2024

[1] Ajay Singh, Trevor Alexander Brown, and Ali José Mashtizadeh. Simple, fast and widely applicable concurrent memory reclamation via neutralization. IEEE Trans. Parallel Distributed Syst., 35(2):203--220, 2024. [ DOI | http ]
[2] Runlong Ye, Yuyang Peng, Fawaz Al-Hazemi, and Raouf Boutaba. A robust cooperative jamming scheme for secure UAV communication via intelligent reflecting surface. IEEE Trans. Commun., 72(2):1005--1019, 2024. [ DOI | http ]
[3] Mohammad Zangooei, Morteza Golkarifard, Mohamed Rouili, Niloy Saha, and Raouf Boutaba. Flexible RAN slicing in open RAN with constrained multi-agent reinforcement learning. IEEE J. Sel. Areas Commun., 42(2):280--294, 2024. [ DOI | http ]
[4] Mohammad Khalaji, Trevor Brown, Khuzaima Daudjee, and Vitaly Aksenov. Practical hardware transactional veb trees. In Proceedings of the 29th ACM SIGPLAN Annual Symposium on Principles and Practice of Parallel Programming, PPoPP 2024, Edinburgh, United Kingdom, March 2-6, 2024, pages 215--228. ACM, 2024. [ DOI | http ]

2023

[1] Basil Alkhatib, Sreeharsha Udayashankar, Sara Qunaibi, Ahmed Alquraan, Mohammed Alfatafta, Wael Al-Manasrah, Alex Depoutovitch, and Samer Al-Kiswany. Partial network partitioning. ACM Trans. Comput. Syst., 41:1:1--1:34, 2023. [ DOI | http ]
[2] Muhammad Sulaiman, Arash Moayyedi, Mahdieh Ahmadi, Mohammad Ali Salahuddin, Raouf Boutaba, and Aladdin Saleh. Coordinated slicing and admission control using multi-agent deep reinforcement learning. IEEE Trans. Netw. Serv. Manag., 20(2):1110--1124, 2023. [ DOI | http ]
[3] Joël Roman Ky, Bertrand Mathieu, Abdelkader Lahmadi, and Raouf Boutaba. ML models for detecting qoe degradation in low-latency applications: A cloud-gaming case study. IEEE Trans. Netw. Serv. Manag., 20(3):2295--2308, 2023. [ DOI | http ]
[4] Seyed Soheil Johari, Sepehr Taeb, Nashid Shahriar, Shihabur Rahman Chowdhury, Massimo Tornatore, Raouf Boutaba, Jeebak Mitra, and Mahdi Hemmati. Drl-assisted reoptimization of network slice embedding on eon-enabled transport networks. IEEE Trans. Netw. Serv. Manag., 20(1):800--814, 2023. [ DOI | http ]
[5] Vahid Pourahmadi, Hyame Assem Alameddine, Mohammad Ali Salahuddin, and Raouf Boutaba. Spotting anomalies at the edge: Outlier exposure-based cross-silo federated learning for ddos detection. IEEE Trans. Dependable Secur. Comput., 20(5):4002--4015, 2023. [ DOI | http ]
[6] Kenneth Salem. TECHNICAL PERSPECTIVE: ad hoc transactions: What they are and why we should care. SIGMOD Rec., 52(1):6, 2023. [ DOI | http ]
[7] Jeremy Chen, Yuqing Huang, Mushi Wang, Semih Salihoglu, and Kenneth Salem. Accurate summary-based cardinality estimation through the lens of cardinality estimation graphs. SIGMOD Rec., 52(1):94--102, 2023. [ DOI | http ]
[8] Peter Cai and Martin Karsten. Kernel vs. user-level networking: Don't throw out the stack with the interrupts. Proc. ACM Meas. Anal. Comput. Syst., 7(3):49:1--49:25, 2023. [ DOI | http ]
[9] Alexander Clemm, Raouf Boutaba, Guillaume Doyen, Bertrand Mathieu, and Mohamed Faten Zhani. High-precision, predictable and low-latency networking. J. Netw. Syst. Manag., 31(4):75, 2023. [ DOI | http ]
[10] Paolo Monti, Burak Kantarci, and Raouf Boutaba. Guest editorial networking enablers for 6g use cases. IEEE Netw. Lett., 5(3):146--148, 2023. [ DOI | http ]
[11] Xiaoqi Tan, Siyuan Yu, Raouf Boutaba, and Alberto Leon-Garcia. Threshold policies with tight guarantees for online selection with convex costs. CoRR, abs/2310.06166, 2023. [ DOI | arXiv | http ]
[12] Silvery Fu, Hong Zhang, Ryan Teoh, Taras Priadka, and Sylvia Ratnasamy. From kubernetes to knactor: A state-centric rethink of service integration. CoRR, abs/2309.01805, 2023. [ DOI | arXiv | http ]
[13] Navid Malekghaini, Elham Akbari, Mohammad A. Salahuddin, Noura Limam, Raouf Boutaba, Bertrand Mathieu, Stephanie Moteau, and Stéphane Tuffin. Automl4etc: Automated neural architecture search for real-world encrypted traffic classification. CoRR, abs/2308.02182, 2023. [ DOI | arXiv | http ]
[14] David Radke, Kate Larson, Tim Brecht, and Kyle Tilbury. Towards a better understanding of learning with multiagent teams. CoRR, abs/2306.16205, 2023. [ DOI | arXiv | http ]
[15] Muhammad Sulaiman, Mahdieh Ahmadi, Mohammad Ali Salahuddin, Raouf Boutaba, and Aladdin Saleh. Generalizable resource scaling of 5g slices using constrained reinforcement learning. CoRR, abs/2306.09290, 2023. [ DOI | arXiv | http ]
[16] Niloy Saha, Nashid Shahriar, Raouf Boutaba, and Aladdin Saleh. Monarch: Network slice monitoring architecture for cloud native 5g deployments. CoRR, abs/2306.01072, 2023. [ DOI | arXiv | http ]
[17] Daniel Erhabor, Sreeharsha Udayashankar, Meiyappan Nagappan, and Samer Al-Kiswany. Measuring the runtime performance of code produced with github copilot. CoRR, abs/2305.06439, 2023. [ DOI | arXiv | http ]
[18] Navid Malekghaini, Elham Akbari, Mohammad A. Salahuddin, Noura Limam, Raouf Boutaba, Bertrand Mathieu, Stephanie Moteau, and Stéphane Tuffin. Deep learning for encrypted traffic classification in the face of data drift: An empirical study. Comput. Networks, 225:109648, 2023. [ DOI | http ]
[19] Mohammad Zangooei, Niloy Saha, Morteza Golkarifard, and Raouf Boutaba. Reinforcement learning for radio resource management in RAN slicing: A survey. IEEE Commun. Mag., 61(2):118--124, 2023. [ DOI | http ]
[20] Niloy Saha, Mohammad Zangooei, Morteza Golkarifard, and Raouf Boutaba. Deep reinforcement learning approaches to network slice scaling and placement: A survey. IEEE Commun. Mag., 61(2):82--87, 2023. [ DOI | http ]
[21] Maycon L. M. Peixoto, Edson Mota, Adriano H. O. Maia, Wellington Lobato, Mohammad A. Salahuddin, Raouf Boutaba, and Leandro A. Villas. Fogjam: A fog service for detecting traffic congestion in a continuous data stream VANET. Ad Hoc Networks, 140:103046, 2023. [ DOI | http ]
[22] Sara Qunaibi, Sreeharsha Udayashankar, and Samer Al-Kiswany. CASPR: connectivity-aware scheduling for partition resilience. In 42nd International Symposium on Reliable Distributed Systems, SRDS 2023, Marrakesh, Morocco, September 25-29, 2023, pages 70--81. IEEE, 2023. [ DOI | http ]
[23] Abdallah Elshamy, Ahmed Alquraan, and Samer Al-Kiswany. A study of orchestration approaches for scientific workflows in serverless computing. In Proceedings of the 1st Workshop on SErverless Systems, Applications and MEthodologies, SESAME 2023, Rome, Italy, 8 May 2023, pages 34--40. ACM, 2023. [ DOI | http ]
[24] Mina Tahmasbi Arashloo, Ryan Beckett, and Rachit Agarwal. Formal methods for network performance analysis. In 20th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2023, Boston, MA, April 17-19, 2023, pages 645--661. USENIX Association, 2023. [ http ]
[25] Hong Zhang, Yupeng Tang, Anurag Khandelwal, and Ion Stoica. SHEPHERD: serving dnns in the wild. In 20th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2023, Boston, MA, April 17-19, 2023, pages 787--808. USENIX Association, 2023. [ http ]
[26] Muhammad Sulaiman, Mahdieh Ahmadi, Mohammad A. Salahuddin, Raouf Boutaba, and Aladdin Saleh. Generalizable resource scaling of 5g slices using constrained reinforcement learning. In NOMS 2023, IEEE/IFIP Network Operations and Management Symposium, Miami, FL, USA, May 8-12, 2023, pages 1--9. IEEE, 2023. [ DOI | http ]
[27] Niloy Saha, Nashid Shahriar, Raouf Boutaba, and Aladdin Saleh. Monarch: Network slice monitoring architecture for cloud native 5g deployments. In NOMS 2023, IEEE/IFIP Network Operations and Management Symposium, Miami, FL, USA, May 8-12, 2023, pages 1--7. IEEE, 2023. [ DOI | http ]
[28] Arash Moayyedi, Mahdieh Ahmadi, Mohammad Ali Salahuddin, Raouf Boutaba, and Aladdin Saleh. Generalizable gnn-based 5g RAN/MEC slicing and admission control in metropolitan networks. In NOMS 2023, IEEE/IFIP Network Operations and Management Symposium, Miami, FL, USA, May 8-12, 2023, pages 1--9. IEEE, 2023. [ DOI | http ]
[29] Navid Malekghaini, Hauton Tsang, Mohammad Ali Salahuddin, Noura Limam, and Raouf Boutaba. FSTC: dynamic category adaptation for encrypted network traffic classification. In IFIP Networking Conference, IFIP Networking 2023, Barcelona, Spain, June 12-15, 2023, pages 1--9. IEEE, 2023. [ DOI | http ]
[30] David Radke, Jaxin Lu, Jackson Woloschuk, Tin Le, Daniel Radke, Charlie Liu, and Tim Brecht. Analyzing passing metrics in ice hockey using puck and player tracking data. In Proceedings of the Linköping Hockey Analytics Conference 2023 Research Track, LINHAC 2023, Linköping, Sweden, June 7-9, 2023, volume 201 of Linköping Electronic Conference Proceedings, pages 25--39. Linköping University Electronic Press, 2023. [ DOI | http ]
[31] Osman Salem, Ahmed Mehaoua, and Raouf Boutaba. The sight for hearing: An iot-based system to assist drivers with hearing disability. In IEEE Symposium on Computers and Communications, ISCC 2023, Gammarth, Tunisia, July 9-12, 2023, pages 1305--1310. IEEE, 2023. [ DOI | http ]
[32] David Radke, Kate Larson, Tim Brecht, and Kyle Tilbury. Towards a better understanding of learning with multiagent teams. In Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, IJCAI 2023, 19th-25th August 2023, Macao, SAR, China, pages 271--279. ijcai.org, 2023. [ DOI | http ]
[33] Saif Zabarah, Omar Naman, Mohammad A. Salahuddin, Raouf Boutaba, and Samer Al-Kiswany. Soteria: An approach for detecting multi-institution attacks. In 26th Conference on Innovation in Clouds, Internet and Networks, ICIN 2023, Paris, France, March 6-9, 2023, pages 113--120. IEEE, 2023. [ DOI | http ]
[34] Siyao Zhao and Ali José Mashtizadeh. Metal: An open architecture for developing processor features. In Proceedings of the 19th Workshop on Hot Topics in Operating Systems, HOTOS 2023, Providence, RI, USA, June 22-24, 2023, pages 15--22. ACM, 2023. [ DOI | http ]
[35] Osman Salem, Ahmed Mehaoua, and Raouf Boutaba. Soft voting for anomaly detection in internet of medical things. In IEEE Global Communications Conference, GLOBECOM 2023, Kuala Lumpur, Malaysia, December 4-8, 2023, pages 498--503. IEEE, 2023. [ DOI | http ]
[36] Omar Naman, Hala Qadi, Martin Karsten, and Samer Al-Kiswany. Mecbench: A framework for benchmarking multi-access edge computing platforms. In IEEE International Conference on Edge Computing and Communications, EDGE 2023, Chicago, IL, USA, July 2-8, 2023, pages 85--95. IEEE, 2023. [ DOI | http ]
[37] Lasantha Fernando, Harsh Bindra, and Khuzaima Daudjee. An experimental analysis of quantile sketches over data streams. In Proceedings 26th International Conference on Extending Database Technology, EDBT 2023, Ioannina, Greece, March 28-31, 2023, pages 424--436. OpenProceedings.org, 2023. [ DOI | http ]
[38] Bohan Zhang, Paul Zeinaty, Noura Limam, and Raouf Boutaba. Mitigating signaling storms in 5g with blockchain-assisted 5gaka. In 19th International Conference on Network and Service Management, CNSM 2023, Niagara Falls, ON, Canada, October 30 - Nov. 2, 2023, pages 1--9. IEEE, 2023. [ DOI | http ]
[39] Jiaheng Xiong, Qiaolun Zhang, Alberto Gatto, Francesco Musumeci, Raouf Boutaba, and Massimo Tornatore. Adaptive entanglement routing for quantum networks with cutoff. In 19th International Conference on Network and Service Management, CNSM 2023, Niagara Falls, ON, Canada, October 30 - Nov. 2, 2023, pages 1--5. IEEE, 2023. [ DOI | http ]
[40] Md. Shamim Towhid, Nasik Sami Khan, Nashid Shahriar, Massimo Tornatore, Raouf Boutaba, and Aladdin Saleh. A token-prioritization strategy for handling data imbalance in network-change ticket classification. In 19th International Conference on Network and Service Management, CNSM 2023, Niagara Falls, ON, Canada, October 30 - Nov. 2, 2023, pages 1--7. IEEE, 2023. [ DOI | http ]
[41] Maria Mushtaq, Morteza Golkarifard, Nashid Shahriar, Raouf Boutaba, and Aladdin Saleh. Optimal functional splitting, placement and routing for isolation-aware network slicing in NG-RAN. In 19th International Conference on Network and Service Management, CNSM 2023, Niagara Falls, ON, Canada, October 30 - Nov. 2, 2023, pages 1--5. IEEE, 2023. [ DOI | http ]
[42] Elham Akbari, Sheikh A. Tahmid, Navid Malekghaini, Mohammad Ali Salahuddin, Noura Limam, Raouf Boutaba, Bertrand Mathieu, Stephanie Moteau, and Stéphane Tuffin. A critical study of few-shot learning for encrypted traffic classification. In 19th International Conference on Network and Service Management, CNSM 2023, Niagara Falls, ON, Canada, October 30 - Nov. 2, 2023, pages 1--9. IEEE, 2023. [ DOI | http ]
[43] Alan Liu, Abdelrahman Baba, Sreeharsha Udayashankar, and Samer Al-Kiswany. Dedupbench: A benchmarking tool for data chunking techniques. In IEEE Canadian Conference on Electrical and Computer Engineering, CCECE 2023, Regina, SK, Canada, September 24-27, 2023, pages 469--474. IEEE, 2023. [ DOI | http ]
[44] Berker Acir, Ertan Onur, and Raouf Boutaba. Privacy-preserving user abnormal behavior detection in 5g networks. In IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom 2023, Istanbul, Turkey, July 4-7, 2023, pages 167--172. IEEE, 2023. [ DOI | http ]
[45] David Radke, Kate Larson, and Tim Brecht. The importance of credo in multiagent learning. In Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2023, London, United Kingdom, 29 May 2023 - 2 June 2023, pages 2243--2252. ACM, 2023. [ DOI | http ]

2022

[1] Ibrahim Kettaneh, Ahmed Alquraan, Hatem Takruri, Ali José Mashtizadeh, and Samer Al-Kiswany. Accelerating reads with in-network consistency-aware load balancing. IEEE/ACM Trans. Netw., 30(3):954--968, 2022. [ DOI | http ]
[2] Mohammad A. Salahuddin, Vahid Pourahmadi, Hyame Assem Alameddine, Md. Faizul Bari, and Raouf Boutaba. Chronos: Ddos attack detection using time-based autoencoder. IEEE Trans. Netw. Serv. Manag., 19(1):627--641, 2022. [ DOI | http ]
[3] Davit Harutyunyan, Nashid Shahriar, Raouf Boutaba, and Roberto Riggio. Latency and mobility-aware service function chain placement in 5g networks. IEEE Trans. Mob. Comput., 21(5):1697--1709, 2022. [ DOI | http ]
[4] Osman Salem, Khalid Alsubhi, Aymen Shaafi, Mostafa Gheryani, Ahmed Mehaoua, and Raouf Boutaba. Man-in-the-middle attack mitigation in internet of medical things. IEEE Trans. Ind. Informatics, 18(3):2053--2062, 2022. [ DOI | http ]
[5] Anthony, Shihabur Rahman Chowdhury, Tim Bai, Raouf Boutaba, and Jérôme François. Non-intrusive and workflow-aware virtual network function scheduling in user-space. IEEE Trans. Cloud Comput., 10(3):1975--1990, 2022. [ DOI | http ]
[6] Farzan Dehbashi, Ali Abedi, Tim Brecht, and Omid Abari. Are wifi backscatter systems ready for the real world? GetMobile Mob. Comput. Commun., 26(1):30--34, 2022. [ DOI | http ]
[7] Xiaoqi Tan, Siyuan Yu, and Raouf Boutaba. Online selection with convex costs. SIGMETRICS Perform. Evaluation Rev., 50(2):33--35, 2022. [ DOI | http ]
[8] Jeremy Chen, Yuqing Huang, Mushi Wang, Semih Salihoglu, and Kenneth Salem. Accurate summary-based cardinality estimation through the lens of cardinality estimation graphs. Proc. VLDB Endow., 15(8):1533--1545, 2022. [ DOI | .pdf ]
[9] Michael Abebe, Horatiu Lazu, and Khuzaima Daudjee. Tiresias: Enabling predictive autonomous storage and indexing. Proc. VLDB Endow., 15(11):3126--3136, 2022. [ DOI | .pdf ]
[10] Yuhao Dong, Ian Goldberg, Sergey Gorbunov, and Raouf Boutaba. Astrape: Anonymous payment channels with boring cryptography. IACR Cryptol. ePrint Arch., page 450, 2022. [ http ]
[11] Herodotos Herodotou, Panos K. Chrysanthis, Shimin Chen, Meichun Hsu, Khuzaima Daudjee, Yingjun Wu, and Constantinos Costa. Introduction to the special issue on self8209managing and hardware8209optimized database systems 2020. Distributed Parallel Databases, 40(1):1--3, 2022. [ DOI | http ]
[12] David Radke, Kate Larson, and Tim Brecht. Exploring the benefits of teams in multiagent learning. CoRR, abs/2205.02328, 2022. [ DOI | arXiv | http ]
[13] David Radke, Kate Larson, and Tim Brecht. The importance of credo in multiagent learning. CoRR, abs/2204.07471, 2022. [ DOI | arXiv | http ]
[14] E. L. Hocine Bouzidi, Abdelkader Outtagarts, Rami Langar, and Raouf Boutaba. Dynamic clustering of software defined network switches and controller placement using deep reinforcement learning. Comput. Networks, 207:108852, 2022. [ DOI | http ]
[15] Iman Akbari, Mohammad A. Salahuddin, Leni Ven, Noura Limam, Raouf Boutaba, Bertrand Mathieu, Stephanie Moteau, and Stéphane Tuffin. Traffic classification in an increasingly encrypted web. Commun. ACM, 65(10):75--83, 2022. [ DOI | http ]
[16] Michael Abebe, Horatiu Lazu, and Khuzaima Daudjee. Proteus: Autonomous adaptive storage for mixed workloads. In SIGMOD '22: International Conference on Management of Data, Philadelphia, PA, USA, June 12 - 17, 2022, pages 700--714. ACM, 2022. [ DOI | http ]
[17] Junxue Zhang, Chaoliang Zeng, Hong Zhang, Shuihai Hu, and Kai Chen. Liteflow: towards high-performance adaptive neural networks for kernel datapath. In SIGCOMM '22: ACM SIGCOMM 2022 Conference, Amsterdam, The Netherlands, August 22 - 26, 2022, pages 414--427. ACM, 2022. [ DOI | http ]
[18] Qizhe Cai, Mina Tahmasbi Arashloo, and Rachit Agarwal. dcpim: near-optimal proactive datacenter transport. In SIGCOMM '22: ACM SIGCOMM 2022 Conference, Amsterdam, The Netherlands, August 22 - 26, 2022, pages 53--65. ACM, 2022. [ DOI | http ]
[19] Yang Zhou, Hassan M. G. Wassel, Sihang Liu, Jiaqi Gao, James Mickens, Minlan Yu, Chris Kennelly, Paul Turner, David E. Culler, Henry M. Levy, and Amin Vahdat. Carbink: Fault-tolerant far memory. In 16th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2022, Carlsbad, CA, USA, July 11-13, 2022, pages 55--71. USENIX Association, 2022. [ http ]
[20] Mary Hogan, Shir Landau Feibish, Mina Tahmasbi Arashloo, Jennifer Rexford, and David Walker. Modular switch programming under resource constraints. In 19th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2022, Renton, WA, USA, April 4-6, 2022, pages 193--207. USENIX Association, 2022. [ http ]
[21] Jingrong Chen, Hong Zhang, Wei Zhang, Liang Luo, Jeffrey S. Chase, Ion Stoica, and Danyang Zhuo. Nethint: White-box networking for multi-tenant data centers. In 19th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2022, Renton, WA, USA, April 4-6, 2022, pages 1327--1343. USENIX Association, 2022. [ http ]
[22] Muhammad Sulaiman, Arash Moayyedi, Mohammad A. Salahuddin, Raouf Boutaba, and Aladdin Saleh. Multi-agent deep reinforcement learning for slicing and admission control in 5g C-RAN. In 2022 IEEE/IFIP Network Operations and Management Symposium, NOMS 2022, Budapest, Hungary, April 25-29, 2022, pages 1--9. IEEE, 2022. [ DOI | http ]
[23] Niloy Saha, Alexander James, Nashid Shahriar, Raouf Boutaba, and Aladdin Saleh. Demonstrating network slice KPI monitoring in a 5g testbed. In 2022 IEEE/IFIP Network Operations and Management Symposium, NOMS 2022, Budapest, Hungary, April 25-29, 2022, pages 1--3. IEEE, 2022. [ DOI | http ]
[24] Abir Laraba, Jérôme François, Isabelle Chrisment, Shihabur Rahman Chowdhury, and Raouf Boutaba. Detecting multi-step attacks: A modular approach for programmable data plane. In 2022 IEEE/IFIP Network Operations and Management Symposium, NOMS 2022, Budapest, Hungary, April 25-29, 2022, pages 1--9. IEEE, 2022. [ DOI | http ]
[25] Seyed Soheil Johari, Nashid Shahriar, Massimo Tornatore, Raouf Boutaba, and Aladdin Saleh. Anomaly detection and localization in NFV systems: an unsupervised learning approach. In 2022 IEEE/IFIP Network Operations and Management Symposium, NOMS 2022, Budapest, Hungary, April 25-29, 2022, pages 1--9. IEEE, 2022. [ DOI | http ]
[26] Shihabur Rahman Chowdhury and Raouf Boutaba. Resource management in softwarized networks. In 2022 IEEE/IFIP Network Operations and Management Symposium, NOMS 2022, Budapest, Hungary, April 25-29, 2022, pages 1--6. IEEE, 2022. [ DOI | http ]
[27] Navid Malekghaini, Elham Akbari, Mohammad A. Salahuddin, Noura Limam, Raouf Boutaba, Bertrand Mathieu, Stephanie Moteau, and Stéphane Tuffin. Data drift in DL: lessons learned from encrypted traffic classification. In IFIP Networking Conference, IFIP Networking 2022, Catania, Italy, June 13-16, 2022, pages 1--9. IEEE, 2022. [ DOI | http ]
[28] Runsheng Guo, Victor Guo, Antonio Kim, Josh Hildred, and Khuzaima Daudjee. Hydrozoa: Dynamic hybrid-parallel DNN training on serverless containers. In Proceedings of Machine Learning and Systems 2022, MLSys 2022, Santa Clara, CA, USA, August 29 - September 1, 2022. mlsys.org, 2022. [ .html ]
[29] David Radke, Tim Brecht, and Daniel Radke. Identifying completed pass types and improving passing lane models. In Proceedings of the Linköping Hockey Analytics Conference 2022 Research Track, LINHAC 2022, Linköping, Sweden, June 6-8, 2022, volume 191 of Linköping Electronic Conference Proceedings, pages 71--86. Linköping University Electronic Press, 2022. [ DOI | http ]
[30] Tim Brecht. Puck and player tracking: Challenges and opportunities. In Proceedings of the Linköping Hockey Analytics Conference 2022 Research Track, LINHAC 2022, Linköping, Sweden, June 6-8, 2022, volume 191 of Linköping Electronic Conference Proceedings, page 10. Linköping University Electronic Press, 2022. [ DOI | http ]
[31] David Radke, Kate Larson, and Tim Brecht. Exploring the benefits of teams in multiagent learning. In Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, IJCAI 2022, Vienna, Austria, 23-29 July 2022, pages 454--460. ijcai.org, 2022. [ DOI | http ]
[32] Ryan Hancock, Sreeharsha Udayashankar, Ali José Mashtizadeh, and Samer Al-Kiswany. Orcbench: A representative serverless benchmark. In IEEE 15th International Conference on Cloud Computing, CLOUD 2022, Barcelona, Spain, July 10-16, 2022, pages 103--108. IEEE, 2022. [ DOI | http ]
[33] Silvery Fu, Hong Zhang, Sylvia Ratnasamy, and Ion Stoica. The internet of things in a laptop: rapid prototyping for iot applications with digibox. In Proceedings of the 21st ACM Workshop on Hot Topics in Networks, HotNets 2022, Austin, Texas, November 14-15, 2022, pages 24--30. ACM, 2022. [ DOI | http ]
[34] Joël Roman Ky, Bertrand Mathieu, Abdelkader Lahmadi, and Raouf Boutaba. Assessing unsupervised machine learning solutions for anomaly detection in cloud gaming sessions. In 18th International Conference on Network and Service Management, CNSM 2022, Thessaloniki, Greece, October 31 - Nov. 4, 2022, pages 367--373. IEEE, 2022. [ DOI | http ]
[35] Yuhao Dong, Ian Goldberg, Sergey Gorbunov, and Raouf Boutaba. Astrape: Anonymous payment channels with boring cryptography. In Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Rome, Italy, June 20-23, 2022, Proceedings, volume 13269 of Lecture Notes in Computer Science, pages 748--768. Springer, 2022. [ DOI | http ]
[36] Md Sajid Khan, Behnam Farzaneh, Nashid Shahriar, Niloy Saha, and Raouf Boutaba. Slicesecure: Impact and detection of dos/ddos attacks on 5g network slices. In 2022 IEEE Future Networks World Forum, FNWF 2022, Montreal, QC, Canada, October 10-14, 2022, pages 639--642. IEEE, 2022. [ DOI | http ]

2021

[1] Rodrigo A. C. da Silva, Nelson L. S. da Fonseca, and Raouf Boutaba. Evaluation of the employment of uavs as fog nodes. IEEE Wirel. Commun., 28(5):20--27, 2021. [ DOI | http ]
[2] Abir Laraba, Jérôme François, Shihabur Rahman Chowdhury, Isabelle Chrisment, and Raouf Boutaba. Mitigating TCP protocol misuse with programmable data planes. IEEE Trans. Netw. Serv. Manag., 18(1):760--774, 2021. [ DOI | http ]
[3] Haibo Bian, Tim Bai, Mohammad A. Salahuddin, Noura Limam, Abbas Abou Daya, and Raouf Boutaba. Uncovering lateral movement using authentication logs. IEEE Trans. Netw. Serv. Manag., 18(1):1049--1063, 2021. [ DOI | http ]
[4] Iman Akbari, Mohammad A. Salahuddin, Leni Ven, Noura Limam, Raouf Boutaba, Bertrand Mathieu, Stephanie Moteau, and Stéphane Tuffin. A look behind the curtain: Traffic classification in an increasingly encrypted web. Proc. ACM Meas. Anal. Comput. Syst., 5(1):04:1--04:26, 2021. [ DOI | http ]
[5] Ryan Doenges, Mina Tahmasbi Arashloo, Santiago Bautista, Alexander Chang, Newton Ni, Samwise Parkinson, Rudy Peterson, Alaia Solko-Breslin, Amanda Xu, and Nate Foster. Petr4: formal foundations for p4 data planes. Proc. ACM Program. Lang., 5(POPL):1--32, 2021. [ DOI | http ]
[6] Nashid Shahriar, Mubeen Zulfiqar, Shihabur Rahman Chowdhury, Sepehr Taeb, Raouf Boutaba, Jeebak Mitra, and Mahdi Hemmati. Disruption minimized bandwidth scaling in eon-enabled transport network slices. IEEE J. Sel. Areas Commun., 39(9):2734--2747, 2021. [ DOI | http ]
[7] Osman Salem, Khalid Alsubhi, Ahmed Mehaoua, and Raouf Boutaba. Markov models for anomaly detection in wireless body area networks for secure health monitoring. IEEE J. Sel. Areas Commun., 39(2):526--540, 2021. [ DOI | http ]
[8] EL Hocine Bouzidi, Abdelkader Outtagarts, Rami Langar, and Raouf Boutaba. Deep q-network and traffic prediction based routing optimization in software defined networks. J. Netw. Comput. Appl., 192:103181, 2021. [ DOI | http ]
[9] Benjamin Avanzi, Greg Taylor, Bernard Wong, and Alan Xian. Modelling and understanding count processes through a markov-modulated non-homogeneous poisson process framework. Eur. J. Oper. Res., 290(1):177--195, 2021. [ DOI | http ]
[10] Mohammad S. Parsa, Lukasz Golab, and Srinivasan Keshav. Climate action during COVID-19 recovery and beyond: A twitter text mining study. CoRR, abs/2105.12190, 2021. [ arXiv | http ]
[11] Jeremy Chen, Yuqing Huang, Mushi Wang, Semih Salihoglu, and Ken Salem. Accurate summary-based cardinality estimation through the lens of cardinality estimation graphs. CoRR, abs/2105.08878, 2021. [ arXiv | http ]
[12] Milad Ghaznavi, Elaheh Jalalpour, Mohammad A. Salahuddin, Raouf Boutaba, Daniel Migault, and Stere Preda. Content delivery network security: A survey. IEEE Commun. Surv. Tutorials, 23(4):2166--2190, 2021. [ DOI | http ]
[13] Tim Bai, Haibo Bian, Mohammad A. Salahuddin, Abbas Abou Daya, Noura Limam, and Raouf Boutaba. Rdp-based lateral movement detection using machine learning. Comput. Commun., 165:9--19, 2021. [ DOI | http ]
[14] Ali Abedi, Tim Brecht, and Omid Abari. Demystifying frame aggregation in 802.11 networks: Understanding and approximating optimality. Comput. Commun., 180:259--270, 2021. [ DOI | http ]
[15] Hauton Tsang, Iman Akbari, Mohammad A. Salahuddin, Noura Limam, and Raouf Boutaba. Atmos+: Generalizable threat mitigation in SDN using permutation equivariant and invariant deep reinforcement learning. IEEE Commun. Mag., 59(12):105--111, 2021. [ DOI | http ]
[16] Sherif Sakr, Angela Bonifati, Hannes Voigt, Alexandru Iosup, Khaled Ammar, Renzo Angles, Walid G. Aref, Marcelo Arenas, Maciej Besta, Peter A. Boncz, Khuzaima Daudjee, Emanuele Della Valle, Stefania Dumbrava, Olaf Hartig, Bernhard Haslhofer, Tim Hegeman, Jan Hidders, Katja Hose, Adriana Iamnitchi, Vasiliki Kalavri, Hugo Kapp, Wim Martens, M. Tamer Özsu, Eric Peukert, Stefan Plantikow, Mohamed Ragab, Matei Ripeanu, Semih Salihoglu, Christian Schulz, Petra Selmer, Juan F. Sequeda, Joshua Shinavier, Gábor Szárnyas, Riccardo Tommasini, Antonino Tumeo, Alexandru Uta, Ana Lucia Varbanescu, Hsiang-Yun Wu, Nikolay Yakovets, Da Yan, and Eiko Yoneki. The future is big graphs: a community view on graph processing systems. Commun. ACM, 64(9):62--71, 2021. [ DOI | http ]
[17] Kun Woo Cho, Mohammad Hossein Mazaheri, Jeremy Gummeson, Omid Abari, and Kyle Jamieson. mmwall: A reconfigurable metamaterial surface for mmwave networks. In HotMobile '21: The 22nd International Workshop on Mobile Computing Systems and Applications, Virtual Event, United Kingdom, February 24-26, 2021, pages 119--125. ACM, 2021. [ DOI | http ]
[18] Siyao Zhao, Haoyu Gu, and Ali José Mashtizadeh. SKQ: event scheduling for optimizing tail latency in a traditional OS kernel. In 2021 USENIX Annual Technical Conference, USENIX ATC 2021, July 14-16, 2021, pages 759--772. USENIX Association, 2021. [ http ]
[19] Kyle Langendoen, Brad Glasbergen, and Khuzaima Daudjee. Nir-tree: A non-intersecting r-tree. In SSDBM 2021: 33rd International Conference on Scientific and Statistical Database Management, Tampa, FL, USA, July 6-7, 2021, pages 157--168. ACM, 2021. [ DOI | http ]
[20] K. Shiv Kumar, Ranjitha K., P. S. Prashanth, Mina Tahmasbi Arashloo, Venkanna U., and Praveen Tammana. Dbval: Validating P4 data plane runtime behavior. In SOSR '21: The ACM SIGCOMM Symposium on SDN Research, Virtual Event, USA, October 11 - 12, 2021, pages 122--134. ACM, 2021. [ DOI | http ]
[21] Emil Tsalapatis, Ryan Hancock, Tavian Barnes, and Ali José Mashtizadeh. The aurora single level store operating system. In SOSP '21: ACM SIGOPS 28th Symposium on Operating Systems Principles, Virtual Event / Koblenz, Germany, October 26-29, 2021, pages 788--803. ACM, 2021. [ DOI | http ]
[22] Brad Glasbergen, Fangyu Wu, and Khuzaima Daudjee. Dendrite: Bolt-on adaptivity for data systems. In SIGMOD '21: International Conference on Management of Data, Virtual Event, China, June 20-25, 2021, pages 2726--2730. ACM, 2021. [ DOI | http ]
[23] Omar Farhat, Khuzaima Daudjee, and Leonardo Querzoni. Klink: Progress-aware scheduling for streaming data systems. In SIGMOD '21: International Conference on Management of Data, Virtual Event, China, June 20-25, 2021, pages 485--498. ACM, 2021. [ DOI | http ]
[24] Iman Akbari, Mohammad A. Salahuddin, Leni Ven, Noura Limam, Raouf Boutaba, Bertrand Mathieu, Stephanie Moteau, and Stéphane Tuffin. A look behind the curtain: Traffic classification in an increasingly encrypted web. In SIGMETRICS '21: ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, Virtual Event, China, June 14-18, 2021, pages 23--24. ACM, 2021. [ DOI | http ]
[25] Raouf Boutaba, Nashid Shahriar, Mohammad A. Salahuddin, Shihabur Rahman Chowdhury, Niloy Saha, and Alexander James. Ai-driven closed-loop automation in 5g and beyond mobile networks. In FlexNets '21: Proceedings of the 4th FlexNets Workshop on Flexible Networks Artificial Intelligence Supported Network Flexibility and Agility, Virtual Event, USA, 23 August 2021, pages 1--6. ACM, 2021. [ DOI | http ]
[26] Venkat Arun, Mina Tahmasbi Arashloo, Ahmed Saeed, Mohammad Alizadeh, and Hari Balakrishnan. Toward formally verifying congestion control behavior. In ACM SIGCOMM 2021 Conference, Virtual Event, USA, August 23-27, 2021, pages 1--16. ACM, 2021. [ DOI | http ]
[27] Ajay Singh, Trevor Brown, and Ali José Mashtizadeh. NBR: neutralization based reclamation. In PPoPP '21: 26th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, Virtual Event, Republic of Korea, February 27- March 3, 2021, pages 175--190. ACM, 2021. [ DOI | http ]
[28] Hong Zhang, Yupeng Tang, Anurag Khandelwal, Jingrong Chen, and Ion Stoica. Caerus: NIMBLE task scheduling for serverless analytics. In 18th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2021, April 12-14, 2021, pages 653--669. USENIX Association, 2021. [ http ]
[29] Farzan Dehbashi, Ali Abedi, Tim Brecht, and Omid Abari. Verification: can wifi backscatter replace rfid? In ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, New Orleans, Louisiana, USA, October 25-29, 2021, pages 97--107. ACM, 2021. [ DOI | http ]
[30] Raouf Boutaba. The cloud to things continuum: infrastructure and management. In Middleware '21: Proceedings of the 22nd International Middleware Conference: Extended Abstracts, Virtual Event / Québec City, Canada, December 6 - 10, 2021, page 7. ACM, 2021. [ DOI | http ]
[31] Nashid Shahriar and Raouf Boutaba. Survivable virtual network embedding. In 17th IFIP/IEEE International Symposium on Integrated Network Management, IM 2021, Bordeaux, France, May 17-21, 2021, pages 748--753. IEEE, 2021. [ http ]
[32] Shihabur Rahman Chowdhury, Raouf Boutaba, and Jérôme François. LINT: accuracy-adaptive and lightweight in-band network telemetry. In 17th IFIP/IEEE International Symposium on Integrated Network Management, IM 2021, Bordeaux, France, May 17-21, 2021, pages 349--357. IEEE, 2021. [ http ]
[33] Emil Tsalapatis, Ryan Hancock, Tavian Barnes, and Ali José Mashtizadeh. The aurora operating system: revisiting the single level store. In HotOS '21: Workshop on Hot Topics in Operating Systems, Ann Arbor, Michigan, USA, June, 1-3, 2021, pages 136--143. ACM, 2021. [ DOI | http ]
[34] Sepehr Taeb, Nashid Shahriar, Shihabur Rahman Chowdhury, Massimo Tornatore, Raouf Boutaba, Jeebak Mitra, and Mahdi Hemmati. Reoptimizing network slice embedding on eon-enabled transport networks. In 17th International Conference on Network and Service Management, CNSM 2021, Izmir, Turkey, October 25-29, 2021, pages 292--300. IEEE, 2021. [ DOI | http ]

