-
Chapter
Stream Processing Techniques for Network Management
For network operators, understanding the types and volumes of traffic carried on the Internet is fundamental to maintaining its stability, reliability, security, and performance. Having efficient and comprehen...
-
Chapter and Conference Paper
RadioProphet: Intelligent Radio Resource Deallocation for Cellular Networks
Traditionally, radio resources are released in cellular networks by statically configured inactivity timers, causing substantial resource inefficiencies. We propose a novel system RadioProphet ...
-
Chapter and Conference Paper
Performance Implications of Unilateral Enabling of IPv6
While some IPv6-enabled Web sites such as Google require an explicit opt-in by IPv6-enabled clients before serving them over the IPv6 protocol, we quantify performance implications of unilateral enabling of IPv6 ...
-
Chapter and Conference Paper
How to Reduce Smartphone Traffic Volume by 30%?
The unprecedented growth in smartphone usage has fueled a massive increase in cellular network traffic volumes. We investigate the feasibility of applying Redundancy Elimination (RE) for today’s smartphone tra...
-
Chapter and Conference Paper
Network DVR: A Programmable Framework for Application-Aware Trace Collection
Network traces are essential for a wide range of network applications, including traffic analysis, network measurement, performance monitoring, and security analysis. Existing capture tools do not have suffici...
-
Chapter and Conference Paper
Streams, Security and Scalability
Network-based attacks, such as DDoS attacks and worms, are threatening the continued utility of the Internet. As the variety and the sophistication of attacks grow, early detection of potential attacks will be...
-
Chapter and Conference Paper
Analysis of Communities of Interest in Data Networks
Communities of interest (COI) have been applied in a variety of environments ranging from characterizing the online buying behavior of individuals to detecting fraud in telephone networks...
-
Chapter and Conference Paper
Fast Key Exchange with Elliptic Curve Systems
The Diffie-Hellman key exchange algorithm can be implemented using the group of points on an elliptic curve over the field $$ \mathbb{...