Skip to main content

Xiaowei Yang

Professor of Computer Science
Computer Science
Box 90129, Durham, NC 27708-0129
LSRC-D336, Durham, NC 27708

Selected Publications


Regional IP Anycast: Deployments, Performance, and Potentials

Conference SIGCOMM 2023 - Proceedings of the ACM SIGCOMM 2023 Conference · September 10, 2023 Recent studies show that an end system's traffic may reach a distant anycast site within a global IP anycast system, resulting in high latency. To address this issue, some private and public CDNs have implemented regional IP anycast, a technique that invol ... Full text Cite

Quantifying User Password Exposure to Third-Party CDNs

Conference Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) · January 1, 2023 Web services commonly employ Content Distribution Networks (CDNs) for performance and security. As web traffic is becoming 100% HTTPS, more and more websites allow CDNs to terminate their HTTPS connections. This practice may expose a website’s user sensiti ... Full text Cite

Remote Procedure Call as a Managed System Service

Conference Proceedings of the 20th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2023 · January 1, 2023 Remote Procedure Call (RPC) is a widely used abstraction for cloud computing. The programmer specifies type information for each remote procedure, and a compiler generates stub code linked into each application to marshal and unmarshal arguments into messa ... Cite

InviCloak: An End-to-End Approach to Privacy and Performance in Web Content Distribution

Conference Proceedings of the ACM Conference on Computer and Communications Security · November 7, 2022 In today's web ecosystem, a website that uses a Content Delivery Network (CDN) shares its Transport Layer Security (TLS) private key or session key with the CDN. In this paper, we present the design and implementation of InviCloak, a system that protects t ... Full text Cite

Characterizing Physical-Layer Transmission Errors in Cable Broadband Networks

Conference Proceedings of the 19th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2022 · January 1, 2022 Packet loss rate in a broadband network is an important quality of service metric. Previous work that characterizes broadband performance does not separate packet loss caused by physical layer transmission errors from that caused by congestion. In this wor ... Cite

AnyOpt: Predicting and optimizing IP Anycast performance

Conference SIGCOMM 2021 - Proceedings of the ACM SIGCOMM 2021 Conference · August 9, 2021 The key to optimizing the performance of an anycast-based system (e.g., the root DNS or a CDN) is choosing the right set of sites to announce the anycast prefix. One challenge here is predicting catchments. A naïve approach is to advertise the prefix from ... Full text Cite

Speeding Up TCP with Selective Loss Prevention

Conference Proceedings - International Conference on Network Protocols, ICNP · January 1, 2021 Low latency is an important design goal for reliable data transmission protocols such as TCP and QUIC. However, timeout-based loss recovery can unnecessarily increase end-to-end latency. Previous work in reducing timeout-based loss recovery latency either ... Full text Cite

CloudCmp: Shopping for a cloud made easy

Conference 2nd USENIX Workshop on Hot Topics in Cloud Computing, HotCloud 2010 · January 1, 2020 © USENIX Workshop on Hot Topics in Cloud Computing, HotCloud 2010.All right reserved. Cloud computing has gained much popularity recently, and many companies now offer a variety of public cloud computing services, such as Google AppEngine, Amazon AWS, and ... Cite

CloudCmp: Shopping for a cloud made easy

Conference 2nd USENIX Workshop on Hot Topics in Cloud Computing, HotCloud 2010 · January 1, 2020 © USENIX Workshop on Hot Topics in Cloud Computing, HotCloud 2010.All right reserved. Cloud computing has gained much popularity recently, and many companies now offer a variety of public cloud computing services, such as Google AppEngine, Amazon AWS, and ... Cite

CableMon: Improving the reliability of cable broadband networks via proactive network maintenance

Conference Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2020 · January 1, 2020 Cable broadband networks are one of the few “last-mile” broadband technologies widely available in the U.S. Unfortunately, they have poor reliability after decades of deployment. Cable industry proposed a framework called Proactive Network Maintenance (PNM ... Cite

Trigger relationship aware mobile traffic classification

Conference Proceedings of the International Symposium on Quality of Service, IWQoS 2019 · June 24, 2019 Network traffic classification is important to network operators to ensure visibility of traffic. Network management, monitoring, and other services are built upon such classification results for improving quality of service. Compared with traffic classifi ... Full text Cite

