Reducing web latency: the virtue of gentle aggression

T Flach, N Dukkipati, A Terzis, B Raghavan… - Proceedings of the …, 2013 - dl.acm.org
To serve users quickly, Web service providers build infrastructure closer to clients and use
multi-stage transport connections. Although these changes reduce client-perceived round …

Contention resolution with log-logstar channel accesses

MA Bender, T Kopelowitz, S Pettie… - Proceedings of the forty …, 2016 - dl.acm.org
For decades, randomized exponential backoff has provided a critical algorithmic building
block in situations where multiple devices seek access to a shared resource. Surprisingly …

How to scale exponential backoff: Constant throughput, polylog access attempts, and robustness

MA Bender, JT Fineman, S Gilbert, M Young - Proceedings of the Twenty …, 2016 - SIAM
Randomized exponential backoff is a widely deployed technique for coordinating access to
a shared resource. A good backoff protocol should, arguably, satisfy three natural …

Contention resolution without collision detection

MA Bender, T Kopelowitz, W Kuszmaul… - Proceedings of the 52nd …, 2020 - dl.acm.org
This paper focuses on the contention resolution problem on a shared communication
channel that does not support collision detection. A shared communication channel is a …

Multipath aggregation of heterogeneous access networks

D Kaspar - ACM SIGMultimedia Records, 2012 - dl.acm.org
The explosive deployment of wired and wireless communication infrastructure has recently
enabled many novel applications and sparked new research problems. One of the unsolved …

Scaling exponential backoff: constant throughput, polylogarithmic channel-access attempts, and robustness

MA Bender, JT Fineman, S Gilbert… - Journal of the ACM (JACM), 2018 - dl.acm.org
Randomized exponential backoff is a widely deployed technique for coordinating access to
a shared resource. A good backoff protocol should, arguably, satisfy three natural …

A longitudinal view of http traffic

T Callahan, M Allman, V Paxson - … , PAM 2010, Zurich, Switzerland, April 7 …, 2010 - Springer
In this paper we analyze three and a half years of HTTP traffic observed at a small research
institute to characterize the evolution of various facets of web operation. While our dataset is …

Contention resolution with constant throughput and log-logstar channel accesses

MA Bender, T Kopelowitz, S Pettie, M Young - SIAM Journal on Computing, 2018 - SIAM
For decades, randomized exponential backoff has provided a critical algorithmic building
block in situations where multiple devices seek access to a shared resource. Despite this …

Contention resolution with message deadlines

K Agrawal, MA Bender, JT Fineman, S Gilbert… - Proceedings of the …, 2020 - dl.acm.org
In the contention-resolution problem, multiple players contend for access to a shared
resource. Contention resolution is used in wireless networks, where messages must be …

Windowed backoff algorithms for WiFi: theory and performance under batched arrivals

WC Anderton, T Chakraborty, M Young - Distributed Computing, 2021 - Springer
Binary exponential backoff (BEB) is a decades-old algorithm for coordinating access to a
shared channel. In modern networks, BEB plays a crucial role in WiFi and other wireless …