2020

[1] Kenneth Salem. Special issue on best papers of damon 2018. VLDB J., 29(2-3):755, 2020. [ DOI | http ]
[2] Peter A. Boncz and Kenneth Salem. Special issue on best papers of VLDB 2017. VLDB J., 29(1):483--484, 2020. [ DOI | http ]
[3] Ibrahim Kettaneh, Ahmed Alquraan, Hatem Takruri, Suli Yang, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, and Samer Al-Kiswany. The network-integrated storage system. IEEE Trans. Parallel Distributed Syst., 31(2):486--500, 2020. [ DOI | http ]
[4] Nashid Shahriar, Sepehr Taeb, Shihabur Rahman Chowdhury, Mubeen Zulfiqar, Massimo Tornatore, Raouf Boutaba, Jeebak Mitra, and Mahdi Hemmati. Reliable slicing of 5g transport networks with bandwidth squeezing and multi-path provisioning. IEEE Trans. Netw. Serv. Manag., 17(3):1418--1431, 2020. [ DOI | http ]
[5] Abbas Abou Daya, Mohammad A. Salahuddin, Noura Limam, and Raouf Boutaba. Botchase: Graph-based bot detection using machine learning. IEEE Trans. Netw. Serv. Manag., 17(1):15--29, 2020. [ DOI | http ]
[6] Nashid Shahriar, Reaz Ahmed, Shihabur Rahman Chowdhury, Md Mashrur Alam Khan, Raouf Boutaba, Jeebak Mitra, and Feng Zeng. Virtual network embedding with guaranteed connectivity under multiple substrate link failures. IEEE Trans. Commun., 68(2):1025--1043, 2020. [ DOI | http ]
[7] Brad Glasbergen, Michael Abebe, Khuzaima Daudjee, and Amit Levi. Sentinel: Universal analysis and insight for data systems. Proc. VLDB Endow., 13(11):2720--2733, 2020. [ .pdf ]
[8] Ahmed Alquraan, Alex Kogan, Virendra J. Marathe, and Samer Al-Kiswany. Scalable, nearzero loss disaster recovery for distributed data stores. Proc. VLDB Endow., 13(9):1429--1442, 2020. [ DOI | .pdf ]
[9] Michael Abebe, Brad Glasbergen, and Khuzaima Daudjee. Morphosys: Automatic physical design metamorphosis for distributed database systems. Proc. VLDB Endow., 13(13):3573--3587, 2020. [ DOI | .pdf ]
[10] Martin Karsten and Saman Barghi. User-level threading: Have your cake and eat it too. Proc. ACM Meas. Anal. Comput. Syst., 4(1):17:1--17:30, 2020. [ DOI | http ]
[11] Shihabur Rahman Chowdhury, Anthony, Haibo Bian, Tim Bai, and Raouf Boutaba. A disaggregated packet processing architecture for network function virtualization. IEEE J. Sel. Areas Commun., 38(6):1075--1088, 2020. [ DOI | http ]
[12] Abdelhamid Alleg, Toufik Ahmed, Mohamed Mosbah, and Raouf Boutaba. Joint diversity and redundancy for resilient service chain provisioning. IEEE J. Sel. Areas Commun., 38(7):1490--1504, 2020. [ DOI | http ]
[13] Alexander Clemm, Mohamed Faten Zhani, and Raouf Boutaba. Network management 2030: Operations and control of network 2030 services. J. Netw. Syst. Manag., 28(4):721--750, 2020. [ DOI | http ]
[14] Hongtaek Ju, Raouf Boutaba, Myung-Sup Kim, and Burkhard Stiller. Editorial for special issue on "challenges and opportunities of blockchain and cryptocurrency". Int. J. Netw. Manag., 30(5), 2020. [ DOI | http ]
[15] Christian Gorenflo, Stephen Lee, Lukasz Golab, and Srinivasan Keshav. Fastfabric: Scaling hyperledger fabric to 20 000 transactions per second. Int. J. Netw. Manag., 30(5), 2020. [ DOI | http ]
[16] Shimin Chen, Panos K. Chrysanthis, Khuzaima Daudjee, Meichun Hsu, and Mohammad Sadoghi. Introduction to the special issue on self-managing and hardware-optimized database systems 2019. Distributed Parallel Databases, 38(4):767--769, 2020. [ DOI | http ]
[17] Ajay Singh, Trevor Brown, and Ali José Mashtizadeh. NBR: neutralization based reclamation. CoRR, abs/2012.14542, 2020. [ arXiv | http ]
[18] Sherif Sakr, Angela Bonifati, Hannes Voigt, Alexandru Iosup, Khaled Ammar, Renzo Angles, Walid G. Aref, Marcelo Arenas, Maciej Besta, Peter A. Boncz, Khuzaima Daudjee, Emanuele Della Valle, Stefania Dumbrava, Olaf Hartig, Bernhard Haslhofer, Tim Hegeman, Jan Hidders, Katja Hose, Adriana Iamnitchi, Vasiliki Kalavri, Hugo Kapp, Wim Martens, M. Tamer Özsu, Eric Peukert, Stefan Plantikow, Mohamed Ragab, Matei Ripeanu, Semih Salihoglu, Christian Schulz, Petra Selmer, Juan F. Sequeda, Joshua Shinavier, Gábor Szárnyas, Riccardo Tommasini, Antonino Tumeo, Alexandru Uta, Ana Lucia Varbanescu, Hsiang-Yun Wu, Nikolay Yakovets, Da Yan, and Eiko Yoneki. The future is big graphs! A community view on graph processing systems. CoRR, abs/2012.06171, 2020. [ arXiv | http ]
[19] Ryan Doenges, Mina Tahmasbi Arashloo, Santiago Bautista, Alexander Chang, Newton Ni, Samwise Parkinson, Rudy Peterson, Alaia Solko-Breslin, Amanda Xu, and Nate Foster. Petr4: Formal foundations for P4 data planes. CoRR, abs/2011.05948, 2020. [ arXiv | http ]
[20] Milad Ghaznavi, Ali José Mashtizadeh, Bernard Wong, and Raouf Boutaba. Constellation: A high performance geo-distributed middlebox framework. CoRR, abs/2003.05111, 2020. [ arXiv | http ]
[21] Mirmojtaba Gharibi, Steven L. Waslander, and Raouf Boutaba. Vehicle scheduling problem. CoRR, abs/2001.09297, 2020. [ arXiv | http ]
[22] Milad Ghaznavi, Elaheh Jalalpour, Bernard Wong, and Raouf Boutaba. Fault tolerance for service function chains. CoRR, abs/2001.03321, 2020. [ arXiv | http ]
[23] Piotr Borylo, Massimo Tornatore, Piotr Jaglarz, Nashid Shahriar, Piotr Cholda, and Raouf Boutaba. Latency and energy-aware provisioning of network slices in cloud networks. Comput. Commun., 157:1--19, 2020. [ DOI | http ]
[24] Suriya Kodeswaran, Mina Tahmasbi Arashloo, Praveen Tammana, and Jennifer Rexford. Tracking P4 program execution in the data plane. In SOSR '20: Symposium on SDN Research, San Jose, CA, USA, March 3, 2020, pages 117--122. ACM, 2020. [ DOI | http ]
[25] Dimcho Karakashev, Sergey Gorbunov, and Srinivasan Keshav. Making renewable energy certificates efficient, trustworthy, and anonymous. In 2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2020, Tempe, AZ, USA, November 11-13, 2020, pages 1--7. IEEE, 2020. [ DOI | http ]
[26] Runsheng Benson Guo and Khuzaima Daudjee. Research challenges in deep reinforcement learning-based join query optimization. In Proceedings of the Third International Workshop on Exploiting Artificial Intelligence Techniques for Data Management, aiDM@SIGMOD 2020, Portland, Oregon, USA, June 19, 2020, pages 3:1--3:6. ACM, 2020. [ DOI | http ]
[27] Brad Glasbergen, Kyle Langendoen, Michael Abebe, and Khuzaima Daudjee. Chronocache: Predictive and adaptive mid-tier query result caching. In Proceedings of the 2020 International Conference on Management of Data, SIGMOD Conference 2020, online conference [Portland, OR, USA], June 14-19, 2020, pages 2391--2406. ACM, 2020. [ DOI | http ]
[28] Brad Glasbergen, Michael Abebe, Khuzaima Daudjee, Daniel Vogel, and Jian Zhao. Sentinel: Understanding data systems. In Proceedings of the 2020 International Conference on Management of Data, SIGMOD Conference 2020, online conference [Portland, OR, USA], June 14-19, 2020, pages 2729--2732. ACM, 2020. [ DOI | http ]
[29] Martin Karsten and Saman Barghi. User-level threading: Have your cake and eat it too. In Abstracts of the 2020 SIGMETRICS/Performance Joint International Conference on Measurement and Modeling of Computer Systems, Boston, MA, USA, June, 8-12, 2020, pages 89--90. ACM, 2020. [ DOI | http ]
[30] Milad Ghaznavi, Elaheh Jalalpour, Bernard Wong, Raouf Boutaba, and Ali José Mashtizadeh. Fault tolerant service function chaining. In SIGCOMM '20: Proceedings of the 2020 Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication, Virtual Event, USA, August 10-14, 2020, pages 198--210. ACM, 2020. [ DOI | http ]
[31] Ali Abedi, Farzan Dehbashi, Mohammad Hossein Mazaheri, Omid Abari, and Tim Brecht. Witag: Seamless wifi backscatter communication. In SIGCOMM '20: Proceedings of the 2020 Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication, Virtual Event, USA, August 10-14, 2020, pages 240--252. ACM, 2020. [ DOI | http ]
[32] David Radke, Omid Abari, Tim Brecht, and Kate Larson. Can future wireless networks detect fires? In BuildSys '20: The 7th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation, Virtual Event, Japan, November 18-20, 2020, pages 286--289. ACM, 2020. [ DOI | http ]
[33] Ju Wang, Jianyan Li, Mohammad Hossein Mazaheri, Keiko Katsuragawa, Daniel Vogel, and Omid Abari. Sensing finger input using an RFID transmission line. In SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, Virtual Event, Japan, November 16-19, 2020, pages 531--543. ACM, 2020. [ DOI | http ]
[34] Mohammed Alfatafta, Basil Alkhatib, Ahmed Alquraan, and Samer Al-Kiswany. Toward a generic fault tolerance technique for partial network partitioning. In 14th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2020, Virtual Event, November 4-6, 2020, pages 351--368. USENIX Association, 2020. [ http ]
[35] Nashid Shahriar, Mubeen Zulfiqar, Shihabur Rahman Chowdhury, Sepehr Taeb, Massimo Tornatore, Raouf Boutaba, Jeebak Mitra, and Mahdi Hemmati. Disruption-minimized re-adaptation of virtual links in elastic optical networks. In Optical Fiber Communications Conference and Exhibition, OFC 2020, San Diego, CA, USA, March 8-12, 2020, pages 1--3. IEEE, 2020. [ http ]
[36] Hatem Takruri, Ibrahim Kettaneh, Ahmed Alquraan, and Samer Al-Kiswany. FLAIR: accelerating reads with consistency-aware network routing. In 17th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2020, Santa Clara, CA, USA, February 25-27, 2020, pages 723--737. USENIX Association, 2020. [ http ]
[37] Mina Tahmasbi Arashloo, Alexey Lavrov, Manya Ghobadi, Jennifer Rexford, David Walker, and David Wentzlaff. Enabling programmable transport protocols in high-speed nics. In 17th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2020, Santa Clara, CA, USA, February 25-27, 2020, pages 93--109. USENIX Association, 2020. [ http ]
[38] Iman Akbari, Ezzeldin Tahoun, Mohammad A. Salahuddin, Noura Limam, and Raouf Boutaba. Atmos: Autonomous threat mitigation in SDN using reinforcement learning. In NOMS 2020 - IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, April 20-24, 2020, pages 1--9. IEEE, 2020. [ DOI | http ]
[39] Nazih Salhab, Rana Rahim, Rami Langar, and Raouf Boutaba. Deep neural networks approach for power head-room predictions in 5g networks and beyond. In 2020 IFIP Networking Conference, Networking 2020, Paris, France, June 22-26, 2020, pages 579--583. IEEE, 2020. [ http ]
[40] Abir Laraba, Jérôme François, Isabelle Chrisment, Shihabur Rahman Chowdhury, and Raouf Boutaba. Defeating protocol abuse with P4: application to explicit congestion notification. In 2020 IFIP Networking Conference, Networking 2020, Paris, France, June 22-26, 2020, pages 431--439. IEEE, 2020. [ http ]
[41] Shervin Khastoo, Tim Brecht, and Ali Abedi. Neura: Using neural networks to improve wifi rate adaptation. In MSWiM '20: 23rd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Alicante, Spain, November 16-20, 2020, pages 161--170. ACM, 2020. [ DOI | http ]
[42] Ali Abedi, Tim Brecht, and Omid Abari. PNOFA: practical, near-optimal frame aggregation for modern 802.11 networks. In MSWiM '20: 23rd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Alicante, Spain, November 16-20, 2020, pages 63--72. ACM, 2020. [ DOI | http ]
[43] Ju Wang, Liqiong Chang, Shourya Aggarwal, Omid Abari, and Srinivasan Keshav. Soil moisture sensing with commodity RFID systems. In MobiSys '20: The 18th Annual International Conference on Mobile Systems, Applications, and Services, Toronto, Ontario, Canada, June 15-19, 2020, pages 273--285. ACM, 2020. [ DOI | http ]
[44] Liqiong Chang, Ju Wang, Omid Abari, and Srinivasan Keshav. Id-clicker: A battery-free in-class response system using RFID tags. In Fifth IEEE/ACM International Conference on Internet-of-Things Design and Implementation, IoTDI 2020, Sydney, Australia, April 21-24, 2020, pages 238--244. IEEE, 2020. [ DOI | http ]
[45] Michael Abebe, Brad Glasbergen, and Khuzaima Daudjee. Dynamast: Adaptive dynamic mastering for replicated systems. In 36th IEEE International Conference on Data Engineering, ICDE 2020, Dallas, TX, USA, April 20-24, 2020, pages 1381--1392. IEEE, 2020. [ DOI | http ]
[46] Nazih Salhab, Rana Rahim, Rami Langar, and Raouf Boutaba. Offloading network data analytics function to the cloud with minimum cost and maximum utilization. In 2020 IEEE International Conference on Communications, ICC 2020, Dublin, Ireland, June 7-11, 2020, pages 1--6. IEEE, 2020. [ DOI | http ]
[47] EL Hocine Bouzidi, Abdelkader Outtagarts, Abdelkrim Hebbar, Rami Langar, and Raouf Boutaba. Online based learning for predictive end-to-end network slicing in 5g networks. In 2020 IEEE International Conference on Communications, ICC 2020, Dublin, Ireland, June 7-11, 2020, pages 1--7. IEEE, 2020. [ DOI | http ]
[48] Christian Gorenflo, Lukasz Golab, and Srinivasan Keshav. XOX fabric: A hybrid approach to blockchain transaction execution. In IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2020, Toronto, ON, Canada, May 2-6, 2020, pages 1--9. IEEE, 2020. [ DOI | http ]
[49] Rishav Raj Agarwal, Dhruv Kumar, Lukasz Golab, and Srinivasan Keshav. Consentio: Managing consent to data access using permissioned blockchains. In IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2020, Toronto, ON, Canada, May 2-6, 2020, pages 1--9. IEEE, 2020. [ DOI | http ]
[50] Mohammad Hossein Mazaheri, Alex Chen, and Omid Abari. Millimeter wave backscatter: Toward batteryless wireless networking at gigabit speeds. In HotNets '20: The 19th ACM Workshop on Hot Topics in Networks, Virtual Event, USA, November 4-6, 2020, pages 139--145. ACM, 2020. [ DOI | http ]
[51] Mary Hogan, Shir Landau Feibish, Mina Tahmasbi Arashloo, Jennifer Rexford, David Walker, and Rob Harrison. Elastic switch programming with p4all. In HotNets '20: The 19th ACM Workshop on Hot Topics in Networks, Virtual Event, USA, November 4-6, 2020, pages 168--174. ACM, 2020. [ DOI | http ]
[52] Ali Abedi and Omid Abari. Wifi says "hi!" back to strangers! In HotNets '20: The 19th ACM Workshop on Hot Topics in Networks, Virtual Event, USA, November 4-6, 2020, pages 132--138. ACM, 2020. [ DOI | http ]
[53] Jan Deller and Srinivasan Keshav. The benefits of dynamically resizing residential storage. In e-Energy '20: The Eleventh ACM International Conference on Future Energy Systems, Virtual Event, Australia, June 22-26, 2020, pages 496--502. ACM, 2020. [ DOI | http ]
[54] Huy Hoang, Benjamin Cassell, Tim Brecht, and Samer Al-Kiswany. Rocketbufs: a framework for building efficient, in-memory, message-oriented middleware. In 14th ACM International Conference on Distributed and Event-based Systems, DEBS 2020, Montreal, Quebec, Canada, July 13-17, 2020, pages 121--132. ACM, 2020. [ DOI | http ]
[55] Omar Farhat, Harsh Bindra, and Khuzaima Daudjee. Leaving stragglers at the window: low-latency stream sampling with accuracy guarantees. In 14th ACM International Conference on Distributed and Event-based Systems, DEBS 2020, Montreal, Quebec, Canada, July 13-17, 2020, pages 15--26. ACM, 2020. [ DOI | http ]
[56] Xinan Yan, Linguan Yang, and Bernard Wong. Domino: using network measurements to reduce state machine replication latency in wans. In CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, Barcelona, Spain, December, 2020, pages 351--363. ACM, 2020. [ DOI | http ]
[57] Ibrahim Kettaneh, Sreeharsha Udayashankar, Ashraf Abdel-hadi, Robin Grosman, and Samer Al-Kiswany. Falcon: Low latency, network-accelerated scheduling. In EuroP4@CoNEXT 2020: Proceedings of the 3rd P4 Workshop in Europe, Barcelona, Spain, December 1, 2020, pages 7--12. ACM, 2020. [ DOI | http ]
[58] Mohammad A. Salahuddin, Md. Faizul Bari, Hyame Assem Alameddine, Vahid Pourahmadi, and Raouf Boutaba. Time-based anomaly detection using autoencoder. In 16th International Conference on Network and Service Management, CNSM 2020, Izmir, Turkey, November 2-6, 2020, pages 1--9. IEEE, 2020. [ DOI | http ]
[59] Michael J. Mior and Kenneth Salem. Respark: Automatic caching for iterative applications in apache spark. In 2020 IEEE International Conference on Big Data (IEEE BigData 2020), Atlanta, GA, USA, December 10-13, 2020, pages 331--340. IEEE, 2020. [ DOI | http ]
[60] Xinchen Wan, Hong Zhang, Hao Wang, Shuihai Hu, Junxue Zhang, and Kai Chen. RAT - resilient allreduce tree for distributed machine learning. In APNet '20: 4th Asia-Pacific Workshop on Networking, Seoul, Korea, 3-4 August, 2020, pages 52--57. ACM, 2020. [ DOI | http ]

2019

[1] Günes Aluç, M. Tamer Özsu, and Khuzaima Daudjee. Building self-clustering RDF databases using tunable-lsh. VLDB J., 28(2):173--195, 2019. [ DOI | http ]
[2] Md. Faizul Bari, Shihabur Rahman Chowdhury, and Raouf Boutaba. ESSO: an energy smart service function chain orchestrator. IEEE Trans. Netw. Serv. Manag., 16(4):1345--1359, 2019. [ DOI | http ]
[3] Osman Salem, Khalid Alsubhi, Ahmed Mehaoua, and Raouf Boutaba. Nocturnal epileptic seizures detection using inertial and muscular sensors. IEEE Trans. Mob. Comput., 18(12):2913--2925, 2019. [ DOI | http ]
[4] Fatma Bouabdallah, Chaima Zidi, Raouf Boutaba, and Ahmed Mehaoua. Collision avoidance energy efficient multi-channel MAC protocol for underwater acoustic sensor networks. IEEE Trans. Mob. Comput., 18(10):2298--2314, 2019. [ DOI | http ]
[5] Ju Wang, Omid Abari, and Srinivasan Keshav. RFID hacking for fun and profit. GetMobile Mob. Comput. Commun., 23(1):21--23, 2019. [ DOI | http ]
[6] Mohammad Hossein Mazaheri, Ali Abedi, Soroush Ameli, and Omid Abari. A millimeter wave network for billions of things. GetMobile Mob. Comput. Commun., 23(3):34--38, 2019. [ DOI | http ]
[7] Alexey Karyakin and Kenneth Salem. Dimmstore: Memory power optimization for database systems. Proc. VLDB Endow., 12(11):1499--1512, 2019. [ DOI | .pdf ]
[8] Shihabur Rahman Chowdhury, Mohammad A. Salahuddin, Noura Limam, and Raouf Boutaba. Re-architecting NFV ecosystem with microservices: State of the art and research challenges. IEEE Netw., 33(3):168--176, 2019. [ DOI | http ]
[9] Joao Vitor Torres, Igor Drummond Alvarenga, Raouf Boutaba, and Otto Carlos Muniz Bandeira Duarte. Evaluating cros-ndn: a comparative performance analysis of a controller-based routing scheme for named-data networking. J. Internet Serv. Appl., 10(1):20:1--20:24, 2019. [ DOI | http ]
[10] Rishav Raj Agarwal, Dhruv Kumar, Lukasz Golab, and Srinivasan Keshav. Consentio: Managing consent to data access using permissioned blockchains. CoRR, abs/1910.07110, 2019. [ arXiv | http ]
[11] Marcel Rumez, Jürgen Dürrwang, Tim Brecht, Timo Steinshorn, Peter Neugebauer, Reiner Kriesten, and Eric Sax. CAN radar: Sensing physical devices in CAN networks based on time domain reflectometry. CoRR, abs/1910.02847, 2019. [ arXiv | http ]
[12] Mirmojtaba Gharibi, Raouf Boutaba, and Steven L. Waslander. 3d traffic flow model for uavs. CoRR, abs/1909.04838, 2019. [ arXiv | http ]
[13] Christian Gorenflo, Lukasz Golab, and Srinivasan Keshav. XOX fabric: A hybrid approach to transaction execution. CoRR, abs/1906.11229, 2019. [ arXiv | http ]
[14] Nashid Shahriar, Sepehr Taeb, Shihabur Rahman Chowdhury, Mubeen Zulfiqar, Massimo Tornatore, Raouf Boutaba, Jeebak Mitra, and Mahdi Hemmati. Reliable slicing of 5g transport networks with dedicated protection. CoRR, abs/1906.10265, 2019. [ arXiv | http ]
[15] Abbas Abou Daya, Mohammad A. Salahuddin, Noura Limam, and Raouf Boutaba. A graph-based machine learning approach for bot detection. CoRR, abs/1902.08538, 2019. [ arXiv | http ]
[16] Christian Gorenflo, Stephen Lee, Lukasz Golab, and Srinivasan Keshav. Fastfabric: Scaling hyperledger fabric to 20, 000 transactions per second. CoRR, abs/1901.00910, 2019. [ arXiv | http ]
[17] Srinivasan Keshav. Reflections on "a control-theoretic approach to flow control". Comput. Commun. Rev., 49(5):54--55, 2019. [ DOI | http ]
[18] Srinivasan Keshav. Reflections on "analysis and simulation of a fair queueing algorithm". Comput. Commun. Rev., 49(5):46--47, 2019. [ DOI | http ]
[19] Srinivasan Keshav. Reflections on being CCR editor 2008-2012. Comput. Commun. Rev., 49(5):26, 2019. [ DOI | http ]
[20] Srinivasan Keshav. Reflections on being SIGCOMM chair 2013-2017. Comput. Commun. Rev., 49(5):18--19, 2019. [ DOI | http ]
[21] Marcel Rumez, Jürgen Dürrwang, Tim Brecht, Timo Steinshorn, Peter Neugebauer, Reiner Kriesten, and Eric Sax. CAN radar: Sensing physical devices in CAN networks based on time domain reflectometry. In 2019 IEEE Vehicular Networking Conference, VNC 2019, Los Angeles, CA, USA, December 4-6, 2019, pages 1--8. IEEE, 2019. [ DOI | http ]
[22] Keiko Katsuragawa, Ju Wang, Ziyang Shan, Ningshan Ouyang, Omid Abari, and Daniel Vogel. Tip-tap: Battery-free discrete 2d fingertip input. In Proceedings of the 32nd Annual ACM Symposium on User Interface Software and Technology, UIST 2019, New Orleans, LA, USA, October 20-23, 2019, pages 1045--1057. ACM, 2019. [ DOI | http ]
[23] Thomas Neumann and Ken Salem. Damon 19: The 15th international workshop on data management on new hardware. In Proceedings of the 2019 International Conference on Management of Data, SIGMOD Conference 2019, Amsterdam, The Netherlands, June 30 - July 5, 2019, pages 2070--2071. ACM, 2019. [ DOI | http ]
[24] Michael Abebe, Brad Glasbergen, and Khuzaima Daudjee. Watdfs: A project for understanding distributed systems in the undergraduate curriculum. In Proceedings of the 50th ACM Technical Symposium on Computer Science Education, SIGCSE 2019, Minneapolis, MN, USA, February 27 - March 02, 2019, pages 920--926. ACM, 2019. [ DOI | http ]
[25] Mohammad Hossein Mazaheri, Soroush Ameli, Ali Abedi, and Omid Abari. A millimeter wave network for billions of things. In Proceedings of the ACM Special Interest Group on Data Communication, SIGCOMM 2019, Beijing, China, August 19-23, 2019, pages 174--186. ACM, 2019. [ DOI | http ]
[26] Farzan Dehbashi, Nauman Ahmed, Manav Mehra, Ju Wang, and Omid Abari. Swimtrack: Drowning detection using RFID. In Proceedings of the ACM SIGCOMM 2019 Conference Posters and Demos, SIGCOMM 2019, Beijing, China, August 19-23, 2019, pages 161--162. ACM, 2019. [ DOI | http ]
[27] Davit Harutyunyan, Nashid Shahriar, Raouf Boutaba, and Roberto Riggio. Latency-aware service function chain placement in 5g mobile networks. In 5th IEEE Conference on Network Softwarization, NetSoft 2019, Paris, France, June 24-28, 2019, pages 133--141. IEEE, 2019. [ DOI | http ]
[28] Shihabur Rahman Chowdhury, Anthony, Haibo Bian, Tim Bai, and Raouf Boutaba. mumathrm{NF}: A disaggregated packet processing architecture. In 5th IEEE Conference on Network Softwarization, NetSoft 2019, Paris, France, June 24-28, 2019, pages 342--350. IEEE, 2019. [ DOI | http ]
[29] Ju Wang, Liqiong Chang, Omid Abari, and Srinivasan Keshav. Are RFID sensing systems ready for the real world? In Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2019, Seoul, Republic of Korea, June 17-21, 2019, pages 366--377. ACM, 2019. [ DOI | http ]
[30] Benoit Henry, Shihabur Rahman Chowdhury, Abdelkader Lahmadi, Romain Azaïs, Jérôme François, and Raouf Boutaba. SPONGE: software-defined traffic engineering to absorb influx of network traffic. In 44th IEEE Conference on Local Computer Networks, LCN 2019, Osnabrueck, Germany, October 14-17, 2019, pages 193--201. IEEE, 2019. [ DOI | http ]
[31] Tim Bai, Haibo Bian, Abbas Abou Daya, Mohammad A. Salahuddin, Noura Limam, and Raouf Boutaba. A machine learning approach for rdp-based lateral movement detection. In 44th IEEE Conference on Local Computer Networks, LCN 2019, Osnabrueck, Germany, October 14-17, 2019, pages 242--245. IEEE, 2019. [ DOI | http ]
[32] Nashid Shahriar, Sepehr Taeb, Shihabur Rahman Chowdhury, Massimo Tornatore, Raouf Boutaba, Jeebak Mitra, and Mahdi Hemmati. Achieving a fully-flexible virtual network embedding in elastic optical networks. In 2019 IEEE Conference on Computer Communications, INFOCOM 2019, Paris, France, April 29 - May 2, 2019, pages 1756--1764. IEEE, 2019. [ DOI | http ]
[33] Elaheh Jalalpour, Milad Ghaznavi, Raouf Boutaba, and Toufik Ahmed. TMAS: A traffic monitoring analytics system leveraging machine learning. In IFIP/IEEE International Symposium on Integrated Network Management, IM 2019, Washington, DC, USA, April 09-11, 2019, pages 408--414. IFIP, 2019. [ http ]
[34] Abbas Abou Daya, Mohammad A. Salahuddin, Noura Limam, and Raouf Boutaba. A graph-based machine learning approach for bot detection. In IFIP/IEEE International Symposium on Integrated Network Management, IM 2019, Washington, DC, USA, April 09-11, 2019, pages 144--152. IFIP, 2019. [ .pdf ]
[35] Sepehr Taeb, Nashid Shahriar, Shihabur Rahman Chowdhury, Massimo Tornatore, Raouf Boutaba, Jeebak Mitra, and Mahdi Hemmati. Virtual network embedding with path-based latency guarantees in elastic optical networks. In 27th IEEE International Conference on Network Protocols, ICNP 2019, Chicago, IL, USA, October 8-10, 2019, pages 1--12. IEEE, 2019. [ DOI | http ]
[36] Christian Gorenflo, Stephen Lee, Lukasz Golab, and Srinivasan Keshav. Fastfabric: Scaling hyperledger fabric to 20, 000 transactions per second. In IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2019, Seoul, Korea (South), May 14-17, 2019, pages 455--463. IEEE, 2019. [ DOI | http ]
[37] Yuhao Dong and Raouf Boutaba. Elasticoin: Low-volatility cryptocurrency with proofs of sequential work. In IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2019, Seoul, Korea (South), May 14-17, 2019, pages 205--209. IEEE, 2019. [ DOI | http ]
[38] Ali Abedi, Omid Abari, and Tim Brecht. Wi-le: Can wifi replace bluetooth? In Proceedings of the 18th ACM Workshop on Hot Topics in Networks, HotNets 2019, Princeton, NJ, USA, November 13-15, 2019, pages 117--124. ACM, 2019. [ DOI | http ]
[39] Nazih Salhab, Rana Rahim, Rami Langar, and Raouf Boutaba. Machine learning based resource orchestration for 5g network slices. In 2019 IEEE Global Communications Conference, GLOBECOM 2019, Waikoloa, HI, USA, December 9-13, 2019, pages 1--6. IEEE, 2019. [ DOI | http ]
[40] Sun Sun, Fiodar Kazhamiaka, Srinivasan Keshav, and Catherine Rosenberg. Using synthetic traces for robust energy system sizing. In Proceedings of the Tenth ACM International Conference on Future Energy Systems, e-Energy 2019, Phoenix, AZ, USA, June 25-28, 2019, pages 251--262. ACM, 2019. [ DOI | http ]
[41] Fiodar Kazhamiaka, Srinivasan Keshav, and Catherine Rosenberg. Adaptive battery control with neural networks. In Proceedings of the Tenth ACM International Conference on Future Energy Systems, e-Energy 2019, Phoenix, AZ, USA, June 25-28, 2019, pages 536--543. ACM, 2019. [ DOI | http ]
[42] Christian Gorenflo, Lukasz Golab, and Srinivasan Keshav. Mitigating trust issues in electric vehicle charging using a blockchain. In Proceedings of the Tenth ACM International Conference on Future Energy Systems, e-Energy 2019, Phoenix, AZ, USA, June 25-28, 2019, pages 160--164. ACM, 2019. [ DOI | http ]
[43] Mikhail Kazhamiaka, Babar Naveed Memon, Chathura Kankanamge, Siddhartha Sahu, Sajjad Rizvi, Bernard Wong, and Khuzaima Daudjee. Sift: resource-efficient consensus with RDMA. In Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, CoNEXT 2019, Orlando, FL, USA, December 09-12, 2019, pages 260--271. ACM, 2019. [ DOI | http ]
[44] Nashid Shahriar, Sepehr Taeb, Shihabur Rahman Chowdhury, Mubeen Zulfiqar, Massimo Tornatore, Raouf Boutaba, Jeebak Mitra, and Mahdi Hemmati. Reliable slicing of 5g transport networks with dedicated protection. In 15th International Conference on Network and Service Management, CNSM 2019, Halifax, NS, Canada, October 21-25, 2019, pages 1--9. IEEE, 2019. [ DOI | http ]
[45] Davit Harutyunyan, Riccardo Fedrizzi, Nashid Shahriar, Raouf Boutaba, and Roberto Riggio. Orchestrating end-to-end slices in 5g networks. In 15th International Conference on Network and Service Management, CNSM 2019, Halifax, NS, Canada, October 21-25, 2019, pages 1--9. IEEE, 2019. [ DOI | http ]
[46] Haibo Bian, Tim Bai, Mohammad A. Salahuddin, Noura Limam, Abbas Abou Daya, and Raouf Boutaba. Host in danger? detecting network intrusions from authentication logs. In 15th International Conference on Network and Service Management, CNSM 2019, Halifax, NS, Canada, October 21-25, 2019, pages 1--9. IEEE, 2019. [ DOI | http ]
[47] Gustavo Alonso, Carsten Binnig, Ippokratis Pandis, Kenneth Salem, Jan Skrzypczak, Ryan Stutsman, Lasse Thostrup, Tianzheng Wang, Zeke Wang, and Tobias Ziegler. DPI: the data processing interface for modern networks. In 9th Biennial Conference on Innovative Data Systems Research, CIDR 2019, Asilomar, CA, USA, January 13-16, 2019, Online Proceedings. www.cidrdb.org, 2019. [ .pdf ]
[48] Benjamin Cassell, Huy Hoang, and Tim Brecht. Rocketstreams: A framework for the efficient dissemination of live streaming video. In Proceedings of the 10th ACM SIGOPS Asia-Pacific Workshop on Systems, APSys 2019, Hangzhou, China, Augsut 19-20, 2019, pages 84--90. ACM, 2019. [ DOI | http ]

