Search For:

Displaying 1-39 out of 39 total
Proxy Cache Coherency and Replacement - Towards a More Complete Picture
Found in: Distributed Computing Systems, International Conference on
By Balachander Krishnamurthy, Craig E. Wills
Issue Date:June 1999
pp. 0332
This work studies the interaction of Web proxy cache coherency and replacement policies using trace-driven simulations. We specifically examine the relative importance of each type of policy in affecting the overall costs, the potential of incorporating co...
 
Privacy and online social networks: can colorless green ideas sleep furiously?
Found in: IEEE Security & Privacy
By Balachander Krishnamurthy
Issue Date:May 2013
pp. 14-20
One definition of privacy is the selective revelation of information about oneself. With billions of people using social media, it's increasingly difficult for users to control what they're disclosing and to whom. Current privacy protection measures block ...
 
On stationarity in Internet measurements through an information-theoretic lens
Found in: Data Engineering Workshops, 22nd International Conference on
By Balachander Krishnamurthy, Suresh Venkatasubramanian, Harsha V. Madhyastha
Issue Date:April 2005
pp. 1185
<p>Streaming change detection schemes are of great interest in the context of data warehouses, data cleaning systems, network traffic anomaly detection and other measurement scenarios. The goal of change detection systems is to determine whether fund...
 
Software Reuse Metrics for an Industrial Project
Found in: Software Metrics, IEEE International Symposium on
By Richard N. Ferri, Raghavan N. Pratiwadi, Lynn M. Rivera, Mohammed Shakir, John J. Snyder, D. W. Thomas, Yih-Farn Chen, Glenn S. Fowler, Balachander Krishnamurthy, Kiem-Phong Vo
Issue Date:November 1997
pp. 165
In 1990 a project was established at AT&T to build applications that manage telephone systems. Since then the project has successfully completed over 20 applications comprising about 500,000 lines of source code. These systems are used daily by hundred...
 
Yeast: A General Purpose Event-Action System
Found in: IEEE Transactions on Software Engineering
By Balachander Krishnamurthy, David S. Rosenblum
Issue Date:October 1995
pp. 845-857
Distributed networks of personal workstations are becoming the dominant computing environment for software development organizations. Many cooperative activities that are carried out in such environments are particularly well suited for automated support. ...
 
Using Event Contexts and Matching Constraints to Monitor Software Processes
Found in: Software Engineering, International Conference on
By Naser S. Barghouti, Balachander Krishnamurthy
Issue Date:April 1995
pp. 83
Automated monitoring of events that occur in a computer network is essential for non-intrusive software process enactment. Relevant events include modification of product artifacts like source files and documents, and execution and termination of tool invo...
 
Privacy awareness about information leakage: who knows what about me?
Found in: Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society (WPES '13)
By Andrea Petta, Raffaele Spinelli, Vittorio Scarano, Balachander Krishnamurthy, Delfina Malandrino, Luigi Serra
Issue Date:November 2013
pp. 279-284
The task of protecting users' privacy is made more difficult by their attitudes towards information disclosure without full awareness and the economics of the tracking and advertising industry. Even after numerous press reports and widespread disclosure of...
     
Beyond friendship: modeling user activity graphs on social network-based gifting applications
Found in: Proceedings of the 2012 ACM conference on Internet measurement conference (IMC '12)
By Alex Waagen, Atif Nazir, Balachander Krishnamurthy, Chen-Nee Chuah, Raissa M. D'Souza, Vikram S. Vijayaraghavan
Issue Date:November 2012
pp. 467-480
We employ user activity data from three highly popular gifting applications on Facebook to study the evolution of user activity on applications through the most commonly-used growth mechanism, namely Application Requests. We find user activity graphs diffe...
     
Towards an AS-to-organization map
Found in: Proceedings of the 10th annual conference on Internet measurement (IMC '10)
By Balachander Krishnamurthy, John Heidemann, Walter Willinger, Xue Cai
Issue Date:November 2010
pp. 199-205
An understanding of Internet topology is central to answer various questions ranging from network resilience to peer selection or data center location. While much of prior work has examined AS-level connectivity, meaningful and relevant results from such a...
     
IXPs: mapped?
Found in: Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference (IMC '09)
By Balachander Krishnamurthy, Brice Augustin, Walter Willinger
Issue Date:November 2009
pp. 336-349
Internet exchange points (IXPs) are an important ingredient of the Internet AS-level ecosystem - a logical fabric of the Internet made up of about 30,000 ASes and their mutual business relationships whose primary purpose is to control and manage the flow o...
     
