Now showing items 43-62 of 91

    • Managing BGP Routes with a BGP Session Multiplexer 

      Valancius, Vytautas; Feamster, Nick (Georgia Institute of Technology, 2008)
      This paper presents the design, implementation, and evaluation of BGP-Mux, a system for providing multiple clients access to a common set of BGP update streams from multiple BGP peers. By providing multiple clients ...
    • Message Ferries as Generalized Dominating Sets in Intermittently Connected Mobile Networks 

      Ammar, Mostafa H.; Polat, Bahadir K.; Sachdeva, Pushkar; Zegura, Ellen W. (Georgia Institute of Technology, 2009)
      Message ferrying is a technique for routing data in wireless and mobile networks in which one or more mobile nodes are tasked with storing and carrying data between sources and destinations. To achieve connectivity between ...
    • Methodical Approximate Hardware Design and Reuse 

      Yazdanbakhsh, Amir; Thwaites, Bradley; Park, Jongse; Esmaeilzadeh, Hadi (Georgia Institute of Technology, 2014)
      Design and reuse of approximate hardware components—digital circuits that may produce inaccurate results—can potentially lead to significant performance and energy improvements. Many emerging error-resilient applications ...
    • A Model of Interdomain Network Formation, Economics and Routing 

      Dhamdhere, Amogh; Dovrolis, Constantine (Georgia Institute of Technology, 2009)
      The Internet at the interdomain level is highly dynamic, as autonomous networks change their connectivity to optimize either monetary cost, profit and/or performance. Internet Service Providers (ISPs), for example, are ...
    • Models for Decision Support in Healthcare 

      Malhotra, Kunal (Georgia Institute of Technology, 2014)
      One of the many challenges in the field of medicine is to make the best decisions about optimal treatment plans for patients. Medical practitioners often have differing opinions about the best treatment among multiple ...
    • NANO: Network Access Neutrality Observatory 

      Tariq, Mukarram Bin; Motiwala, Murtaza; Feamster, Nick (Georgia Institute of Technology, 2008)
      This paper tackles a technical problem that is of growing interest in light of the ongoing network neutrality debate: We aim to develop a system that can reliably determine whether particular ISP is discriminating against ...
    • Network-Wide Prediction of BGP Routes 

      Feamster, Nick; Rexford, Jennifer (Georgia Institute of Technology, 2006)
      This paper presents provably correct algorithms for computing the outcome of the BGP route-selection process for each router in a network, without simulating the complex details of BGP message passing. The algorithms ...
    • Neural Acceleration for GPU Throughput Processors 

      Yazdanbakhsh, Amir; Park, Jongse; Sharma, Hardik; Lotfi-Kamran, Pejman; Esmaeilzadeh, Hadi (Georgia Institute of Technology, 2015)
      General-purpose computing on graphics processing units (GPGPU) accelerates the execution of diverse classes of applications, such as recognition, gaming, data analytics, weather prediction, and multimedia. Many of these ...
    • On the Congestion Responsiveness of Aggregate Internet Traffic: Open-loop vs Closed-loop Session Arrivals 

      Prasad, Ravi S.; Dovrolis, Constantinos (Georgia Institute of Technology, 2006)
      A traffic aggregate is congestion responsive if it reacts to network congestion by reducing its rate. The congestion responsiveness of Internet traffic has been largely attributed to TCP's congestion control. In this ...
    • On the Disparity of Display Security in Mobile and Traditional Web Browsers 

      Amrutkar, Chaitrali; Singh, Kapil; Verma, Arunabh; Traynor, Patrick (Georgia Institute of Technology, 2011)
      Mobile web browsers now provide nearly equivalent features when compared to their desktop counterparts. However, smaller screen size and optimized features for constrained hardware make the web experience on mobile browsers ...
    • One-Time Cookies: Preventing Session Hijacking Attacks with Disposable Credentials 

      Dacosta, Italo; Chakradeo, Saurabh; Ahamad, Mustaque; Traynor, Patrick (Georgia Institute of Technology, 2011)
      Many web applications are vulnerable to session hijacking attacks due to the insecure use of cookies for session management. The most recommended defense against this threat is to completely replace HTTP with HTTPS. ...
    • One-Time Cookies: Preventing Session Hijacking Attacks with Stateless Authentication Tokens 

      Dacosta, Italo; Chakradeo, Saurabh; Ahamad, Mustaque; Traynor, Patrick (Georgia Institute of Technology, 2012-02)
      HTTP cookies are the de facto mechanism for session authentication in web applications. However, their inherent security weaknesses allow attacks against the integrity of web sessions. HTTPS is often recommended to protect ...
    • Operating System Interface Obfuscation and the Revealing of Hidden Operations 

      Srivastava, Abhinav; Lanzi, Andrea; Giffin, Jonathon (Georgia Institute of Technology, 2008)
      Many software security solutions—including malware analyzers, information flow tracking systems, auditing utilities, and host-based intrusion detectors—rely on knowledge of standard system call interfaces to reason about ...
    • Overlay Network Assignment in PlanetLab With NetFinder 

      Zhu, Yong; Ammar, Mostafa H. (Mostafa Hamed) (Georgia Institute of Technology, 2006)
      PlanetLab has been widely used in the networking community to test and deploy user-defined overlays. Serving as a meta testbed to support multiple overlay networks, PlanetLab has significantly lowered the barriers to ...
    • Packets with Provenance 

      Ramachandran, Anirudh; Bhandankar, Kaushik; Tariq, Mukarram Bin; Feamster, Nick (Georgia Institute of Technology, 2008)
      Traffic classification and distinction allows network operators to provision resources, enforce trust, control unwanted traffic, and traceback unwanted traffic to its source. Today’s classification mechanisms rely ...
    • Practical Data-Leak Prevention for Legacy Applications in Enterprise Networks 

      Mundada, Yogesh; Ramachandran, Anirudh; Tariq, Mukarram Bin; Feamster, Nick (Georgia Institute of Technology, 2011)
      Organizations must control where private information spreads; this problem is referred to in the industry as data leak prevention. Commercial solutions for DLP are based on scanning content; these impose high overhead and ...
    • Preventing Attacks on BGP Policies: One Bit is Enough 

      Sundaresan, Srikanth; Lychev, Robert; Valancius, Vytautas (Georgia Institute of Technology, 2011)
      The Internet is comprised of many autonomous systems (AS) managed by independent entities that use the Border Gateway Protocol (BGP) to route their traffic. Although it is the de facto standard for establishing paths ...
    • Privacy Preserving Grapevines: Capturing Social Network Interactions Using Delegatable Anonymous Credentials 

      Balasubramaniyan, Vijay A.; Lee, Younho; Ahamad, Mustaque (Georgia Institute of Technology, 2009)
      A wide variety of services allow users to meet online and communicate with each other, building new social relationships and reinforcing older ones. Unfortunately, malicious entities can exploit such services for fraudulent ...
    • Process Mining, Discovery, and Integration Using Distance Measures 

      Bae, Joonsoo; Caverlee, James; Liu, Ling; Rouse, William B. (Georgia Institute of Technology, 2006)
      Business processes continue to play an important role in today's service-oriented enterprise computing systems. Mining, discovering, and integrating process-oriented services has attracted growing attention in the recent ...
    • Pushing Enterprise Security Down the Network Stack 

      Clark, Russ; Feamster, Nick; Nayak, Ankur; Reimers, Alex (Georgia Institute of Technology, 2009)
      Network security is typically reactive: Networks provide connectivity and subsequently alter this connectivity according to various security policies, as implemented in middleboxes, or at higher layers. This approach ...