2018

[1] Kenneth Salem. Sagas. In Encyclopedia of Database Systems, Second Edition. Springer, 2018. [ DOI | http ]
[2] Omid Salehi-Abari. Software-hardware systems for the Internet-of-Things. PhD thesis, Massachusetts Institute of Technology, Cambridge, USA, 2018. [ http ]
[3] Nikolas Herbst, André Bauer, Samuel Kounev, Giorgos Oikonomou, Erwin Van Eyk, George Kousiouris, Athanasia Evangelinou, Rouven Krebs, Tim Brecht, Cristina L. Abad, and Alexandru Iosup. Quantifying cloud performance and dependability: Taxonomy, metric design, and emerging challenges. ACM Trans. Model. Perform. Evaluation Comput. Syst., 3(4):19:1--19:36, 2018. [ DOI | http ]
[4] Benjamin Cassell, Tyler Szepesi, Jim Summers, Tim Brecht, Derek L. Eager, and Bernard Wong. Disk prefetching mechanisms for increasing HTTP streaming video server throughput. ACM Trans. Model. Perform. Evaluation Comput. Syst., 3(2):7:1--7:30, 2018. [ DOI | http ]
[5] Osman Salem, Ahmed Serhrouchni, Ahmed Mehaoua, and Raouf Boutaba. Event detection in wireless body area networks using kalman filter and power divergence. IEEE Trans. Netw. Serv. Manag., 15(3):1018--1034, 2018. [ DOI | http ]
[6] Wolfgang Kellerer, Raouf Boutaba, Prosper Chemouil, Rafael Pasquini, Giovanni Schembra, Stefan Schmid, Sandra Scott-Hayward, and Kohei Shiomoto. Guest editors' introduction: Special section on novel techniques for managing softwarized networks. IEEE Trans. Netw. Serv. Manag., 15(4):1192--1196, 2018. [ DOI | http ]
[7] Shihabur Rahman Chowdhury, Sara Ayoubi, Reaz Ahmed, Nashid Shahriar, Raouf Boutaba, Jeebak Mitra, and Liu Liu. Multi-layer virtual network embedding. IEEE Trans. Netw. Serv. Manag., 15(3):1132--1145, 2018. [ DOI | http ]
[8] Guoming Tang, Srinivasan Keshav, Lukasz Golab, and Kui Wu. Bikeshare pool sizing for bike-and-ride multimodal transit. IEEE Trans. Intell. Transp. Syst., 19(7):2279--2289, 2018. [ DOI | http ]
[9] Nashid Shahriar, Shihabur Rahman Chowdhury, Reaz Ahmed, Aimal Khan, Siavash Fathi, Raouf Boutaba, Jeebak Mitra, and Liu Liu. Virtual network survivability through joint spare capacity allocation and embedding. IEEE J. Sel. Areas Commun., 36(3):502--518, 2018. [ DOI | http ]
[10] Raouf Boutaba, Mohammad A. Salahuddin, Noura Limam, Sara Ayoubi, Nashid Shahriar, Felipe Estrada Solano, and Oscar Maurício Caicedo Rendón. A comprehensive survey on machine learning for networking: evolution, applications and research opportunities. J. Internet Serv. Appl., 9(1):16:1--16:99, 2018. [ DOI | http ]
[11] Srinivasan Keshav. Paradoxes of internet architecture. IEEE Internet Comput., 22(1):96--102, 2018. [ DOI | http ]
[12] Milan Jain, Rachel K. Kalaimani, Srinivasan Keshav, and Catherine Rosenberg. Using personal environmental comfort systems to mitigate the impact of occupancy prediction errors on HVAC performance. CoRR, abs/1810.10619, 2018. [ arXiv | http ]
[13] Srinivasan Keshav, Wojciech M. Golab, Bernard Wong, Sajjad Rizvi, and Sergey Gorbunov. Rcanopus: Making canopus resilient to failures and byzantine faults. CoRR, abs/1810.09300, 2018. [ arXiv | http ]
[14] Ali Abedi, Tim Brecht, and Andrew Heard. T-simn: A trace collection and simulation framework for 802.11n networks. Comput. Commun., 117:116--132, 2018. [ DOI | http ]
[15] Fawaz AL-Hazemi, Yuyang Peng, Chan-Hyun Youn, Josip Lorincz, Chao Li, Song Guo, and Raouf Boutaba. Dynamic allocation of power delivery paths in consolidated data centers based on adaptive UPS switching. Comput. Networks, 144:254--270, 2018. [ DOI | http ]
[16] Sara Ayoubi, Noura Limam, Mohammad A. Salahuddin, Nashid Shahriar, Raouf Boutaba, Felipe Estrada Solano, and Oscar Maurício Caicedo Rendón. Machine learning for cognitive network management. IEEE Commun. Mag., 56(1):158--165, 2018. [ DOI | http ]
[17] Mina Tahmasbi Arashloo, Pavel Shirshov, Rohan Gandhi, Guohan Lu, Lihua Yuan, and Jennifer Rexford. A scalable VPN gateway for multi-tenant cloud services. Comput. Commun. Rev., 48(1):49--55, 2018. [ DOI | http ]
[18] Xinan Yan, Linguan Yang, Hongbo Zhang, Xiayue Charles Lin, Bernard Wong, Kenneth Salem, and Tim Brecht. Carousel: Low-latency transaction processing for globally-distributed data. In Proceedings of the 2018 International Conference on Management of Data, SIGMOD Conference 2018, Houston, TX, USA, June 10-15, 2018, pages 231--243. ACM, 2018. [ DOI | http ]
[19] Mustafa Korkmaz, Martin Karsten, Kenneth Salem, and Semih Salihoglu. Workload-aware CPU performance scaling for transactional database systems. In Proceedings of the 2018 International Conference on Management of Data, SIGMOD Conference 2018, Houston, TX, USA, June 10-15, 2018, pages 291--306. ACM, 2018. [ DOI | http ]
[20] Deepak Vasisht, Guo Zhang, Omid Abari, Hsiao-Ming Lu, Jacob Flanz, and Dina Katabi. In-body backscatter communication and localization. In Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication, SIGCOMM 2018, Budapest, Hungary, August 20-25, 2018, pages 132--146. ACM, 2018. [ DOI | http ]
[21] Haitham Hassanieh, Omid Abari, Michael Rodriguez, Mohammed A. Abdelghany, Dina Katabi, and Piotr Indyk. Fast millimeter wave beam alignment. In Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication, SIGCOMM 2018, Budapest, Hungary, August 20-25, 2018, pages 432--445. ACM, 2018. [ DOI | http ]
[22] Ahmed Alquraan, Hatem Takruri, Mohammed Alfatafta, and Samer Al-Kiswany. An analysis of network-partitioning failures in cloud systems. In 13th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2018, Carlsbad, CA, USA, October 8-10, 2018, pages 51--68. USENIX Association, 2018. [ http ]
[23] Abdelhadi Azzouni, Raouf Boutaba, Thi Mai Trang Nguyen, and Guy Pujolle. softdp: Secure and efficient openflow topology discovery protocol. In 2018 IEEE/IFIP Network Operations and Management Symposium, NOMS 2018, Taipei, Taiwan, April 23-27, 2018, pages 1--7. IEEE, 2018. [ DOI | http ]
[24] Sara Ayoubi, Shihabur Rahman Chowdhury, and Raouf Boutaba. Breaking service function chains with khaleesi. In 17th International IFIP TC6 Networking Conference, Networking 2018, Zurich, Switzerland, May 14-16, 2018, pages 64--72. IFIP, 2018. [ DOI | .pdf ]
[25] Elaheh Jalalpour, Milad Ghaznavi, Daniel Migault, Stere Preda, Makan Pourzandi, and Raouf Boutaba. Dynamic security orchestration for CDN edge-servers. In 4th IEEE Conference on Network Softwarization and Workshops, NetSoft 2018, Montreal, QC, Canada, June 25-29, 2018, pages 329--331. IEEE, 2018. [ DOI | http ]
[26] Elaheh Jalalpour, Milad Ghaznavi, Daniel Migault, Stere Preda, Makan Pourzandi, and Raouf Boutaba. A security orchestration system for CDN edge servers. In 4th IEEE Conference on Network Softwarization and Workshops, NetSoft 2018, Montreal, QC, Canada, June 25-29, 2018, pages 46--54. IEEE, 2018. [ DOI | http ]
[27] Ju Wang, Omid Abari, and Srinivasan Keshav. Challenge: RFID hacking for fun and profit. In Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, MobiCom 2018, New Delhi, India, October 29 - November 02, 2018, pages 461--470. ACM, 2018. [ DOI | http ]
[28] Mohammad Hossein Mazaheri, Ali Abedi, and Omid Abari. Poster: Bringing mmwave communications to raspberry pi. In Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, MobiCom 2018, New Delhi, India, October 29 - November 02, 2018, pages 687--689. ACM, 2018. [ DOI | http ]
[29] Yixuan Gao, Ali Abedi, Tim Brecht, and Ramya Bhagavatula. Poster: Analyzing bitrates in modern wi-fi networks. In Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, MobiCom 2018, New Delhi, India, October 29 - November 02, 2018, pages 717--719. ACM, 2018. [ DOI | http ]
[30] Xinan Yan, Arturo Pie Joa, Bernard Wong, Benjamin Cassell, Tyler Szepesi, Malek Naouach, and Disney Lam. Specrpc: A general framework for performing speculative remote procedure calls. In Proceedings of the 19th International Middleware Conference, Middleware 2018, Rennes, France, December 10-14, 2018, pages 266--278. ACM, 2018. [ DOI | http ]
[31] Brad Glasbergen, Michael Abebe, and Khuzaima Daudjee. Tutorial: Adaptive replication and partitioning in data systems. In Proceedings of the 19th International Middleware Conference Tutorials, Middleware 2018, Rennes, France, December 10-14, 2018, pages 1:1--1:5. ACM, 2018. [ DOI | http ]
[32] Yuhao Dong, Woojung Kim, and Raouf Boutaba. Conifer: Centrally-managed PKI with blockchain-rooted trust. In IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), iThings/GreenCom/CPSCom/SmartData 2018, Halifax, NS, Canada, July 30 - August 3, 2018, pages 1092--1099. IEEE, 2018. [ DOI | http ]
[33] Saman Barghi and Martin Karsten. Work-stealing, locality-aware actor scheduling. In 2018 IEEE International Parallel and Distributed Processing Symposium, IPDPS 2018, Vancouver, BC, Canada, May 21-25, 2018, pages 484--494. IEEE Computer Society, 2018. [ DOI | http ]
[34] Mohammed Alfatafta, Zuhair AlSader, and Samer Al-Kiswany. COOL: A cloud-optimized structure for MPI collective operations. In 11th IEEE International Conference on Cloud Computing, CLOUD 2018, San Francisco, CA, USA, July 2-7, 2018, pages 746--753. IEEE Computer Society, 2018. [ DOI | http ]
[35] Hui Yu, Jiahai Yang, Carol J. Fung, Raouf Boutaba, and Yi Zhuang. ENSC: multi-resource hybrid scaling for elastic network service chain in clouds. In 24th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2018, Singapore, December 11-13, 2018, pages 34--41. IEEE, 2018. [ DOI | http ]
[36] Michael Abebe, Khuzaima Daudjee, Brad Glasbergen, and Yuanfeng Tian. Ec-store: Bridging the gap between storage and latency in distributed erasure coded systems. In 38th IEEE International Conference on Distributed Computing Systems, ICDCS 2018, Vienna, Austria, July 2-6, 2018, pages 255--266. IEEE Computer Society, 2018. [ DOI | http ]
[37] Ali Abedi, Mohammad Hossein Mazaheri, Omid Abari, and Tim Brecht. Witag: Rethinking backscatter communication for wifi networks. In Proceedings of the 17th ACM Workshop on Hot Topics in Networks, HotNets 2018, Redmond, WA, USA, November 15-16, 2018, pages 148--154. ACM, 2018. [ DOI | http ]
[38] Babar Naveed Memon, Xiayue Charles Lin, Arshia Mufti, Arthur Scott Wesley, Tim Brecht, Kenneth Salem, Bernard Wong, and Benjamin Cassell. Ramp: A lightweight RDMA abstraction for loosely coupled applications. In 10th USENIX Workshop on Hot Topics in Cloud Computing, HotCloud 2018, Boston, MA, USA, July 9, 2018. USENIX Association, 2018. [ http ]
[39] Michael J. Mior and Kenneth Salem. Renormalization of nosql database schemas. In Conceptual Modeling - 37th International Conference, ER 2018, Xi'an, China, October 22-25, 2018, Proceedings, volume 11157 of Lecture Notes in Computer Science, pages 479--487. Springer, 2018. [ DOI | http ]
[40] Sun Sun, Srinivasan Keshav, Catherine Rosenberg, and Matthew Peloso. Optimal matching of stochastic solar generators to stochastic loads. In Proceedings of the Ninth International Conference on Future Energy Systems, e-Energy 2018, Karlsruhe, Germany, June 12-15, 2018, pages 33--37. ACM, 2018. [ DOI | http ]
[41] Fiodar Kazhamiaka, Yashar Ghiassi-Farrokhfal, Srinivasan Keshav, and Catherine Rosenberg. Robust and practical approaches for solar PV and storage sizing. In Proceedings of the Ninth International Conference on Future Energy Systems, e-Energy 2018, Karlsruhe, Germany, June 12-15, 2018, pages 146--156. ACM, 2018. [ DOI | http ]
[42] M. Doroshenko, Srinivasan Keshav, and Catherine Rosenberg. Flattening the duck curve using grid-friendly solar panel orientation. In Proceedings of the Ninth International Conference on Future Energy Systems, e-Energy 2018, Karlsruhe, Germany, June 12-15, 2018, pages 375--377. ACM, 2018. [ DOI | http ]
[43] Brad Glasbergen, Michael Abebe, Khuzaima Daudjee, Scott Foggo, and Anil Pacaci. Apollo: Learning query correlations for predictive caching in geo-distributed systems. In Proceedings of the 21st International Conference on Extending Database Technology, EDBT 2018, Vienna, Austria, March 26-29, 2018, pages 253--264. OpenProceedings.org, 2018. [ DOI | http ]
[44] Yuhao Dong, Woojung Kim, and Raouf Boutaba. Bitforest: a portable and efficient blockchain-based naming system. In 14th International Conference on Network and Service Management, CNSM 2018, Rome, Italy, November 5-9, 2018, pages 226--232. IEEE Computer Society, 2018. [ http ]
[45] Anthony, Shihabur Rahman Chowdhury, Tim Bai, Raouf Boutaba, and Jérôme François. Unis: A user-space non-intrusive workflow-aware virtual network function scheduler. In 14th International Conference on Network and Service Management, CNSM 2018, Rome, Italy, November 5-9, 2018, pages 152--160. IEEE Computer Society, 2018. [ http ]
[46] Hong Zhang, Kai Chen, and Mosharaf Chowdhury. Pas de deux: Shape the circuits, and shape the apps too! In Proceedings of the 2nd Asia-Pacific Workshop on Networking, APNet 2018, Beijing, China, August 02-03, 2018, pages 29--35. ACM, 2018. [ DOI | http ]

2017

[1] Ali José Mashtizadeh. Topics in systems reliability: storage, execution, and security. PhD thesis, Stanford University, USA, 2017. [ http ]
[2] Benjamin Cassell, Tyler Szepesi, Bernard Wong, Tim Brecht, Jonathan Ma, and Xiaoyi Liu. Nessie: A decoupled, client-driven key-value store using RDMA. IEEE Trans. Parallel Distributed Syst., 28(12):3537--3552, 2017. [ DOI | http ]
[3] Hong Zhang, Kai Chen, Wei Bai, Dongsu Han, Chen Tian, Hao Wang, Haibing Guan, and Ming Zhang. Guaranteeing deadlines for inter-data center transfers. IEEE/ACM Trans. Netw., 25(1):579--595, 2017. [ DOI | http ]
[4] Filip De Turck, Prosper Chemouil, Wolfgang Kellerer, Raouf Boutaba, Kohei Shiomoto, Roberto Riggio, and Rafael Pasquini. Guest editors' introduction: Special issue on advances in management of softwarized networks. IEEE Trans. Netw. Serv. Manag., 14(4):786--791, 2017. [ DOI | http ]
[5] Nashid Shahriar, Reaz Ahmed, Shihabur Rahman Chowdhury, Aimal Khan, Raouf Boutaba, and Jeebak Mitra. Generalized recovery from node failure in virtual network embedding. IEEE Trans. Netw. Serv. Manag., 14(2):261--274, 2017. [ DOI | http ]
[6] Khaled Salah, Prasad Calyam, and Raouf Boutaba. Analytical model for elastic scaling of cloud-based firewalls. IEEE Trans. Netw. Serv. Manag., 14(1):136--146, 2017. [ DOI | http ]
[7] Rashid Mijumbi, Sidhant Hasija, Steven Davy, Alan Davy, Brendan Jennings, and Raouf Boutaba. Topology-aware prediction of virtual network function resource requirements. IEEE Trans. Netw. Serv. Manag., 14(1):106--120, 2017. [ DOI | http ]
[8] Fatma Bouabdallah, Chaima Zidi, and Raouf Boutaba. Joint routing and energy management in underwater acoustic sensor networks. IEEE Trans. Netw. Serv. Manag., 14(2):456--471, 2017. [ DOI | http ]
[9] Michael J. Mior, Kenneth Salem, Ashraf Aboulnaga, and Rui Liu. Nose: Schema design for nosql applications. IEEE Trans. Knowl. Data Eng., 29(10):2275--2289, 2017. [ DOI | http ]
[10] Milad Ghaznavi, Nashid Shahriar, Shahin Kamali, Reaz Ahmed, and Raouf Boutaba. Distributed service function chaining. IEEE J. Sel. Areas Commun., 35(11):2479--2489, 2017. [ DOI | http ]
[11] Raouf Boutaba, Nashid Shahriar, and Siavash Fathi. Elastic optical networking for 5g transport. J. Netw. Syst. Manag., 25(4):819--847, 2017. [ DOI | http ]
[12] Samer Al-Kiswany, Lauro B. Costa, Hao Yang, Emalayan Vairavanathan, and Matei Ripeanu. A cross-layer optimized storage system for workflow applications. Future Gener. Comput. Syst., 75:423--437, 2017. [ DOI | http ]
[13] Haitham Hassanieh, Omid Abari, Michael Rodreguez, Mohammed A. Abdelghany, Dina Katabi, and Piotr Indyk. Agile millimeter wave networks with provable guarantees. CoRR, abs/1706.06935, 2017. [ arXiv | http ]
[14] Abdelhadi Azzouni, Thi Mai Trang Nguyen, Raouf Boutaba, and Guy Pujolle. Limitations of openflow topology discovery protocol. CoRR, abs/1705.00706, 2017. [ arXiv | http ]
[15] Abdelhadi Azzouni, Raouf Boutaba, Thi Mai Trang Nguyen, and Guy Pujolle. softdp: Secure and efficient topology discovery protocol for SDN. CoRR, abs/1705.04527, 2017. [ arXiv | http ]
[16] Rachel K. Kalaimani, Milan Jain, Srinivasan Keshav, and Catherine Rosenberg. On the interaction between personal comfort systems and centralized HVAC systems in office buildings. CoRR, abs/1710.02064, 2017. [ arXiv | http ]
[17] Abdelhadi Azzouni, Raouf Boutaba, and Guy Pujolle. Neuroute: Predictive dynamic routing for software-defined networks. CoRR, abs/1709.06002, 2017. [ arXiv | http ]
[18] Joao Vitor Torres, Igor Drummond Alvarenga, Raouf Boutaba, and Otto Carlos M. B. Duarte. An autonomous and efficient controller-based routing scheme for networking named-data mobility. Comput. Commun., 103:94--103, 2017. [ DOI | http ]
[19] Sai Qian Zhang, Qi Zhang, Ali Tizghadam, Byungchul Park, Hadi Bannazadeh, Raouf Boutaba, and Alberto Leon-Garcia. TCAM space-efficient routing in a software defined network. Comput. Networks, 125:26--40, 2017. [ DOI | http ]
[20] Yuyang Peng, Fawaz AL-Hazemi, Raouf Boutaba, Fei Tong, Il-Sun Hwang, and Chan-Hyun Youn. Enhancing energy efficiency via cooperative MIMO in wireless sensor networks: State of the art and future research directions. IEEE Commun. Mag., 55(11):47--53, 2017. [ DOI | http ]
[21] Srinivasan Keshav. Technical perspective: The power of wi-fi to deliver power. Commun. ACM, 60(3):82, 2017. [ DOI | http ]
[22] Nadjib Aitsaadi, Raouf Boutaba, and Yutaka Takahashi. Cloudification of the internet of things. Ann. des Télécommunications, 72(1-2):1--2, 2017. [ DOI | http ]
[23] Tyler Szepesi, Benjamin Cassell, Tim Brecht, Derek L. Eager, Jim Summers, and Bernard Wong. Using libception to understand and improve HTTP streaming video server throughput. In Proceedings of the 8th ACM/SPEC on International Conference on Performance Engineering, ICPE 2017, L'Aquila, Italy, April 22-26, 2017, pages 51--62. ACM, 2017. [ DOI | http ]
[24] Ali Abedi and Tim Brecht. Conducting repeatable experiments in highly variable cloud computing environments. In Proceedings of the 8th ACM/SPEC on International Conference on Performance Engineering, ICPE 2017, L'Aquila, Italy, April 22-26, 2017, pages 287--292. ACM, 2017. [ DOI | http ]
[25] Chaima Zidi, Fatma Bouabdallah, Raouf Boutaba, and Ahmed Mehaoua. MC-UWMAC: A multi-channel MAC protocol for underwater sensor networks. In International Conference on Wireless Networks and Mobile Communications, WINCOM 2017, Rabat, Morocco, November 1-4, 2017, pages 1--6. IEEE, 2017. [ DOI | http ]
[26] Christian Gorenflo, Lukasz Golab, and Srinivasan Keshav. Managing sensor data streams: Lessons learned from the webike project. In Proceedings of the 29th International Conference on Scientific and Statistical Database Management, Chicago, IL, USA, June 27-29, 2017, pages 1:1--1:11. ACM, 2017. [ DOI | http ]
[27] Hong Zhang, Junxue Zhang, Wei Bai, Kai Chen, and Mosharaf Chowdhury. Resilient datacenter load balancing in the wild. In Proceedings of the Conference of the ACM Special Interest Group on Data Communication, SIGCOMM 2017, Los Angeles, CA, USA, August 21-25, 2017, pages 253--266. ACM, 2017. [ DOI | http ]
[28] David Pariag and Tim Brecht. Application bandwidth and flow rates from 3 trillion flows across 45 carrier networks. In Passive and Active Measurement - 18th International Conference, PAM 2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings, volume 10176 of Lecture Notes in Computer Science, pages 129--141. Springer, 2017. [ DOI | http ]
[29] Nashid Shahriar, Shihabur Rahman Chowdhury, Reaz Ahmed, Mahfuza Sharmin, Raouf Boutaba, and Bertrand Mathieu. Availability in P2P based online social networks. In 4th International Conference on Networking, Systems and Security, NSysS (2) 2017, Dhaka, Bangladesh, December 18-20, 2017, pages 1--9. IEEE, 2017. [ DOI | http ]
[30] Omid Abari, Dinesh Bharadia, Austin Duffield, and Dina Katabi. Enabling high-quality untethered virtual reality. In 14th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2017, Boston, MA, USA, March 27-29, 2017, pages 531--544. USENIX Association, 2017. [ http ]
[31] Nashid Shahriar, Shihabur Rahman Chowdhury, Reaz Ahmed, Aimal Khan, Raouf Boutaba, Jeebak Mitra, and Liu Liu. Joint backup capacity allocation and embedding for survivable virtual networks. In 2017 IFIP Networking Conference, IFIP Networking 2017 and Workshops, Stockholm, Sweden, June 12-16, 2017, pages 1--9. IEEE Computer Society, 2017. [ DOI | http ]
[32] Omid Abari. Enabling high-quality untethered virtual reality. In Proceedings of the 1st ACM Workshop on Millimeter-Wave Networks and Sensing Systems, mmNets@MobiCom 2017, Snowbird, UT, USA, October 16 - 20, 2017, page 49. ACM, 2017. [ DOI | http ]
[33] Xu Cui, Michael Mior, Bernard Wong, Khuzaima Daudjee, and Sajjad Rizvi. Netstore: leveraging network optimizations to improve distributed transaction processing performance. In Proceedings of the Second International Workshop on Active Middleware on Modern Hardware, ACTIVE@Middleware 2017, Las Vegas, NV, USA, December 11-15, 2017, pages 1--10. ACM, 2017. [ DOI | http ]
[34] Abdelhadi Azzouni, Thi Mai Trang Nguyen, Raouf Boutaba, and Guy Pujolle. Limitations of openflow topology discovery protocol. In 16th Annual Mediterranean Ad Hoc Networking Workshop, Med-Hoc-Net 2017, Budva, Montenegro, June 28-30, 2017, pages 1--3. IEEE, 2017. [ DOI | http ]
[35] Chaima Zidi, Fatma Bouabdallah, Raouf Boutaba, and Ahmed Mehaoua. Toward avoiding energy holes in underwater acoustic sensor networks. In 13th International Wireless Communications and Mobile Computing Conference, IWCMC 2017, Valencia, Spain, June 26-30, 2017, pages 1616--1621. IEEE, 2017. [ DOI | http ]
[36] Shihabur Rahman Chowdhury, Reaz Ahmed, Nashid Shahriar, Aimal Khan, Raouf Boutaba, Jeebak Mitra, and Liu Liu. Revine: Reallocation of virtual network embedding to eliminate substrate bottlenecks. In 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), Lisbon, Portugal, May 8-12, 2017, pages 116--124. IEEE, 2017. [ DOI | http ]
[37] Joseph Mate, Khuzaima Daudjee, and Shahin Kamali. Robust multi-tenant server consolidation in the cloud for data analytics workloads. In 37th IEEE International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, June 5-8, 2017, pages 2111--2118. IEEE Computer Society, 2017. [ DOI | http ]
[38] Samer Al-Kiswany, Suli Yang, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau. NICE: network-integrated cluster-efficient storage. In Proceedings of the 26th International Symposium on High-Performance Parallel and Distributed Computing, HPDC 2017, Washington, DC, USA, June 26-30, 2017, pages 29--40. ACM, 2017. [ DOI | http ]
[39] Mina Tahmasbi Arashloo, Monia Ghobadi, Jennifer Rexford, and David Walker. Hotcocoa: Hardware congestion control abstractions. In Proceedings of the 16th ACM Workshop on Hot Topics in Networks, Palo Alto, CA, USA, HotNets 2017, November 30 - December 01, 2017, pages 108--114. ACM, 2017. [ DOI | http ]
[40] Simon Dominik Fink, Lukasz Golab, Srinivasan Keshav, and Hermann de Meer. How similar is the usage of electric cars and electric bicycles? In Proceedings of the Eighth International Conference on Future Energy Systems, e-Energy 2017, Shatin, Hong Kong, China, May 16-19, 2017, pages 334--340. ACM, 2017. [ DOI | http ]
[41] Alexey Karyakin and Kenneth Salem. An analysis of memory power consumption in database systems. In Proceedings of the 13th International Workshop on Data Management on New Hardware, DaMoN 2017, Chicago, IL, USA, May 15, 2017, pages 2:1--2:9. ACM, 2017. [ DOI | http ]
[42] Sajjad Rizvi, Bernard Wong, and Srinivasan Keshav. Canopus: A scalable and massively parallel consensus protocol. In Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies, CoNEXT 2017, Incheon, Republic of Korea, December 12 - 15, 2017, pages 426--438. ACM, 2017. [ DOI | http ]
[43] Shihabur Rahman Chowdhury, Sara Ayoubi, Reaz Ahmed, Nashid Shahriar, Raouf Boutaba, Jeebak Mitra, and Liu Liu. MULE: multi-layer virtual network embedding. In 13th International Conference on Network and Service Management, CNSM 2017, Tokyo, Japan, November 26-30, 2017, pages 1--9. IEEE Computer Society, 2017. [ DOI | http ]
[44] Abdelhadi Azzouni, Raouf Boutaba, and Guy Pujolle. Neuroute: Predictive dynamic routing for software-defined networks. In 13th International Conference on Network and Service Management, CNSM 2017, Tokyo, Japan, November 26-30, 2017, pages 1--6. IEEE Computer Society, 2017. [ DOI | http ]
[45] Abdelhamid Alleg, Toufik Ahmed, Mohamed Mosbah, Roberto Riggio, and Raouf Boutaba. Delay-aware VNF placement and chaining based on a flexible resource allocation approach. In 13th International Conference on Network and Service Management, CNSM 2017, Tokyo, Japan, November 26-30, 2017, pages 1--7. IEEE Computer Society, 2017. [ DOI | http ]
[46] Ali José Mashtizadeh, Tal Garfinkel, David Terei, David Mazières, and Mendel Rosenblum. Towards practical default-on multi-core record/replay. In Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2017, Xi'an, China, April 8-12, 2017, pages 693--708. ACM, 2017. [ DOI | http ]

2016

[1] Chaima Zidi, Fatma Bouabdallah, and Raouf Boutaba. Routing design avoiding energy holes in underwater acoustic sensor networks. Wirel. Commun. Mob. Comput., 16(14):2035--2051, 2016. [ DOI | http ]
[2] Yousri Daldoul, Djamal-Eddine Meddour, Toufik Ahmed, and Raouf Boutaba. Performance and scalability evaluation of IEEE 802.11v/aa multicast transport. Wirel. Commun. Mob. Comput., 16(14):1987--2000, 2016. [ DOI | http ]
[3] Rami Langar, Bechir Hamdaoui, Mario Gerla, and Raouf Boutaba. Guest editorial "vehicular cloud networking". Veh. Commun., 4:38, 2016. [ DOI | http ]
[4] Lauro Beltrão Costa, Samer Al-Kiswany, Matei Ripeanu, and Hao Yang. Support for provisioning and configuration decisions for data intensive workflows. IEEE Trans. Parallel Distributed Syst., 27(9):2725--2739, 2016. [ DOI | http ]
[5] Stephen M. Blackburn, Amer Diwan, Matthias Hauswirth, Peter F. Sweeney, José Nelson Amaral, Tim Brecht, Lubomír Bulej, Cliff Click, Lieven Eeckhout, Sebastian Fischmeister, Daniel Frampton, Laurie J. Hendren, Michael Hind, Antony L. Hosking, Richard E. Jones, Tomas Kalibera, Nathan Keynes, Nathaniel Nystrom, and Andreas Zeller. The truth, the whole truth, and nothing but the truth: A pragmatic guide to assessing empirical evaluations. ACM Trans. Program. Lang. Syst., 38(4):15:1--15:20, 2016. [ http ]
[6] Reaz Ahmed, Md. Faizul Bari, Shihabur Rahman Chowdhury, Md. Golam Rabbani, Raouf Boutaba, and Bertrand Mathieu. αroute: Routing on names. IEEE/ACM Trans. Netw., 24(5):3070--3083, 2016. [ DOI | http ]
[7] Filip De Turck, Prosper Chemouil, Raouf Boutaba, Minlan Yu, Christian Esteve Rothenberg, and Kohei Shiomoto. Guest editors' introduction: Special issue on management of softwarized networks. IEEE Trans. Netw. Serv. Manag., 13(3):362--365, 2016. [ DOI | http ]
[8] Md Mashrur Alam Khan, Nashid Shahriar, Reaz Ahmed, and Raouf Boutaba. Multi-path link embedding for survivability in virtual networks. IEEE Trans. Netw. Serv. Manag., 13(2):253--266, 2016. [ DOI | http ]
[9] Shihabur Rahman Chowdhury, Reaz Ahmed, Md Mashrur Alam Khan, Nashid Shahriar, Raouf Boutaba, Jeebak Mitra, and Feng Zeng. Dedicated protection for survivable virtual network embedding. IEEE Trans. Netw. Serv. Manag., 13(4):913--926, 2016. [ DOI | http ]
[10] Md. Faizul Bari, Shihabur Rahman Chowdhury, Reaz Ahmed, Raouf Boutaba, and Otto Carlos Muniz Bandeira Duarte. Orchestrating virtualized network functions. IEEE Trans. Netw. Serv. Manag., 13(4):725--739, 2016. [ DOI | http ]
[11] Daniel S. Berger, Martin Karsten, and Jens B. Schmitt. How real is the threat of instability events predicted by adversarial queueing theory? Tiny Trans. Comput. Sci., 4, 2016. [ .pdf ]
[12] Hong Zhang, Hongbo Jiang, Bo Li, Fangming Liu, Athanasios V. Vasilakos, and Jiangchuan Liu. A framework for truthful online auctions in cloud computing with heterogeneous user demands. IEEE Trans. Computers, 65(3):805--818, 2016. [ DOI | http ]
[13] Zhihong Liu, Qi Zhang, Reaz Ahmed, Raouf Boutaba, Yaping Liu, and Zhenghu Gong. Dynamic resource allocation for mapreduce with partitioning skew. IEEE Trans. Computers, 65(11):3304--3317, 2016. [ DOI | http ]
[14] Peter A. Boncz and Kenneth Salem. Front matter. Proc. VLDB Endow., 10(1):i--vi, 2016. [ .pdf ]
[15] Yashar Ghiassi-Farrokhfal, Catherine Rosenberg, Srinivasan Keshav, and Marie-Benedicte Adjaho. Joint optimal design and operation of hybrid energy storage systems. IEEE J. Sel. Areas Commun., 34(3):639--650, 2016. [ DOI | http ]
[16] Khaled Salah, Khalid Elbadawi, and Raouf Boutaba. An analytical model for estimating cloud resources of elastic services. J. Netw. Syst. Manag., 24(2):285--308, 2016. [ DOI | http ]
[17] Zhihong Liu, Qi Zhang, Raouf Boutaba, Yaping Liu, and Baosheng Wang. OPTIMA: on-line partitioning skew mitigation for mapreduce with resource adjustment. J. Netw. Syst. Manag., 24(4):859--883, 2016. [ DOI | http ]
[18] Yousri Daldoul, Djamal-Eddine Meddour, Toufik Ahmed, and Raouf Boutaba. Block negative acknowledgement protocol for reliable multicast in IEEE 802.11. J. Netw. Comput. Appl., 75:32--46, 2016. [ DOI | http ]
[19] Kyungyong Chung, Raouf Boutaba, and Salim Hariri. Knowledge based decision support system. Inf. Technol. Manag., 17(1):1--3, 2016. [ DOI | http ]
[20] Zhihong Liu, Qi Zhang, Raouf Boutaba, Yaping Liu, and Zhenghu Gong. ROUTE: run-time robust reducer workload estimation for mapreduce. Int. J. Netw. Manag., 26(3):224--244, 2016. [ DOI | http ]
[21] Milad Ghaznavi, Nashid Shahriar, Reaz Ahmed, and Raouf Boutaba. Service function chaining simplified. CoRR, abs/1601.00751, 2016. [ arXiv | http ]
[22] Mirmojtaba Gharibi, Raouf Boutaba, and Steven Lake Waslander. Internet of drones. CoRR, abs/1601.01289, 2016. [ arXiv | http ]
[23] Daniel M. Batista, Gordon S. Blair, Fabio Kon, Raouf Boutaba, David Hutchison, Raj Jain, Ramachandran Ramjee, and Christian Esteve Rothenberg. Perspectives on software-defined networks: interviews with five leading scientists from the networking community. CoRR, abs/1603.08461, 2016. [ arXiv | http ]
[24] Abdelhadi Azzouni, Othmen Braham, Thi Mai Trang Nguyen, Guy Pujolle, and Raouf Boutaba. Fingerprinting openflow controllers: The first step to attack an SDN control plane. CoRR, abs/1611.02370, 2016. [ arXiv | http ]
[25] Omid Abari, Hariharan Rahul, and Dina Katabi. Over-the-air function computation in sensor networks. CoRR, abs/1612.02307, 2016. [ arXiv | http ]
[26] Rashid Mijumbi, Joan Serrat, Juan-Luis Gorricho, Niels Bouten, Filip De Turck, and Raouf Boutaba. Network function virtualization: State-of-the-art and research challenges. IEEE Commun. Surv. Tutorials, 18(1):236--262, 2016. [ DOI | http ]
[27] Harvey Freeman and Raouf Boutaba. Networking ind ustry transf ormation through softwarization [the president's page]. IEEE Commun. Mag., 54(8):4--6, 2016. [ DOI | http ]
[28] Rayman Preet Singh, Benjamin Cassell, Srinivasan Keshav, and Tim Brecht. Tussleos: managing privacy versus functionality trade-offs on iot devices. Comput. Commun. Rev., 46(3):3:1--3:8, 2016. [ DOI | http ]
[29] Srinivasan Keshav. Technical perspective: The chemistry of software-defined batteries. Commun. ACM, 59(12):110, 2016. [ DOI | http ]
[30] Mirmojtaba Gharibi, Raouf Boutaba, and Steven Lake Waslander. Internet of drones. IEEE Access, 4:1148--1162, 2016. [ DOI | http ]
[31] Sai Qian Zhang, Qi Zhang, Ali Tizghadam, Byungchul Park, Hadi Bannazadeh, Raouf Boutaba, and Alberto Leon-Garcia. Sector: TCAM space aware routing on SDN. In 28th International Teletraffic Congress, ITC 2016, Würzburg, Germany, September 12-16, 2016, pages 216--224. IEEE, 2016. [ DOI | http ]
[32] Martin Karsten, Daniel S. Berger, and Jens B. Schmitt. Traffic-driven implicit buffer management - delay differentiation without traffic contracts. In 28th International Teletraffic Congress, ITC 2016, Würzburg, Germany, September 12-16, 2016, pages 44--52. IEEE, 2016. [ DOI | http ]
[33] Hong Zhang, Li Chen, Bairen Yi, Kai Chen, Mosharaf Chowdhury, and Yanhui Geng. CODA: toward automatically identifying and scheduling coflows in the dark. In Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, pages 160--173. ACM, 2016. [ DOI | http ]
[34] Mina Tahmasbi Arashloo, Yaron Koral, Michael Greenberg, Jennifer Rexford, and David Walker. SNAP: stateful network-wide abstractions for packet processing. In Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, pages 29--43. ACM, 2016. [ DOI | http ]
[35] Alimohammad Rabbani and Srinivasan Keshav. The spot* personal thermal comfort system. In Proceedings of the 3rd ACM International Conference on Systems for Energy-Efficient Built Environments, BuildSys@SenSys 2016, Palo Alto, CA, USA, November 16-17, 2016, pages 75--84. ACM, 2016. [ DOI | http ]
[36] Srinivas Narayana, Mina Tahmasbi, Jennifer Rexford, and David Walker. Compiling path queries. In 13th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2016, Santa Clara, CA, USA, March 16-18, 2016, pages 207--222. USENIX Association, 2016. [ http ]
[37] Cong Guo and Martin Karsten. On the feasibility of core-rooted path addressing. In 2016 IEEE/IFIP Network Operations and Management Symposium, NOMS 2016, Istanbul, Turkey, April 25-29, 2016, pages 306--314. IEEE, 2016. [ DOI | http ]
[38] Shihabur Rahman Chowdhury, Reaz Ahmed, Md Mashrur Alam Khan, Nashid Shahriar, Raouf Boutaba, Jeebak Mitra, and Feng Zeng. Protecting virtual networks with DRONE. In 2016 IEEE/IFIP Network Operations and Management Symposium, NOMS 2016, Istanbul, Turkey, April 25-29, 2016, pages 78--86. IEEE, 2016. [ DOI | http ]
[39] Leonardo Richter Bays, Luciano Paschoal Gaspary, Reaz Ahmed, and Raouf Boutaba. Virtual network embedding in software-defined networks. In 2016 IEEE/IFIP Network Operations and Management Symposium, NOMS 2016, Istanbul, Turkey, April 25-29, 2016, pages 10--18. IEEE, 2016. [ DOI | http ]
[40] Nashid Shahriar, Reaz Ahmed, Shihabur Rahman Chowdhury, Md Mashrur Alam Khan, Raouf Boutaba, Jeebak Mitra, and Feng Zeng. Connectivity-aware virtual network embedding. In 2016 IFIP Networking Conference, Networking 2016 and Workshops, Vienna, Austria, May 17-19, 2016, pages 46--54. IEEE Computer Society, 2016. [ DOI | http ]
[41] Lautaro Dolberg, Jérôme François, Shihabur Rahman Chowdhury, Reaz Ahmed, Raouf Boutaba, and Thomas Engel. A generic framework to support application-level flow management in software-defined networks. In IEEE NetSoft Conference and Workshops, NetSoft 2016, Seoul, South Korea, June 6-10, 2016, pages 121--125. IEEE, 2016. [ DOI | http ]
[42] Srihari Radhakrishnan, Bryan J. Muscedere, and Khuzaima Daudjee. V-hadoop: Virtualized hadoop using containers. In 15th IEEE International Symposium on Network Computing and Applications, NCA 2016, Cambridge, Boston, MA, USA, October 31 - November 2, 2016, pages 237--241. IEEE Computer Society, 2016. [ DOI | http ]
[43] Ali Abedi, Andrew Heard, and Tim Brecht. T-simn: Towards the high fidelity trace-based simulation of 802.11n networks. In Proceedings of the 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, MSWiM 2016, Malta, November 13-17, 2016, pages 83--92. ACM, 2016. [ DOI | http ]
[44] Ali Abedi and Tim Brecht. Examining relationships between 802.11n physical layer transmission feature combinations. In Proceedings of the 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, MSWiM 2016, Malta, November 13-17, 2016, pages 229--238. ACM, 2016. [ DOI | http ]
[45] Omid Abari, Haitham Hassanieh, Michael Rodreguiz, and Dina Katabi. A millimeter wave software defined radio platform with phased arrays: poster. In Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, MobiCom 2016, New York City, NY, USA, October 3-7, 2016, pages 419--420. ACM, 2016. [ DOI | http ]
[46] Xinan Yan, Bernard Wong, and Sharon Choy. R3S: rdma-based RDD remote storage for spark. In Proceedings of the 15th International Workshop on Adaptive and Reflective Middleware, ARM@Middleware 2016, Trento, Italy, December 12-16, 2016, pages 4:1--4:6. ACM, 2016. [ DOI | http ]
[47] Jim Summers, Tim Brecht, Derek L. Eager, and Alex Gutarin. Characterizing the workload of a netflix streaming video server. In 2016 IEEE International Symposium on Workload Characterization, IISWC 2016, Providence, RI, USA, September 25-27, 2016, pages 43--54. IEEE Computer Society, 2016. [ DOI | http ]
[48] Michael J. Mior, Kenneth Salem, Ashraf Aboulnaga, and Rui Liu. Nose: Schema design for nosql applications. In 32nd IEEE International Conference on Data Engineering, ICDE 2016, Helsinki, Finland, May 16-20, 2016, pages 181--192. IEEE Computer Society, 2016. [ DOI | http ]
[49] Sajjad Rizvi, Xi Li, Bernard Wong, Fiodar Kazhamiaka, and Benjamin Cassell. Mayflower: Improving distributed filesystem performance through sdn/filesystem co-design. In 36th IEEE International Conference on Distributed Computing Systems, ICDCS 2016, Nara, Japan, June 27-30, 2016, pages 384--394. IEEE Computer Society, 2016. [ DOI | http ]
[50] Omid Abari, Haitham Hassanieh, Michael Rodreguez, and Dina Katabi. Millimeter wave communications: From point-to-point links to agile network connections. In Proceedings of the 15th ACM Workshop on Hot Topics in Networks, HotNets 2016, Atlanta, GA, USA, November 9-10, 2016, pages 169--175. ACM, 2016. [ DOI | http ]
[51] Omid Abari, Dinesh Bharadia, Austin Duffield, and Dina Katabi. Cutting the cord in virtual reality. In Proceedings of the 15th ACM Workshop on Hot Topics in Networks, HotNets 2016, Atlanta, GA, USA, November 9-10, 2016, pages 162--168. ACM, 2016. [ DOI | http ]
[52] Abdelhadi Azzouni, Othmen Braham, Thi Mai Trang Nguyen, Guy Pujolle, and Raouf Boutaba. Fingerprinting openflow controllers: The first step to attack an SDN control plane. In 2016 IEEE Global Communications Conference, GLOBECOM 2016, Washington, DC, USA, December 4-8, 2016, pages 1--6. IEEE, 2016. [ DOI | http ]
[53] Mihai Budiu, Rebecca Isaacs, Derek Murray, Gordon D. Plotkin, Paul Barham, Samer Al-Kiswany, Yazan Boshmaf, Qingzhou Luo, and Alexandr Andoni. Interacting with large distributed datasets using sketch. In 16th Eurographics Symposium on Parallel Graphics and Visualization, EGPGV@EuroVis 2016, Groningen, The Netherlands, June 6-10, 2016, pages 31--43. Eurographics Association, 2016. [ DOI | http ]
[54] Adedamola Adepetu and Srinivasan Keshav. Understanding solar PV and battery adoption in ontario: an agent-based approach. In Proceedings of the Seventh International Conference on Future Energy Systems, Waterloo, ON, Canada, June 21 - 24, 2016, pages 5:1--5:12. ACM, 2016. [ DOI | http ]
[55] Fiodar Kazhamiaka, Catherine Rosenberg, Srinivasan Keshav, and Karl-Heinz Pettinger. Li-ion storage models for energy system optimization: the accuracy-tractability tradeoff. In Proceedings of the Seventh International Conference on Future Energy Systems, Waterloo, ON, Canada, June 21 - 24, 2016, pages 17:1--17:12. ACM, 2016. [ DOI | http ]
[56] Rachel K. Kalaimani, Srinivasan Keshav, and Catherine Rosenberg. Multiple time-scale model predictive control for thermal comfort in buildings. In Proceedings of the Seventh International Conference on Future Energy Systems, Waterloo, ON, Canada, June 21 - 24, 2016 - Poster Sessions, pages 11:1--11:2. ACM, 2016. [ DOI | http ]
[57] Lukas Gebhard, Lukasz Golab, Srinivasan Keshav, and Hermann de Meer. Range prediction for electric bicycles. In Proceedings of the Seventh International Conference on Future Energy Systems, Waterloo, ON, Canada, June 21 - 24, 2016, pages 21:1--21:11. ACM, 2016. [ DOI | http ]
[58] Shreya Agrawal and Khuzaima Daudjee. A performance comparison of algorithms for byzantine agreement in distributed systems. In 12th European Dependable Computing Conference, EDCC 2016, Gothenburg, Sweden, September 5-9, 2016, pages 249--260. IEEE Computer Society, 2016. [ DOI | http ]
[59] Minyang Han and Khuzaima Daudjee. Providing serializability for pregel-like graph processing systems. In Proceedings of the 19th International Conference on Extending Database Technology, EDBT 2016, Bordeaux, France, March 15-16, 2016, Bordeaux, France, March 15-16, 2016, pages 77--88. OpenProceedings.org, 2016. [ DOI | http ]
[60] Nashid Shahriar, Reaz Ahmed, Aimal Khan, Shihabur Rahman Chowdhury, Raouf Boutaba, and Jeebak Mitra. Renovate: Recovery from node failure in virtual network embedding. In 12th International Conference on Network and Service Management, CNSM 2016, Montreal, QC, Canada, October 31 - Nov. 4, 2016, pages 19--27. IEEE, 2016. [ DOI | http ]
[61] Arup Raton Roy, Shihabur Rahman Chowdhury, Md. Faizul Bari, Reaz Ahmed, and Raouf Boutaba. Emulating an infrastructure with EASE. In 12th International Conference on Network and Service Management, CNSM 2016, Montreal, QC, Canada, October 31 - Nov. 4, 2016, pages 167--173. IEEE, 2016. [ DOI | http ]
[62] Rashid Mijumbi, Sidhant Hasija, Steven Davy, Alan Davy, Brendan Jennings, and Raouf Boutaba. A connectionist approach to dynamic resource management for virtualised network functions. In 12th International Conference on Network and Service Management, CNSM 2016, Montreal, QC, Canada, October 31 - Nov. 4, 2016, pages 1--9. IEEE, 2016. [ DOI | http ]
[63] Samer Al-Kiswany and Matei Ripeanu. A software-defined storage for workflow applications. In 2016 IEEE International Conference on Cluster Computing, CLUSTER 2016, Taipei, Taiwan, September 12-16, 2016, pages 350--353. IEEE Computer Society, 2016. [ DOI | http ]