Network level footprints of facebook applications
Found in: Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference (IMC '09)
By Atif Nazir, Balachander Krishnamurthy, Chen-Nee Chuah, Dhruv Gupta, Saqib Raza
Issue Date:November 2009
pp. 63-75
With over half a billion users, Online Social Networks (OSNs) are the major new applications on the Internet. Little information is available on the network impact of OSNs, although there is every expectation that the volume and diversity of traffic due to...
     
Understanding online social network usage from a network perspective
Found in: Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference (IMC '09)
By Anja Feldmann, Balachander Krishnamurthy, Fabian Schneider, Walter Willinger
Issue Date:November 2009
pp. 35-48
Online Social Networks (OSNs) have already attracted more than half a billion users. However, our understanding of which OSN features attract and keep the attention of these users is poor. Studies thus far have relied on surveys or interviews of OSN users ...
     
On the leakage of personally identifiable information via online social networks
Found in: Proceedings of the 2nd ACM workshop on Online social networks (WOSN '09)
By Balachander Krishnamurthy, Craig E. Wills
Issue Date:August 2009
pp. 101-104
For purposes of this paper, we define "Personally identifiable information" (PII) as information which can be used to distinguish or trace an individual's identity either alone or when combined with other information that is linkable to a specific individu...
     
Privacy diffusion on the web: a longitudinal perspective
Found in: Proceedings of the 18th international conference on World wide web (WWW '09)
By Balachander Krishnamurthy, Craig Wills
Issue Date:April 2009
pp. 66-66
For the last few years we have been studying the diffusion of private information for users as they visit various Web sites triggering data gathering aggregation by third parties. This paper reports on our longitudinal study consisting of multiple snapshot...
     
Measuring privacy loss and the impact of privacy protection in web browsing
Found in: Proceedings of the 3rd symposium on Usable privacy and security (SOUPS '07)
By Balachander Krishnamurthy, Craig E. Wills, Delfina Malandrino
Issue Date:July 2007
pp. 52-63
Various bits of information about users accessing Web sites. some of which are private, have been gathered since the inception of the Web. Increasingly the gathering, aggregation, and processing has been outsourced to third parties. The goal of this work i...
     
Generating a privacy footprint on the internet
Found in: Proceedings of the 6th ACM SIGCOMM on Internet measurement (IMC '06)
By Balachander Krishnamurthy, Craig E. Wills
Issue Date:October 2006
pp. 65-70
As a follow up to characterizing traffic deemed as unwanted by Web clients such as advertisements, we examine how information related to individual users is aggregated as a result of browsing seemingly unrelated Web sites. We examine the privacy diffusion ...
     
Cat and mouse: content delivery tradeoffs in web access
Found in: Proceedings of the 15th international conference on World Wide Web (WWW '06)
By Balachander Krishnamurthy, Craig E. Wills
Issue Date:May 2006
pp. 337-346
Web pages include extraneous material that may be viewed as undesirable by a user. Increasingly many Web sites also require users to register to access either all or portions of the site. Such tension between content owners and users has resulted in a "cat...
     
Collaborating against common enemies
Found in: Proceedings of the 5th ACM SIGCOMM conference on Internet measurement (IMC '05)
By Balachander Krishnamurthy
Issue Date:October 2005
pp. 55-62
This paper presents the first wide-scale study of correlated attacks, i.e., attacks mounted by the same source IP against different networks. Using a large dataset from 1700 intrusion detection systems (IDSs), we show that correlated attacks are prevalent ...
     
Predicting short-transfer latency from TCP arcana: a trace-based validation
Found in: Proceedings of the 5th ACM SIGCOMM conference on Internet measurement (IMC '05)
By Balachander Krishnamurthy
Issue Date:October 2005
pp. 55-62
In some contexts it may be useful to predict the latency for short TCP transfers. For example, a Web server could automatically tailor its content depending on the network path to each client, or an "opportunistic networking" application could improve its ...
     
ATMEN: a triggered network measurement infrastructure
Found in: Proceedings of the 14th international conference on World Wide Web (WWW '05)
By Balachander Krishnamurthy, Harsha V. Madhyastha, Oliver Spatscheck
Issue Date:May 2005
pp. 499-509
Web performance measurements and availability tests have been carried out using a variety of infrastructures over the last several years. Disruptions in the Internet can lead to Web sites being unavailable or increase user-perceived latency. The unavailabi...
     
