Tree-based protocols are ubiquitous in distributed systems. They are flexible, they perform generally well, and, in static conditions, their analysis is mostly simple. Under churn...
Supriya Krishnamurthy, John Ardelius, Erik Aurell,...
In this paper we present GOAFR, a new geometric ad-hoc routing algorithm combining greedy and face routing. We evaluate this algorithm by both rigorous analysis and comprehensive ...
On our ongoing research on variability analysis, two major drawbacks have been identified: a) the lack of an effective tracing from the rationale to the selected variant, and b) t...
Malicious traffic from self-propagating worms and denialof-service attacks constantly threatens the everyday operation of Internet systems. Defending networks from these threats d...
As the utility of wireless technology grows, wireless networks are being deployed in more widely varying conditions. The monitoring of these networks continues to reveal key imple...
Ramya Raghavendra, Elizabeth M. Belding, Konstanti...