2015

[1] Yashar Ghiassi-Farrokhfal, Srinivasan Keshav, and Catherine Rosenberg. Toward a realistic performance analysis of storage systems in smart grids. IEEE Trans. Smart Grid, 6(1):402--410, 2015. [ DOI | http ]
[2] Fen Zhou, Jiayi Liu, Gwendal Simon, and Raouf Boutaba. Joint optimization for the delivery of multiple video channels in telco-cdns. IEEE Trans. Netw. Serv. Manag., 12(1):87--100, 2015. [ DOI | http ]
[3] Filip De Turck, Raouf Boutaba, Prosper Chemouil, Jun Bi, and Cédric Westphal. Guest editors' introduction: Special issue on efficient management of sdn/nfv-based systems - part II. IEEE Trans. Netw. Serv. Manag., 12(2):114--116, 2015. [ DOI | http ]
[4] Filip De Turck, Raouf Boutaba, Prosper Chemouil, Jun Bi, and Cédric Westphal. Guest editors' introduction: Special issue on efficient management of sdn/nfv-based systems - part I. IEEE Trans. Netw. Serv. Manag., 12(1):1--3, 2015. [ DOI | http ]
[5] Rashid Mijumbi, Joan Serrat, Juan-Luis Gorricho, and Raouf Boutaba. A path generation approach to embedding of virtual networks. IEEE Trans. Netw. Serv. Manag., 12(3):334--348, 2015. [ DOI | http ]
[6] Ahmed Amokrane, Rami Langar, Mohamed Faten Zhani, Raouf Boutaba, and Guy Pujolle. Greenslater: On satisfying green slas in distributed clouds. IEEE Trans. Netw. Serv. Manag., 12(3):363--376, 2015. [ DOI | http ]
[7] Ahmed Amokrane, Rami Langar, Raouf Boutaba, and Guy Pujolle. Flow-based management for energy efficient campus networks. IEEE Trans. Netw. Serv. Manag., 12(4):565--579, 2015. [ DOI | http ]
[8] Rami Langar, Stefano Secci, Raouf Boutaba, and Guy Pujolle. An operations research game approach for resource and power allocation in cooperative femtocell networks. IEEE Trans. Mob. Comput., 14(4):675--687, 2015. [ DOI | http ]
[9] Qi Zhang, Mohamed Faten Zhani, Yuke Yang, Raouf Boutaba, and Bernard Wong. PRISM: fine-grained resource-aware scheduling for mapreduce. IEEE Trans. Cloud Comput., 3(2):182--194, 2015. [ DOI | http ]
[10] Ali Abedi, Andrew Heard, and Tim Brecht. Conducting repeatable experiments and fair comparisons using 802.11n MIMO networks. ACM SIGOPS Oper. Syst. Rev., 49(1):41--50, 2015. [ DOI | http ]
[11] Thanumalayan Sankaranarayana Pillai, Vijay Chidambaram, Ramnatthan Alagappan, Samer Al-Kiswany, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau. Crash consistency. ACM Queue, 13(7):20, 2015. [ DOI | http ]
[12] Minyang Han and Khuzaima Daudjee. Giraph unchained: Barrierless asynchronous parallel execution in pregel-like graph processing systems. Proc. VLDB Endow., 8(9):950--961, 2015. [ DOI | .pdf ]
[13] Hua Fan, Aditya Ramaraju, Marlon McKenzie, Wojciech M. Golab, and Bernard Wong. Understanding the causes of consistency anomalies in apache cassandra. Proc. VLDB Endow., 8(7):810--821, 2015. [ DOI | .pdf ]
[14] Shihabur Rahman Chowdhury, Arup Raton Roy, Maheen Shaikh, and Khuzaima Daudjee. A taxonomy of decentralized online social networks. Peer-to-Peer Netw. Appl., 8(3):367--383, 2015. [ DOI | http ]
[15] Jong-Hun Kim, Raouf Boutaba, and Junseok Yoo. Special issue: Interactive multimedia convergence. Multim. Tools Appl., 74(20):8723--8728, 2015. [ DOI | http ]
[16] Faisal N. Abu-Khzam, Khuzaima Daudjee, Amer E. Mouawad, and Naomi Nishimura. On scalable parallel recursive backtracking. J. Parallel Distributed Comput., 84:65--75, 2015. [ DOI | http ]
[17] Daniel M. Batista, Gordon S. Blair, Fabio Kon, Raouf Boutaba, David Hutchison, Raj Jain, Ramachandran Ramjee, and Christian Esteve Rothenberg. Perspectives on software-defined networks: interviews with five leading scientists from the networking community. J. Internet Serv. Appl., 6(1):22:1--22:10, 2015. [ DOI | http ]
[18] Lauro Beltrão Costa, Hao Yang, Emalayan Vairavanathan, Abmar Barros, Ketan Maheshwari, Gilles Fedak, Daniel S. Katz, Michael Wilde, Matei Ripeanu, and Samer Al-Kiswany. The case for workflow-aware storage: An opportunity study. J. Grid Comput., 13(1):95--113, 2015. [ DOI | http ]
[19] Divy Agrawal, Amr El Abbadi, and Kenneth Salem. A taxonomy of partitioned replicated cloud-based database systems. IEEE Data Eng. Bull., 38(1):4--9, 2015. [ .pdf ]
[20] Guozhu Meng, Yang Liu, Jie Zhang, Alexander Pokluda, and Raouf Boutaba. Collaborative security: A survey and taxonomy. ACM Comput. Surv., 48(1):1:1--1:42, 2015. [ DOI | http ]
[21] Rashid Mijumbi, Joan Serrat, Juan-Luis Gorricho, Niels Bouten, Filip De Turck, and Raouf Boutaba. Network function virtualization: State-of-the-art and research challenges. CoRR, abs/1509.07675, 2015. [ arXiv | http ]
[22] Rashid Mijumbi, Joan Serrat, Juan-Luis Gorricho, and Raouf Boutaba. A path generation approach to embedding of virtual networks. CoRR, abs/1509.07684, 2015. [ arXiv | http ]
[23] Robert Escriva, Bernard Wong, and Emin Gün Sirer. Warp: Lightweight multi-key transactions for key-value stores. CoRR, abs/1509.07815, 2015. [ arXiv | http ]
[24] Md. Faizul Bari, Shihabur Rahman Chowdhury, Reaz Ahmed, and Raouf Boutaba. On orchestrating virtual network functions in NFV. CoRR, abs/1503.06377, 2015. [ arXiv | http ]
[25] Mina Tahmasbi Arashloo, Yaron Koral, Michael Greenberg, Jennifer Rexford, and David Walker. SNAP: stateful network-wide abstractions for packet processing. CoRR, abs/1512.00822, 2015. [ arXiv | http ]
[26] Günes Aluç, M. Tamer Özsu, and Khuzaima Daudjee. Clustering RDF databases using tunable-lsh. CoRR, abs/1504.02523, 2015. [ arXiv | http ]
[27] Yousri Daldoul, Djamal-Eddine Meddour, Toufik Ahmed, and Raouf Boutaba. Impact of device unavailability on the reliability of multicast transport in IEEE 802.11 networks. Comput. Networks, 79:236--246, 2015. [ DOI | http ]
[28] Raouf Boutaba, Nelson Luis Saldanha da Fonseca, Dzmitry Kliazovich, and Noura Limam. Cloud networking and communications II. Comput. Networks, 93:405--407, 2015. [ DOI | http ]
[29] Omid Abari, Deepak Vasisht, Dina Katabi, and Anantha Chandrakasan. Caraoke: An e-toll transponder network for smart cities. Comput. Commun. Rev., 45(5):297--310, 2015. [ DOI | http ]
[30] Thanumalayan Sankaranarayana Pillai, Vijay Chidambaram, Ramnatthan Alagappan, Samer Al-Kiswany, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau. Crash consistency. Commun. ACM, 58(10):46--51, 2015. [ DOI | http ]
[31] Mustafa Korkmaz, Alexey Karyakin, Martin Karsten, and Kenneth Salem. Towards dynamic green-sizing for database servers. In International Workshop on Accelerating Data Management Systems Using Modern Processor and Storage Architectures - ADMS 2015, Kohala Coast, Hawaii, USA, August 31, 2015, pages 25--36, 2015. [ .pdf ]
[32] Jaemyung Kim, Kenneth Salem, and Khuzaima Daudjee. Write amplification: An analysis of in-memory database durability techniques. In Proceedings of the 3rd VLDB Workshop on In-Memory Data Mangement and Analytics, IMDM@VLDB 2015, Kohala Coast, HI, USA, August 31, 2015, pages 1:1--1:7. ACM, 2015. [ DOI | http ]
[33] Cong Guo and Martin Karsten. Towards adaptive resource allocation for database workloads. In International Workshop on Accelerating Data Management Systems Using Modern Processor and Storage Architectures - ADMS 2015, Kohala Coast, Hawaii, USA, August 31, 2015, pages 49--60, 2015. [ .pdf ]
[34] Rayman Preet Singh, Tim Brecht, and Srinivasan Keshav. Towards VM consolidation using a hierarchy of idle states. In Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, Istanbul, Turkey, March 14-15, 2015, pages 107--119. ACM, 2015. [ DOI | http ]
[35] Suli Yang, Tyler Harter, Nishant Agrawal, Salini Selvaraj Kowsalya, Anand Krishnamurthy, Samer Al-Kiswany, Rini T. Kaushik, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau. Split-level I/O scheduling. In Proceedings of the 25th Symposium on Operating Systems Principles, SOSP 2015, Monterey, CA, USA, October 4-7, 2015, pages 474--489. ACM, 2015. [ DOI | http ]
[36] Md. Faizul Bari, Shihabur Rahman Chowdhury, Reaz Ahmed, and Raouf Boutaba. nf.io: A file system abstraction for NFV orchestration. In Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, SIGCOMM 2015, London, United Kingdom, August 17-21, 2015, pages 361--362. ACM, 2015. [ DOI | http ]
[37] Omid Abari, Deepak Vasisht, Dina Katabi, and Anantha Chandrakasan. Caraoke: An e-toll transponder network for smart cities. In Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, SIGCOMM 2015, London, United Kingdom, August 17-21, 2015, pages 297--310. ACM, 2015. [ DOI | http ]
[38] Md. Faizul Bari, Shihabur Rahman Chowdhury, Reaz Ahmed, and Raouf Boutaba. nf.io: A file system abstraction for NFV orchestration. In IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2015, San Francisco, CA, USA, November 18-21, 2015, pages 135--141. IEEE, 2015. [ DOI | http ]
[39] Prosper Chemouil, George Pavlou, Raouf Boutaba, and Alex Galis. Netsoft 2015 - foreword. In Proceedings of the 1st IEEE Conference on Network Softwarization, NetSoft 2015, London, United Kingdom, April 13-17, 2015, page 1. IEEE, 2015. [ DOI | http ]
[40] Omid Abari, Hariharan Rahul, Dina Katabi, and Mondira Pant. Airshare: Distributed coherent transmission made seamless. In 2015 IEEE Conference on Computer Communications, INFOCOM 2015, Kowloon, Hong Kong, April 26 - May 1, 2015, pages 1742--1750. IEEE, 2015. [ DOI | http ]
[41] Md. Ahsan Raza, Reaz Ahmed, and Raouf Boutaba. URL forwarding for NAT traversal. In IFIP/IEEE International Symposium on Integrated Network Management, IM 2015, Ottawa, ON, Canada, 11-15 May, 2015, pages 599--605. IEEE, 2015. [ DOI | http ]
[42] Jian Li, Jin Xiao, James Won-Ki Hong, and Raouf Boutaba. Fsm-based wi-fi power estimation method for smart devices. In IFIP/IEEE International Symposium on Integrated Network Management, IM 2015, Ottawa, ON, Canada, 11-15 May, 2015, pages 147--155. IEEE, 2015. [ DOI | http ]
[43] Zhihong Liu, Qi Zhang, Mohamed Faten Zhani, Raouf Boutaba, Yaping Liu, and Zhenghu Gong. DREAMS: dynamic resource allocation for mapreduce with data skew. In IFIP/IEEE International Symposium on Integrated Network Management, IM 2015, Ottawa, ON, Canada, 11-15 May, 2015, pages 18--26. IEEE, 2015. [ DOI | http ]
[44] Hemant Saxena and Kenneth Salem. Edgex: Edge replication for web applications. In 8th IEEE International Conference on Cloud Computing, CLOUD 2015, New York City, NY, USA, June 27 - July 2, 2015, pages 1041--1044. IEEE Computer Society, 2015. [ DOI | http ]
[45] Günes Aluç, M. Tamer Özsu, Khuzaima Daudjee, and Olaf Hartig. Executing queries over schemaless RDF databases. In 31st IEEE International Conference on Data Engineering, ICDE 2015, Seoul, South Korea, April 13-17, 2015, pages 807--818. IEEE Computer Society, 2015. [ DOI | http ]
[46] Qi Zhang, Sai Qian Zhang, Alberto Leon-Garcia, and Raouf Boutaba. Aurora: Adaptive block replication in distributed file systems. In 35th IEEE International Conference on Distributed Computing Systems, ICDCS 2015, Columbus, OH, USA, June 29 - July 2, 2015, pages 442--451. IEEE Computer Society, 2015. [ DOI | http ]
[47] Daniel S. Marcon, Miguel C. Neves, Rodrigo Ruas Oliveira, Leonardo Richter Bays, Raouf Boutaba, Luciano Paschoal Gaspary, and Marinho P. Barcellos. Ioncloud: Exploring application affinity to improve utilization and predictability in datacenters. In 2015 IEEE International Conference on Communications, ICC 2015, London, United Kingdom, June 8-12, 2015, pages 5497--5503. IEEE, 2015. [ DOI | http ]
[48] Ricardo Koller, Ali José Mashtizadeh, and Raju Rangaswami. Centaur: Host-side SSD caching for storage performance control. In 2015 IEEE International Conference on Autonomic Computing, Grenoble, France, July 7-10, 2015, pages 51--60. IEEE Computer Society, 2015. [ DOI | http ]
[49] Hong Zhang, Kai Chen, Wei Bai, Dongsu Han, Chen Tian, Hao Wang, Haibing Guan, and Ming Zhang. Guaranteeing deadlines for inter-datacenter transfers. In Proceedings of the Tenth European Conference on Computer Systems, EuroSys 2015, Bordeaux, France, April 21-24, 2015, pages 20:1--20:14. ACM, 2015. [ DOI | http ]
[50] Alimohammad Rabbani and Srinivasan Keshav. The spot* system for flexible personal heating and cooling. In Proceedings of the 2015 ACM Sixth International Conference on Future Energy Systems, e-Energy 2015, Bangalore, India, July 14-17, 2015, pages 209--210. ACM, 2015. [ DOI | http ]
[51] Daniel Nicoara, Shahin Kamali, Khuzaima Daudjee, and Lei Chen. Hermes: Dynamic partitioning for distributed social network graph databases. In Proceedings of the 18th International Conference on Extending Database Technology, EDBT 2015, Brussels, Belgium, March 23-27, 2015, pages 25--36. OpenProceedings.org, 2015. [ DOI | http ]
[52] Peter Xiang Gao, Lukasz Golab, and Srinivasan Keshav. What's wrong with my solar panels: a data-driven approach. In Proceedings of the Workshops of the EDBT/ICDT 2015 Joint Conference (EDBT/ICDT), Brussels, Belgium, March 27th, 2015, volume 1330 of CEUR Workshop Proceedings, pages 86--93. CEUR-WS.org, 2015. [ .pdf ]
[53] Md Mashrur Alam Khan, Nashid Shahriar, Reaz Ahmed, and Raouf Boutaba. Simple: Survivability in multi-path link embedding. In 11th International Conference on Network and Service Management, CNSM 2015, Barcelona, Spain, November 9-13, 2015, pages 210--218. IEEE Computer Society, 2015. [ DOI | http ]
[54] Md. Faizul Bari, Shihabur Rahman Chowdhury, Reaz Ahmed, and Raouf Boutaba. On orchestrating virtual network functions. In 11th International Conference on Network and Service Management, CNSM 2015, Barcelona, Spain, November 9-13, 2015, pages 50--56. IEEE Computer Society, 2015. [ DOI | http ]
[55] Milad Ghaznavi, Aimal Khan, Nashid Shahriar, Khalid Alsubhi, Reaz Ahmed, and Raouf Boutaba. Elastic virtual network function placement. In 4th IEEE International Conference on Cloud Networking, CloudNet 2015, Niagara Falls, ON, Canada, October 5-7, 2015, pages 255--260. IEEE, 2015. [ DOI | http ]
[56] Jaemyung Kim, Kenneth Salem, Khuzaima Daudjee, Ashraf Aboulnaga, and Xin Pan. Database high availability using SHADOW systems. In Proceedings of the Sixth ACM Symposium on Cloud Computing, SoCC 2015, Kohala Coast, Hawaii, USA, August 27-29, 2015, pages 209--221. ACM, 2015. [ DOI | http ]
[57] Fabio Petroni, Leonardo Querzoni, Khuzaima Daudjee, Shahin Kamali, and Giorgio Iacoboni. HDRF: stream-based partitioning for power-law graphs. In Proceedings of the 24th ACM International Conference on Information and Knowledge Management, CIKM 2015, Melbourne, VIC, Australia, October 19 - 23, 2015, pages 243--252. ACM, 2015. [ DOI | http ]
[58] Ali José Mashtizadeh, Andrea Bittau, Dan Boneh, and David Mazières. CCFI: cryptographically enforced control flow integrity. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015, pages 941--951. ACM, 2015. [ DOI | http ]

2014

[1] Reaz Ahmed and Raouf Boutaba. Collaborative Web Hosting - Challenges and Research Directions. Springer Briefs in Computer Science. Springer, 2014. [ DOI | http ]
[2] Kyung-Yong Chung, Raouf Boutaba, and Salim Hariri. Recent trends in digital convergence information system. Wirel. Pers. Commun., 79(4):2409--2413, 2014. [ DOI | http ]
[3] Abbas Antoun Hatoum, Rami Langar, Nadjib Aitsaadi, Raouf Boutaba, and Guy Pujolle. Cluster-based resource management in OFDMA femtocell networks with qos guarantees. IEEE Trans. Veh. Technol., 63(5):2378--2391, 2014. [ DOI | http ]
[4] Omid Ardakanian, Srinivasan Keshav, and Catherine Rosenberg. Real-time distributed control for smart electric vehicle chargers: From a static to a dynamic study. IEEE Trans. Smart Grid, 5(5):2295--2305, 2014. [ DOI | http ]
[5] Jin Xiao and Raouf Boutaba. Reconciling the overlay and underlay tussle. IEEE/ACM Trans. Netw., 22(5):1489--1502, 2014. [ DOI | http ]
[6] Tommy Carpenter, Srinivasan Keshav, and Johnny Wong. Sizing finite-population vehicle pools. IEEE Trans. Intell. Transp. Syst., 15(3):1134--1144, 2014. [ DOI | http ]
[7] Osman Salem, Yaning Liu, Ahmed Mehaoua, and Raouf Boutaba. Online anomaly detection in wireless body area networks for reliable healthcare monitoring. IEEE J. Biomed. Health Informatics, 18(5):1541--1551, 2014. [ DOI | http ]
[8] Qi Zhang, Mohamed Faten Zhani, Raouf Boutaba, and Joseph L. Hellerstein. Dynamic heterogeneity-aware resource provisioning in the cloud. IEEE Trans. Cloud Comput., 2(1):14--28, 2014. [ DOI | http ]
[9] Marco Serafini, Essam Mansour, Ashraf Aboulnaga, Kenneth Salem, Taha Rafiq, and Umar Farooq Minhas. Accordion: Elastic scalability for database systems supporting distributed transactions. Proc. VLDB Endow., 7(12):1035--1046, 2014. [ DOI | .pdf ]
[10] Minyang Han, Khuzaima Daudjee, Khaled Ammar, M. Tamer Özsu, Xingfang Wang, and Tianqi Jin. An experimental comparison of pregel-like graph processing systems. Proc. VLDB Endow., 7(12):1047--1058, 2014. [ DOI | .pdf ]
[11] Prima Chairunnanda, Khuzaima Daudjee, and M. Tamer Özsu. Confluxdb: Multi-master replication for partitioned snapshot isolation databases. Proc. VLDB Endow., 7(11):947--958, 2014. [ DOI | .pdf ]
[12] Gunes Aluc, M. Tamer Özsu, and Khuzaima Daudjee. Workload matters: Why RDF databases need a new design. Proc. VLDB Endow., 7(10):837--840, 2014. [ DOI | .pdf ]
[13] Sharon Choy, Bernard Wong, Gwendal Simon, and Catherine Rosenberg. A hybrid edge-cloud architecture for reducing on-demand gaming latency. Multim. Syst., 20(5):503--519, 2014. [ DOI | http ]
[14] Samir Medjiah, Toufik Ahmed, and Raouf Boutaba. Avoiding quality bottlenecks in P2P adaptive streaming. IEEE J. Sel. Areas Commun., 32(4):734--745, 2014. [ DOI | http ]
[15] Abbas Bradai, Toufik Ahmed, Raouf Boutaba, and Reaz Ahmed. Efficient content delivery scheme for layered video streaming in large-scale networks. J. Netw. Comput. Appl., 45:1--14, 2014. [ DOI | http ]
[16] Raouf Boutaba, Nadjib Achir, Marc St-Hilaire, and Eduardo Freire Nakamura. Planning and deployment of wireless sensor networks. Int. J. Distributed Sens. Networks, 10, 2014. [ DOI | http ]
[17] Md. Golam Rabbani, Mohamed Faten Zhani, and Raouf Boutaba. On achieving high survivability in virtualized data centers. IEICE Trans. Commun., 97-B(1):10--18, 2014. [ DOI | http ]
[18] Xin Liu and Kenneth Salem. Integrating SSD caching into database systems. IEEE Data Eng. Bull., 37(2):35--43, 2014. [ .pdf ]
[19] Ali José Mashtizadeh, Andrea Bittau, David Mazières, and Dan Boneh. Cryptographically enforced control flow integrity. CoRR, abs/1408.1451, 2014. [ arXiv | http ]
[20] Raouf Boutaba, Noura Limam, Stefano Secci, and Tarik Taleb. Cloud networking and communications. Comput. Networks, 68:1--4, 2014. [ DOI | http ]
[21] Ahmed Amokrane, Rami Langar, Raouf Boutaba, and Guy Pujolle. Energy efficient management framework for multihop tdma-based wireless networks. Comput. Networks, 62:29--42, 2014. [ DOI | http ]
[22] Reaz Ahmed and Raouf Boutaba. Design considerations for managing wide area software defined networks. IEEE Commun. Mag., 52(7):116--123, 2014. [ DOI | http ]
[23] Raouf Boutaba, Kyung-Yong Chung, and Mitsuo Gen. Recent trends in interactive multimedia computing for industry. Clust. Comput., 17(3):723--726, 2014. [ DOI | http ]
[24] Rayman Preet Singh, Tim Brecht, and Srinivasan Keshav. IP address multiplexing for vees. Comput. Commun. Rev., 44(2):36--43, 2014. [ DOI | http ]
[25] Ali José Mashtizadeh, Min Cai, Gabriel Tarasuk-Levin, Ricardo Koller, Tal Garfinkel, and Sreekanth Setty. Xvmotion: Unified virtual machine migration over long distance. In 2014 USENIX Annual Technical Conference, USENIX ATC '14, Philadelphia, PA, USA, June 19-20, 2014, pages 97--108. USENIX Association, 2014. [ http ]
[26] Jim Summers, Tim Brecht, Derek L. Eager, Tyler Szepesi, Ben Cassell, and Bernard Wong. Automated control of aggressive prefetching for HTTP streaming video servers. In International Conference on Systems and Storage, SYSTOR 2014, Haifa, Israel, June 30 - July 02, 2014, pages 5:1--5:11. ACM, 2014. [ DOI | http ]
[27] Catalin-Alexandru Avram, Kenneth Salem, and Bernard Wong. Latency amplification: Characterizing the impact of web page content on load times. In 33rd IEEE International Symposium on Reliable Distributed Systems Workshops, SRDS Workshops 2014, Nara, Japan, October 6-9, 2014, pages 20--25. IEEE Computer Society, 2014. [ DOI | http ]
[28] Khuzaima Daudjee, Shahin Kamali, and Alejandro López-Ortiz. On the online fault-tolerant server consolidation problem. In 26th ACM Symposium on Parallelism in Algorithms and Architectures, SPAA '14, Prague, Czech Republic - June 23 - 25, 2014, pages 12--21. ACM, 2014. [ DOI | http ]
[29] Andrea Bittau, Adam Belay, Ali José Mashtizadeh, David Mazières, and Dan Boneh. Hacking blind. In 2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014, pages 227--242. IEEE Computer Society, 2014. [ DOI | http ]
[30] Omid Ardakanian, Catherine Rosenberg, and Srinivasan Keshav. Quantifying the benefits of extending electric vehicle charging deadlines with solar generation. In 2014 IEEE International Conference on Smart Grid Communications, SmartGridComm 2014, Venice, Italy, November 3-6, 2014, pages 620--625. IEEE, 2014. [ DOI | http ]
[31] Daniel S. Berger, Martin Karsten, and Jens B. Schmitt. On the relevance of adversarial queueing theory in practice. In ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS 2014, Austin, TX, USA, June 16-20, 2014, pages 343--354. ACM, 2014. [ DOI | http ]
[32] Arup Raton Roy, Md. Faizul Bari, Mohamed Faten Zhani, Reaz Ahmed, and Raouf Boutaba. DOT: distributed openflow testbed. In ACM SIGCOMM 2014 Conference, SIGCOMM'14, Chicago, IL, USA, August 17-22, 2014, pages 367--368. ACM, 2014. [ DOI | http ]
[33] Yunpeng James Liu, Peter Xiang Gao, Bernard Wong, and Srinivasan Keshav. Quartz: a new design element for low-latency dcns. In ACM SIGCOMM 2014 Conference, SIGCOMM'14, Chicago, IL, USA, August 17-22, 2014, pages 283--294. ACM, 2014. [ DOI | http ]
[34] Günes Aluç, Olaf Hartig, M. Tamer Özsu, and Khuzaima Daudjee. Diversified stress testing of RDF data management systems. In The Semantic Web - ISWC 2014 - 13th International Semantic Web Conference, Riva del Garda, Italy, October 19-23, 2014. Proceedings, Part I, volume 8796 of Lecture Notes in Computer Science, pages 197--212. Springer, 2014. [ DOI | http ]
[35] Abdul Babar, Bernard Wong, and Babak Abedin. Investigating the role of business analysts competencies into strategic business requirements gathering. In 18th Pacific Asia Conference on Information Systems, PACIS 2014, Chengdu, China, June 24-28, 2014, page 18, 2014. [ http ]
[36] Thanumalayan Sankaranarayana Pillai, Vijay Chidambaram, Ramnatthan Alagappan, Samer Al-Kiswany, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau. All file systems are not created equal: On the complexity of crafting crash-consistent applications. In 11th USENIX Symposium on Operating Systems Design and Implementation, OSDI '14, Broomfield, CO, USA, October 6-8, 2014, pages 433--448. USENIX Association, 2014. [ http ]
[37] Lanyue Lu, Yupu Zhang, Thanh Do, Samer Al-Kiswany, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau. Physical disentanglement in a container-based file system. In 11th USENIX Symposium on Operating Systems Design and Implementation, OSDI '14, Broomfield, CO, USA, October 6-8, 2014, pages 81--96. USENIX Association, 2014. [ http ]
[38] Qi Zhang and Raouf Boutaba. Dynamic workload management in heterogeneous cloud computing environments. In 2014 IEEE Network Operations and Management Symposium, NOMS 2014, Krakow, Poland, May 5-9, 2014, pages 1--7. IEEE, 2014. [ DOI | http ]
[39] Arup Raton Roy, Md. Faizul Bari, Mohamed Faten Zhani, Reaz Ahmed, and Raouf Boutaba. Design and management of DOT: A distributed openflow testbed. In 2014 IEEE Network Operations and Management Symposium, NOMS 2014, Krakow, Poland, May 5-9, 2014, pages 1--9. IEEE, 2014. [ DOI | http ]
[40] Jian Li, Jin Xiao, Huu Nhat Minh Nguyen, James Won-Ki Hong, and Raouf Boutaba. Energy efficient wi-fi management for smart devices. In 2014 IEEE Network Operations and Management Symposium, NOMS 2014, Krakow, Poland, May 5-9, 2014, pages 1--9. IEEE, 2014. [ DOI | http ]
[41] Carol J. Fung, Disney Yan Lam, and Raouf Boutaba. Revmatch: An efficient and robust decision model for collaborative malware detection. In 2014 IEEE Network Operations and Management Symposium, NOMS 2014, Krakow, Poland, May 5-9, 2014, pages 1--9. IEEE, 2014. [ DOI | http ]
[42] Rafael Pereira Esteves, Lisandro Zambenedetti Granville, Mohamed Faten Zhani, and Raouf Boutaba. Evaluating allocation paradigms for multi-objective adaptive provisioning in virtualized networks. In 2014 IEEE Network Operations and Management Symposium, NOMS 2014, Krakow, Poland, May 5-9, 2014, pages 1--9. IEEE, 2014. [ DOI | http ]
[43] Shihabur Rahman Chowdhury, Md. Faizul Bari, Reaz Ahmed, and Raouf Boutaba. Payless: A low cost network monitoring framework for software defined networks. In 2014 IEEE Network Operations and Management Symposium, NOMS 2014, Krakow, Poland, May 5-9, 2014, pages 1--9. IEEE, 2014. [ DOI | http ]
[44] Shihabur Rahman Chowdhury, Constantin Adam, Frederick Wu, John J. Rofrano, and Raouf Boutaba. Managing the file system from the kernel. In 2014 IEEE Network Operations and Management Symposium, NOMS 2014, Krakow, Poland, May 5-9, 2014, pages 1--8. IEEE, 2014. [ DOI | http ]
[45] Md. Faizul Bari, Mohamed Faten Zhani, Qi Zhang, Reaz Ahmed, and Raouf Boutaba. CQNCR: optimal VM migration planning in cloud data centers. In 2014 IFIP Networking Conference, Trondheim, Norway, June 2-4, 2014, pages 1--9. IEEE Computer Society, 2014. [ DOI | http ]
[46] Reaz Ahmed, Shihabur Rahman Chowdhury, Alexander Pokluda, Md. Faizul Bari, Raouf Boutaba, and Bertrand Mathieu. pweb: A personal interface to the world wide web. In 2014 IFIP Networking Conference, Trondheim, Norway, June 2-4, 2014, pages 1--9. IEEE Computer Society, 2014. [ DOI | http ]
[47] Omid Abari, Hariharan Rahul, and Dina Katabi. Poster: clock synchronization for distributed wireless protocols at the physical layer. In The 20th Annual International Conference on Mobile Computing and Networking, MobiCom'14, Maui, HI, USA, September 7-11, 2014, pages 337--340. ACM, 2014. [ DOI | http ]
[48] Ali Rajabi and Johnny W. Wong. Provisioning of computing resources for web applications under time-varying traffic. In IEEE 22nd International Symposium on Modelling, Analysis & Simulation of Computer and Telecommunication Systems, MASCOTS 2014, Paris, France, September 9-11, 2014, pages 152--157. IEEE Computer Society, 2014. [ DOI | http ]
[49] Ali Abedi and Tim Brecht. T-RATE: A framework for the trace-driven evaluation of 802.11 rate adaptation algorithms. In IEEE 22nd International Symposium on Modelling, Analysis & Simulation of Computer and Telecommunication Systems, MASCOTS 2014, Paris, France, September 9-11, 2014, pages 1--10. IEEE Computer Society, 2014. [ DOI | http ]
[50] Omid Abari, Ezzeldin Hamed, Haitham Hassanieh, Abhinav Agarwal, Dina Katabi, Anantha Chandrakasan, and Vladimir Stojanovic. 27.4 A 0.75-million-point fourier-transform chip for frequency-sparse signals. In 2014 IEEE International Conference on Solid-State Circuits Conference, ISSCC 2014, Digest of Technical Papers, San Francisco, CA, USA, February 9-13, 2014, pages 458--459. IEEE, 2014. [ DOI | http ]
[51] Qi Zhang, Mohamed Faten Zhani, Maissa Jabri, and Raouf Boutaba. Venice: Reliable virtual data center embedding in clouds. In 2014 IEEE Conference on Computer Communications, INFOCOM 2014, Toronto, Canada, April 27 - May 2, 2014, pages 289--297. IEEE, 2014. [ DOI | http ]
[52] Haitham Hassanieh, Lixin Shi, Omid Abari, Ezzeldin Hamed, and Dina Katabi. Ghz-wide sensing and decoding using the sparse fourier transform. In 2014 IEEE Conference on Computer Communications, INFOCOM 2014, Toronto, Canada, April 27 - May 2, 2014, pages 2256--2264. IEEE, 2014. [ DOI | http ]
[53] Lauro Beltrão Costa, Samer Al-Kiswany, Hao Yang, and Matei Ripeanu. Supporting storage configuration for I/O intensive workflows. In 2014 International Conference on Supercomputing, ICS'14, Muenchen, Germany, June 10-13, 2014, pages 191--200. ACM, 2014. [ DOI | http ]
[54] Akshay K. Singh, Xu Cui, Benjamin Cassell, Bernard Wong, and Khuzaima Daudjee. Microfuge: A middleware approach to providing performance isolation in cloud storage systems. In IEEE 34th International Conference on Distributed Computing Systems, ICDCS 2014, Madrid, Spain, June 30 - July 3, 2014, pages 503--513. IEEE Computer Society, 2014. [ DOI | http ]
[55] Abhinav Agarwal, Haitham Hassanieh, Omid Abari, Ezzeldin Hamed, Dina Katabi, and Arvind. High-throughput implementation of a million-point sparse fourier transform. In 24th International Conference on Field Programmable Logic and Applications, FPL 2014, Munich, Germany, 2-4 September, 2014, pages 1--6. IEEE, 2014. [ DOI | http ]
[56] Robert Escriva, Ayush Dubey, Bernard Wong, and Emin Gün Sirer. Kronos: the design and implementation of an event ordering service. In Ninth Eurosys Conference 2014, EuroSys 2014, Amsterdam, The Netherlands, April 13-16, 2014, pages 3:1--3:14. ACM, 2014. [ DOI | http ]
[57] Yashar Ghiassi-Farrokhfal, Srinivasan Keshav, and Catherine Rosenberg. An eroi-based analysis of renewable energy farms with storage. In The Fifth International Conference on Future Energy Systems, e-Energy '14, Cambridge, United Kingdom - June 11 - 13, 2014, pages 3--13. ACM, 2014. [ DOI | http ]
[58] Omid Ardakanian, Negar Koochakzadeh, Rayman Preet Singh, Lukasz Golab, and Srinivasan Keshav. Computing electricity consumption profiles from household smart meter data. In Proceedings of the Workshops of the EDBT/ICDT 2014 Joint Conference (EDBT/ICDT 2014), Athens, Greece, March 28, 2014, volume 1133 of CEUR Workshop Proceedings, pages 140--147. CEUR-WS.org, 2014. [ .pdf ]
[59] Ahmed Amokrane, Mohamed Faten Zhani, Qi Zhang, Rami Langar, Raouf Boutaba, and Guy Pujolle. On satisfying green slas in distributed clouds. In 10th International Conference on Network and Service Management, CNSM 2014 and Workshop, Rio de Janeiro, Brazil, November 17-21, 2014, pages 64--72. IEEE Computer Society, 2014. [ DOI | http ]
[60] Reaz Ahmed, Md. Faizul Bari, Md. Rakibul Haque, Raouf Boutaba, and Bertrand Mathieu. DEWS: A decentralized engine for web search. In 10th International Conference on Network and Service Management, CNSM 2014 and Workshop, Rio de Janeiro, Brazil, November 17-21, 2014, pages 254--259. IEEE Computer Society, 2014. [ DOI | http ]
[61] Jian Li, Jin Xiao, Heni Azzouz, James Won-Ki Hong, and Raouf Boutaba. Powerguide: Accurate wi-fi power estimator for smartphones. In The 16th Asia-Pacific Network Operations and Management Symposium, APNOMS 2014, Hsinchu, Taiwan, September 17-19, 2014, pages 1--6. IEEE, 2014. [ DOI | http ]

