Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Frank Cangialosi"'
Autor:
Frank Cangialosi, Akshay Narayan
Publikováno v:
Proceedings of the 5th International Workshop on Practical Reproducible Evaluation of Computer Systems.
Autor:
Hari Balakrishnan, Frank Cangialosi, Prateesh Goyal, Mohammad Alizadeh, Akshay Narayan, Radhika Mittal
Publikováno v:
EuroSys
Queues allow network operators to control traffic: where queues build, they can enforce scheduling and shaping policies. In the Internet today, however, there is a mismatch between where queues build and where control is most effectively enforced; qu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::77060f8bc3879ada56d85bda180e679b
http://arxiv.org/abs/2011.01258
http://arxiv.org/abs/2011.01258
Autor:
Hari Balakrishnan, Radhika Mittal, Prateesh Goyal, Mohammad Alizadeh, Frank Cangialosi, Deepti Raghavan, Akshay Narayan, Srinivas Narayana
Publikováno v:
MIT web domain
SIGCOMM
ANRW
SIGCOMM
ANRW
The Congestion Control Plane (CCP) is a new way to structure congestion control functions at the sender by removing them from the datapath. With CCP, each datapath such as the Linux Kernel TCP, UDP-based QUIC, or kernel-bypass transports like mTCP/DP
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9fe6fbc3b32735a4e00baa7ccacc017a
https://hdl.handle.net/1721.1/137387
https://hdl.handle.net/1721.1/137387
Autor:
Frank Cangialosi, Deepti Raghavan, Prateesh Goyal, Mohammad Alizadeh, Akshay Narayan, Hari Balakrishnan, Srinivas Narayana
Publikováno v:
ANRW
MIT web domain
MIT web domain
This paper develops a technique to detect whether the cross traffic competing with a flow is elastic or not, and shows how to use the elasticity detector to improve congestion control. If the cross traffic is elastic, i.e., made up of buffer-filling
Autor:
Prateesh Goyal, Akshay Narayan, Frank Cangialosi, Srinivas Narayana, Mohammad Alizadeh, Hari Balakrishnan
This paper introduces Nimbus, a robust technique to detect whether the cross traffic competing with a flow is "elastic", and shows that this elasticity detector improves congestion control. If cross traffic is inelastic, then a sender can control que
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::80e5f13c438c8366cef0ccc6f89e978d
Autor:
Hari Balakrishnan, Frank Cangialosi, Akshay Narayan, Prateesh Goyal, Mohammad Alizadeh, Srinivas Narayana
Publikováno v:
MIT web domain
HotNets
HotNets
© 2017 Copyright held by the owner/author(s). With Moore's law ending, the gap between general-purpose processor speeds and network link rates is widening. This trend has led to new packet-processing "datapaths" in endpoints, including kernel bypass
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e2036b19a016159caa1073f59c539c72
https://hdl.handle.net/1721.1/137372
https://hdl.handle.net/1721.1/137372
Autor:
Bruce M. Maggs, Frank Cangialosi, Alan Mislove, Taejoong Chung, Dave Levin, David Choffnes, Christo Wilson
Publikováno v:
ACM Conference on Computer and Communications Security
The semantics of online authentication in the web are rather straightforward: if Alice has a certificate binding Bob's name to a public key, and if a remote entity can prove knowledge of Bob's private key, then (barring key compromise) that remote en
Publikováno v:
2016 IEEE Wireless Power Transfer Conference (WPTC).
We investigate the application of time reversed electromagnetic wave propagation to transmit energy to a moving target in a reverberant environment. “Time reversal” is a signal focusing method that exploits the time reversal invariance of the los
Publikováno v:
EuroSys
Cloud computing has evolved to meet user demands, from arbitrary VMs offered by IaaS to the narrow application interfaces of PaaS. Unfortunately, there exists an intermediate point that is not well met by today's offerings: users who wish to run arbi
Publikováno v:
Internet Measurement Conference
Tor is a peer-to-peer overlay routing network that achieves unlinkable communication between source and destination.Unlike traditional mix-nets, Tor seeks to balance anonymity and performance, particularly with respect to providing low-latency commun