SwitchMan: An easy-to-use approach to secure user input and output

Conference Proceedings - 2019 IEEE Symposium on Security and Privacy Workshops, SPW 2019 · May 1, 2019 Modern operating systems for personal computers (including Linux, MAC, and Windows) provide user-level APIs for an application to access the I/O paths of another application. This design facilitates information sharing between applications, enabling applic ... Full text Cite

DynaShield: Reducing the cost of DDoS defense using cloud services

Conference 11th USENIX Workshop on Hot Topics in Cloud Computing, HotCloud 2019, co-located with USENIX ATC 2019 · January 1, 2019 © 2019 USENIX Association. All rights reserved. Fueled by IoT botnets and DDoS-as-a-Service tools, distributed denial of service (DDoS) attacks have reached record high volumes. Although there exist DDoS protection services, they can be costly for small or ... Cite

DynaShield: Reducing the cost of DDoS defense using cloud services

Conference 11th USENIX Workshop on Hot Topics in Cloud Computing, HotCloud 2019, co-located with USENIX ATC 2019 · January 1, 2019 © 2019 USENIX Association. All rights reserved. Fueled by IoT botnets and DDoS-as-a-Service tools, distributed denial of service (DDoS) attacks have reached record high volumes. Although there exist DDoS protection services, they can be costly for small or ... Cite

DynaShield: Reducing the cost of DDoS defense using cloud services

Conference 11th USENIX Workshop on Hot Topics in Cloud Computing, HotCloud 2019, co-located with USENIX ATC 2019 · January 1, 2019 Fueled by IoT botnets and DDoS-as-a-Service tools, distributed denial of service (DDoS) attacks have reached record high volumes. Although there exist DDoS protection services, they can be costly for small organizations as well as individual users. In this ... Cite

Two-stage optimization model for annual rolling generation scheduling considering open and impartial dispatching

Journal Article Dianli Zidonghua Shebei/Electric Power Automation Equipment · December 10, 2018 With the deepening reform of electric power system in China, the commonly used security constrained economic dispatching model cannot meet the calculation period requirement of open and impartial dispatching, and in order to overcome the influence of elect ... Full text Cite

DynaShield: A cost-effective DDoS defense architecture

Conference SIGCOMM 2018 - Proceedings of the 2018 Posters and Demos, Part of SIGCOMM 2018 · August 7, 2018 Full text Cite

Annual rolling generation scheduling and unit commitment optimization model based on open and impartial dispatching

Journal Article Dianli Xitong Baohu yu Kongzhi/Power System Protection and Control · October 16, 2017 Open and impartial dispatching is widely used in China at present. Load forecast and hydropower schedule are the foundation of thermal power generation scheduling, and are generally more precise when the forecast time is more recent. To improve the availab ... Full text Cite

FOCUS: Function Offloading from a Controller to Utilize Switch power

Conference 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2016 · May 4, 2017 Software Defined Networking (SDN) uses a logically centralized controller to replace the distributed control plane in a traditional network. One of the central challenges faced by the SDN paradigm is the scalability of the logical controller. As a network ... Full text Cite

PacketCloud: A Cloudlet-Based Open Platform for In-Network Services

Journal Article IEEE Transactions on Parallel and Distributed Systems · April 1, 2016 The Internet was designed with the end-to-end principle where the network layer provided merely the best-effort forwarding service. This design makes it challenging to add new services into the Internet infrastructure. However, as the Internet connectivity ... Full text Cite

Combating Friend Spam Using Social Rejections

Conference Proceedings - International Conference on Distributed Computing Systems · July 22, 2015 Unwanted friend requests in online social networks (OSNs), also known as friend spam, are among the most evasive malicious activities. Friend spam can result in OSN links that do not correspond to social relationship among users, thus pollute the underlyin ... Full text Cite

In-network compute extensions for rate-adaptive content delivery in mobile networks

Conference Proceedings - International Conference on Network Protocols, ICNP · December 9, 2014 Traffic from mobile wireless networks has been growing at a fast pace in recent years and is expected to surpass wired traffic very soon. Service providers face significant challenges at such scales including providing seamless mobility, efficient data del ... Full text Cite