On the responsiveness of DNS-based network control
Found in: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement (IMC '04)
By Aditya Akella, Anees Shaikh, Balachander Krishnamurthy, Jeffrey Pang, Srinivasan Seshan
Issue Date:October 2004
pp. 21-26
For the last few years, large Web content providers interested in improving their scalability and availability have increasingly turned to three techniques: mirroring, content distribution, and ISP multihoming. The Domain Name System (DNS) has gained a pro...
     
Mohonk: mobile honeypots to trace unwanted traffic early
Found in: Proceedings of the ACM SIGCOMM workshop on Network troubleshooting: research, theory and operations practice meet malfunctioning reality (NetT '04)
By Balachander Krishnamurthy
Issue Date:September 2004
pp. 277-282
Honeypots have been traditionally used to advertise dark address space and gather information about originators of traffic to such addresses. With simple thresholding mechanisms this technique has shown itself to be fairly effective in identifying suspicio...
     
DEW: DNS-enhanced web for faster content delivery
Found in: Proceedings of the twelfth international conference on World Wide Web (WWW '03)
By Balachander Krishnamurthy, Michael Rabinovich, Richard Liston
Issue Date:May 2003
pp. 310-320
With a key component of latency on the Web being connection set up between clients and Web servers, several ways to avoid connections have been explored. While the work in recent years on Content Distribution Networks (CDNs) have moved some content 'closer...
     
Design, implementation, and evaluation of a client characterization driven web server
Found in: Proceedings of the twelfth international conference on World Wide Web (WWW '03)
By Balachander Krishnamurthy, Craig E. Wills, Kashi Vishwanath, Yin Zhang
Issue Date:May 2003
pp. 138-147
In earlier work we proposed a way for a Web server to detect connectivity information about clients accessing it in order to take tailored actions for a client request. This paper describes the design, implementation, and evaluation of such a working syste...
     
Preliminary measurements on the effect of server adaptation for web content delivery
Found in: Proceedings of the second ACM SIGCOMM Workshop on Internet measurment workshop (IMW '02)
By Balachander Krishnamurthy, Craig Wills, Yin Zhang
Issue Date:November 2002
pp. 323-324
We study the patterns and predictability of Internet End-to-End service degradations, where a degradation is a significant deviation of the round trip time between a client and a server. We use simultaneous RTT measurements collected from several locations...
     
Traffic classification for application specific peering
Found in: Proceedings of the second ACM SIGCOMM Workshop on Internet measurment workshop (IMW '02)
By Balachander Krishnamurthy, Jia Wang
Issue Date:November 2002
pp. 179-180
Traffic measurement often focuses on measuring traffic at various granularities. Our paper considers an approach that generalizes previous solutions: we define a traffic cluster to consist of all traffic that matches a specified set of values for certain h...
     
Improving web performance by client characterization driven server adaptation
Found in: Proceedings of the eleventh international conference on World Wide Web (WWW '02)
By Balachander Krishnamurthy, Craig E. Wills
Issue Date:May 2002
pp. 305-316
We categorize the set of clients communicating with a server on the Web based on information that can be determined by the server. The Web server uses the information to direct tailored actions. Users with poor connectivity may choose not to stay at a Web ...
     
Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites
Found in: Proceedings of the eleventh international conference on World Wide Web (WWW '02)
By Balachander Krishnamurthy, Jaeyeon Jung, Michael Rabinovich
Issue Date:May 2002
pp. 293-304
The paper studies two types of events that often overload Web sites to a point when their services are degraded or disrupted entirely - flash events (FEs) and denial of service attacks (DoS). The former are created by legitimate requests and the latter con...
     
On the use and performance of content distribution networks
Found in: Proceedings of the First ACM SIGCOMM Workshop on Internet Measurement Workshop (IMW '01)
By Balachander Krishnamurthy, Craig Wills, Yin Zhang
Issue Date:November 2001
pp. 169-182
Content distribution networks (CDNs) are a mechanism to deliver content to end users on behalf of origin Web sites. Content distribution offloads work from origin servers by serving some or all of the contents of Web pages. We found an order of magnitude i...
     
