Low latency via redundancy

A Vulimiri, PB Godfrey, R Mittal, J Sherry… - Proceedings of the …, 2013 - dl.acm.org
Low latency is critical for interactive networked applications. But while we know how to scale
systems to increase capacity, reducing latency---especially the tail of the latency distribution …

More is less: reducing latency via redundancy

A Vulimiri, O Michel, PB Godfrey… - Proceedings of the 11th …, 2012 - dl.acm.org
Low latency is critical for interactive networked applications. But while we know how to scale
systems to increase capacity, reducing latency---especially the tail of the latency distribution …

Linkscope: Toward detecting target link flooding attacks

L Xue, X Ma, X Luo, EWW Chan… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
A new class of target link flooding attacks (LFAs) can cut off the Internet connections of a
target area without being detected, because they employ legitimate flows to congest …

Towards detecting target link flooding attack

L Xue, X Luo, EWW Chan, X Zhan - 28th Large Installation System …, 2014 - usenix.org
A new class of target link flooding attacks (LFA) can cut off the Internet connections of a
target area without being detected because they employ legitimate flows to congest selected …

Non-cooperative diagnosis of submarine cable faults

EWW Chan, X Luo, WWT Fok, W Li… - Passive and Active …, 2011 - Springer
Submarine cable faults are not uncommon events in the Internet today. However, their
impacts on end-to-end path quality have received almost no attention. In this paper, we …

[PDF][PDF] 一种基于控制平面测量的光突发交换网络动态偏置时间算法

牛大伟, 彭来献, 于卫波, 米志超, 赵文栋, 王海 - 电子与信息学报, 2012 - edit.jeit.ac.cn
该文提出一种基于控制平面背景流量测量方法的动态偏置时间算法. 该算法以控制平面的探测突
发丢失率为依据, 估计瓶颈核心节点的背景流量, 并据此动态设置偏置时间 …

[图书][B] Latency-bandwidth tradeoffs in Internet applications

A Vulimiri - 2015 - search.proquest.com
Wide-area Internet links are slow, expensive, and unreliable. This affects applications in two
distinct ways. Back-end data processing applications, which need to transfer large amounts …

[PDF][PDF] Network Path Monitoring

BB Halis, F Wiedner, M Helm - Network, 2022 - net.in.tum.de
Network path monitoring is an important feature of modern networks. It enables to
understand the behavior of the network. However, a network is a complex structure, and …

Network attack detection method

L Xue, Z Liu, X Zou, J Hou, LUO Xiapu… - US Patent …, 2019 - Google Patents
It is described a network attack detection method. A topol ogy analysis on network is
conducted to obtain a probing path set containing at least one probing path. A first probing …

Network attack detection method

L Xue, Z Liu, X Zou, J Hou, LUO Xiapu… - US Patent …, 2018 - Google Patents
It is described a network attack detection method. A topology analysis on network is
conducted to obtain a probing path set containing at least one probing path. A first probing …