Uncovering large groups of active malicious accounts in online social networks

Conference Proceedings of the ACM Conference on Computer and Communications Security · November 3, 2014 The success of online social networks has attracted a constant interest in attacking and exploiting them. Attackers usually control malicious accounts, including both fake and compromised real user accounts, to launch attack campaigns such as social spam, ... Full text Cite

Leveraging social feedback to verify online identity claims

Journal Article ACM Transactions on the Web · January 1, 2014 Anonymity is one of the main virtues of the Internet, as it protects privacy and enables users to express opinions more freely. However, anonymity hinders the assessment of the veracity of assertions that online users make about their identity attributes, ... Full text Cite

PacketCloud: An open platform for elastic in-network services

Journal Article Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM · November 13, 2013 The Internet was designed with the end-to-end principle where the network layer provided merely the best-effort forwarding service. This design makes it challenging to add new services to the network layer. However, as the Internet connectivity becomes a c ... Full text Cite

Netpilot: Automating datacenter network failure mitigation

Journal Article Computer Communication Review · December 1, 2012 The soaring demands for always-on and fast-response online services have driven modern datacenter networks to undergo tremendous growth. These networks often rely on scale-out designs with large numbers of commodity switches to reach immense capacity while ... Full text Cite

FaaS: Filtering IP spoofing traffic as a service

Journal Article Computer Communication Review · December 1, 2012 IP spooling weakens network security and accountability. Although a lot of techniques have been proposed to prevent IP spoofing, most of them are not implemented by device vendors, and the only available anti-spoofing tool in practice is ingress filtering ... Full text Cite

DARD: Distributed adaptive routing for datacenter networks

Journal Article Proceedings - International Conference on Distributed Computing Systems · October 5, 2012 Datacenter networks typically have many paths connecting each host pair to achieve high bisection bandwidth for arbitrary communication patterns. Fully utilizing the bisection bandwidth may require flows between the same source and destination pair to take ... Full text Cite

FaaS: Filtering IP spoofing traffic as a service

Journal Article SIGCOMM'12 - Proceedings of the ACM SIGCOMM 2012 Conference Applications, Technologies, Architectures, and Protocols for Computer Communication · September 26, 2012 Full text Cite

NetPilot: Automating datacenter network failure mitigation

Journal Article SIGCOMM'12 - Proceedings of the ACM SIGCOMM 2012 Conference Applications, Technologies, Architectures, and Protocols for Computer Communication · September 26, 2012 Driven by the soaring demands for always-on and fast-response online services, modern datacenter networks have recently undergone tremendous growth. These networks often rely on commodity hardware to reach immense scale while keeping capital expenses under ... Full text Cite

Assessing the veracity of identity assertions via OSNs

Journal Article 2012 4th International Conference on Communication Systems and Networks, COMSNETS 2012 · March 15, 2012 Anonymity is one of the main virtues of the Internet, as it protects privacy and enables users to express opinions more freely. However, anonymity hinders the assessment of the veracity of assertions that online users make about their identity attributes, ... Full text Cite

Aiding the detection of fake accounts in large scale social online services

Conference Proceedings of NSDI 2012: 9th USENIX Symposium on Networked Systems Design and Implementation · January 1, 2012 Users increasingly rely on the trustworthiness of the information exposed on Online Social Networks (OSNs). In addition, OSN providers base their businessmodels on the marketability of this information. However, OSNs suffer from abuse in the form of the cr ... Cite

CloudProphet: Towards application performance prediction in cloud

Journal Article Proceedings of the ACM SIGCOMM 2011 Conference, SIGCOMM'11 · September 29, 2011 Choosing the best-performing cloud for one's application is a critical problem for potential cloud customers. We propose Cloud- Prophet, a trace-and-replay tool to predict a legacy application's performance if migrated to a cloud infrastructure. CloudProph ... Full text Cite

Cloud Prophet: Towards application performance prediction in cloud

Journal Article Computer Communication Review · August 15, 2011 Choosing the best-performing cloud for one's application is a critical problem for potential cloud customers. We propose CloudProphet, a trace-and-replay tool to predict a legacy application's performance if migrated to a cloud infrastructure. CloudProphet ... Full text Cite