2013

[1] Fatma Bouabdallah, Nizar Bouabdallah, and Raouf Boutaba. Efficient reporting node selection-based MAC protocol for wireless sensor networks. Wirel. Networks, 19(3):373--391, 2013. [ DOI | http ]
[2] Umar Farooq Minhas, Shriram Rajagopalan, Brendan Cully, Ashraf Aboulnaga, Kenneth Salem, and Andrew Warfield. Remusdb: transparent high availability for database systems. VLDB J., 22(1):29--45, 2013. [ DOI | http ]
[3] Samer Al-Kiswany, Abdullah Gharaibeh, and Matei Ripeanu. Gpus as storage system accelerators. IEEE Trans. Parallel Distributed Syst., 24(8):1556--1566, 2013. [ DOI | http ]
[4] Maxwell Young, Aniket Kate, Ian Goldberg, and Martin Karsten. Towards practical communication in byzantine-resistant dhts. IEEE/ACM Trans. Netw., 21(1):190--203, 2013. [ DOI | http ]
[5] Muntasir Raihan Rahman and Raouf Boutaba. SVNE: survivable virtual network embedding algorithms for network virtualization. IEEE Trans. Netw. Serv. Manag., 10(2):105--118, 2013. [ DOI | http ]
[6] Ahmed Amokrane, Mohamed Faten Zhani, Rami Langar, Raouf Boutaba, and Guy Pujolle. Greenhead: Virtual data center embedding across distributed infrastructures. IEEE Trans. Cloud Comput., 1(1):36--49, 2013. [ DOI | http ]
[7] Omid Salehi-Abari, Fabian Lim, Fred Chen, and Vladimir Stojanovic. Why analog-to-information converters suffer in high-bandwidth sparse signal applications. IEEE Trans. Circuits Syst. I Regul. Pap., 60-I(9):2273--2284, 2013. [ DOI | http ]
[8] Fred Chen, Fabian Lim, Omid Salehi-Abari, Anantha Chandrakasan, and Vladimir Stojanovic. Energy-aware design of compressed sensing systems for wireless sensors under performance and reliability constraints. IEEE Trans. Circuits Syst. I Regul. Pap., 60-I(3):650--661, 2013. [ DOI | http ]
[9] Ashif S. Harji, Peter A. Buhr, and Tim Brecht. Our troubles with linux kernel upgrades and why you should care. ACM SIGOPS Oper. Syst. Rev., 47(2):66--72, 2013. [ DOI | http ]
[10] Sahil Singla, Yashar Ghiassi-Farrokhfal, and Srinivasan Keshav. Battery provisioning and scheduling for a hybrid battery-diesel generator system. SIGMETRICS Perform. Evaluation Rev., 41(3):71--76, 2013. [ DOI | http ]
[11] Xin Liu and Kenneth Salem. Hybrid storage management for database systems. Proc. VLDB Endow., 6(8):541--552, 2013. [ DOI | .pdf ]
[12] Rui Liu, Ashraf Aboulnaga, and Kenneth Salem. DAX: A widely distributed multi-tenant storage service for DBMS hosting. Proc. VLDB Endow., 6(4):253--264, 2013. [ DOI | .pdf ]
[13] Qi Zhang, Quanyan Zhu, Mohamed Faten Zhani, Raouf Boutaba, and Joseph L. Hellerstein. Dynamic service placement in geographically distributed clouds. IEEE J. Sel. Areas Commun., 31(12-Supplement):762--772, 2013. [ DOI | http ]
[14] Md. Faizul Bari, Md. Rakibul Haque, Reaz Ahmed, Raouf Boutaba, and Bertrand Mathieu. A naming scheme for P2P web hosting. IEEE J. Sel. Areas Commun., 31(9-Supplement):299--309, 2013. [ DOI | http ]
[15] Fady Samuel, Mosharaf Chowdhury, and Raouf Boutaba. Polyvine: policy-based virtual network embedding across multiple domains. J. Internet Serv. Appl., 4(1):6:1--6:23, 2013. [ DOI | http ]
[16] Jin Xiao and Raouf Boutaba. The design and implementation of an energy-smart home in korea. J. Comput. Sci. Eng., 7(3):204--210, 2013. [ DOI | http ]
[17] Kamran Jamshaid, Paul A. S. Ward, Martin Karsten, and Basem Shihada. The efficacy of centralized flow rate control in 802.11-based wireless mesh networks. EURASIP J. Wirel. Commun. Netw., 2013:163, 2013. [ DOI | http ]
[18] Faisal N. Abu-Khzam, Khuzaima Daudjee, Amer E. Mouawad, and Naomi Nishimura. An easy-to-use scalable framework for parallel recursive backtracking. CoRR, abs/1312.7626, 2013. [ arXiv | http ]
[19] Lauro Beltrão Costa, Abmar Barros, Samer Al-Kiswany, Emalayan Vairavanathan, and Matei Ripeanu. Predicting intermediate storage performance for workflow applications. CoRR, abs/1302.4760, 2013. [ arXiv | http ]
[20] Samer Al-Kiswany, Emalayan Vairavanathan, Lauro B. Costa, Hao Yang, and Matei Ripeanu. The case for cross-layer optimizations in storage: A workflow-optimized storage system. CoRR, abs/1301.6195, 2013. [ arXiv | http ]
[21] Md. Faizul Bari, Raouf Boutaba, Rafael Pereira Esteves, Lisandro Zambenedetti Granville, Maxim Podlesny, Md. Golam Rabbani, Qi Zhang, and Mohamed Faten Zhani. Data center network virtualization: A survey. IEEE Commun. Surv. Tutorials, 15(2):909--928, 2013. [ DOI | http ]
[22] Fatma Bouabdallah, Nizar Bouabdallah, and Raouf Boutaba. Reliable and energy efficient cooperative detection in wireless sensor networks. Comput. Commun., 36(5):520--532, 2013. [ DOI | http ]
[23] Rafael Pereira Esteves, Lisandro Zambenedetti Granville, and Raouf Boutaba. On the management of virtual networks. IEEE Commun. Mag., 51(7), 2013. [ DOI | http ]
[24] Soroush Alamdari, Therese C. Biedl, Timothy M. Chan, Elyot Grant, Krishnam Raju Jampani, Srinivasan Keshav, Anna Lubiw, and Vinayak Pathak. Smart-grid electricity allocation via strip packing with slicing. In Algorithms and Data Structures - 13th International Symposium, WADS 2013, London, ON, Canada, August 12-14, 2013. Proceedings, volume 8037 of Lecture Notes in Computer Science, pages 25--36. Springer, 2013. [ DOI | http ]
[25] Ali José Mashtizadeh, Andrea Bittau, Yifeng Frank Huang, and David Mazières. Replication, history, and grafting in the ori file system. In ACM SIGOPS 24th Symposium on Operating Systems Principles, SOSP '13, Farmington, PA, USA, November 3-6, 2013, pages 151--166. ACM, 2013. [ DOI | http ]
[26] Adedamola Adepetu, Elnaz Rezaei, Daniel J. Lizotte, and Srinivasan Keshav. Critiquing time-of-use pricing in ontario. In IEEE Fourth International Conference on Smart Grid Communications, SmartGridComm 2013, Vancouver, BC, Canada, October 21-24, 2013, pages 223--228. IEEE, 2013. [ DOI | http ]
[27] Daniel S. Berger, Martin Karsten, and Jens B. Schmitt. Simulation of adversarial scenarios in omnet++: putting adversarial queueing theory from its head to feet. In 6th International ICST Conference on Simulation Tools and Techniques, SimuTools '13, Cannes, France, March 6-8, 2013, pages 291--298. ICST/ACM, 2013. [ DOI | http ]
[28] Yashar Ghiassi-Farrokhfal, Srinivasan Keshav, Catherine Rosenberg, and Florin Ciucu. Firming solar power. In ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS '13, Pittsburgh, PA, USA, June 17-21, 2013, pages 357--358. ACM, 2013. [ DOI | http ]
[29] Peter Xiang Gao and Srinivasan Keshav. Optimal personal comfort management using SPOT+. In BuildSys 2013, Proceedings of the 5th ACM Workshop On Embedded Systems For Energy-Efficient Buildings, Roma, Italy, November 13-14, 2013, pages 22:1--22:8. ACM, 2013. [ DOI | http ]
[30] Mehmet Ulema, Niranth Amogh, Raouf Boutaba, Cagatay Buyukkoc, Alex Clemm, Jiang (Linda) Xie, Mehmet C. Vuran, Antonio Manzalini, and Roberto Saracco. IEEE software defined network initiative. In IEEE SDN for Future Networks and Services, SDN4FNS 2013, Trento, Italy, November 11-13, 2013, pages 1--6. IEEE, 2013. [ DOI | http ]
[31] Md. Faizul Bari, Shihabur Rahman Chowdhury, Reaz Ahmed, and Raouf Boutaba. Policycop: An autonomic qos policy enforcement framework for software defined networks. In IEEE SDN for Future Networks and Services, SDN4FNS 2013, Trento, Italy, November 11-13, 2013, pages 1--7. IEEE, 2013. [ DOI | http ]
[32] Anthony Simonet, Gilles Fedak, Matei Ripeanu, and Samer Al-Kiswany. Active data: a data-centric approach to data life-cycle management. In Proceedings of the 8th Parallel Data Storage Workshop, PDSW 2013, Denver, Colorado, USA, November 17-21, 2013, pages 39--44. ACM, 2013. [ DOI | http ]
[33] Lauro Beltrão Costa, Samer Al-Kiswany, Abmar Barros, Hao Yang, and Matei Ripeanu. Predicting intermediate storage performance for workflow applications. In Proceedings of the 8th Parallel Data Storage Workshop, PDSW 2013, Denver, Colorado, USA, November 17-21, 2013, pages 33--38. ACM, 2013. [ DOI | http ]
[34] Jian Li, Jin Xiao, Huu Nhat Minh Nguyen, James Won-Ki Hong, and Raouf Boutaba. Breezchirp: Energy efficient wi-fi bandwidth estimator for smartphones. In Fourth International Conference on the Network of the Future, NOF 2013, Pohang, Korea (South), October 23-25, 2013, pages 1--5. IEEE, 2013. [ DOI | http ]
[35] Bairong Lei, Ivan Surya, Shahin Kamali, and Khuzaima Daudjee. Data partitioning for video-on-demand services. In 2013 IEEE 12th International Symposium on Network Computing and Applications, Cambridge, MA, USA, August 22-24, 2013, pages 49--54. IEEE Computer Society, 2013. [ DOI | http ]
[36] Srinivasan Keshav. The challenge of deployment. In Proceedings of the 2013 ACM MobiCom workshop on Lowest cost denominator networking for universal access, LCDNet@MobiCom 2013, Miami, Florida, USA, September 30, 2013, pages 1--2. ACM, 2013. [ DOI | http ]
[37] Hong Zhang, Bo Li, Hongbo Jiang, Fangming Liu, Athanasios V. Vasilakos, and Jiangchuan Liu. A framework for truthful online auctions in cloud computing with heterogeneous user demands. In Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, pages 1510--1518. IEEE, 2013. [ DOI | http ]
[38] Reaz Ahmed, Md. Faizul Bari, Shihabur Rahman Chowdhury, Md. Golam Rabbani, Raouf Boutaba, and Bertrand Mathieu. αroute: A name based routing scheme for information centric networks. In Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, pages 90--94. IEEE, 2013. [ DOI | http ]
[39] Mohamed Faten Zhani, Qi Zhang, Gwendal Simon, and Raouf Boutaba. VDC planner: Dynamic migration-aware virtual data center embedding for clouds. In 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), Ghent, Belgium, May 27-31, 2013, pages 18--25. IEEE, 2013. [ http ]
[40] Md. Golam Rabbani, Rafael Pereira Esteves, Maxim Podlesny, Gwendal Simon, Lisandro Zambenedetti Granville, and Raouf Boutaba. On tackling virtual data center embedding problem. In 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), Ghent, Belgium, May 27-31, 2013, pages 177--184. IEEE, 2013. [ http ]
[41] Carol J. Fung and Raouf Boutaba. Design and management of collaborative intrusion detection networks. In 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), Ghent, Belgium, May 27-31, 2013, pages 955--961. IEEE, 2013. [ http ]
[42] Rafael Pereira Esteves, Lisandro Zambenedetti Granville, Hadi Bannazadeh, and Raouf Boutaba. Paradigm-based adaptive provisioning in virtualized data centers. In 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), Ghent, Belgium, May 27-31, 2013, pages 169--176. IEEE, 2013. [ http ]
[43] Kirill Kogan, Sergey I. Nikolenko, Srinivasan Keshav, and Alejandro López-Ortiz. Efficient demand assignment in multi-connected microgrids with a shared central grid. In Sustainable Internet and ICT for Sustainability, SustainIT 2013, Palermo, Italy, 30-31 October, 2013, Sponsored by the IFIP TC6 WG 6.3 "Performance of Communication Systems", pages 1--5. IEEE Computer Society, 2013. [ DOI | http ]
[44] Lesley Northam, Rob Smits, Khuzaima Daudjee, and Joe Istead. Ray tracing in the cloud using mapreduce. In International Conference on High Performance Computing & Simulation, HPCS 2013, Helsinki, Finland, July 1-5, 2013, pages 19--26. IEEE, 2013. [ DOI | http ]
[45] Changjiu Jin, Rui Liu, and Kenneth Salem. Materialized views for eventually consistent record stores. In Workshops Proceedings of the 29th IEEE International Conference on Data Engineering, ICDE 2013, Brisbane, Australia, April 8-12, 2013, pages 250--257. IEEE Computer Society, 2013. [ DOI | http ]
[46] Nashid Shahriar, Shihabur Rahman Chowdhury, Mahfuza Sharmin, Reaz Ahmed, Raouf Boutaba, and Bertrand Mathieu. Ensuring beta-availability in P2P social networks. In 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), Philadelphia, PA, USA, 8-11 July, 2013, pages 150--155. IEEE Computer Society, 2013. [ DOI | http ]
[47] Simon Forsyth and Khuzaima Daudjee. Update management in decentralized social networks. In 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), Philadelphia, PA, USA, 8-11 July, 2013, pages 196--201. IEEE Computer Society, 2013. [ DOI | http ]
[48] Qi Zhang, Mohamed Faten Zhani, Raouf Boutaba, and Joseph L. Hellerstein. Harmony: Dynamic heterogeneity-aware resource provisioning in the cloud. In IEEE 33rd International Conference on Distributed Computing Systems, ICDCS 2013, 8-11 July, 2013, Philadelphia, Pennsylvania, USA, pages 510--519. IEEE Computer Society, 2013. [ DOI | http ]
[49] Sukanta Pramanik, David Taylor, and Bernard Wong. Towards an efficient online causal-event-pattern-matching framework. In IEEE 33rd International Conference on Distributed Computing Systems, ICDCS 2013, 8-11 July, 2013, Philadelphia, Pennsylvania, USA, pages 481--490. IEEE Computer Society, 2013. [ DOI | http ]
[50] Mouna Hkimi, Rami Langar, Stefano Secci, Raouf Boutaba, and Guy Pujolle. Demands rescaling for resource and power allocation in cooperative femtocell networks. In Proceedings of IEEE International Conference on Communications, ICC 2013, Budapest, Hungary, June 9-13, 2013, pages 6235--6239. IEEE, 2013. [ DOI | http ]
[51] Ahmed Amokrane, Rami Langar, Raouf Boutaba, and Guy Pujolle. Online flow-based energy efficient management in wireless mesh networks. In 2013 IEEE Global Communications Conference, GLOBECOM 2013, Atlanta, GA, USA, December 9-13, 2013, pages 329--335. IEEE, 2013. [ DOI | http ]
[52] Rayman Preet Singh, Srinivasan Keshav, and Tim Brecht. A cloud-based consumer-centric architecture for energy data analytics. In The Fourth International Conference on Future Energy Systems, e-Energy '13, Berkeley, CA, USA, May 22-24, 2013, pages 63--74. ACM, 2013. [ DOI | http ]
[53] Kirill Kogan, Sergey I. Nikolenko, Srinivasan Keshav, and Alejandro López-Ortiz. Efficient demand assignment in multi-connected microgrids. In The Fourth International Conference on Future Energy Systems, e-Energy '13, Berkeley, CA, USA, May 22-24, 2013, pages 277--278. ACM, 2013. [ DOI | http ]
[54] Peter Xiang Gao and Srinivasan Keshav. SPOT: a smart personalized office thermal control system. In The Fourth International Conference on Future Energy Systems, e-Energy '13, Berkeley, CA, USA, May 22-24, 2013, pages 237--246. ACM, 2013. [ DOI | http ]
[55] Omid Ardakanian, Catherine Rosenberg, and Srinivasan Keshav. Distributed control of electric vehicle charging. In The Fourth International Conference on Future Energy Systems, e-Energy '13, Berkeley, CA, USA, May 22-24, 2013, pages 101--112. ACM, 2013. [ DOI | http ]
[56] Samer Al-Kiswany, Hakan Hacigümüs, Ziyang Liu, and Jagan Sankaranarayanan. Cost exploration of data sharings in the cloud. In Joint 2013 EDBT/ICDT Conferences, EDBT '13 Proceedings, Genoa, Italy, March 18-22, 2013, pages 601--612. ACM, 2013. [ DOI | http ]
[57] Divyakant Agrawal, Amr El Abbadi, Hatem A. Mahmoud, Faisal Nawab, and Kenneth Salem. Managing geo-replicated data in multi-datacenters. In Databases in Networked Information Systems - 8th International Workshop, DNIS 2013, Aizu-Wakamatsu, Japan, March 25-27, 2013. Proceedings, volume 7813 of Lecture Notes in Computer Science, pages 23--43. Springer, 2013. [ DOI | http ]
[58] Fen Zhou, Jiayi Liu, Gwendal Simon, and Raouf Boutaba. Joint optimization for the delivery of multiple video channels in telco-cdn. In Proceedings of the 9th International Conference on Network and Service Management, CNSM 2013, Zurich, Switzerland, October 14-18, 2013, pages 161--165. IEEE Computer Society, 2013. [ DOI | http ]
[59] Md. Faizul Bari, Arup Raton Roy, Shihabur Rahman Chowdhury, Qi Zhang, Mohamed Faten Zhani, Reaz Ahmed, and Raouf Boutaba. Dynamic controller provisioning in software defined networks. In Proceedings of the 9th International Conference on Network and Service Management, CNSM 2013, Zurich, Switzerland, October 14-18, 2013, pages 18--25. IEEE Computer Society, 2013. [ DOI | http ]
[60] Carol J. Fung and Raouf Boutaba. Intrusion Detection Networks - A Key to Collaborative Security. CRC Press, 2013. [ http ]

2012

[1] Robert Escriva, Bernard Wong, and Emin Gün Sirer. An introduction to hyperdex and the brave new world of high performance, scalable, consistent, fault-tolerant data stores. login Usenix Mag., 37(3), 2012. [ http ]
[2] Jérôme François, Issam Aib, and Raouf Boutaba. Firecol: a collaborative protection network for the detection of flooding ddos attacks. IEEE/ACM Trans. Netw., 20(6):1828--1841, 2012. [ DOI | http ]
[3] Mosharaf Chowdhury, Muntasir Raihan Rahman, and Raouf Boutaba. Vineyard: Virtual network embedding algorithms with coordinated node and link mapping. IEEE/ACM Trans. Netw., 20(1):206--219, 2012. [ DOI | http ]
[4] Khaled Salah, Khalid Elbadawi, and Raouf Boutaba. Performance modeling and analysis of network firewalls. IEEE Trans. Netw. Serv. Manag., 9(1):12--21, 2012. [ DOI | http ]
[5] Carol J. Fung, Jie Zhang, and Raouf Boutaba. Effective acquaintance management based on bayesian learning for distributed intrusion detection networks. IEEE Trans. Netw. Serv. Manag., 9(3):320--332, 2012. [ DOI | http ]
[6] Omid Ardakanian, Catherine Rosenberg, and Srinivasan Keshav. On the impact of storage in residential power distribution systems. SIGMETRICS Perform. Evaluation Rev., 40(3):43--47, 2012. [ DOI | http ]
[7] Omid Ardakanian, Catherine Rosenberg, and Srinivasan Keshav. Realtime distributed congestion control for electrical vehicle charging. SIGMETRICS Perform. Evaluation Rev., 40(3):38--42, 2012. [ DOI | http ]
[8] Loubna Mekouar, Youssef Iraqi, and Raouf Boutaba. An analysis of peer similarity for recommendations in P2P systems. Multim. Tools Appl., 60(2):277--303, 2012. [ DOI | http ]
[9] Quanyan Zhu, Carol J. Fung, Raouf Boutaba, and Tamer Basar. GUIDEX: A game-theoretic incentive-based mechanism for intrusion detection networks. IEEE J. Sel. Areas Commun., 30(11):2220--2230, 2012. [ DOI | http ]
[10] Djamal-Eddine Meddour, Alaeddine Abdallah Djamal, Toufik Ahmed, and Raouf Boutaba. A cross layer architecture for multicast and unicast video transmission in mobile broadband networks. J. Netw. Comput. Appl., 35(5):1377--1391, 2012. [ DOI | http ]
[11] Fabio Kon, Gordon S. Blair, Lisandro Zambenedetti Granville, Raouf Boutaba, Lizhe Wang, Jie Tao, Achim Streit, Dieter Kranzlmüller, and Luís Veiga. The path to openness: letter from the editors. J. Internet Serv. Appl., 3(3):243--244, 2012. [ DOI | http ]
[12] Raouf Boutaba, Lu Cheng, and Qi Zhang. On cloud computational models and the heterogeneity challenge. J. Internet Serv. Appl., 3(1):77--86, 2012. [ DOI | http ]
[13] Khalid Alsubhi, Yassir Alhazmi, Nizar Bouabdallah, and Raouf Boutaba. Security configuration management in intrusion detection and prevention systems. Int. J. Secur. Networks, 7(1):30--39, 2012. [ DOI | http ]
[14] Khalid Alsubhi, Issam Aib, and Raouf Boutaba. Fuzmet: a fuzzy-logic based alert prioritization engine for intrusion detection systems. Int. J. Netw. Manag., 22(4):263--284, 2012. [ DOI | http ]
[15] Samer Al-Kiswany, Abdullah Gharaibeh, and Matei Ripeanu. Gpus as storage system accelerators. CoRR, abs/1202.3669, 2012. [ arXiv | http ]
[16] Kamran Jamshaid, Paul A. S. Ward, and Martin Karsten. Mechanisms for centralized flow rate control in 802.11-based wireless mesh networks. Comput. Networks, 56(2):884--901, 2012. [ DOI | http ]
[17] Md. Faizul Bari, Shihabur Rahman Chowdhury, Reaz Ahmed, Raouf Boutaba, and Bertrand Mathieu. A survey of naming and routing in information-centric networks. IEEE Commun. Mag., 50(12):44--53, 2012. [ DOI | http ]
[18] Jim Summers, Tim Brecht, Derek L. Eager, and Bernard Wong. Methodologies for generating HTTP streaming video workloads to evaluate web server performance. In The 5th Annual International Systems and Storage Conference, SYSTOR '12, Haifa, Israel, June 4-6, 2012, page 13. ACM, 2012. [ DOI | http ]
[19] Ashif S. Harji, Peter A. Buhr, and Tim Brecht. Comparing high-performance multi-core web-server architectures. In The 5th Annual International Systems and Storage Conference, SYSTOR '12, Haifa, Israel, June 4-6, 2012, page 2. ACM, 2012. [ DOI | http ]
[20] Pirathayini Srikantha, Srinivasan Keshav, and Catherine Rosenberg. Distributed control for reducing carbon footprint in the residential sector. In IEEE Third International Conference on Smart Grid Communications, SmartGridComm 2012, Tainan, Taiwan, November 5-8, 2012, pages 115--120. IEEE, 2012. [ DOI | http ]
[21] Sahil Singla and Srinivasan Keshav. Demand response through a temperature setpoint market in ontario. In IEEE Third International Conference on Smart Grid Communications, SmartGridComm 2012, Tainan, Taiwan, November 5-8, 2012, pages 103--108. IEEE, 2012. [ DOI | http ]
[22] Peter Xiang Gao, Andrew R. Curtis, Bernard Wong, and Srinivasan Keshav. It's not easy being green. In ACM SIGCOMM 2012 Conference, SIGCOMM '12, Helsinki, Finland - August 13 - 17, 2012, pages 211--222. ACM, 2012. [ DOI | http ]
[23] Robert Escriva, Bernard Wong, and Emin Gün Sirer. Hyperdex: a distributed, searchable key-value store. In ACM SIGCOMM 2012 Conference, SIGCOMM '12, Helsinki, Finland - August 13 - 17, 2012, pages 25--36. ACM, 2012. [ DOI | http ]
[24] Adam Belay, Andrea Bittau, Ali José Mashtizadeh, David Terei, David Mazières, and Christos Kozyrakis. Dune: Safe user-level access to privileged CPU features. In 10th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2012, Hollywood, CA, USA, October 8-10, 2012, pages 335--348. USENIX Association, 2012. [ http ]
[25] Jim Summers, Tim Brecht, Derek L. Eager, and Bernard Wong. To chunk or not to chunk: implications for HTTP streaming video server performance. In Network and Operating System Support for Digital Audio and Video Workshop, NOSSDAV '12, Toronto, ON, Canada, June 7-8, 2012, pages 15--20. ACM, 2012. [ DOI | http ]
[26] Tung Tran, Issam Aib, Ehab Al-Shaer, and Raouf Boutaba. An evasive attack on SNORT flowbits. In 2012 IEEE Network Operations and Management Symposium, NOMS 2012, Maui, HI, USA, April 16-20, 2012, pages 351--358. IEEE, 2012. [ DOI | http ]
[27] Arum Kwon, Jin Xiao, Sin-Seok Seo, James Won-Ki Hong, and Raouf Boutaba. The impact of network performance on perceived video quality in H.264/AVC. In 2012 IEEE Network Operations and Management Symposium, NOMS 2012, Maui, HI, USA, April 16-20, 2012, pages 1061--1067. IEEE, 2012. [ DOI | http ]
[28] Sharon Choy, Bernard Wong, Gwendal Simon, and Catherine Rosenberg. The brewing storm in cloud gaming: A measurement study on cloud to end-user latency. In 11th Annual Workshop on Network and Systems Support for Games, NetGames 2012, Venice, Italy, November 22-23, 2012, pages 1--6. IEEE, 2012. [ DOI | http ]
[29] Ali Rajabi and Johnny W. Wong. MMPP characterization of web application traffic. In 20th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, MASCOTS 2012, Washington, DC, USA, August 7-9, 2012, pages 107--114. IEEE Computer Society, 2012. [ DOI | http ]
[30] Sonia Waharte, Alexander Golynski, and Raouf Boutaba. On the complexity of routing in wireless multihop network. In 8th International Wireless Communications and Mobile Computing Conference, IWCMC 2012, Limassol, Cyprus, August 27-31, 2012, pages 431--436. IEEE, 2012. [ DOI | http ]
[31] Andrew R. Curtis, Tommy Carpenter, Mustafa Elsheikh, Alejandro López-Ortiz, and Srinivasan Keshav. REWIRE: an optimization-based framework for unstructured data center network design. In Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, pages 1116--1124. IEEE, 2012. [ DOI | http ]
[32] Umar Farooq Minhas, Rui Liu, Ashraf Aboulnaga, Kenneth Salem, Jonathan Ng, and Sean Robertson. Elastic scale-out for partition-based database systems. In Workshops Proceedings of the IEEE 28th International Conference on Data Engineering, ICDE 2012, Arlington, VA, USA, April 1-5, 2012, pages 281--288. IEEE Computer Society, 2012. [ DOI | http ]
[33] Qi Zhang, Quanyan Zhu, Mohamed Faten Zhani, and Raouf Boutaba. Dynamic service placement in geographically distributed clouds. In 2012 IEEE 32nd International Conference on Distributed Computing Systems, Macau, China, June 18-21, 2012, pages 526--535. IEEE Computer Society, 2012. [ DOI | http ]
[34] Omid Salehi-Abari, Fred Chen, Fabian Lim, and Vladimir Stojanovic. Performance trade-offs and design limitations of analog-to-information converter front-ends. In 2012 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2012, Kyoto, Japan, March 25-30, 2012, pages 5309--5312. IEEE, 2012. [ DOI | http ]
[35] Raouf Boutaba. On managing heterogeneity in production cloud computing environments. In Advanced Infocomm Technology - 5th IEEE International Conference, ICAIT 2012, Paris, France, July 25-27, 2012. Revised Papers, volume 7593 of Lecture Notes in Computer Science, page 3. Springer, 2012. [ DOI | http ]
[36] Qi Zhang, Mohamed Faten Zhani, Shuo Zhang, Quanyan Zhu, Raouf Boutaba, and Joseph L. Hellerstein. Dynamic energy-aware capacity provisioning for cloud computing environments. In 9th International Conference on Autonomic Computing, ICAC'12, San Jose, CA, USA, September 16 - 20, 2012, pages 145--154. ACM, 2012. [ DOI | http ]
[37] Prima Chairunnanda, Simon Forsyth, and Khuzaima Daudjee. Graph data partition models for online social networks. In 23rd ACM Conference on Hypertext and Social Media, HT '12, Milwaukee, WI, USA, June 25-28, 2012, pages 175--180. ACM, 2012. [ DOI | http ]
[38] Sahar Hoteit, Stefano Secci, Rami Langar, Guy Pujolle, and Raouf Boutaba. A bankruptcy game approach for resource allocation in cooperative femtocell networks. In 2012 IEEE Global Communications Conference, GLOBECOM 2012, Anaheim, CA, USA, December 3-7, 2012, pages 1800--1805. IEEE, 2012. [ DOI | http ]
[39] Abbas Antoun Hatoum, Rami Langar, Nadjib Aitsaadi, Raouf Boutaba, and Guy Pujolle. Qos-based power control and resource allocation in OFDMA femtocell networks. In 2012 IEEE Global Communications Conference, GLOBECOM 2012, Anaheim, CA, USA, December 3-7, 2012, pages 5116--5122. IEEE, 2012. [ DOI | http ]
[40] Khalid Alsubhi, Mohamed Faten Zhani, and Raouf Boutaba. Embedded markov process based model for performance analysis of intrusion detection and prevention systems. In 2012 IEEE Global Communications Conference, GLOBECOM 2012, Anaheim, CA, USA, December 3-7, 2012, pages 898--903. IEEE, 2012. [ DOI | http ]
[41] Pirathayini Srikantha, Catherine Rosenberg, and Srinivasan Keshav. An analysis of peak demand reductions due to elasticity of domestic appliances. In Proceedings of the 3rd International Conference on Energy-Efficient Computing and Networking, e-Energy'12, Madrid, Spain, May 9-11, 2012, page 28. ACM, 2012. [ DOI | http ]
[42] Tommy Carpenter, Sahil Singla, Parsiad Azimzadeh, and Srinivasan Keshav. The impact of electricity pricing schemes on storage adoption in ontario. In Proceedings of the 3rd International Conference on Energy-Efficient Computing and Networking, e-Energy'12, Madrid, Spain, May 9-11, 2012, page 18. ACM, 2012. [ DOI | http ]
[43] Omid Ardakanian, Srinivasan Keshav, and Catherine Rosenberg. On the use of teletraffic theory in power distribution systems. In Proceedings of the 3rd International Conference on Energy-Efficient Computing and Networking, e-Energy'12, Madrid, Spain, May 9-11, 2012, page 21. ACM, 2012. [ DOI | http ]
[44] Jin Xiao, Jian Li, Raouf Boutaba, and James Won-Ki Hong. Comfort-aware home energy management under market-based demand-response. In 8th International Conference on Network and Service Management, CNSM 2012, Las Vegas, NV, USA, October 22-26, 2012, pages 10--18. IEEE, 2012. [ http ]
[45] Ahmed Amokrane, Rami Langar, Raouf Boutaba, and Guy Pujolle. A green framework for energy efficient management in tdma-based wireless mesh networks. In 8th International Conference on Network and Service Management, CNSM 2012, Las Vegas, NV, USA, October 22-26, 2012, pages 322--328. IEEE, 2012. [ http ]
[46] Khaled Salah and Raouf Boutaba. Estimating service response time for elastic cloud applications. In 1st IEEE International Conference on Cloud Networking, CloudNet 2012, Paris, France, November 28-30, 2012, pages 12--16. IEEE, 2012. [ DOI | http ]
[47] Nashid Shahriar, Mahfuza Sharmin, Reaz Ahmed, Md. Mustafizur Rahman, Raouf Boutaba, and Bertrand Mathieu. Diurnal availability for peer-to-peer systems. In 2012 IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA, January 14-17, 2012, pages 619--623. IEEE, 2012. [ DOI | http ]
[48] Emalayan Vairavanathan, Samer Al-Kiswany, Lauro Beltrão Costa, Zhao Zhang, Daniel S. Katz, Michael Wilde, and Matei Ripeanu. A workflow-aware storage system: An opportunity study. In 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2012, Ottawa, Canada, May 13-16, 2012, pages 326--334. IEEE Computer Society, 2012. [ DOI | http ]
[49] Abdul Babar and Bernard Wong. Capturing strategic business requirements: An exploratory study. In 19th Asia-Pacific Software Engineering Conference, APSEC 2012, Hong Kong, China, December 4-7, 2012, pages 446--451. IEEE, 2012. [ DOI | http ]
[50] Jian Li, Jin Xiao, James Won-Ki Hong, and Raouf Boutaba. Application-centric wi-fi energy management on smart phone. In 14th Asia-Pacific Network Operations and Management Symposium, APNOMS 2012, Seoul, Korea (South), September 25-27, 2012, pages 1--8. IEEE, 2012. [ DOI | http ]
[51] Yongfeng Huang, Jin Xiao, James Won-Ki Hong, Ahmed Mehaoua, and Raouf Boutaba. Event-based estimation of user experience for network video streaming. In 14th Asia-Pacific Network Operations and Management Symposium, APNOMS 2012, Seoul, Korea (South), September 25-27, 2012, pages 1--8. IEEE, 2012. [ DOI | http ]
[52] Srinivasan Keshav. Mathematical Foundations of Computer Networking. Addison-Wesley professional computing series. Addison-Wesley, 2012. [ http ]

