Moving beyond end-to-end path information to optimize CDN performance

R Krishnan, HV Madhyastha, S Srinivasan… - Proceedings of the 9th …, 2009 - dl.acm.org
Replicating content across a geographically distributed set of servers and redirecting clients
to the closest server in terms of latency has emerged as a common paradigm for improving …

A trace-driven analysis of caching in content-centric networks

G Tyson, S Kaune, S Miles, Y El-Khatib… - 2012 21st …, 2012 - ieeexplore.ieee.org
A content-centric network is one which supports host-to-content routing, rather than the host-
to-host routing of the existing Internet. This paper investigates the potential of caching data …

LASTor: A low-latency AS-aware Tor client

M Akhoondi, C Yu… - 2012 IEEE Symposium on …, 2012 - ieeexplore.ieee.org
The widely used Tor anonymity network is designed to enable low-latency anonymous
communication. However, in practice, interactive communication on Tor-which accounts for …

Lightweight source authentication and path validation

THJ Kim, C Basescu, L Jia, SB Lee, YC Hu… - Proceedings of the 2014 …, 2014 - dl.acm.org
In-network source authentication and path validation are fundamental primitives to construct
higher-level security mechanisms such as DDoS mitigation, path compliance, packet …

Matchmaking for online games and other latency-sensitive P2P systems

S Agarwal, JR Lorch - Proceedings of the ACM SIGCOMM 2009 …, 2009 - dl.acm.org
The latency between machines on the Internet can dramatically affect users' experience for
many distributed applications. Particularly, in multiplayer online games, players seek to …

LIFEGUARD: Practical repair of persistent route failures

E Katz-Bassett, C Scott, DR Choffnes, Í Cunha… - ACM SIGCOMM …, 2012 - dl.acm.org
The Internet was designed to always find a route if there is a policy-compliant path.
However, in many cases, connectivity is disrupted despite the existence of an underlying …

Investigating interdomain routing policies in the wild

R Anwar, H Niaz, D Choffnes, Í Cunha, P Gill… - Proceedings of the …, 2015 - dl.acm.org
Models of Internet routing are critical for studies of Internet security, reliability and evolution,
which often rely on simulations of the Internet's routing system. Accurate models are difficult …

Slice embedding solutions for distributed service architectures

F Esposito, I Matta, V Ishakian - ACM Computing Surveys (CSUR), 2013 - dl.acm.org
Network virtualization provides a novel approach to running multiple concurrent virtual
networks over a common physical network infrastructure. From a research perspective, this …

Compressing IP forwarding tables: Towards entropy bounds and beyond

G Rétvári, J Tapolcai, A Kőrösi, A Majdán… - Proceedings of the …, 2013 - dl.acm.org
Lately, there has been an upsurge of interest in compressed data structures, aiming to pack
ever larger quantities of information into constrained memory without sacrificing the …

The resource public key infrastructure (RPKI): A survey on measurements and future prospects

N Rodday, Í Cunha, R Bush… - IEEE transactions on …, 2023 - ieeexplore.ieee.org
The adoption of the Resource Public Key Infrastructure (RPKI) is increasing. To better
understand and improve RPKI deployment, measuring route origin authorization (ROA) …