SocialFilter: Introducing social trust to collaborative spam mitigation

Journal Article Proceedings - IEEE INFOCOM · August 2, 2011 We propose SocialFilter, a trust-aware collaborative spam mitigation system. Our proposal enables nodes with no email classification functionality to query the network on whether a host is a spammer. It employs Sybil-resilient trust inference to weigh the ... Full text Cite

Comparing public-cloud providers

Journal Article IEEE Internet Computing · March 1, 2011 As cloud computing becomes increasingly popular among enterprises, developers, and organizations, it's time to consider the practical problem: how do you choose from the growing number of providers? To help users make this decision, researchers first deter ... Full text Cite

Bootstrapping accountability in the internet we have

Conference Proceedings of NSDI 2011: 8th USENIX Symposium on Networked Systems Design and Implementation · January 1, 2011 Lack of accountability makes the Internet vulnerable to numerous attacks, including prefix hijacking, route forgery, source address spoofing, and DoS flooding attacks. This paper aims to bring accountability to the Internet with lowcost and deployable enha ... Cite

NetFence: Preventing internet denial of service from inside out

Journal Article Computer Communication Review · December 1, 2010 Denial of Service (DoS) attacks frequently happen on the Internet, paralyzing Internet services and causing millions of dollars of financial loss. This work presents NetFence, a scalable DoS-resistant network architecture. NetFence uses a novel mechanism, ... Full text Cite

NetFence: Preventing internet denial of service from inside out

Journal Article SIGCOMM'10 - Proceedings of the SIGCOMM 2010 Conference · November 15, 2010 Denial of Service (DoS) attacks frequently happen on the Internet, paralyzing Internet services and causing millions of dollars of financial loss. This work presents NetFence, a scalable DoS-resistant network architecture. NetFence uses a novel mechanism, ... Full text Cite

Ads-portal domains: Identification and measurements

Journal Article ACM Transactions on the Web · April 1, 2010 An ads-portal domain refers to a Web domain that shows only advertisements, served by a third-party advertisement syndication service, in the form of ads listing. We develop a machine-learning-based classifier to identify ads-portal domains, which has 96% ... Full text Cite

Improving XCP to achieve max-min fair bandwidth allocation

Journal Article Computer Networks · February 26, 2010 TCP is prone to be inefficient and unstable in high-speed and long-latency networks [1]. The eXplicit Control Protocol (XCP) is a new and promising protocol that outperforms TCP in terms of efficiency, stability, queue size, and convergence speed. However, ... Full text Cite

CloudCmp: Shopping for a cloud made easy

Conference 2nd USENIX Workshop on Hot Topics in Cloud Computing, HotCloud 2010 · January 1, 2010 Cloud computing has gained much popularity recently, and many companies now offer a variety of public cloud computing services, such as Google AppEngine, Amazon AWS, and Microsoft Azure. These services differ in service models and pricing schemes, making i ... Cite

SocialFilter: Introducing social trust to collaborative spam mitigation

Conference CollSec 2010 - 2010 Workshop on Collaborative Methods for Security and Privacy · January 1, 2010 Cite

CloudCmp: Comparing public cloud providers

Journal Article Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC · January 1, 2010 While many public cloud providers offer pay-as-you-go computing, their varying approaches to infrastructure, virtualization, and software services lead to a problem of plenty. To help customers pick a cloud that fits their needs, we develop CloudCmp, a sys ... Full text Cite

Robust and efficient incentives for cooperative content distribution

Journal Article IEEE/ACM Transactions on Networking · December 1, 2009 Content distribution via the Internet is becoming increasingly popular. To be cost-effective, commercial content providers are now using peer-to-peer (P2P) protocols such as BitTorrent to save bandwidth costs and to handle peak demands. When an online cont ... Full text Cite

SafeGuard: Safe forwarding during route changes

Journal Article CoNEXT'09 - Proceedings of the 2009 ACM Conference on Emerging Networking Experiments and Technologies · December 1, 2009 This paper presents the design and evaluation of SafeGuard, an intra-domain routing system that can safely forward packets to their destinations even when routes are changing. SafeGuard is based on the simple idea that packets carry a destination address p ... Full text Cite

FaceTrust: Assessing the credibility of online personas via social networks

Conference HotSec 2009 - 4th USENIX Workshop on Hot Topics in Security · January 1, 2009 Cite

