Layering as optimization decomposition: A mathematical theory of network architectures

M Chiang, SH Low, AR Calderbank… - Proceedings of the …, 2007 - ieeexplore.ieee.org
Network protocols in layered architectures have historically been obtained on an ad hoc
basis, and many of the recent cross-layer designs are also conducted through piecemeal …

A general approach to network configuration verification

R Beckett, A Gupta, R Mahajan, D Walker - … of the Conference of the ACM …, 2017 - dl.acm.org
We present Minesweeper, a tool to verify that a network satisfies a wide range of intended
properties such as reachability or isolation among nodes, waypointing, black holes …

On removing routing protocol from future wireless networks: A real-time deep learning approach for intelligent traffic control

F Tang, B Mao, ZM Fadlullah, N Kato… - IEEE Wireless …, 2017 - ieeexplore.ieee.org
Recently, deep learning has appeared as a breakthrough machine learning technique for
various areas in computer science as well as other disciplines. However, the application of …

[КНИГА][B] Cloud computing: theory and practice

DC Marinescu - 2022 - books.google.com
Cloud Computing: Theory and Practice, Third Edition provides students and IT professionals
with an in-depth analysis of the cloud from the ground up. After an introduction to network …

A survey on network verification and testing with formal methods: Approaches and challenges

Y Li, X Yin, Z Wang, J Yao, X Shi, J Wu… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Networks have grown increasingly complicated. Violations of intended policies can
compromise network availability and network reliability. Network operators need to ensure …

Efficient network reachability analysis using a succinct control plane representation

SK Fayaz, T Sharma, A Fogel, R Mahajan… - … USENIX Symposium on …, 2016 - usenix.org
To guarantee network availability and security, operators must ensure that their reachability
policies (eg, A can or cannot talk to B) are correctly implemented. This is a difficult task due …

The complete guide to scion

L Chuat, M Legner, D Basin, D Hausheer, S Hitz… - Information Security and …, 2022 - Springer
The first SCION book, published in 2017, summarized the results of eight years of work by
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …

How (not) to predict elections

PT Metaxas, E Mustafaraj… - 2011 ieee third …, 2011 - ieeexplore.ieee.org
Using social media for political discourse is increasingly becoming common practice,
especially around election time. Arguably, one of the most interesting aspects of this trend is …

In VINI veritas: realistic and controlled network experimentation

A Bavier, N Feamster, M Huang, L Peterson… - Proceedings of the …, 2006 - dl.acm.org
This paper describes VINI, a virtual network infrastructure that allows network researchers to
evaluate their protocols and services in a realistic environment that also provides a high …

[PDF][PDF] Detecting BGP configuration faults with static analysis

N Feamster, H Balakrishnan - Proceedings of the 2nd conference on …, 2005 - usenix.org
The Internet is composed of many independent autonomous systems (ASes) that exchange
reachability information to destinations using the Border Gateway Protocol (BGP). Network …