Search For:

Displaying 1-13 out of 13 total
Robust Information Dissemination in Uncooperative Environments
Found in: Distributed Computing Systems, International Conference on
By Seung Jun, Mustaque Ahamad, Jun (Jim) Xu
Issue Date:June 2005
pp. 293-302
The open nature of peer-to-peer systems has played an important role in their growing popularity. The current file-sharing applications, for instance, have been widely used largely because they allow anyone to participate in them. This openness, however, b...
 
Robust Statistics Counter Arrays with Interleaved Memories
Found in: IEEE Transactions on Parallel and Distributed Systems
By Hao Wang,Bill Lin,Jun Jim Xu
Issue Date:September 2013
pp. 1894-1907
Statistics counters are essential in network measurement on tracking various network statistics and implementing various network counting sketches. For such applications it is crucial to maintain a large number of statistics counters at very high speeds. O...
 
Hint-based Routing in WSNs using Scope Decay Bloom Filters
Found in: Networking, Architecture, and Storages, International Workshop on
By Xiuqi Li, Jie Wu, Jun (Jim) Xu
Issue Date:August 2006
pp. 111-118
In existing query-based routing protocols in wireless sensor networks (WSNs), a node either keeps precise route information to desired events, such as in event flooding, or does not keep any route to desired events such as in query flooding. In this paper,...
 
Scalable and Efficient Data Streaming Algorithms for Detecting Common Content in Internet Traffic
Found in: Data Engineering Workshops, 22nd International Conference on
By Minho Sung, Abhishek Kumar, Li (Erran) Li, Jia Wang, Jun (Jim) Xu
Issue Date:April 2006
pp. 27
Recent research on data streaming algorithms has provided powerful tools to efficiently monitor various characteristics of traffic passing through a single network link or node. However, it is often desirable to perform data streaming analysis on the traff...
 
Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation
Found in: Security and Privacy, IEEE Symposium on
By Jun Li, Minho Sung, Jun (Jim) Xu, Li (Erran) Li
Issue Date:May 2004
pp. 115
Tracing attack packets to their sources, known as IP traceback, is an important step to counter distributed denial-of-service (DDoS) attacks. In this paper, we propose a novel packet logging based (i.e., hash-based) traceback scheme that requires an order ...
 
Ulysses: A Robust, Low-Diameter, Low-Latency Peer-ti-Peer Network
Found in: Network Protocols, IEEE International Conference on
By Abhishek Kumar, Shashidhar Merugu, Jun (Jim) Xu, Xingxing Yu
Issue Date:November 2003
pp. 258
A number of Distributed Hash Table (DHT)-based protocols have been proposed to address the issue of scalability in peer-to-peer networks. In this paper, we present Ulysses, a peer-to-peer network based on the butterfly topology that achieves the theoretica...
 
Design and performance analysis of a DRAM-based statistics counter array architecture
Found in: Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS '09)
By Bill Lin, Haiquan (Chuck) Zhao, Hao Wang, Jun (Jim) Xu
Issue Date:October 2010
pp. 84-93
The problem of maintaining efficiently a large number (say millions) of statistics counters that need to be updated at very high speeds (e.g. 40 Gb/s) has received considerable research attention in recent years. This problem arises in a variety of router ...
     
Packet doppler: network monitoring using packet shift detection
Found in: Proceedings of the 2008 ACM CoNEXT Conference (CONEXT '08)
By Hao Wang, Jian Ni, Jun Jim Xu, Nan Hua, Tongqing Qiu, Y. Richard Yang
Issue Date:December 2008
pp. 1-12
Due to recent large-scale deployments of delay and loss-sensitive applications, there are increasingly stringent demands on the monitoring of service level agreement metrics. Although many end-to-end monitoring methods have been proposed, they are mainly b...
     
BRICK: a novel exact active statistics counter architecture
Found in: Proceedings of the 4th ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS '08)
By Bill Lin, Haiquan (Chuck) Zhao, Jun (Jim) Xu, Nan Hua
Issue Date:November 2008
pp. 77-81
In this paper, we present an exact active statistics counter architecture called BRICK (Bucketized Rank Indexed Counters) that can efficiently store per-flow variable-width statistics counters entirely in SRAM while supporting both fast updates and lookups...
     
Finding global icebergs over distributed data sets
Found in: Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems (PODS '06)
By Haixun Wang, Jun (Jim) Xu, Mitsunori Ogihara, Qi (George) Zhao
Issue Date:June 2006
pp. 298-307
Finding icebergs–items whose frequency of occurrence is above a certain threshold–is an important problem with a wide range of applications. Most of the existing work focuses on iceberg queries at a single node. However, in many real-life appli...
     
Data streaming algorithms for accurate and efficient measurement of traffic and flow matrices
Found in: Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems (SIGMETRICS '05)
By Abhishek Kumar, Jia Wang, Jun (Jim) Xu, Qi (George) Zhao
Issue Date:June 2005
pp. 350-361
The traffic volume between origin/destination (OD) pairs in a network, known as traffic matrix, is essential for efficient network provisioning and traffic engineering. Existing approaches of estimating the traffic matrix, based on statistical inference an...
     
A data streaming algorithm for estimating subpopulation flow size distribution
Found in: Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems (SIGMETRICS '05)
By Abhishek Kumar, Ellen W. Zegura, Jun (Jim) Xu, Minho Sung
Issue Date:June 2005
pp. 61-72
Statistical information about the flow sizes in the traffic passing through a network link helps a network operator to characterize network resource usage, infer traffic demands, detect traffic anomalies, and improve network performance through traffic eng...
     
Data streaming algorithms for efficient and accurate estimation of flow size distribution
Found in: Proceedings of the joint international conference on Measurement and modeling of computer systems (SIGMETRICS 2004/PERFORMANCE 2004)
By Abhishek Kumar, Jia Wang, Jun (Jim) Xu, Minho Sung
Issue Date:June 2004
pp. 318-326
Knowing the distribution of the sizes of traffic flows passing through a network link helps a network operator to characterize network resource usage, infer traffic demands, detect traffic anomalies, and accommodate new traffic demands through better traff...
     
 1