Poking facebook: Characterization of OSN applications

Journal Article Proceedings of the ACM SIGCOMM 2008 Conference on Computer Communications -1st Workshop on Online Social Networks, WOSP'08 · December 1, 2008 Facebook is one of the most popular Internet sites today. A key feature that arguably contributed to Facebook's unprecedented success is its application platform, which enables the development of third-party social-networking applications. Understanding ho ... Full text Cite

Auction, but don't block

Journal Article SIGCOMM 2008 Conference and the Co-located Workshops - Proceedings of the 3rd International Workshop on Economics of Networked Systems, NetEcon'08 · December 1, 2008 This paper argues that ISP's recent actions to block certain applications (e.g. BitTorrent) and attempts to differentiate traffic could be a signal of bandwidth scarcity. Bandwidth-intensive applications such as VoD could have driven the traffic demand to ... Full text Cite

To filter or to authorize: Network-layer DoS defense against multimillion-node botnets

Journal Article Computer Communication Review · December 1, 2008 This paper presents the design and implementation of a filter-based DoS defense system (StopIt) and a comparison study on the effectiveness of filters and capabilities. Central to the StopIt design is a novel closed-control, open-service architecture: any ... Full text Cite

TVA: A DoS-limiting network architecture

Journal Article IEEE/ACM Transactions on Networking · August 12, 2008 We motivate the capability approach to network denial-of-service (DoS) attacks, and evaluate the Traffic Validation Architecture (TVA) architecture which builds on capabilities. With our approach, rather than send packets to any destination at any time, se ... Full text Cite

Passport: Secure and adoptable source authentication

Conference 5th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2008 · January 1, 2008 We present the design and evaluation of Passport, a system that allows source addresses to be validated within the network. Passport uses efficient, symmetric-key cryptography to place tokens on packets that allow each autonomous system (AS) along the netw ... Cite

Improving XCP to achieve max-min fair bandwidth allocation

Journal Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) · December 24, 2007 TCP is shown to be inefficient and instable in high speed and long latency networks. The eXplicit Control Protocol (XCP) is a new and promising protocol that outperforms TCP in terms of efficiency, stability, queue size, and convergence speed. However, Low ... Cite

NIRA: A new inter-domain routing architecture

Journal Article IEEE/ACM Transactions on Networking · December 1, 2007 In today's Internet, users can choose their local Internet service providers (ISPs), but once their packets have entered the network, they have little control over the overall routes their packets take. Giving a user the ability to choose between provider- ... Full text Cite

On improving the efficiency and manageability of NotVia

Journal Article Proceedings of 2007 ACM CoNEXT Conference - 3rd International Conference on Emerging Networking EXperiments and Technologies, CoNEXT · December 1, 2007 This paper presents techniques that improve the efficiency and manageability of an IP Fast Reroute (IPFRR) technology: NotVia. NotVia provides the IPFRR service for all destinations in an ISP's network upon any single link or node failure, while previous p ... Full text Cite

Evaluation of IP fast reroute proposals

Journal Article Proceedings of the 2007 2nd International Conference on Communication System Software and Middleware and Workshops, COMSWARE 2007 · October 1, 2007 With the increasing demand for low-latency applications in the Internet, the slow convergence of the existing routing protocols is a growing concern. A number of IP fast reroute mechanisms have been developed by the IETF to address the issue. The goal of t ... Full text Cite

Effects of pulsed electromagnetic fields on osteoporosis model

Journal Article IEEJ Transactions on Fundamentals and Materials · September 25, 2007 The purpose of this paper was to investigate the preventive effects and long term effects of extremely low frequency pulsed electromagnetic fields (PEMFs), generated by circular coils and pulsed electromagnetic fields stimulators, on osteoporosis in bilate ... Full text Cite

Bio-effects of pulsed electromagnetic fields on osteoporosis

Journal Article Gaodianya Jishu/High Voltage Engineering · February 1, 2007 This paper reviewed the research progress in the effects of pulsed electromagnetic fields on osteoporosis by our team since 1997. To establish the interaction between osteoporosis and pulsed electromagnetic fields, precise cellular response to the electrom ... Cite

Preventive effects of pulsed electromagnetic fields on osteoporosis model induced by ovariectomy