2011

[1] Hanan Saleet, Rami Langar, Kshirasagar Naik, Raouf Boutaba, Amiya Nayak, and Nishith Goel. Intersection-based geographical routing protocol for vanets: A proposal and analysis. IEEE Trans. Veh. Technol., 60(9):4560--4574, 2011. [ DOI | http ]
[2] Abdullah Gharaibeh, Samer Al-Kiswany, and Matei Ripeanu. Thriftstore: Finessing reliability trade-offs in replicated storage systems. IEEE Trans. Parallel Distributed Syst., 22(6):910--923, 2011. [ DOI | http ]
[3] Carol J. Fung, Jie Zhang, Issam Aib, and Raouf Boutaba. Dirichlet-based trust management for effective collaborative intrusion detection networks. IEEE Trans. Netw. Serv. Manag., 8(2):79--91, 2011. [ DOI | http ]
[4] Nizar Bouabdallah, Brent Ishibashi, and Raouf Boutaba. Performance of cognitive radio-based wireless mesh networks. IEEE Trans. Mob. Comput., 10(1):122--135, 2011. [ DOI | http ]
[5] Umar Farooq Minhas, Shriram Rajagopalan, Brendan Cully, Ashraf Aboulnaga, Kenneth Salem, and Andrew Warfield. Remusdb: Transparent high availability for database systems. Proc. VLDB Endow., 4(11):738--748, 2011. [ .pdf ]
[6] Carol J. Fung, Jie Zhang, Issam Aib, and Raouf Boutaba. Trust management and admission control for host-based collaborative intrusion detection. J. Netw. Syst. Manag., 19(2):257--277, 2011. [ DOI | http ]
[7] Yixin Diao, Hanan Lutfiyya, Noura Limam, and Raouf Boutaba. A report on CNSM 2010. J. Netw. Syst. Manag., 19(1):137--142, 2011. [ DOI | http ]
[8] Patrick Kling, M. Tamer Özsu, and Khuzaima Daudjee. Scaling XML query processing: distribution, localization and pruning. Distributed Parallel Databases, 29(5-6):445--490, 2011. [ DOI | http ]
[9] Nashid Shahriar, Mahfuza Sharmin, Reaz Ahmed, and Raouf Boutaba. Diurnal availability for peer-to-peer systems. CoRR, abs/1101.4260, 2011. [ arXiv | http ]
[10] Maxwell Young and Raouf Boutaba. Overcoming adversaries in sensor networks: A survey of theoretical models and algorithmic approaches for tolerating malicious interference. IEEE Commun. Surv. Tutorials, 13(4):617--641, 2011. [ DOI | http ]
[11] Reaz Ahmed and Raouf Boutaba. A survey of distributed search techniques in large scale distributed systems. IEEE Commun. Surv. Tutorials, 13(2):150--167, 2011. [ DOI | http ]
[12] Peter Rost, Raouf Boutaba, Klaus Doppler, and Ashwin Gumaste. Recent advances in network convergence. Comput. Networks, 55(7):1455--1458, 2011. [ DOI | http ]
[13] Brent Ishibashi, Nizar Bouabdallah, and Raouf Boutaba. Qos capacity of virtual wireless networks. Comput. Networks, 55(7):1592--1613, 2011. [ DOI | http ]
[14] Shimin Guo, Mohammad Derakhshani, Mohammad Hossein Falaki, Usman Ismail, Rowena Luk, Earl A. Oliver, Sumair Ur Rahman, Aaditeshwar Seth, Matei A. Zaharia, and Srinivasan Keshav. Design and implementation of the kiosknet system. Comput. Networks, 55(1):264--281, 2011. [ DOI | http ]
[15] Srinivasan Keshav and Catherine Rosenberg. How internet concepts and technologies can help green and smarten the electrical grid. Comput. Commun. Rev., 41(1):109--114, 2011. [ DOI | http ]
[16] Jiajia Han, Brent Ishibashi, Raouf Boutaba, and Djamal-Eddine Meddour. Routing internal traffic in multiple gateway wireless mesh networks. In Proceedings of the IFIP Wireless Days Conference 2011, Niagara Falls, ON, Canada, October 10-12, 2011, pages 1--9. IEEE, 2011. [ DOI | http ]
[17] Ali José Mashtizadeh, Emré Celebi, Tal Garfinkel, and Min Cai. The design and evolution of live storage migration in vmware ESX. In 2011 USENIX Annual Technical Conference, Portland, OR, USA, June 15-17, 2011. USENIX Association, 2011. [ http ]
[18] Irfan Ahmad, Ajay Gulati, and Ali José Mashtizadeh. vic: Interrupt coalescing for virtual machine storage device IO. In 2011 USENIX Annual Technical Conference, Portland, OR, USA, June 15-17, 2011. USENIX Association, 2011. [ http ]
[19] Qi Zhang, Quanyan Zhu, and Raouf Boutaba. Dynamic resource allocation for spot markets in cloud computing environments. In IEEE 4th International Conference on Utility and Cloud Computing, UCC 2011, Melbourne, Australia, December 5-8, 2011, pages 178--185. IEEE Computer Society, 2011. [ DOI | http ]
[20] Stefan Wagner, Sunita Chulani, and Bernard Wong. 8th international workshop on software quality (wosq). In SIGSOFT/FSE'11 19th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-19) and ESEC'11: 13th European Software Engineering Conference (ESEC-13), Szeged, Hungary, September 5-9, 2011, pages 524--525. ACM, 2011. [ DOI | http ]
[21] Ryan S. Peterson, Bernard Wong, and Emin Gün Sirer. A content propagation metric for efficient content distribution. In Proceedings of the ACM SIGCOMM 2011 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Toronto, ON, Canada, August 15-19, 2011, pages 326--337. ACM, 2011. [ DOI | http ]
[22] Abdul Babar, Bernard Wong, and Asif Qumer. An evaluation of the goal-oriented approaches for modelling strategic alignment concept. In Proceedings of the Fifth IEEE International Conference on Research Challenges in Information Science, RCIS 2011, Gosier, Guadeloupe, France, 19-21 May, 2011, pages 1--8. IEEE, 2011. [ DOI | http ]
[23] Md. Faizul Bari, Md. Rakibul Haque, Reaz Ahmed, Raouf Boutaba, and Bertrand Mathieu. Persistent naming for P2P web hosting. In 2011 IEEE International Conference on Peer-to-Peer Computing, P2P 2011, Kyoto, Japan, August 31 - September 2, 2011, pages 270--279. IEEE, 2011. [ DOI | http ]
[24] Qi Zhang, Eren Gürses, Raouf Boutaba, and Jin Xiao. Dynamic resource allocation for spot markets in clouds. In USENIX Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services, Hot-ICE'11, Boston, MA, USA, March 29, 2011. USENIX Association, 2011. [ http ]
[25] Nabeel Ahmed, Srinivasan Keshav, and Konstantina Papagiannaki. Omnivoice: a mobile voice solution for small-scale enterprises. In Proceedings of the 12th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2011, Paris, France, May 16-20, 2011, page 5. ACM, 2011. [ DOI | http ]
[26] Khaled Ben Letaief, Mario Gerla, Ahmed Helmy, Sajal K. Das, Raouf Boutaba, and Mohsen Guizani. Message from the IWCMC 2011 chairs. In Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, IWCMC 2011, Istanbul, Turkey, 4-8 July, 2011, page 1. IEEE, 2011. [ DOI | http ]
[27] Shahin Kamali, Pedram Ghodsnia, and Khuzaima Daudjee. Dynamic data allocation with replication in distributed systems. In 30th IEEE International Performance Computing and Communications Conference, IPCCC 2011, Orlando, Florida, USA, November 17-19, 2011, pages 1--8. IEEE Computer Society, 2011. [ DOI | http ]
[28] Khalid Alsubhi, Nizar Bouabdallah, and Raouf Boutaba. Performance analysis in intrusion detection and prevention systems. In Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, IM 2011, Dublin, Ireland, 23-27 May 2011, pages 369--376. IEEE, 2011. [ DOI | http ]
[29] Abbas Antoun Hatoum, Nadjib Aitsaadi, Rami Langar, Raouf Boutaba, and Guy Pujolle. FCRA: femtocell cluster-based resource allocation scheme for OFDMA networks. In Proceedings of IEEE International Conference on Communications, ICC 2011, Kyoto, Japan, 5-9 June, 2011, pages 1--6. IEEE, 2011. [ DOI | http ]
[30] Fatma Bouabdallah and Raouf Boutaba. A distributed OFDMA medium access control for underwater acoustic sensors networks. In Proceedings of IEEE International Conference on Communications, ICC 2011, Kyoto, Japan, 5-9 June, 2011, pages 1--5. IEEE, 2011. [ DOI | http ]
[31] Muhammad Bilal Sheikh, Umar Farooq Minhas, Omar Zia Khan, Ashraf Aboulnaga, Pascal Poupart, and David J. Taylor. A bayesian approach to online performance modeling for database appliances using gaussian models. In Proceedings of the 8th International Conference on Autonomic Computing, ICAC 2011, Karlsruhe, Germany, June 14-18, 2011, pages 121--130. ACM, 2011. [ DOI | http ]
[32] Earl A. Oliver and Srinivasan Keshav. An empirical approach to smartphone energy level prediction. In UbiComp 2011: Ubiquitous Computing, 13th International Conference, UbiComp 2011, Beijing, China, September 17-21, 2011, Proceedings, pages 345--354. ACM, 2011. [ DOI | http ]
[33] Samer Al-Kiswany, Dinesh Subhraveti, Prasenjit Sarkar, and Matei Ripeanu. Vmflock: virtual machine co-migration for the cloud. In Proceedings of the 20th ACM International Symposium on High Performance Distributed Computing, HPDC 2011, San Jose, CA, USA, June 8-11, 2011, pages 159--170. ACM, 2011. [ DOI | http ]
[34] Lauro Beltrão Costa, Samer Al-Kiswany, Raquel Vigolvino Lopes, and Matei Ripeanu. Assessing data deduplication trade-offs from an energy and performance perspective. In 2011 International Green Computing Conference and Workshops, IGCC 2012, Orlando, FL, USA, July 25-28, 2011, pages 1--6. IEEE Computer Society, 2011. [ DOI | http ]
[35] Hanan Saleet, Sagar Naik, Rami Langar, Raouf Boutaba, Amiya Nayak, and Vineet Srivastava. Performance modeling of routing dependability in home networks. In Proceedings of the Global Communications Conference, GLOBECOM 2011, 5-9 December 2011, Houston, Texas, USA, pages 1--6. IEEE, 2011. [ DOI | http ]
[36] Khalid Alsubhi, Yassir Alhazmi, Nizar Bouabdallah, and Raouf Boutaba. Rule mode selection in intrusion detection and prevention systems. In Proceedings of the Global Communications Conference, GLOBECOM 2011, 5-9 December 2011, Houston, Texas, USA, pages 1--6. IEEE, 2011. [ DOI | http ]
[37] Carol J. Fung, Quanyan Zhu, Raouf Boutaba, and Tamer Basar. SMURFEN: A system framework for rule sharing collaborative intrusion detection. In 7th International Conference on Network and Service Management, CNSM 2011, Paris, France, October 24-28, 2011, pages 1--6. IEEE, 2011. [ http ]
[38] Lu Cheng, Qi Zhang, and Raouf Boutaba. Mitigating the negative impact of preemption on heterogeneous mapreduce workloads. In 7th International Conference on Network and Service Management, CNSM 2011, Paris, France, October 24-28, 2011, pages 1--9. IEEE, 2011. [ http ]
[39] Ji-Yong Shin, Bernard Wong, and Emin Gün Sirer. Small-world datacenters. In ACM Symposium on Cloud Computing in conjunction with SOSP 2011, SOCC '11, Cascais, Portugal, October 26-28, 2011, page 2. ACM, 2011. [ DOI | http ]
[40] Quanyan Zhu, Carol J. Fung, Raouf Boutaba, and Tamer Basar. A game-theoretic approach to rule sharing mechanism in networked intrusion detection systems: Robustness, incentives and security. In 50th IEEE Conference on Decision and Control and European Control Conference, 11th European Control Conference, CDC/ECC 2011, Orlando, FL, USA, December 12-15, 2011, pages 243--248. IEEE, 2011. [ DOI | http ]
[41] Carol J. Fung, Quanyan Zhu, Raouf Boutaba, and Tamer Basar. Poster: SMURFEN: a rule sharing collaborative intrusion detection network. In Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011, pages 761--764. ACM, 2011. [ http ]
[42] Ashif S. Harji, Peter A. Buhr, and Tim Brecht. Our troubles with linux and why you should care. In APSys '11 Asia Pacific Workshop on Systems, Shanghai, China, July 11-12, 2011, page 2. ACM, 2011. [ DOI | http ]
[43] Martin Karsten. FIFO service with differentiated queueing. In 2011 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), Brooklyn, NY, USA, October 3-4, 2011, pages 122--133. IEEE Computer Society, 2011. [ DOI | http ]

2010

[1] Hanan Saleet, Otman Basir, Rami Langar, and Raouf Boutaba. Region-based location-service-management protocol for vanets. IEEE Trans. Veh. Technol., 59(2):917--931, 2010. [ DOI | http ]
[2] Noura Limam and Raouf Boutaba. Assessing software service quality and trustworthiness at selection time. IEEE Trans. Software Eng., 36(4):559--574, 2010. [ DOI | http ]
[3] Martin Karsten. Approximation of generalized processor sharing with interleaved stratified timer wheels. IEEE/ACM Trans. Netw., 18(3):708--721, 2010. [ DOI | http ]
[4] Nizar Bouabdallah, Rami Langar, and Raouf Boutaba. Design and analysis of mobility-aware clustering algorithms for wireless mesh networks. IEEE/ACM Trans. Netw., 18(6):1677--1690, 2010. [ DOI | http ]
[5] Ahmed A. Soror, Umar Farooq Minhas, Ashraf Aboulnaga, Kenneth Salem, Peter Kokosielis, and Sunil Kamath. Automatic virtual machine configuration for database workloads. ACM Trans. Database Syst., 35(1):7:1--7:47, 2010. [ DOI | http ]
[6] Raouf Boutaba. Farewell message. IEEE Trans. Netw. Serv. Manag., 7(4):200--203, 2010. [ DOI | http ]
[7] Samer Al-Kiswany, Abdullah Gharaibeh, and Matei Ripeanu. The case for a versatile storage system. ACM SIGOPS Oper. Syst. Rev., 44(1):10--14, 2010. [ DOI | http ]
[8] Patrick Kling, M. Tamer Özsu, and Khuzaima Daudjee. Generating efficient execution plans for vertically partitioned XML databases. Proc. VLDB Endow., 4(1):1--11, 2010. [ DOI | .pdf ]
[9] Qiang Wang, Khuzaima Daudjee, and M. Tamer Özsu. Popularity-aware prefetch in P2P range caching. Peer-to-Peer Netw. Appl., 3(2):145--160, 2010. [ DOI | http ]
[10] Raouf Boutaba, Jean-Philippe Martin-Flatin, Joseph L. Hellerstein, Randy H. Katz, George Pavlou, and Chin-Tau Lea. Recent advances in autonomic communications [guest editorial]. IEEE J. Sel. Areas Commun., 28(1):1--3, 2010. [ DOI | http ]
[11] Qi Zhang, Lu Cheng, and Raouf Boutaba. Cloud computing: state-of-the-art and research challenges. J. Internet Serv. Appl., 1(1):7--18, 2010. [ DOI | http ]
[12] Abdullah Gharaibeh, Samer Al-Kiswany, and Matei Ripeanu. Crystalgpu: Transparent and efficient utilization of GPU power. CoRR, abs/1005.1695, 2010. [ arXiv | http ]
[13] Quanyan Zhu, Carol J. Fung, Raouf Boutaba, and Tamer Basar. A distributed sequential algorithm for collaborative intrusion detection networks. CoRR, abs/1002.3190, 2010. [ arXiv | http ]
[14] N. M. Mosharaf Kabir Chowdhury and Raouf Boutaba. A survey of network virtualization. Comput. Networks, 54(5):862--876, 2010. [ DOI | http ]
[15] Raouf Boutaba, Seán Murphy, and Albert Banchs. Special issue on "wireless multi-hop networking for infrastructure access". Comput. Networks, 54(2):175--177, 2010. [ DOI | http ]
[16] Phillipa Gill, Yashar Ganjali, Bernard Wong, and David Lie. Dude, where's that ip? circumventing measurement-based IP geolocation. In 19th USENIX Security Symposium, Washington, DC, USA, August 11-13, 2010, Proceedings, pages 241--256. USENIX Association, 2010. [ .pdf ]
[17] Oguzhan Ozmen, Kenneth Salem, Jiri Schindler, and Steve Daniel. Workload-aware storage layout for database systems. In Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2010, Indianapolis, Indiana, USA, June 6-10, 2010, pages 939--950. ACM, 2010. [ DOI | http ]
[18] Srinivasan Keshav and Catherine Rosenberg. How internet concepts and technologies can help green and smarten the electrical grid. In Proceedings of the 1st ACM SIGCOMM Workshop on Green Networking 2010, New Delhi, India, August 30, 2010, pages 35--40. ACM, 2010. [ DOI | http ]
[19] Mosharaf Chowdhury, Fady Samuel, and Raouf Boutaba. Polyvine: policy-based virtual network embedding across multiple domains. In Proceedings of the Second ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architectures, VISA '10, New Delhi, India, September 3, 2010, pages 49--56. ACM, 2010. [ DOI | http ]
[20] Srinivasan Keshav. Design principles for robust opportunistic communication. In Proceedings of the 4th ACM Workshop on Networked Systems for Developing Regions, NSDR '10, San Francisco, CA, USA, June 15, 2010, page 6. ACM, 2010. [ DOI | http ]
[21] Fida-E. Zaheer, Jin Xiao, and Raouf Boutaba. Multi-provider service negotiation and contracting in network virtualization. In IEEE/IFIP Network Operations and Management Symposium, NOMS 2010, 19-23 April 2010, Osaka, Japan, pages 471--478. IEEE, 2010. [ DOI | http ]
[22] Javier Rubio-Loyola, Marinos Charalambides, Issam Aib, Joan Serrat, George Pavlou, and Raouf Boutaba. Business-driven management of differentiated services. In IEEE/IFIP Network Operations and Management Symposium, NOMS 2010, 19-23 April 2010, Osaka, Japan, pages 240--247. IEEE, 2010. [ DOI | http ]
[23] Carol J. Fung, Quanyan Zhu, Raouf Boutaba, and Tamer Basar. Bayesian decision aggregation in collaborative intrusion detection networks. In IEEE/IFIP Network Operations and Management Symposium, NOMS 2010, 19-23 April 2010, Osaka, Japan, pages 349--356. IEEE, 2010. [ DOI | http ]
[24] Qi Zhang, Jin Xiao, Eren Gürses, Martin Karsten, and Raouf Boutaba. Dynamic service placement in shared service hosting infrastructures. In NETWORKING 2010, 9th International IFIP TC 6 Networking Conference, Chennai, India, May 11-15, 2010. Proceedings, volume 6091 of Lecture Notes in Computer Science, pages 251--264. Springer, 2010. [ DOI | http ]
[25] Muntasir Raihan Rahman, Issam Aib, and Raouf Boutaba. Survivable virtual network embedding. In NETWORKING 2010, 9th International IFIP TC 6 Networking Conference, Chennai, India, May 11-15, 2010. Proceedings, volume 6091 of Lecture Notes in Computer Science, pages 40--52. Springer, 2010. [ DOI | http ]
[26] Nabeel Farooq Butt, N. M. Mosharaf Kabir Chowdhury, and Raouf Boutaba. Topology-awareness and reoptimization mechanism for virtual network embedding. In NETWORKING 2010, 9th International IFIP TC 6 Networking Conference, Chennai, India, May 11-15, 2010. Proceedings, volume 6091 of Lecture Notes in Computer Science, pages 27--39. Springer, 2010. [ DOI | http ]
[27] Alaeddine Abdallah Djamal, Djamal-Eddine Meddour, Toufik Ahmed, and Raouf Boutaba. Cross layer optimization architecture for video streaming in WIMAX networks. In Proceedings of the 15th IEEE Symposium on Computers and Communications, ISCC 2010, Riccione, Italy, June 22-25, 2010, pages 8--13. IEEE Computer Society, 2010. [ DOI | http ]
[28] Omid Salehi-Abari and Calvin Plett. A differential 5^th derivative gaussian pulse generator for UWB transceivers. In International Symposium on Circuits and Systems (ISCAS 2010), May 30 - June 2, 2010, Paris, France, pages 1089--1092. IEEE, 2010. [ DOI | http ]
[29] Ryan S. Peterson, Bernard Wong, and Emin Gün Sirer. Blindfold: a system to "see no evil" in content discovery. In Proceedings of the 9th international conference on Peer-to-peer systems, IPTPS'10, San Jose, CA, USA, April 27, 2010, page 1. USENIX, 2010. [ .pdf ]
[30] Lu Cheng, Xuesong Qiu, Luoming Meng, Yan Qiao, and Raouf Boutaba. Efficient active probing for fault diagnosis in large scale and noisy networks. In INFOCOM 2010. 29th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 15-19 March 2010, San Diego, CA, USA, pages 2169--2177. IEEE, 2010. [ DOI | http ]
[31] Loubna Mekouar, Youssef Iraqi, and Raouf Boutaba. Incorporating trust in network virtualization. In 10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010, pages 942--947. IEEE Computer Society, 2010. [ DOI | http ]
[32] Loubna Mekouar, Youssef Iraqi, and Raouf Boutaba. Impact of peers' similarity on recommendations in P2P systems. In 10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010, pages 393--399. IEEE Computer Society, 2010. [ DOI | http ]
[33] Sean Tozer, Tim Brecht, and Ashraf Aboulnaga. Q-cop: Avoiding bad query mixes to minimize client timeouts under heavy loads. In Proceedings of the 26th International Conference on Data Engineering, ICDE 2010, March 1-6, 2010, Long Beach, California, USA, pages 397--408. IEEE Computer Society, 2010. [ DOI | http ]
[34] Mohammed Abouzour, Kenneth Salem, and Peter Bumbulis. Automatic tuning of the multiprogramming level in sybase SQL anywhere. In Workshops Proceedings of the 26th International Conference on Data Engineering, ICDE 2010, March 1-6, 2010, Long Beach, California, USA, pages 99--104. IEEE Computer Society, 2010. [ DOI | http ]
[35] Maxwell Young, Aniket Kate, Ian Goldberg, and Martin Karsten. Practical robust communication in dhts tolerating a byzantine adversary. In 2010 International Conference on Distributed Computing Systems, ICDCS 2010, Genova, Italy, June 21-25, 2010, pages 263--272. IEEE Computer Society, 2010. [ DOI | http ]
[36] Quanyan Zhu, Carol J. Fung, Raouf Boutaba, and Tamer Basar. A distributed sequential algorithm for collaborative intrusion detection networks. In Proceedings of IEEE International Conference on Communications, ICC 2010, Cape Town, South Africa, 23-27 May 2010, pages 1--6. IEEE, 2010. [ DOI | http ]
[37] Djamal-Eddine Meddour, Abdesselem Kortebi, and Raouf Boutaba. Mesh-based broadband home network solution: Setup and experiments. In Proceedings of IEEE International Conference on Communications, ICC 2010, Cape Town, South Africa, 23-27 May 2010, pages 1--5. IEEE, 2010. [ DOI | http ]
[38] Rami Langar, Nizar Bouabdallah, Raouf Boutaba, and Guy Pujolle. Interferer link-aware routing in wireless mesh networks. In Proceedings of IEEE International Conference on Communications, ICC 2010, Cape Town, South Africa, 23-27 May 2010, pages 1--6. IEEE, 2010. [ DOI | http ]
[39] Abdullah Gharaibeh, Samer Al-Kiswany, Sathish Gopalakrishnan, and Matei Ripeanu. A GPU accelerated storage system. In Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing, HPDC 2010, Chicago, Illinois, USA, June 21-25, 2010, pages 167--178. ACM, 2010. [ DOI | http ]
[40] Hanan Saleet, Rami Langar, Sagar Naik, Raouf Boutaba, Amiya Nayak, and Nishith Goel. Qos support in delay tolerant vehicular ad hoc networks. In Proceedings of the Global Communications Conference, 2010. GLOBECOM 2010, 6-10 December 2010, Miami, Florida, USA, pages 1--6. IEEE, 2010. [ DOI | http ]
[41] Rami Langar, Salsabil Njima, Nizar Bouabdallah, Raouf Boutaba, and Guy Pujolle. Towards efficient use of radio resources in single channel wireless mesh networks. In Proceedings of the Global Communications Conference, 2010. GLOBECOM 2010, 6-10 December 2010, Miami, Florida, USA, pages 1--6. IEEE, 2010. [ DOI | http ]
[42] Andrew R. Curtis, Srinivasan Keshav, and Alejandro López-Ortiz. LEGUP: using heterogeneity to reduce the cost of data center network upgrades. In Proceedings of the 2010 ACM Conference on Emerging Networking Experiments and Technology, CoNEXT 2010, Philadelphia, PA, USA, November 30 - December 03, 2010, page 14. ACM, 2010. [ DOI | http ]
[43] Jin Xiao, Jae Yoon Chung, Jian Li, Raouf Boutaba, and James Won-Ki Hong. Near optimal demand-side energy management under real-time demand-response pricing. In Proceedings of the 6th International Conference on Network and Service Management, CNSM 2010, Niagara Falls, Canada, October 25-29, 2010, pages 527--532. IEEE, 2010. [ DOI | http ]
[44] Carol J. Fung, Jie Zhang, and Raouf Boutaba. Effective acquaintance management for collaborative intrusion detection networks. In Proceedings of the 6th International Conference on Network and Service Management, CNSM 2010, Niagara Falls, Canada, October 25-29, 2010, pages 158--165. IEEE, 2010. [ DOI | http ]
[45] Sergey Savinov and Khuzaima Daudjee. Dynamic database replica provisioning through virtualization. In Proceedings of the Second International CIKM Workshop on Cloud Data Management, CloudDB 2010, Toronto, Ontario, Canada, October 30, 2010, pages 41--46. ACM, 2010. [ DOI | http ]

2009

[1] Brent Ishibashi and Raouf Boutaba. The symbiosis of cognitive radio and wireless mesh networks. In Guide to Wireless Mesh Networks, Computer Communications and Networks, pages 471--496. Springer, 2009. [ DOI | http ]
[2] Kenneth Salem. Sagas. In Encyclopedia of Database Systems, pages 2466--2467. Springer US, 2009. [ DOI | http ]
[3] Djamal-Eddine Meddour, Usman Javaid, Nicolas Bihannic, Tinku Rasheed, and Raouf Boutaba. Completing the convergence puzzle: a survey and a roadmap. IEEE Wirel. Commun., 16(3):86--96, 2009. [ DOI | http ]
[4] Rami Langar, Nizar Bouabdallah, Raouf Boutaba, and Bruno Sericola. Proposal and analysis of adaptive mobility management in ip-based mobile networks. IEEE Trans. Wirel. Commun., 8(7):3608--3619, 2009. [ DOI | http ]
[5] Fatma Bouabdallah, Nizar Bouabdallah, and Raouf Boutaba. On balancing energy consumption in wireless sensor networks. IEEE Trans. Veh. Technol., 58(6):2909--2924, 2009. [ DOI | http ]
[6] Reaz Ahmed and Raouf Boutaba. Plexus: a scalable peer-to-peer protocol enabling efficient subset search. IEEE/ACM Trans. Netw., 17(1):130--143, 2009. [ DOI | http ]
[7] Mohammad Hossein Falaki and Srinivasan Keshav. Trace-based analysis of wi-fi scanning strategies. ACM SIGMOBILE Mob. Comput. Commun. Rev., 13(1):73--76, 2009. [ DOI | http ]
[8] Nabeel Ahmed, Usman Ismail, Srinivasan Keshav, and Konstantina Papagiannaki. Poster abstract: measuring multi-parameter conflict graphs for 802.11 networks. ACM SIGMOBILE Mob. Comput. Commun. Rev., 13(3):54--57, 2009. [ DOI | http ]
[9] Loubna Mekouar, Youssef Iraqi, and Raouf Boutaba. A contribution-based service differentiation scheme for peer-to-peer systems. Peer-to-Peer Netw. Appl., 2(2):146--163, 2009. [ DOI | http ]
[10] Sonia Waharte, Brent Ishibashi, Raouf Boutaba, and Djamal-Eddine Meddour. Design and performance evaluation of IAR: interference-aware routing metric for wireless mesh networks. Mob. Networks Appl., 14(5):649--660, 2009. [ DOI | http ]
[11] Samer Al-Kiswany, Matei Ripeanu, Adriana Iamnitchi, and Sudharshan Vazhkudai. Beyond music sharing: An evaluation of peer-to-peer data dissemination techniques in large scientific collaborations. J. Grid Comput., 7(1):91--114, 2009. [ DOI | http ]
[12] Ashraf Aboulnaga, Kenneth Salem, Ahmed A. Soror, Umar Farooq Minhas, Peter Kokosielis, and Sunil Kamath. Deploying database appliances in the cloud. IEEE Data Eng. Bull., 32(1):13--20, 2009. [ .pdf ]
[13] Ashraf Aboulnaga and Kenneth Salem. Report: 4th int'l workshop on self-managing database systems (SMDB 2009). IEEE Data Eng. Bull., 32(4):2--5, 2009. [ .pdf ]
[14] Rami Langar, Nizar Bouabdallah, and Raouf Boutaba. Mobility-aware clustering algorithms with interference constraints in wireless mesh networks. Comput. Networks, 53(1):25--44, 2009. [ DOI | http ]
[15] N. M. Mosharaf Kabir Chowdhury and Raouf Boutaba. Network virtualization: state of the art and research challenges. IEEE Commun. Mag., 47(7):20--26, 2009. [ DOI | http ]
[16] Samer Al-Kiswany, Abdullah Gharaibeh, Elizeu Santos-Neto, and Matei Ripeanu. On gpu's viability as a middleware accelerator. Clust. Comput., 12(2):123--140, 2009. [ DOI | http ]
[17] Jon Crowcroft, Srinivasan Keshav, and Nick McKeown. Viewpoint: Scaling the academic publication process to internet scale. Commun. ACM, 52(1):27--30, 2009. [ DOI | http ]
[18] Raouf Boutaba, Martin Karsten, and Maxwell Young. A heuristic for fair correlation-aware resource placement. In Experimental Algorithms, 8th International Symposium, SEA 2009, Dortmund, Germany, June 4-6, 2009. Proceedings, volume 5526 of Lecture Notes in Computer Science, pages 89--100. Springer, 2009. [ DOI | http ]
[19] Md. Rakibul Haque, Reaz Ahmed, and Raouf Boutaba. QPM: phonetic aware P2P searching. In Proceedings P2P 2009, Ninth International Conference on Peer-to-Peer Computing, 9-11 September 2009, Seattle, Washington, USA, pages 131--134. IEEE, 2009. [ DOI | http ]
[20] Kevin J. Henry, Colleen Swanson, Qi Xie, and Khuzaima Daudjee. Efficient hierarchical quorums in unstructured peer-to-peer networks. In On the Move to Meaningful Internet Systems: OTM 2009, Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part I, volume 5870 of Lecture Notes in Computer Science, pages 183--200. Springer, 2009. [ DOI | http ]
[21] Vivek Shrivastava, Nabeel Ahmed, Shravan K. Rayanchu, Suman Banerjee, Srinivasan Keshav, Konstantina Papagiannaki, and Arunesh Mishra. CENTAUR: realizing the full potential of centralized wlans through a hybrid data path. In Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, MOBICOM 2009, Beijing, China, September 20-25, 2009, pages 297--308. ACM, 2009. [ DOI | http ]
[22] Lauro B. Costa, Samer Al-Kiswany, and Matei Ripeanu. GPU support for batch oriented workloads. In 28th International Performance Computing and Communications Conference, IPCCC 2009, 14-16 December 2009, Phoenix, Arizona, USA, pages 231--238. IEEE Computer Society, 2009. [ DOI | http ]
[23] Adel El-Atawy, Ehab Al-Shaer, Tung Tran, and Raouf Boutaba. Adaptive early packet filtering for defending firewalls against dos attacks. In INFOCOM 2009. 28th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 19-25 April 2009, Rio de Janeiro, Brazil, pages 2437--2445. IEEE, 2009. [ DOI | http ]
[24] N. M. Mosharaf Kabir Chowdhury, Muntasir Raihan Rahman, and Raouf Boutaba. Virtual network embedding with coordinated node and link mapping. In INFOCOM 2009. 28th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 19-25 April 2009, Rio de Janeiro, Brazil, pages 783--791. IEEE, 2009. [ DOI | http ]
[25] Carol J. Fung, Jie Zhang, Issam Aib, and Raouf Boutaba. Robust and scalable trust management for collaborative intrusion detection. In Integrated Network Management, IM 2009. 11th IFIP/IEEE International Symposium on Integrated Network Management, Hofstra University, Long Island, NY, USA, June 1-5, 2009, pages 33--40. IEEE, 2009. [ DOI | http ]
[26] N. M. Mosharaf Kabir Chowdhury, Fida-E. Zaheer, and Raouf Boutaba. imark: An identity management framework for network virtualization environment. In Integrated Network Management, IM 2009. 11th IFIP/IEEE International Symposium on Integrated Network Management, Hofstra University, Long Island, NY, USA, June 1-5, 2009, pages 335--342. IEEE, 2009. [ DOI | http ]
[27] Bernard Wong and Mahwish Bhatti. The influence of team relationships on software quality. In 2009 ICSE Workshop on Software Quality, WoSQ@ICSE 2009, Vancouver, BC, Canada, May 16, 2009, pages 1--8. IEEE Computer Society, 2009. [ DOI | http ]
[28] Barry W. Boehm, Sunita Chulani, June M. Verner, and Bernard Wong. Seventh workshop on software quality. In 31st International Conference on Software Engineering, ICSE 2009, May 16-24, 2009, Vancouver, Canada, Companion Volume, pages 449--450. IEEE, 2009. [ DOI | http ]
[29] Huaxin Zhang, Ihab F. Ilyas, and Kenneth Salem. PSALM: cardinality estimation inthe presence of fine-grained access controls. In Proceedings of the 25th International Conference on Data Engineering, ICDE 2009, March 29 2009 - April 2 2009, Shanghai, China, pages 505--516. IEEE Computer Society, 2009. [ DOI | http ]
[30] Issam Aib, Tung Tran, and Raouf Boutaba. Characterization and solution to a stateful IDS evasion. In 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 22-26 June 2009, Montreal, Québec, Canada, pages 597--604. IEEE Computer Society, 2009. [ DOI | http ]
[31] Sonia Waharte, Raouf Boutaba, and Pascal Anelli. Impact of gateways placement on clustering algorithms in wireless mesh networks. In Proceedings of IEEE International Conference on Communications, ICC 2009, Dresden, Germany, 14-18 June 2009, pages 1--5. IEEE, 2009. [ DOI | http ]
[32] Hanan Saleet, Rami Langar, Otman Basir, and Raouf Boutaba. A distributed approach for location lookup in vehicular ad hoc networks. In Proceedings of IEEE International Conference on Communications, ICC 2009, Dresden, Germany, 14-18 June 2009, pages 1--6. IEEE, 2009. [ DOI | http ]
[33] Eren Gürses, Jin Xiao, and Raouf Boutaba. Service engineering for inter-domain overlay networks. In Proceedings of IEEE International Conference on Communications, ICC 2009, Dresden, Germany, 14-18 June 2009, pages 1--5. IEEE, 2009. [ DOI | http ]
[34] Eren Gürses, Yuan Lin, and Raouf Boutaba. Distributed quality-lifetime maximization in wireless video sensor networks. In Proceedings of IEEE International Conference on Communications, ICC 2009, Dresden, Germany, 14-18 June 2009, pages 1--6. IEEE, 2009. [ DOI | http ]
[35] Fatma Bouabdallah, Nizar Bouabdallah, and Raouf Boutaba. Cross-layer design for energy conservation in wireless sensor networks. In Proceedings of IEEE International Conference on Communications, ICC 2009, Dresden, Germany, 14-18 June 2009, pages 1--6. IEEE, 2009. [ DOI | http ]
[36] Khalid Alsubhi, Issam Aib, Jérôme François, and Raouf Boutaba. Policy-based security configuration management, application to intrusion detection and prevention. In Proceedings of IEEE International Conference on Communications, ICC 2009, Dresden, Germany, 14-18 June 2009, pages 1--6. IEEE, 2009. [ DOI | http ]
[37] Hanan Saleet, Rami Langar, Otman Basir, and Raouf Boutaba. Adaptive message routing with qos support in vehicular ad hoc networks. In Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009, pages 1--6. IEEE, 2009. [ DOI | http ]
[38] Eren Gürses and Raouf Boutaba. Capacity of wireless multi-hop networks using physical carrier sense and transmit power control. In Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009, pages 1--6. IEEE, 2009. [ DOI | http ]
[39] Quanyan Zhu, Carol J. Fung, Raouf Boutaba, and Tamer Basar. A game-theoretical approach to incentive design in collaborative intrusion detection networks. In 1st International Conference on Game Theory for Networks, GAMENETS 2009, Istanbul, Turkey, May 13-15, 2009, pages 384--392. IEEE, 2009. [ DOI | http ]
[40] Xin Liu, Ashraf Aboulnaga, Kenneth Salem, and Xuhui Li. CLIC: client-informed caching for storage servers. In 7th USENIX Conference on File and Storage Technologies, February 24-27, 2009, San Francisco, CA, USA. Proceedings, pages 297--310. USENIX, 2009. [ .pdf ]
[41] Raouf Boutaba, Jin Xiao, and Qi Zhang. Toward autonomic networks: Knowledge management and self-stabilization. In Autonomic Computing and Networking, pages 239--260. Springer, 2009. [ DOI | http ]