Early measurements of a cluster-based architecture for P2P systems
Found in: Proceedings of the First ACM SIGCOMM Workshop on Internet Measurement Workshop (IMW '01)
By Balachander Krishnamurthy, Jia Wang, Yinglian Xie
Issue Date:November 2001
pp. 105-109
Most network traffic analysis and modeling studies lump all connections together into a single flow. Such aggregate traffic typically exhibits long-range-dependent (LRD) correlations and non-Gaussian marginal distributions. Importantly, in a typical aggreg...
     
Characterizing large DNS traces using graphs
Found in: Proceedings of the First ACM SIGCOMM Workshop on Internet Measurement Workshop (IMW '01)
By Balachander Krishnamurthy, Charles D. Cranor, Emden Gansner, Oliver Spatscheck
Issue Date:November 2001
pp. 55-67
The increasing deployment of overlay networks that rely on DNS tricks has led to added interest in examining DNS traffic. In this paper we report on a characterization of DNS traffic gathered over a period of several weeks at Internet Gateway Routers (IGRs...
     
Topology modeling via cluster graphs
Found in: Proceedings of the First ACM SIGCOMM Workshop on Internet Measurement Workshop (IMW '01)
By Balachander Krishnamurthy, Jia Wang
Issue Date:November 2001
pp. 19-23
Several recent studies have focused on generating Internet topology graphs. Topology graphs have been used to predict growth patterns of prefixes and traffic flow as well as for designing better protocols. Internet topology graphs can be studied at eitherm...
     
On network-aware clustering of Web clients
Found in: Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM '00)
By Balachander Krishnamurthy, Jia Wang
Issue Date:August 2000
pp. 406-415
Being able to identify the groups of clients that are responsible for a significant portion of a Web site's requests can be helpful to both the Web site and the clients. In a Web application, it is beneficial to move content closer to groups of clients tha...
     
Focusing search in hierarchical structures with directory sets
Found in: Proceedings of the seventh international conference on Information and knowledge management (CIKM '98)
By Balachander Krishnamurthy, Dan Suciu, Divesh Srivastava, Guy Jacobson
Issue Date:November 1998
pp. 1-9
This paper focuses on the consistency issues related to integrating multiple sets of spatial data in spatial information systems such as Geographic Information Systems (GISs). Data sets to be integrated are assumed to hold information about the same geogra...
     
High-level constructs in the READY event notification system
Found in: Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications (EW-8)
By Balachander Krishnamurthy, Euthimios Panagos, Robert E. Gruber
Issue Date:September 1998
pp. 195-202
The predominant use of point-to-point communication protocols on the global Internet, combined with the communication patterns imposed by the World Wide Web, make inefficient use of the Internet's increasingly scarce network bandwidth. While more network f...
     
Improving end-to-end performance of the Web using server volumes and proxy filters
Found in: Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication (SIGCOMM '98)
By Balachander Krishnamurthy, Edith Cohen, Jennifer Rexford
Issue Date:August 1998
pp. 406-415
The rapid growth of the World Wide Web has caused serious performance degradation on the Internet. This paper offers an end-to-end approach to improving Web performance by collectively examining the Web components --- clients, proxies, servers, and the net...
     
Potential benefits of delta encoding and data compression for HTTP
Found in: Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication (SIGCOMM '97)
By Anja Feldmann, Balachander Krishnamurthy, Fred Douglis, Jeffrey C. Mogul
Issue Date:September 1997
pp. 406-415
Caching in the World Wide Web currently follows a naive model, which assumes that resources are referenced many times between changes. The model also provides no way to update a cache entry if a resource does change, except by transferring the resource's e...
     
Using event contexts and matching constraints to monitor software processes
Found in: Proceedings of the 17th international conference on Software engineering (ICSE '95)
By Balachander Krishnamurthy, Naser S. Barghouti
Issue Date:April 1995
pp. 83-92
One popular use for Haskell in recent years has been as a host language for domain-specific embedded languages. But how can one embed a postfix language in Haskell, given that Haskell only supports prefix and infix syntax? This paper describes several such...
     
An event-based model of software configuration management
Found in: Proceedings of the 3rd international workshop on Software configuration management
By Balachander Krishnamurthy, David S. Rosenblum
Issue Date:June 1991
pp. 94-97
The MONSYS (MONtage SYStem) method and tool has been developed by the SIEMENS Systems Development . Division with the objective to increase the efficiency and quality of the integration process for the BS2000 System Software. Presently MONSYS is used to in...
     
 1