Reproducible network experiments using container-based emulation
In an ideal world, all research papers would be runnable: simply click to replicate all results,
using the same setup as the authors. One approach to enable runnable network systems …
using the same setup as the authors. One approach to enable runnable network systems …
Evolve or die: High-availability design principles drawn from googles network infrastructure
R Govindan, I Minei, M Kallahalla, B Koley… - Proceedings of the 2016 …, 2016 - dl.acm.org
Maintaining the highest levels of availability for content providers is challenging in the face
of scale, network evolution and complexity. Little, however, is known about failures large …
of scale, network evolution and complexity. Little, however, is known about failures large …
An integrated experimental environment for distributed systems and networks
Three experimental environments traditionally support network and distributed systems
research: network emulators, network simulators, and live networks. The continued use of …
research: network emulators, network simulators, and live networks. The continued use of …
Methods, systems, and media for detecting covert malware
BM Bowen, PV Prabhu, VP Kemerlis… - US Patent …, 2013 - Google Patents
Methods, systems, and media for detecting covert malware are provided. In accordance with
some embodiments, a method for detecting covert malware in a computing environ ment is …
some embodiments, a method for detecting covert malware in a computing environ ment is …
Methods, systems, and media for baiting inside attackers
SJ Stolfo, AD Keromytis, BM Bowen… - US Patent …, 2015 - Google Patents
2009-12-05 Assigned to THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF
NEW YORK reassignment THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF …
NEW YORK reassignment THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF …
[HTML][HTML] Handling churn in a DHT
S Rhea, D Geels, T Roscoe, J Kubiatowicz - Proceedings of the USENIX …, 2004 - usenix.org
This paper addresses the problem of churn--the continuous process of node arrival and
departure--in distributed hash tables (DHTs). We argue that DHTs should perform lookups …
departure--in distributed hash tables (DHTs). We argue that DHTs should perform lookups …
Methods, systems, and media for masquerade attack detection by monitoring computer user behavior
Methods, systems, and media for masquerade attack detec tion by monitoring computer user
behavior are provided. In accordance with some embodiments, a method for detecting …
behavior are provided. In accordance with some embodiments, a method for detecting …
In VINI veritas: realistic and controlled network experimentation
This paper describes VINI, a virtual network infrastructure that allows network researchers to
evaluate their protocols and services in a realistic environment that also provides a high …
evaluate their protocols and services in a realistic environment that also provides a high …
Dummynet revisited
M Carbone, L Rizzo - ACM SIGCOMM Computer Communication …, 2010 - dl.acm.org
Dummynet is a widely used link emulator, developed long ago to run experiments in user-
configurable network environments. Since its original design, our system has been extended …
configurable network environments. Since its original design, our system has been extended …
Simgrid: A generic framework for large-scale distributed experiments
H Casanova, A Legrand… - … Conference on Computer …, 2008 - ieeexplore.ieee.org
Distributed computing is a very broad and active research area comprising fields such as
cluster computing, computational grids, desktop grids and peer-to-peer (P2P) systems …
cluster computing, computational grids, desktop grids and peer-to-peer (P2P) systems …