2008

[1] Michael Kwok and Johnny W. Wong. Scalability analysis of the hierarchical architecture for distributed virtual environments. IEEE Trans. Parallel Distributed Syst., 19(3):408--417, 2008. [ DOI | http ]
[2] Rami Langar, Nizar Bouabdallah, and Raouf Boutaba. A comprehensive analysis of mobility management in mpls-based wireless access networks. IEEE/ACM Trans. Netw., 16(4):918--931, 2008. [ DOI | http ]
[3] Yongning Tang, Ehab Al-Shaer, and Raouf Boutaba. Efficient fault diagnosis using incremental alarm correlation and active investigation for internet and overlay networks. IEEE Trans. Netw. Serv. Manag., 5(1):36--49, 2008. [ DOI | http ]
[4] Ismail Djama, Toufik Ahmed, Abdelhamid Nafaa, and Raouf Boutaba. Meet in the middle cross-layer adaptation for audiovisual content delivery. IEEE Trans. Multim., 10(1):105--120, 2008. [ DOI | http ]
[5] Fatma Bouabdallah, Nizar Bouabdallah, and Raouf Boutaba. Toward reliable and efficient reporting in wireless sensor networks. IEEE Trans. Mob. Comput., 7(8):978--994, 2008. [ DOI | http ]
[6] Wojciech M. Golab and Raouf Boutaba. Path selection in user-controlled circuit-switched optical networks. Opt. Switch. Netw., 5(2-3):123--138, 2008. [ DOI | http ]
[7] Raouf Boutaba, Marcus Brunner, Stefan Schmid, and Lisandro Zambenedetti Granville. Report of the 2nd workshop on autonomic communications and network management (ACNM 2008). J. Netw. Syst. Manag., 16(3):323--324, 2008. [ DOI | http ]
[8] Anastassia Ailamaki, Shivnath Babu, Pedro Furtado, Sam Lightstone, Guy M. Lohman, Patrick Martin, Vivek R. Narasayya, Glenn Pauley, Kenneth Salem, Kai-Uwe Sattler, and Gerhard Weikum. Report: 3rd int'l workshop on self-managing database systems (SMDB 2008). IEEE Data Eng. Bull., 31(4):2--5, 2008. [ .pdf ]
[9] Matei A. Zaharia and Srinivasan Keshav. Gossip-based search selection in hybrid peer-to-peer networks. Concurr. Comput. Pract. Exp., 20(2):139--153, 2008. [ DOI | http ]
[10] Willem van Heiningen, Steve MacDonald, and Tim Brecht. Babylon: middleware for distributed, parallel, and mobile java applications. Concurr. Comput. Pract. Exp., 20(10):1195--1224, 2008. [ DOI | http ]
[11] Yanni Ellen Liu and Johnny W. Wong. Deadline-based scheduling in support of real-time data delivery. Comput. Networks, 52(3):514--530, 2008. [ DOI | http ]
[12] Sonia Waharte, Jin Xiao, and Raouf Boutaba. Sensor-based architecture for qos provisioning and fast handoff management in wlans. Ann. des Télécommunications, 63(3-4):137--148, 2008. [ DOI | http ]
[13] Loubna Mekouar, Youssef Iraqi, and Raouf Boutaba. Personalized recommendations in peer-to-peer systems. In 17th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, WETICE 2008, Rome, Italy, June 23-25, 2008, Proceedings, pages 99--104. IEEE Computer Society, 2008. [ DOI | http ]
[14] Fatma Bouabdallah, Nizar Bouabdallah, and Raouf Boutaba. The relationship between sensor networks performance and the number of reporting nodes. In WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008 - April 3 2008, Las Vegas, Nevada, USA, Conference Proceedings, pages 2361--2366. IEEE, 2008. [ DOI | http ]
[15] Abdullah Gharaibeh, Samer Al-Kiswany, and Matei Ripeanu. Configurable security for scavenged storage systems. In Proceedings of the 2008 ACM Workshop On Storage Security And Survivability, StorageSS 2008, Alexandria, VA, USA, October 31, 2008, pages 55--62. ACM, 2008. [ DOI | http ]
[16] Ahmed A. Soror, Umar Farooq Minhas, Ashraf Aboulnaga, Kenneth Salem, Peter Kokosielis, and Sunil Kamath. Automatic virtual machine configuration for database workloads. In Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2008, Vancouver, BC, Canada, June 10-12, 2008, pages 953--966. ACM, 2008. [ DOI | http ]
[17] Anh Le, Raouf Boutaba, and Ehab Al-Shaer. Correlation-based load balancing for network intrusion detection and prevention systems. In 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, page 2. ACM, 2008. [ DOI | http ]
[18] Loubna Mekouar, Youssef Iraqi, and Raouf Boutaba. A recommender scheme for peer-to-peer systems. In Proceedings of the 2008 International Symposium on Applications and the Internet, SAINT 2008, 28 July - 1 August 2008, Turku, Finland, pages 197--200. IEEE Computer Society, 2008. [ DOI | http ]
[19] Qiang Wang, Khuzaima Daudjee, and M. Tamer Özsu. Popularity-aware prefetch in P2P range caching. In Proceedings P2P'08, Eighth International Conference on Peer-to-Peer Computing, 8-11 September 2008, Aachen, Germany, pages 53--62. IEEE Computer Society, 2008. [ DOI | http ]
[20] Sumair Ur Rahman, Urs Hengartner, Usman Ismail, and Srinivasan Keshav. Practical security for rural internet kiosks. In Proceedings of the second ACM SIGCOMM workshop on Networked systems for developing regions, NSDR '08, Seattle, WA, USA, August 18, 2008, pages 13--18. ACM, 2008. [ DOI | http ]
[21] Jon Crowcroft, Srinivasan Keshav, and Nick McKeown. Scaling internet research publication processes to internet scale. In Workshop on Organizing Workshops, Conferences, and Symposia for Computer Systems, WOWCS'08, San Francisco, CA, USA, April 15, 2008, Proceedings. USENIX Association, 2008. [ .pdf ]
[22] Elad Lahav, Martin Karsten, Tim Brecht, Weihan Wang, and Tony Zhao. Group unicast for the real world. In Network and Operating System Support for Digital Audio and Video, 18th International Workshop, NOSSDAV 2008, Braunschweig, Germany, May 28-30, 2008, Proceedings, pages 27--32. ACM, 2008. [ DOI | http ]
[23] Noura Limam and Raouf Boutaba. Qos and reputation-aware service selection. In IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, NOMS 2008, 7-11 April 2008, Salvador, Bahia, Brazil, pages 403--410. IEEE, 2008. [ DOI | http ]
[24] Raouf Boutaba, Jin Xiao, and Issam Aib. Cyberplanner: A comprehensive toolkit for network service providers. In IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, NOMS 2008, 7-11 April 2008, Salvador, Bahia, Brazil, pages 379--386. IEEE, 2008. [ DOI | http ]
[25] Raouf Boutaba. Peer-to-peer networking: State of the art and research challenges. In IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, NOMS 2008, 7-11 April 2008, Salvador, Bahia, Brazil. IEEE, 2008. [ DOI | http ]
[26] Khalid Alsubhi, Ehab Al-Shaer, and Raouf Boutaba. Alert prioritization in intrusion detection systems. In IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, NOMS 2008, 7-11 April 2008, Salvador, Bahia, Brazil, pages 33--40. IEEE, 2008. [ DOI | http ]
[27] Sonia Waharte and Raouf Boutaba. On the probability of finding non-interfering paths in wireless multihop networks. In NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet , 7th International IFIP-TC6 Networking Conference, Singapore, May 5-9, 2008, Proceedings, volume 4982 of Lecture Notes in Computer Science, pages 914--921. Springer, 2008. [ DOI | http ]
[28] Earl A. Oliver and Srinivasan Keshav. Design principles for opportunistic communication in constrained computing environments. In Proceedings of the 2008 ACM Workshop on Wireless Networks and Systems for Developing Regions, San Francisco, California, USA, September 19, 2007, pages 31--36. ACM, 2008. [ DOI | http ]
[29] Raouf Boutaba. Distributed search revisited: Resolving the conflict of flexibility and efficiency. In LCN 2008, The 33rd IEEE Conference on Local Computer Networks, The Conference on Leading Edge and Practical Computer Networking, Hyatt Regency Montreal, Montreal, Quebec, Canada, 14-17 October 2008, Proceedings, pages 9--10. IEEE Computer Society, 2008. [ DOI | http ]
[30] Raouf Boutaba. Distributed pattern matching: Concept and applications in internet-scale networks. In Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), July 6-9, Marrakech, Morocco. IEEE Computer Society, 2008. [ DOI | http ]
[31] Bernard Wong and Saikat Guha. Quasar: a probabilistic publish-subscribe system for social networks. In Proceedings of the 7th international conference on Peer-to-peer systems, IPTPS'08, Tampa, FL, USA, February 25-26, 2008, page 2. USENIX, 2008. [ .pdf ]
[32] Brent Ishibashi, Nizar Bouabdallah, and Raouf Boutaba. Qos performance analysis of cognitive radio-based virtual wireless networks. In INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, USA, pages 2423--2431. IEEE, 2008. [ DOI | http ]
[33] Bernard Wong and Sazzad Hasan. Cultural influences and differences in software process improvement programs. In Proceedings of the 6th international workshop on Software quality, WoSQ@ICSE 2008, Leipzig, Germany, May 10, 2008, pages 3--10. ACM, 2008. [ DOI | http ]
[34] Barry W. Boehm, Sunita Chulani, June M. Verner, and Bernard Wong. Sixth workshop on software quality. In 30th International Conference on Software Engineering (ICSE 2008), Leipzig, Germany, May 10-18, 2008, Companion Volume, pages 1035--1036. ACM, 2008. [ DOI | http ]
[35] Hannes Voigt, Wolfgang Lehner, and Kenneth Salem. Poster session: Constrained dynamic physical database design. In Proceedings of the 24th International Conference on Data Engineering Workshops, ICDE 2008, April 7-12, 2008, Cancún, Mexico, pages 63--70. IEEE Computer Society, 2008. [ DOI | http ]
[36] Umar Farooq Minhas, Jitendra Yadav, Ashraf Aboulnaga, and Kenneth Salem. Database systems on virtual machines: How much do you lose? In Proceedings of the 24th International Conference on Data Engineering Workshops, ICDE 2008, April 7-12, 2008, Cancún, Mexico, pages 35--41. IEEE Computer Society, 2008. [ DOI | http ]
[37] Samer Al-Kiswany, Matei Ripeanu, Sudharshan S. Vazhkudai, and Abdullah Gharaibeh. stdchk: A checkpoint storage system for desktop grid computing. In 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 17-20 June 2008, Beijing, China, pages 613--624. IEEE Computer Society, 2008. [ DOI | http ]
[38] Sonia Waharte, Brent Ishibashi, Raouf Boutaba, and Djamal-Eddine Meddour. Interference-aware routing metric for improved load balancing in wireless mesh networks. In Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pages 2979--2983. IEEE, 2008. [ DOI | http ]
[39] Fatma Bouabdallah, Nizar Bouabdallah, and Raouf Boutaba. Energy conservation in reliable wireless sensor networks. In Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pages 2404--2408. IEEE, 2008. [ DOI | http ]
[40] Elizeu Santos-Neto, Samer Al-Kiswany, Nazareno Andrade, Sathish Gopalakrishnan, and Matei Ripeanu. enabling cross-layer optimizations in storage systems with custom metadata. In Proceedings of the 17th International Symposium on High-Performance Distributed Computing (HPDC-17 2008), 23-27 June 2008, Boston, MA, USA, pages 213--216. ACM, 2008. [ DOI | http ]
[41] Samer Al-Kiswany, Abdullah Gharaibeh, Elizeu Santos-Neto, George Yuan, and Matei Ripeanu. Storegpu: exploiting graphics processing units to accelerate distributed storage systems. In Proceedings of the 17th International Symposium on High-Performance Distributed Computing (HPDC-17 2008), 23-27 June 2008, Boston, MA, USA, pages 165--174. ACM, 2008. [ DOI | http ]
[42] Quanyan Zhu and Raouf Boutaba. Nonlinear quadratic pricing for concavifiable utilities in network rate control. In Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November - 4 December 2008, pages 1593--1598. IEEE, 2008. [ DOI | http ]
[43] Hanan Saleet, Rami Langar, Otman Basir, and Raouf Boutaba. Proposal and analysis of region-based location service management protocol for vanets. In Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November - 4 December 2008, pages 491--496. IEEE, 2008. [ DOI | http ]
[44] Fatma Bouabdallah, Nizar Bouabdallah, and Raouf Boutaba. Load-balanced routing scheme for energy-efficient wireless sensor networks. In Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November - 4 December 2008, pages 67--72. IEEE, 2008. [ DOI | http ]
[45] Ashraf Aboulnaga, Cristiana Amza, and Kenneth Salem. Virtualization and databases: state of the art and research challenges. In EDBT 2008, 11th International Conference on Extending Database Technology, Nantes, France, March 25-29, 2008, Proceedings, volume 261 of ACM International Conference Proceeding Series, pages 746--747. ACM, 2008. [ DOI | http ]
[46] Carol J. Fung, Olga Baysal, Jie Zhang, Issam Aib, and Raouf Boutaba. Trust management for host-based collaborative intrusion detection. In Managing Large-Scale Service Deployment, 19th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedings, volume 5273 of Lecture Notes in Computer Science, pages 109--122. Springer, 2008. [ DOI | http ]
[47] Nabeel Ahmed, Usman Ismail, Srinivasan Keshav, and Konstantina Papagiannaki. Online estimation of RF interference. In Proceedings of the 2008 ACM Conference on Emerging Network Experiment and Technology, CoNEXT 2008, Madrid, Spain, December 9-12, 2008, page 4. ACM, 2008. [ DOI | http ]
[48] Sonia Waharte, Brent Ishibashi, Raouf Boutaba, and Djamal-Eddine Meddour. Performance study of wireless mesh networks routing metrics. In The 6th ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2008, Doha, Qatar, March 31 - April 4, 2008, pages 1100--1106. IEEE Computer Society, 2008. [ DOI | http ]
[49] Fatma Bouabdallah, Nizar Bouabdallah, and Raouf Boutaba. Analysis of the latency-lifetime tradeoff in wireless sensor networks. In The 6th ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2008, Doha, Qatar, March 31 - April 4, 2008, pages 1076--1081. IEEE Computer Society, 2008. [ DOI | http ]

2007

[1] Jin Xiao and Raouf Boutaba. Assessing network service profitability: modeling from market science perspective. IEEE/ACM Trans. Netw., 15(6):1307--1320, 2007. [ DOI | http ]
[2] Issam Aib and Raouf Boutaba. On leveraging policy-based management for maximizing business profit. IEEE Trans. Netw. Serv. Manag., 4(3):25--39, 2007. [ DOI | http ]
[3] Wojciech M. Golab and Raouf Boutaba. Admission control in data transfers over lightpaths. IEEE J. Sel. Areas Commun., 25(S-6):102--110, 2007. [ DOI | http ]
[4] Reaz Ahmed and Raouf Boutaba. Distributed pattern matching: a key to flexible and efficient P2P search. IEEE J. Sel. Areas Commun., 25(1):73--83, 2007. [ DOI | http ]
[5] Raouf Boutaba and Issam Aib. Policy-based management: A historical perspective. J. Netw. Syst. Manag., 15(4):447--480, 2007. [ DOI | http ]
[6] Majid Ghaderi and Raouf Boutaba. Towards all-ip wireless networks: architectures and resource management mechanism. Int. J. Wirel. Mob. Comput., 2(4):263--274, 2007. [ DOI | http ]
[7] Huaxin Zhang, Ning Zhang, Kenneth Salem, and Donghui Zhuo. Compact access control labeling for efficient secure XML query evaluation. Data Knowl. Eng., 60(2):326--344, 2007. [ DOI | http ]
[8] Anastassia Ailamaki, Surajit Chaudhuri, Sam Lightstone, Guy M. Lohman, Patrick Martin, Kenneth Salem, and Gerhard Weikum. Report on the second international workshop on self-managing database systems (SMDB 2007). IEEE Data Eng. Bull., 30(2):2--4, 2007. [ .pdf ]
[9] Samer Al-Kiswany, Matei Ripeanu, and Sudharshan S. Vazhkudai. A checkpoint storage system for desktop grid computing. CoRR, abs/0706.3546, 2007. [ arXiv | http ]
[10] Reaz Ahmed, Noura Limam, Jin Xiao, Youssef Iraqi, and Raouf Boutaba. Resource and service discovery in large-scale multi-domain networks. IEEE Commun. Surv. Tutorials, 9(1-4):2--30, 2007. [ DOI | http ]
[11] Noura Limam, Joanna Ziembicki, Reaz Ahmed, Youssef Iraqi, Tianshu Li, Raouf Boutaba, and Fernando Cuervo. OSDA: open service discovery architecture for efficient cross-domain service provisioning. Comput. Commun., 30(3):546--563, 2007. [ DOI | http ]
[12] Majid Ghaderi, Raouf Boutaba, and Gary W. Kenward. Joint call and packet qos in cellular packet networks. Comput. Networks, 51(4):1060--1071, 2007. [ DOI | http ]
[13] Issam Aib and Raouf Boutaba. PS: A policy simulator. IEEE Commun. Mag., 45(4):130--136, 2007. [ DOI | http ]
[14] Srinivasan Keshav. How to read a paper. Comput. Commun. Rev., 37(3):83--84, 2007. [ DOI | http ]
[15] Shimin Guo, Mohammad Hossein Falaki, Earl A. Oliver, Sumair Ur Rahman, Aaditeshwar Seth, Matei A. Zaharia, and Srinivasan Keshav. Very low-cost internet access using kiosknet. Comput. Commun. Rev., 37(5):95--100, 2007. [ DOI | http ]
[16] Oguzhan Ozmen, Kenneth Salem, Mustafa Uysal, and M. Hossein Sheikh Attar. Storage workload estimation for database management systems. In Proceedings of the ACM SIGMOD International Conference on Management of Data, Beijing, China, June 12-14, 2007, pages 377--388. ACM, 2007. [ DOI | http ]
[17] Martin Karsten, Srinivasan Keshav, Sanjiva Prasad, and Mirza Omer Beg. An axiomatic basis for communication. In Proceedings of the ACM SIGCOMM 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Kyoto, Japan, August 27-31, 2007, pages 217--228. ACM, 2007. [ DOI | http ]
[18] Bernard Wong, Ivan Stoyanov, and Emin Gün Sirer. Octant: A comprehensive framework for the geolocalization of internet hosts. In 4th Symposium on Networked Systems Design and Implementation (NSDI 2007), April 11-13, 2007, Cambridge, Massachusetts, USA, Proceedings. USENIX, 2007. [ .html ]
[19] Srinivasan Keshav. Cell phones as a research platform. In Proceedings of the 5th International Conference on Mobile Systems, Applications, and Services (MobiSys 2007), San Juan, Puerto Rico, June 11-13, 2007, page 2. ACM, 2007. [ DOI | http ]
[20] David Hadaller, Srinivasan Keshav, Tim Brecht, and Shubham Agarwal. Vehicular opportunistic communication under the microscope. In Proceedings of the 5th International Conference on Mobile Systems, Applications, and Services (MobiSys 2007), San Juan, Puerto Rico, June 11-13, 2007, pages 206--219. ACM, 2007. [ DOI | http ]
[21] Nabeel Ahmed, Vivek Shrivastava, Arunesh Mishra, Suman Banerjee, Srinivasan Keshav, and Konstantina Papagiannaki. Interference mitigation in enterprise wlans through speculative scheduling. In Proceedings of the 13th Annual International Conference on Mobile Computing and Networking, MOBICOM 2007, Montréal, Québec, Canada, September 9-14, 2007, pages 342--345. ACM, 2007. [ DOI | http ]
[22] Tung Tran, Ehab S. Al-Shaer, and Raouf Boutaba. Policyvis: Firewall security policy visualization and inspection. In Proceedings of the 21th Large Installation System Administration Conference, LISA 2007, Dallas, Texas, USA, November 11-16, 2007, pages 1--16. USENIX, 2007. [ .html ]
[23] Matei A. Zaharia, Amit Chandel, Stefan Saroiu, and Srinivasan Keshav. Finding content in file-sharing networks when you can't even spell. In 6th International workshop on Peer-To-Peer Systems, IPTPS 2007, Bellevue, WA, USA, February 26-27, 2007, 2007. [ .pdf ]
[24] Issam Aib and Raouf Boutaba. Business-driven optimization of policy-based management solutions. In Integrated Network Management, IM 2007. 10th IFIP/IEEE International Symposium on Integrated Network Management, Munich, Germany, 21-25 May 2007, pages 254--263. IEEE, 2007. [ DOI | http ]
[25] Shimin Guo, Mohammad Hossein Falaki, Earl A. Oliver, Sumair Ur Rahman, Aaditeshwar Seth, Matei A. Zaharia, Usman Ismail, and Srinivasan Keshav. Design and implementation of the kiosknet system. In 2007 International Conference on Information and Communication Technologies and Development, ICTD 2007, Bangalore, India, December 15-16, 2007, pages 1--10. IEEE, 2007. [ DOI | http ]
[26] Barry W. Boehm, Sunita Chulani, June M. Verner, and Bernard Wong. Fifth workshop on software quality. In 29th International Conference on Software Engineering (ICSE 2007), Minneapolis, MN, USA, May 20-26, 2007, Companion Volume, pages 131--132. IEEE Computer Society, 2007. [ DOI | http ]
[27] Ahmed A. Soror, Ashraf Aboulnaga, and Kenneth Salem. Database virtualization: A new frontier for database tuning and physical design. In Proceedings of the 23rd International Conference on Data Engineering Workshops, ICDE 2007, 15-20 April 2007, Istanbul, Turkey, pages 388--394. IEEE Computer Society, 2007. [ DOI | http ]
[28] Ye Qin, Kenneth Salem, and Anil K. Goel. Towards adaptive costing of database access methods. In Proceedings of the 23rd International Conference on Data Engineering Workshops, ICDE 2007, 15-20 April 2007, Istanbul, Turkey, pages 469--477. IEEE Computer Society, 2007. [ DOI | http ]
[29] Ivan T. Bowman and Kenneth Salem. Semantic prefetching of correlated query sequences. In Proceedings of the 23rd International Conference on Data Engineering, ICDE 2007, The Marmara Hotel, Istanbul, Turkey, April 15-20, 2007, pages 1284--1288. IEEE Computer Society, 2007. [ DOI | http ]
[30] Sonia Waharte, Arash Farzan, and Raouf Boutaba. Min-max congestion in interference-prone wireless mesh networks. In Proceedings of IEEE International Conference on Communications, ICC 2007, Glasgow, Scotland, UK, 24-28 June 2007, pages 3746--3751. IEEE, 2007. [ DOI | http ]
[31] Bernard Wong, Ymir Vigfusson, and Emin Gün Sirer. Hyperspaces for object clustering and approximate matching in peer-to-peer overlays. In Proceedings of HotOS'07: 11th Workshop on Hot Topics in Operating Systems, May 7-9, 2005, San Diego, California, USA. USENIX Association, 2007. [ .pdf ]
[32] Rami Langar, Nizar Bouabdallah, and Raouf Boutaba. Adaptive mobility management for ip/mpls-based wireless networks: A proposal and analysis. In Proceedings of the Global Communications Conference, 2007. GLOBECOM '07, Washington, DC, USA, 26-30 November 2007, pages 1786--1791. IEEE, 2007. [ DOI | http ]
[33] Fatma Bouabdallah, Nizar Bouabdallah, and Raouf Boutaba. Analysis of the impact of the number of reporting nodes on sensor networks lifetime. In Proceedings of the Global Communications Conference, 2007. GLOBECOM '07, Washington, DC, USA, 26-30 November 2007, pages 892--897. IEEE, 2007. [ DOI | http ]
[34] David Pariag, Tim Brecht, Ashif S. Harji, Peter A. Buhr, Amol Shukla, and David R. Cheriton. Comparing the performance of web server architectures. In Proceedings of the 2007 EuroSys Conference, Lisbon, Portugal, March 21-23, 2007, pages 231--243. ACM, 2007. [ DOI | http ]
[35] Pradeep Padala, Kang G. Shin, Xiaoyun Zhu, Mustafa Uysal, Zhikui Wang, Sharad Singhal, Arif Merchant, and Kenneth Salem. Adaptive control of virtualized resources in utility computing environments. In Proceedings of the 2007 EuroSys Conference, Lisbon, Portugal, March 21-23, 2007, pages 289--302. ACM, 2007. [ DOI | http ]
[36] Samer Al-Kiswany, Matei Ripeanu, Adriana Iamnitchi, and Sudharshan Vazhkudai. Are P2P data-dissemination techniques viable in today's data-intensive scientific collaborations? In Euro-Par 2007, Parallel Processing, 13th International Euro-Par Conference, Rennes, France, August 28-31, 2007, Proceedings, volume 4641 of Lecture Notes in Computer Science, pages 404--414. Springer, 2007. [ DOI | http ]
[37] Shimin Guo and Srinivasan Keshav. Fair and efficient scheduling in data ferrying networks. In Proceedings of the 2007 ACM Conference on Emerging Network Experiment and Technology, CoNEXT 2007, New York, NY, USA, December 10-13, 2007, page 13. ACM, 2007. [ DOI | http ]

2006

[1] Raouf Boutaba and Majid Ghaderi. Impact of mobility on resource management in wireless networks. In The Handbook of Mobile Middleware, pages 639--662. Auerbach Publications/CRC, 2006. [ DOI | http ]
[2] Brent Ishibashi and Raouf Boutaba. Forward focus: using routing information to improve medium access control in ad hoc networks. Wirel. Commun. Mob. Comput., 6:809--824, 2006. [ DOI | http ]
[3] Majid Ghaderi and Raouf Boutaba. Call admission control in mobile cellular networks: a comprehensive survey. Wirel. Commun. Mob. Comput., 6:69--93, 2006. [ DOI | http ]
[4] Tim Brecht, Eshrat Arjomandi, Chang Li, and Hang Pham. Controlling garbage collection and heap growth to reduce the execution time of java applications. ACM Trans. Program. Lang. Syst., 28(5):908--941, 2006. [ DOI | http ]
[5] Martin Karsten. Collected experience from implementing RSVP. IEEE/ACM Trans. Netw., 14(4):767--778, 2006. [ DOI | http ]
[6] Majid Ghaderi and Raouf Boutaba. Call admission control for voice/data integration in broadband wireless networks. IEEE Trans. Mob. Comput., 5(3):193--207, 2006. [ DOI | http ]
[7] Bernard Wong and Emin Gün Sirer. Closestnode.com: an open access, scalable, shared geocast service for distributed systems. ACM SIGOPS Oper. Syst. Rev., 40(1):62--64, 2006. [ DOI | http ]
[8] Sonia Waharte, Raouf Boutaba, Youssef Iraqi, and Brent Ishibashi. Routing protocols in wireless mesh networks: challenges and design considerations. Multim. Tools Appl., 29(3):285--303, 2006. [ DOI | http ]
[9] Bassam Aoun, Raouf Boutaba, Youssef Iraqi, and Gary W. Kenward. Gateway placement optimization in wireless mesh networks with qos constraints. IEEE J. Sel. Areas Commun., 24(11):2127--2136, 2006. [ DOI | http ]
[10] Bassam Aoun and Raouf Boutaba. Clustering in WSN with latency and energy consumption constraints. J. Netw. Syst. Manag., 14(3):415--439, 2006. [ DOI | http ]
[11] Sonia Waharte and Raouf Boutaba. Dynamic cell-based MAC protocol for target detection applications in energy-constrained wireless networks. Comput. Commun., 29(4):429--436, 2006. [ DOI | http ]
[12] Ajay Pal Singh Virk and Raouf Boutaba. Economical protection in MPLS networks. Comput. Commun., 29(3):402--408, 2006. [ DOI | http ]
[13] Wenli Liu and Raouf Boutaba. pmeasure: A peer-to-peer measurement infrastructure for the internet. Comput. Commun., 29(10):1665--1674, 2006. [ DOI | http ]
[14] Raouf Boutaba, Ehab Al-Shaer, and Kevin C. Almeroth. Special issue: monitoring and measurements of IP networks. Comput. Commun., 29(10):1561--1563, 2006. [ DOI | http ]
[15] Loubna Mekouar, Youssef Iraqi, and Raouf Boutaba. Peer-to-peer's most wanted: Malicious peers. Comput. Networks, 50(4):545--562, 2006. [ DOI | http ]
[16] Anwar Haque, Pin-Han Ho, and Raouf Boutaba. Group shared protection for spare capacity reconfiguration in optical networks. Comput. Networks, 50(2):168--180, 2006. [ DOI | http ]
[17] Raouf Boutaba and Alan Marshall. Management in peer-to-peer systems: Trust, reputation and security. Comput. Networks, 50(4):469--471, 2006. [ DOI | http ]
[18] Srinivasan Keshav. Efficient and decentralized computation of approximate global state. Comput. Commun. Rev., 36(1):69--74, 2006. [ DOI | http ]
[19] H. J. Pan and Srinivasan Keshav. Detection and repair of faulty access points. In IEEE Wireless Communications and Networking Conference, WCNC 2006, 3-6 April 2006, Las Vegas, Nevada, USA, pages 532--538. IEEE, 2006. [ DOI | http ]
[20] N. Ahmed and Srinivasan Keshav. A successive refinement approach to wireless infrastructure network deployment. In IEEE Wireless Communications and Networking Conference, WCNC 2006, 3-6 April 2006, Las Vegas, Nevada, USA, pages 511--519. IEEE, 2006. [ DOI | http ]
[21] Bassam Aoun, Raouf Boutaba, and Gary W. Kenward. Analysis of capacity improvements in multi-radio wireless mesh networks. In Proceedings of the 63rd IEEE Vehicular Technology Conference, VTC Spring 2006, 7-10 May 2006, Melbourne, Australia, pages 543--547. IEEE, 2006. [ DOI | http ]
[22] Khuzaima Daudjee and Kenneth Salem. Lazy database replication with snapshot isolation. In Proceedings of the 32nd International Conference on Very Large Data Bases, Seoul, Korea, September 12-15, 2006, pages 715--726. ACM, 2006. [ http ]
[23] David Hadaller, Srinivasan Keshav, and Tim Brecht. MV-MAX: improving wireless infrastructure access for multi-vehicular communication. In Proceedings of the 2006 SIGCOMM workshop on Challenged networks, CHANTS@SIGCOMM 2006, Pisa, Italy, September 11-15, 2006, pages 269--276. ACM, 2006. [ DOI | http ]
[24] Bernard Wong and Sazzad Hasan. Software process improvement in bangladesh. In Proceedings of the International Conference on Software Engineering Research and Practice & Conference on Programming Languages and Compilers, SERP 2006, Las Vegas, Nevada, USA, June 26-29, 2006, Volume 1, pages 246--252. CSREA Press, 2006.
[25] Mohamed Mahmoud Taibah, Ehab Al-Shaer, and Raouf Boutaba. An architecture for an email worm prevention system. In Second International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August 2, 2006 - September 1, 2006, pages 1--9. IEEE, 2006. [ DOI | http ]
[26] Bernard Wong, Ivan Stoyanov, and Emin Gün Sirer. Geolocalization on the internet through constraint satisfaction. In 3rd USENIX Workshop on Real, Large Distributed Systems, WORLDS'06, Seattle, WA, USA, November 5, 2006. USENIX Association, 2006. [ http ]
[27] Reaz Ahmed and Raouf Boutaba. Distributed pattern matching for P2P systems. In Management of Integrated End-to-End Communications and Services, 10th IEEE/IFIP Network Operations and Management Symposium, NOMS 2006, Vancouver, Canada, April 3-7, 2006. Proceedings, pages 198--208. IEEE, 2006. [ DOI | http ]
[28] Aaditeshwar Seth, D. Kroeker, Matei A. Zaharia, Shimin Guo, and Srinivasan Keshav. Low-cost communication for rural internet kiosks using mechanical backhaul. In Proceedings of the 12th Annual International Conference on Mobile Computing and Networking, MOBICOM 2006, Los Angeles, CA, USA, September 23-29, 2006, pages 334--345. ACM, 2006. [ DOI | http ]
[29] Nabeel Ahmed, David Hadaller, and Srinivasan Keshav. GUESS: gossiping updates for efficient spectrum sensing. In Proceedings of the 1st international workshop on Decentralized resource sharing in mobile computing and networking, MobiShare@MobiCom 2006, Los Angeles, California, USA, July 25, 2006, pages 12--17. ACM, 2006. [ DOI | http ]
[30] Bassam Aoun and Raouf Boutaba. Max-min fair capacity of wireless mesh networks. In IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, MASS 2006, 9-12 October 2006, Vancouver, BC, Canada, pages 21--30. IEEE Computer Society, 2006. [ DOI | http ]
[31] Michael Kwok, Tim Brecht, Martin Karsten, and Jialin Song. Modelling and improving group communication in server operating systems. In 14th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS 2006), 11-14 September 2006, Monterey, California, USA, pages 207--217. IEEE Computer Society, 2006. [ DOI | http ]
[32] Matei A. Zaharia and Srinivasan Keshav. Gossip-based search selection in hybrid peer-to-peer networks. In 5th International workshop on Peer-To-Peer Systems, IPTPS 2006, Santa Barbara, CA, USA, February 27-28, 2006, 2006. [ .pdf ]
[33] Willem van Heiningen, Tim Brecht, and Steve MacDonald. Exploiting dynamic proxies in middleware for distributed, parallel, and mobile java applications. In 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), Proceedings, 25-29 April 2006, Rhodes Island, Greece. IEEE, 2006. [ DOI | http ]
[34] Willem van Heiningen, Tim Brecht, and Steve MacDonald. Babylon v2.0: middleware for distributed, parallel, and mobile java applications. In 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), Proceedings, 25-29 April 2006, Rhodes Island, Greece. IEEE, 2006. [ DOI | http ]
[35] Martin Karsten. SI-WF2Q: WF2Q approximation with small constant execution overhead. In INFOCOM 2006. 25th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 23-29 April 2006, Barcelona, Catalunya, Spain. IEEE, 2006. [ DOI | http ]
[36] Issam Aib, Raouf Boutaba, and Guy Pujolle. A novel architecture for utility driven management. In Network Control and Engineering for Qos, Security and Mobility, V - IFIP 19th World Computer Congress, TC-6, 5th IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, August 20-25, 2006, Santiago, Chile, volume 213 of IFIP, pages 89--99. Springer, 2006. [ DOI | http ]
[37] Sunita Chulani, Barry W. Boehm, June M. Verner, and Bernard Wong. Workshop description of 4th workshop on software quality (wosq). In Proceedings of the 2006 international workshop on Software quality, WoSQ@ICSE 2006, Shanghai, China, May 21, 2006, pages 1--2. ACM, 2006. [ DOI | http ]
[38] Sunita Chulani, Barry W. Boehm, June M. Verner, and Bernard Wong. Workshop description of 4th workshop on software quality (WOSQ). In 28th International Conference on Software Engineering (ICSE 2006), Shanghai, China, May 20-28, 2006, pages 1019--1020. ACM, 2006. [ DOI | http ]
[39] Khuzaima Daudjee and Kenneth Salem. Inferring a serialization order for distributed transactions. In Proceedings of the 22nd International Conference on Data Engineering, ICDE 2006, 3-8 April 2006, Atlanta, GA, USA, page 154. IEEE Computer Society, 2006. [ DOI | http ]
[40] Sonia Waharte and Raouf Boutaba. Totally disjoint multipath routing in multihop wireless networks. In Proceedings of IEEE International Conference on Communications, ICC 2006, Istanbul, Turkey, 11-15 June 2006, pages 5576--5581. IEEE, 2006. [ DOI | http ]
[41] Amol Shukla and Tim Brecht. TCP connection management mechanisms for improving internet server performance. In 1st IEEE Workshop on Hot Topics in Web Systems and Technologies, HotWeb 2006, Boston, MA, USA, November 13-14, 2006, pages 1--12. IEEE Computer Society, 2006. [ DOI | http ]
[42] Martin Karsten, Srinivasan Keshav, and Sanjiva Prasad. An axiomatic basis for communication. In 5th ACM Workshop on Hot Topics in Networks - HotNets-V, Irvine, California, USA, November 29-30, 2006. ACM SIGCOMM, 2006. [ .pdf ]
[43] Markose Thomas, Arobinda Gupta, and Srinivasan Keshav. Group based routing in disconnected ad hoc networks. In High Performance Computing - HiPC 2006, 13th International Conference, Bangalore, India, December 18-21, 2006, Proceedings, volume 4297 of Lecture Notes in Computer Science, pages 399--410. Springer, 2006. [ DOI | http ]
[44] Rami Langar, Nizar Bouabdallah, Samir Tohmé, and Raouf Boutaba. Mobility modeling and handoff analysis for ip/mpls-based cellular networks. In Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November - 1 December 2006. IEEE, 2006. [ DOI | http ]
[45] Tim Brecht, G. John Janakiraman, Brian Lynn, Vikram A. Saletore, and Yoshio Turner. Evaluating network processing efficiency with processor partitioning and asynchronous I/O. In Proceedings of the 2006 EuroSys Conference, Leuven, Belgium, April 18-21, 2006, pages 265--278. ACM, 2006. [ DOI | http ]
[46] Nabeel Ahmed and Srinivasan Keshav. SMARTA: a self-managing architecture for thin access points. In Proceedings of the 2006 ACM Conference on Emerging Network Experiment and Technology, CoNEXT 2006, Lisboa, Portugal, December 4-7, 2006, page 9. ACM, 2006. [ DOI | http ]
[47] L. G. Alex Sung and Johnny W. Wong. Autonomic resource management for a cluster that executes batch jobs. In Proceedings of the 2006 IEEE International Conference on Cluster Computing, September 25-28, 2006, Barcelona, Spain. IEEE Computer Society, 2006. [ DOI | http ]