Journal Article Gaodianya Jishu/High Voltage Engineering · February 1, 2007 To investigate the preventive effects of pulsed electromagnetic fields (PEMFs) with specific parameters on osteoporosis, thirty 3-month old female Sprague-Dawley rats were randomly divided into three different groups: normal control group (SHAM group), ova ... Cite

Dandelion: Cooperative Content Distribution with Robust Incentives

Conference USENIX 2007 - 2007 USENIX Annual Technical Conference · January 1, 2007 Content distribution via the Internet is becoming increasingly popular. To be cost-effective, commercial content providers are considering the use of peer-to-peer (P2P) protocols such as BitTorrent to save on bandwidth costs and to handle peak demands. How ... Cite

Source selectable path diversity via routing deflections

Journal Article Computer Communication Review · October 1, 2006 We present the design of a routing system in which end-systems set tags to select non-shortest path routes as an alternative to explicit source routes. Routers collectively generate these routes by using tags as hints to independently deflect packets to ne ... Full text Cite

Efficient and secure source authentication with packet passports

Conference 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet, SRUTI 2006 · January 1, 2006 A key challenge in combating Denial of Service (DoS) attacks is to reliably identify attack sources from packet contents. If a source can be reliably identified, routers can stop an attack by filtering packets from the attack sources without causing collat ... Cite

A Technical Approach to Net Neutrality

Conference 5th ACM Workshop on Hot Topics in Networks, HotNets 2006 · January 1, 2006 A recent statement by AT&T CEO Ed Whitacre sparked considerable fear in the public that the Internet may not be open any more: the ISPs dictate which sites/applications flourish and which flounder. The statement triggered the heated debate on net neutralit ... Cite

A DoS-limiting network architecture

Journal Article Computer Communication Review · October 1, 2005 We present the design and evaluation of TVA, a network architecture that limits the impact of Denial of Service (DoS) floods from the outset. Our work builds on earlier work on capabilities in which senders obtain short-term authorizations from receivers t ... Full text Cite

Compact routing on internet-like graphs

Journal Article Proceedings - IEEE INFOCOM · November 22, 2004 The Thorup-Zwick (TZ) compact routing scheme is the first generic stretch-3 routing scheme delivering a nearly optimal per-node memory upper bound. Using both direct analysis and simulation, we derive the stretch distribution of this routing scheme on Inte ... Cite

NIRA: A new Internet routing architecture

Journal Article Proceedings of the ACM SIGCOMM Workshop on Future Directions in Network Architecture, FDNA '03 · December 1, 2003 This paper presents the design of a new Internet routing architecture (NIRA). In today's Internet, users can pick their own ISPs, but once the packets have entered the network, the users have no control over the overall routes their packets take. NIRA aims ... Full text Cite

Workshop report: Future Directions in Network Architecture (FDNA-03)

Journal Article Computer Communication Review · October 1, 2003 Full text Cite

NIRA: A New Internet Routing Architecture

Journal Article Proceedings of the ACM SIGCOMM Workshops · 2003 This paper presents the design of a new Internet routing architecture (NIRA). In today's Internet, users can pick their own ISPs, but once the packets have entered the network, the users have no control over the overall routes their packets take. NIRA aims ... Cite

Designing traffic profiles for bursty internet traffic

Journal Article Conference Record / IEEE Global Telecommunications Conference · December 1, 2002 This paper proposes a new class of traffic profiles that is better suited for metering bursty Internet traffic streams than the traditional token bucket profile. A good traffic profile should satisfy two criteria: first, it should consider packets from a c ... Cite

A passive approach for detecting shared bottlenecks

Conference Proceedings - International Conference on Computer Communications and Networks, ICCCN · January 1, 2001 There is a growing interest in discovering Internet path characteristics using end-to-end measurements. However, the current mechanisms for performing this task either send probe traffic, or require the sender to cooperate by time stamping the packets or s ... Full text Cite

A model for window based flow control in packet-switched networks

Journal Article Proceedings - IEEE INFOCOM · December 1, 1999 Recently, networks have increased rapidly both in scale and speed. Problems related to the control and management are of increasing interest. The average throughput and end-to-end delay of a network Row are important design factors. However, there is nosat ... Full text Cite