2005

[1] Ivan T. Bowman and Kenneth Salem. Optimization of query streams using semantic prefetching. ACM Trans. Database Syst., 30(4):1056--1101, 2005. [ DOI | http ]
[2] Bernard Wong. Understanding stakeholder values as a means of dealing with stakeholder conflicts. Softw. Qual. J., 13(4):429--445, 2005. [ DOI | http ]
[3] Abdelhamid Nafaa, Adlen Ksentini, Ahmed Mehaoua, B. lshibashi, Youssef Iraqi, and Raouf Boutaba. Sliding contention window (SCW): towards backoff range-based service differentiation over IEEE 802.11 wireless LAN networks. IEEE Netw., 19(4):45--51, 2005. [ DOI | http ]
[4] Jin Xiao and Raouf Boutaba. Qos-aware service composition and adaptation in autonomic communication. IEEE J. Sel. Areas Commun., 23(12):2344--2360, 2005. [ DOI | http ]
[5] Ehab Al-Shaer, Hazem H. Hamed, Raouf Boutaba, and Masum Hasan. Conflict classification and analysis of distributed firewall policies. IEEE J. Sel. Areas Commun., 23(10):2069--2084, 2005. [ DOI | http ]
[6] Toufik Ahmed, Ahmed Mehaoua, Raouf Boutaba, and Youssef Iraqi. Adaptive packet video streaming over IP networks: a cross-layer approach. IEEE J. Sel. Areas Commun., 23(2):385--401, 2005. [ DOI | http ]
[7] Reaz Ahmed, Raouf Boutaba, Fernando Cuervo, Youssef Iraqi, Tianshu Li, Noura Limam, Jin Xiao, and Joanna Ziembicki. Service naming in large-scale and multi-domain networks. IEEE Commun. Surv. Tutorials, 7(1-4):38--54, 2005. [ DOI | http ]
[8] Youssef Iraqi and Raouf Boutaba. Weight allocation in distributed admission control for wireless networks. Comput. Commun., 28(2):199--214, 2005. [ DOI | http ]
[9] Toufik Ahmed, Raouf Boutaba, and Ahmed Mehaoua. A measurement-based approach for dynamic qos adaptation in diffserv networks. Comput. Commun., 28(18):2020--2033, 2005. [ DOI | http ]
[10] Curtis A. Siller Jr. and Raouf Boutaba. Standards - A new challenge for comsoc - the president's page. IEEE Commun. Mag., 43(8):6--8, 2005. [ DOI | http ]
[11] Srinivasan Keshav. Why cell phones will dominate the future internet. Comput. Commun. Rev., 35(2):83--86, 2005. [ DOI | http ]
[12] Sonia Waharte and Raouf Boutaba. A comparative study of distributed frequency assignment algorithms for wireless sensor networks. Ann. des Télécommunications, 60(7-8):858--871, 2005. [ DOI | http ]
[13] Brent Ishibashi and Raouf Boutaba. Topology and mobility considerations in mobile ad hoc networks. Ad Hoc Networks, 3(6):762--776, 2005. [ DOI | http ]
[14] Evan P. C. Jones, Martin Karsten, and Paul A. S. Ward. Multipath load balancing in multi-hop wireless networks. In 2005 IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, WiMob 2005, Montreal, Canada, August 22-14, 2005, Volume 2, pages 158--166. IEEE, 2005. [ DOI | http ]
[15] Joe Capka and Raouf Boutaba. A mobility management tool-the realistic mobility model. In 2005 IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, WiMob 2005, Montreal, Canada, August 22-14, 2005, Volume 2, pages 242--246. IEEE, 2005. [ DOI | http ]
[16] Majid Ghaderi and Srinivasan Keshav. Multimedia messaging service: system description and performance analysis. In 1st International ICST Conference on Wireless Internet, WICON 2005, Budapest, Hungary, July 10-15, 2005, pages 198--205. IEEE Computer Society, 2005. [ DOI | http ]
[17] Bernard Wong, Aleksandrs Slivkins, and Emin Gün Sirer. Meridian: a lightweight network location service without virtual coordinates. In Proceedings of the ACM SIGCOMM 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Philadelphia, Pennsylvania, USA, August 22-26, 2005, pages 85--96. ACM, 2005. [ DOI | http ]
[18] Bernard Wong. The views of quality for the requirements document. In Proceedings of the International Conference on Software Engineering Research and Practice, SERP 2005, Las Vegas, Nevada, USA, June 27-29, 2005, Volume 1, pages 427--434. CSREA Press, 2005.
[19] Kyeong Kang, Bernard Wong, and Jim Underwood. Understanding of user preferences in global electronic commerce sites. In Pacific Asia Conference on Information Systems, PACIS 2005, Bangkok, Thailand, July 7-10, 2005, page 103. AISeL, 2005. [ http ]
[20] Martin Karsten, Jialin Song, Michael Kwok, and Tim Brecht. Efficient operating system support for group unicast. In Network and Operating System Support for Digital Audio and Video, 15th International Workshop, NOSSDAV 2005, Stevenson, Washington, USA, June 13-14, 2005, Proceedings, pages 153--158. ACM, 2005. [ DOI | http ]
[21] Majid Ghaderi, Raouf Boutaba, and Gary W. Kenward. Stochastic admission control for quality of service in wireless packet networks. In NETWORKING 2005: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, 4th International IFIP-TC6 Networking Conference, Waterloo, Canada, May 2-6, 2005, Proceedings, volume 3462 of Lecture Notes in Computer Science, pages 1309--1320. Springer, 2005. [ DOI | http ]
[22] Mahesh Balakrishnan, Maya Haridasan, Prakash Linga, Hongzhou Liu, Venugopalan Ramasubramanian, Sean C. Rhea, Manpreet Singh, Vidhyashankar Venkatraman, Vivek Vishnumurthy, Kevin Walsh, Bernard Wong, and Ming Zhong. Workshop report. In Peer-to-Peer Systems IV, 4th International Workshop, IPTPS 2005, Ithaca, NY, USA, February 24-25, 2005, Revised Selected Papers, volume 3640 of Lecture Notes in Computer Science, pages 1--12. Springer, 2005. [ DOI | http ]
[23] Jin Xiao and Raouf Boutaba. Qos-aware service composition in large scale multi-domain networks. In Integrated Network Management, IM 2005. 9th IFIP/IEEE International Symposium on Integrated Network Management, 15-19 May 2005, Nice, France, pages 397--410. IEEE, 2005. [ DOI | http ]
[24] Yongning Tang, Ehab S. Al-Shaer, and Raouf Boutaba. Active integrated fault localization in communication networks. In Integrated Network Management, IM 2005. 9th IFIP/IEEE International Symposium on Integrated Network Management, 15-19 May 2005, Nice, France, pages 543--556. IEEE, 2005. [ DOI | http ]
[25] Wenli Liu, Youssef Iraqi, and Raouf Boutaba. Zero-budget network dimensioning. In Integrated Network Management, IM 2005. 9th IFIP/IEEE International Symposium on Integrated Network Management, 15-19 May 2005, Nice, France, pages 323--336. IEEE, 2005. [ DOI | http ]
[26] Martin Karsten and Jens B. Schmitt. Packet marking for integrated load control. In Integrated Network Management, IM 2005. 9th IFIP/IEEE International Symposium on Integrated Network Management, 15-19 May 2005, Nice, France, pages 499--512. IEEE, 2005. [ DOI | http ]
[27] Raouf Boutaba. Peer-to-peer networking and management. In Integrated Network Management, IM 2005. 9th IFIP/IEEE International Symposium on Integrated Network Management, 15-19 May 2005, Nice, France, page 784. IEEE, 2005. [ DOI | http ]
[28] Elizabeth Lam and Kenneth Salem. Dynamic histograms for non-stationary updates. In Ninth International Database Engineering and Applications Symposium (IDEAS 2005), 25-27 July 2005, Montreal, Canada, pages 235--243. IEEE Computer Society, 2005. [ DOI | http ]
[29] Bernard Wong, June M. Verner, Sunita Chulani, and Barry W. Boehm. Third workshop on software quality. In 27th International Conference on Software Engineering (ICSE 2005), 15-21 May 2005, St. Louis, Missouri, USA, pages 688--689. ACM, 2005. [ DOI | http ]
[30] Khuzaima Daudjee and Kenneth Salem. A pure lazy technique for scalable transaction processing in replicated databases. In 11th International Conference on Parallel and Distributed Systems, ICPADS 2005, Fuduoka, Japan, July 20-22, 2005, pages 802--808. IEEE Computer Society, 2005. [ DOI | http ]
[31] Huaxin Zhang, Ning Zhang, Kenneth Salem, and Donghui Zhuo. Compact access control labeling for efficient secure XML query evaluation. In Proceedings of the 21st International Conference on Data Engineering Workshops, ICDE 2005, 5-8 April 2005, Tokyo, Japan, page 1275. IEEE Computer Society, 2005. [ DOI | http ]
[32] Xuhui Li, Ashraf Aboulnaga, Kenneth Salem, Aamer Sachedina, and Shaobo Gao. Second-tier cache management using write hints. In Proceedings of the FAST '05 Conference on File and Storage Technologies, December 13-16, 2005, San Francisco, California, USA. USENIX, 2005. [ .html ]
[33] Wenli Liu and Raouf Boutaba. Tracerouting peer-to-peer networks. In Third IEEE/IFIP Workshop on End-to-End Monitoring Techniques and Services, E2EMON 2005, 15th May 2005, Nice, France, pages 101--114. IEEE Computer Society, 2005. [ DOI | http ]
[34] Aaditeshwar Seth, Patrick Darragh, Suihong Liang, Yunfeng Lin, and Srinivasan Keshav. An architecture for tetherless communication. In Disruption Tolerant Networking, 3.-6. April 2005, volume 05142 of Dagstuhl Seminar Proceedings. Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany, 2005. [ http ]
[35] Loubna Mekouar, Youssef Iraqi, and Raouf Boutaba. Free riders under control through service differentiation in peer-to-peer systems. In Proceedings of the 1st International Conference on Collaborative Computing: Networking, Applications and Worksharing, San Jose, CA, USA, December 19-21, 2005. IEEE Computer Society / ICST, 2005. [ DOI | http ]
[36] Loubna Mekouar, Youssef Iraqi, and Raouf Boutaba. Detecting malicious peers in a reputation-based peer-to-peer system. In 2nd IEEE Consumer Communications and Networking Conference, CCNC 2005, Las Vegas, NV, USA, January 3-6, 2005, pages 37--42. IEEE, 2005. [ DOI | http ]
[37] Loubna Mekouar, Youssef Iraqi, and Raouf Boutaba. Handling free riders in peer-to-peer systems. In Agents and Peer-to-Peer Computing, 4th International Workshop, AP2PC 2005, Utrecht, The Netherlands, July 25, 2005, Revised Papers, volume 4118 of Lecture Notes in Computer Science, pages 58--69. Springer, 2005. [ DOI | http ]

2004

[1] Daniel M. Berry, Khuzaima Daudjee, Jing Dong, Igor Fainchtein, Maria Augusta V. Nelson, Torsten Nelson, and Lihua Ou. User's manual as a requirements specification: case studies. Requir. Eng., 9(1):67--82, 2004. [ DOI | http ]
[2] Bill St. Arnaud, Andrew K. Bjerring, Omar Cherkaoui, Raouf Boutaba, Martin Pott, and Wade Hong. Web services architecture for user control and management of optical internet networks. Proc. IEEE, 92(9):1490--1500, 2004. [ DOI | http ]
[3] Nicole Karsten-Beriér, Martin Karsten, Jens B. Schmitt, and Ralf Steinmetz. A modular approach to mobile qos signaling- motivation, design & implementation. Multim. Tools Appl., 22(2):117--135, 2004. [ DOI | http ]
[4] Bernard Wong. The software evaluation framework 'sef' extended. Inf. Softw. Technol., 46(15):1037--1047, 2004. [ DOI | http ]
[5] Burkhard Stiller, Lee McKnight, Martin Karsten, and Peter Reichl. Internet economics: pricing and policie. Comput. Networks, 46(1):1--2, 2004. [ DOI | http ]
[6] Tianshu Li, Youssef Iraqi, and Raouf Boutaba. Pricing and admission control for qos-enabled internet. Comput. Networks, 46(1):87--110, 2004. [ DOI | http ]
[7] Wojciech M. Golab and Raouf Boutaba. Policy-driven automated reconfiguration for performance management in WDM optical networks. IEEE Commun. Mag., 42(1):44--51, 2004. [ DOI | http ]
[8] Raouf Boutaba, Wojciech M. Golab, and Youssef Iraqi. Lightpaths on demand: a web-services-based management system. IEEE Commun. Mag., 42(7):101--107, 2004. [ DOI | http ]
[9] Raouf Boutaba, Andreas Polyrakis, and Álvaro Fernández Casaní. Active networks as a developing and testing environment for network protocols. Ann. des Télécommunications, 59(5-6):505--524, 2004. [ DOI | http ]
[10] Youssef Iraqi, Majid Ghaderi, and Raouf Boutaba. Enabling real-time all-ip wireless networks. In 2004 IEEE Wireless Communications and Networking Conference , WCNC 2004, Atlanta, Georgia, USA, 21-25 March 2004, pages 1500--1505. IEEE, 2004. [ DOI | http ]
[11] Tim Brecht, David Pariag, and Louay Gammo. accept()able strategies for improving web server performance. In Proceedings of the General Track: 2004 USENIX Annual Technical Conference, June 27 - July 2, 2004, Boston Marriott Copley Place, Boston, MA, USA, pages 227--240. USENIX, 2004. [ .html ]
[12] Ivan T. Bowman and Kenneth Salem. Optimization of query streams using semantic prefetching. In Proceedings of the ACM SIGMOD International Conference on Management of Data, Paris, France, June 13-18, 2004, pages 179--190. ACM, 2004. [ DOI | http ]
[13] Bernard Wong. A study of the metrics for measuring the quality of the requirements specification document. In Proceedings of the International Conference on Software Engineering Research and Practice, SERP '04, June 21-24, 2004, Las Vegas, Nevada, USA, Volume 2, pages 549--553. CSREA Press, 2004.
[14] Mahmood Niazi, David Wilson, Didar Zowghi, and Bernard Wong. A model for the implementation of software process improvement: An empirical study. In Product Focused Software Process Improvement, 5th International Conference, PROFES 2004, Kausai Science City, Japan, April 5-8, 2004, Proceedings, volume 3009 of Lecture Notes in Computer Science, pages 1--16. Springer, 2004. [ DOI | http ]
[15] Majid Ghaderi and Raouf Boutaba. Data service performance analysis in GPRS systems. In Proceedings of the IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2004, 5-8 September 2004, Barcelona, Spain, pages 556--560. IEEE, 2004. [ DOI | http ]
[16] Jin Xiao and Raouf Boutaba. Customer-centric network upgrade strategy: maximizing investment benefits for enhanced service quality. In Managing Next Generation Convergence Networks and Services, IEEE/IFIP Network Operations and Management Symposium, NOMS 2004, Seoul, Korea, 19-23 April 2004, Proceedings, pages 759--772. IEEE, 2004. [ DOI | http ]
[17] Majid Ghaderi and Raouf Boutaba. Call admission control for voice/data integration in broadband wireless networks. In NETWORKING 2004, Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication, Third International IFIP-TC6 Networking Conference, Athens, Greece, May 9-14, 2004, Proceedings, volume 3042 of Lecture Notes in Computer Science, pages 369--380. Springer, 2004. [ DOI | http ]
[18] Sonia Waharte, Kevin Ritzenthaler, and Raouf Boutaba. Selective active scanning for fast handoff in WLAN using sensor networks. In Mobile and Wireless Communication Networks, IFIP TC6 / WG6.8 Conference on Mobile and Wireless Communication Networks (MWCN 2004), October 25-27, 2004, Paris, France, volume 162 of IFIP, pages 59--70. Kluwer/Springer, 2004. [ DOI | http ]
[19] Sonia Waharte and Raouf Boutaba. Dynamic cell-based MAC protocol for target detection applications in energy-constrained wireless networks. In Management of Multimedia Networks and Services: 7th IFIP/IEEE International Conference, MMNS 2004, San Diego, CA, USA, October 2004, Proceedings, volume 3271 of Lecture Notes in Computer Science, pages 74--87. Springer, 2004. [ DOI | http ]
[20] Joe Capka and Raouf Boutaba. Mobility prediction in wireless networks using neural networks. In Management of Multimedia Networks and Services: 7th IFIP/IEEE International Conference, MMNS 2004, San Diego, CA, USA, October 2004, Proceedings, volume 3271 of Lecture Notes in Computer Science, pages 320--334. Springer, 2004. [ DOI | http ]
[21] Yanni Ellen Liu and Johnny W. Wong. Admission control in deadline-based network resource management. In Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, IPCCC 2004, April 15-17, 2004, Phoenix, Arizona, USA, pages 95--102. IEEE, 2004. [ DOI | http ]
[22] Sonia Waharte and Raouf Boutaba. Performance comparison of distributed frequency assignment algorithms for wireless sensor networks. In Network Control and Engineering for QoS, Security and Mobility, III - IFIP TC6 / WG6.2, 6.6, 6.7 and 6.8 Third International Conference on Network Control and Engineering for QoS, Security and Mobility, NetCon 2004 on November 2-5, 2004, Palma de Mallorca, Spain, volume 165 of IFIP, pages 151--162. Springer, 2004. [ DOI | http ]
[23] Bernard Wong, Sunita Chulani, June M. Verner, and Barry W. Boehm. Second workshop on software quality. In 26th International Conference on Software Engineering (ICSE 2004), 23-28 May 2004, Edinburgh, United Kingdom, pages 780--782. IEEE Computer Society, 2004. [ DOI | http ]
[24] Paul A. S. Ward, Tao Huang, and David J. Taylor. Clustering strategies for cluster timestamps. In 33rd International Conference on Parallel Processing (ICPP 2004), 15-18 August 2004, Montreal, Quebec, Canada, pages 73--81. IEEE Computer Society, 2004. [ DOI | http ]
[25] Khuzaima Daudjee and Kenneth Salem. Lazy database replication with ordering guarantees. In Proceedings of the 20th International Conference on Data Engineering, ICDE 2004, 30 March - 2 April 2004, Boston, MA, USA, pages 424--435. IEEE Computer Society, 2004. [ DOI | http ]
[26] Sonia Waharte, Jin Xiao, and Raouf Boutaba. Overlay wireless sensor networks for application-adaptive scheduling in WLAN. In High Speed Networks and Multimedia Communications, 7th IEEE International Conference, HSNMC 2004, Toulouse, France, June 30 - July 2, 2004, Proceedings, volume 3079 of Lecture Notes in Computer Science, pages 676--684. Springer, 2004. [ DOI | http ]
[27] Wojciech M. Golab and Raouf Boutaba. Resource allocation in user-controlled circuit-switched optical networks. In High Speed Networks and Multimedia Communications, 7th IEEE International Conference, HSNMC 2004, Toulouse, France, June 30 - July 2, 2004, Proceedings, volume 3079 of Lecture Notes in Computer Science, pages 776--787. Springer, 2004. [ DOI | http ]
[28] Anwar Haque, Pin-Han Ho, Raouf Boutaba, and James Ho. Group shared protection (GSP): a scalable solution for spare capacity reconfiguration in mesh WDM networks. In Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November - 3 December 2004, pages 2029--2035. IEEE, 2004. [ DOI | http ]
[29] Loubna Mekouar, Youssef Iraqi, and Raouf Boutaba. A reputation management and selection advisor schemes for peer-to-peer systems. In Utility Computing: 15th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2004, Davis, CA, USA, November 15-17, 2004.Proceedings, volume 3278 of Lecture Notes in Computer Science, pages 208--219. Springer, 2004. [ DOI | http ]
[30] Amol Shukla, Lily Li, Anand Subramanian, Paul A. S. Ward, and Tim Brecht. Evaluating the performance of user-space and kernel-space web servers. In Proceedings of the 2004 conference of the Centre for Advanced Studies on Collaborative research, October 5-7, 2004, Markham, Ontario, Canada, pages 189--201. IBM, 2004. [ http ]
[31] Bernard Wong. A study of the perceptions of IT professionals on IT outsourcing. In 10th Americas Conference on Information Systems, AMCIS 2004, New York, NY, USA, August 6-8, 2004, page 449. Association for Information Systems, 2004. [ http ]

2003

[1] Jeff Edmonds, Donald D. Chinn, Tim Brecht, and Xiaotie Deng. Non-clairvoyant multiprocessor scheduling of jobs with changing execution characteristics. J. Sched., 6(3):231--250, 2003. [ DOI | http ]
[2] Raouf Boutaba, Youssef Iraqi, and Ahmed Mehaoua. A multi-agent architecture for qos management in multimedia networks. J. Netw. Syst. Manag., 11(1):83--107, 2003. [ DOI | http ]
[3] Johnny W. Wong, David Evans, and Michael Kwok. On staleness and the delivery of web pages. Inf. Syst. Frontiers, 5(2):129--136, 2003. [ DOI | http ]
[4] Raouf Boutaba, Wojciech M. Golab, Youssef Iraqi, Tianshu Li, and Bill St. Arnaud. Grid-controlled lightpaths for high performance grid applications. J. Grid Comput., 1(4):387--394, 2003. [ DOI | http ]
[5] Martin Karsten, Peter Reichl, and Burkhard Stiller. Internet pricing and charging. Comput. Commun., 26(13):1433, 2003. [ DOI | http ]
[6] Gregor von Bochmann, Johnny W. Wong, David Evans, Terence C. Lau, Don Bourne, Brigitte Kerhervé, Mohamed-Vall M. Salem, and Haiwei Ye. Scalability of web-based electronic commerce systems. IEEE Commun. Mag., 41(7):110--115, 2003. [ DOI | http ]
[7] Bernard Wong. Measurements used in software quality evaluation. In Proceedings of the International Conference on Software Engineering Research and Practice, SERP '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 2, pages 971--977. CSREA Press, 2003.
[8] Bernard Wong. A study of the metrics applied to the software evaluation framework 'sef'. In 3rd International Conference on Quality Software (QSIC 2003), 6-7 November 2003, Dallas, TX, USA, pages 52--58. IEEE Computer Society, 2003. [ DOI | http ]
[9] Toufik Ahmed, Ahmed Mehaoua, Raouf Boutaba, and Youssef Iraqi. IP video streaming with fine-grained tcp-friendly rate adaptation. In Management of Multimedia Networks and Services, 6th IFIP/IEEE International Conference, MMNS 2003, Belfast, Northern Ireland, UK, September 7-10, 2003, Proceedings, volume 2839 of Lecture Notes in Computer Science, pages 18--31. Springer, 2003. [ DOI | http ]
[10] Krishna Pandit, Jens B. Schmitt, Martin Karsten, and Ralf Steinmetz. Bottleneck estimation for load control gateways. In 11th International Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS 2003), 12-15 October 2003, Orlando, FL, USA, page 279. IEEE Computer Society, 2003. [ DOI | http ]
[11] Bernard Wong. Applying the software evaluation framework 'sef' to the software development life cycle. In 2003 International Symposium on Empirical Software Engineering (ISESE 2003), 30 September - 1 October 2003. Rome, Italy, pages 281--293. IEEE Computer Society, 2003. [ DOI | http ]
[12] Youssef Iraqi and Raouf Boutaba. The degree of participation concept in ad hoc networks. In Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June - 3 July 2003, Kiris-Kemer, Turkey, pages 197--202. IEEE Computer Society, 2003. [ DOI | http ]
[13] Bernard Wong, Grzegorz Czajkowski, and Laurent Daynès. Dynamically loaded classes as shared libraries: An approach to improving virtual machine scalability. In 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 22-26 April 2003, Nice, France, CD-ROM/Abstracts Proceedings, page 38. IEEE Computer Society, 2003. [ DOI | http ]
[14] Mohamed-Vall O. Mohamed-Salem, J. Chen, Gregor von Bochmann, and Johnny W. Wong. An experimental prototype for scalable server selection. In Proceedings of the 22nd IEEE International Performance Computing and Communications Conference, IPCCC 2003, April 9-11, 2003, Phoenix, Arizona, USA, pages 505--512. IEEE, 2003. [ DOI | http ]
[15] Tianshu Li, Youssef Iraqi, and Raouf Boutaba. Tariff-based pricing and admission control for diffserv networks. In Integrated Network Management VII, Managing It All, IFIP/IEEE Eighth International Symposium on Integrated Network Management (IM 2003), March 24-28, 2003, Colorado Springs, USA, volume 246 of IFIP Conference Proceedings, pages 73--86. Kluwer, 2003.
[16] Mohamed-Vall O. Mohamed-Salem, Gregor von Bochmann, and Johnny W. Wong. Scaling server selection using a multi-broker architecture. In 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 19-22 May 2003, Providence, RI, USA, page 934. IEEE Computer Society, 2003. [ DOI | http ]
[17] Wayne Szeto, Youssef Iraqi, and Raouf Boutaba. A multi-commodity flow based approach to virtual network resource allocation. In Proceedings of the Global Telecommunications Conference, 2003. GLOBECOM '03, San Francisco, CA, USA, 1-5 December 2003, pages 3004--3008. IEEE, 2003. [ DOI | http ]
[18] Lesley Pek Wee Land, Bernard Wong, and D. Ross Jeffery. An extension of the behavioral theory of group performance in software development technical reviews. In 10th Asia-Pacific Software Engineering Conference (APSEC 2003), 10-12 December 2003, Chiang Mai, Thailand, page 520. IEEE Computer Society, 2003. [ DOI | http ]

2002

[1] Arunprasad P. Marathe and Kenneth Salem. Query processing techniques for arrays. VLDB J., 11(1):68--91, 2002. [ DOI | http ]
[2] Gopi K. Attaluri and Kenneth Salem. The presumed-either two-phase commit protocol. IEEE Trans. Knowl. Data Eng., 14(5):1190--1196, 2002. [ DOI | http ]
[3] Jens B. Schmitt, Lars C. Wolf, Martin Karsten, and Ralf Steinmetz. VC management for heterogeneous qos multicast transmissions. Telecommun. Syst., 19(2):227--247, 2002. [ DOI | http ]
[4] Christoph Rensing, Martin Karsten, and Burkhard Stiller. AAA: a survey and a policy-based architecture and framework. IEEE Netw., 16(6):22--27, 2002. [ DOI | http ]
[5] Andreas Polyrakis and Raouf Boutaba. The meta-policy information base. IEEE Netw., 16(2):40--48, 2002. [ DOI | http ]
[6] Raouf Boutaba and Andreas Polyrakis. Projecting advanced enterprise network and service management to active networks. IEEE Netw., 16(1):28--33, 2002. [ DOI | http ]
[7] Raouf Boutaba, Ned Ning Ren, Yasser Rasheed, and Alberto Leon-Garcia. Distributed video production: Tasks, architecture and qos provisioning. Multim. Tools Appl., 16(1):99--136, 2002. [ DOI | http ]
[8] Raouf Boutaba, Wayne Szeto, and Youssef Iraqi. DORA: efficient routing for MPLS traffic engineering. J. Netw. Syst. Manag., 10(3):309--325, 2002. [ DOI | http ]
[9] Raouf Boutaba and Andreas Polyrakis. Extending COPS-PR with meta-policies for scalable management of IP networks. J. Netw. Syst. Manag., 10(1):91--106, 2002. [ DOI | http ]
[10] Jens B. Schmitt, Oliver Heckmann, Martin Karsten, and Ralf Steinmetz. Decoupling different time scales of network qos systems. Comput. Commun., 25(11-12):1047--1057, 2002. [ DOI | http ]
[11] Bernard Wong and D. Ross Jeffery. A framework for software quality evaluation. In Product Focused Software Process Improvement, 4th International Conference, PROFES 2002, Rovaniemi, Finland, December 9-11, 2002, Proceedings, volume 2559 of Lecture Notes in Computer Science, pages 103--118. Springer, 2002. [ DOI | http ]
[12] Anna Evlogimenou and Raouf Boutaba. Programmable accounting management for virtual private networks. In Management Solutions for the New Communications World, 8th IEEE/IFIP Network Operations and Management Symposium, NOMS 2002, Florence, Italy, April 15-19, 2002. Proceedings, pages 297--312. IEEE, 2002. [ DOI | http ]
[13] Wayne Szeto, Raouf Boutaba, and Youssef Iraqi. Dynamic online routing algorithm for MPLS traffic engineering. In NETWORKING 2002, Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; and Mobile and Wireless Communications, Second International IFIP-TC6 Networking Conference, Pisa, Italy, May 19-24, 2002, Proceedings, volume 2345 of Lecture Notes in Computer Science, pages 936--946. Springer, 2002. [ DOI | http ]
[14] Toufik Ahmed, Ahmed Mehaoua, and Raouf Boutaba. Dynamic qos adaptation using COPS and network monitoring feedback. In Management of Multimedia on the Internet, 5th IFIP/IEEE International Conference on Management of Multimedia Networks and Services, MMNS 2002, Santa Barbara, CA, USA, October 6-9, 2002, Proceedings, volume 2496 of Lecture Notes in Computer Science, pages 250--262. Springer, 2002. [ DOI | http ]
[15] Bernard Wong. The appropriateness of gutman's means-end chain model in software evaluation. In 2002 International Symposium on Empirical Software Engineering (ISESE 2002), 3-4 October 2002, Nara, Japan, pages 56--68. IEEE Computer Society, 2002. [ DOI | http ]
[16] Toufik Ahmed, Raouf Boutaba, and Ahmed Mehaoua. On enhancing diffserv architecture by dynamic policy provisioning using network feedback. In Network Control and Engineering for QoS, Security and Mobility, IFIP TC6 / WG6.2 & WG6.7 Conference on Network Control and Engineering for QoS (net-Con 2002), October 23-25, 2002, Paris, France, volume 235 of IFIP Conference Proceedings, pages 273--278. Kluwer, 2002.
[17] Raouf Boutaba, Brent Ishibashi, and Basem Shihada. A network management viewpoint on security in e-services. In Certification and Security in E-Services, From E-Govenment to E-Business, IFIP 17^th World Computer Congress - TC11 Stream on Security in E-Services, August 26-29, 2002, Montréal, Québec, Canada, volume 255 of IFIP Conference Proceedings, pages 17--45. Kluwer, 2002.
[18] Raouf Boutaba and Jin Xiao. Network management: State of the art. In Communication Systems: The State of the Art, IFIP 17^th World Computer Congress - TC6 Stream on Communication Systems: The State of the Art, August 25-30, 2002, Montréal, Québec, Canada, volume 220 of IFIP Conference Proceedings, pages 127--146. Kluwer, 2002.
[19] Toufik Ahmed, Ahmed Mehaoua, and Raouf Boutaba. Interworking between SIP and MPEG-4 DMIF for heterogeneous IP video conferencing. In IEEE International Conference on Communications, ICC 2002, April 28 - May 2, 2002, New York City, NY, USA, pages 2469--2473. IEEE, 2002. [ DOI | http ]
[20] Manuel Görtz, Ralf Ackermann, Martin Karsten, and Ralf Steinmetz. Using a multi-layer approach to tackle the service interaction problem in telephony scenarios. In 28th EUROMICRO Conference 2002, 4-6 September 2002, Dortmund, Germany, pages 207--215. IEEE Computer Society, 2002. [ DOI | http ]

2001

[1] I-Ling Yen, Farokh B. Bastani, and David J. Taylor. Design of multi-invariant data structures for robust shared accesses in multiprocessor systems. IEEE Trans. Software Eng., 27(3):193--207, 2001. [ DOI | http ]
[2] Ahmed Mehaoua, Raouf Boutaba, Yasser Rasheed, and Alberto Leon-Garcia. An integrated framework for efficient transport of real-time MPEG video over ATM best effort service. Real Time Imaging, 7(3):287--300, 2001. [ DOI | http ]
[3] Raouf Boutaba, Walfrey Ng, and Alberto Leon-Garcia. Web-based customer management of vpns. J. Netw. Syst. Manag., 9(1):67--87, 2001. [ DOI | http ]
[4] Raouf Boutaba, Salima Omari, and Ajay Pal Singh Virk. SELFCON: an architecture for self-configuration of networks. J. Commun. Networks, 3(4):317--323, 2001. [ DOI | http ]
[5] Jens B. Schmitt, Martin Karsten, and Ralf Steinmetz. On the aggregation of deterministic service flows. Comput. Commun., 24(1):2--18, 2001. [ DOI | http ]
[6] Youssef Iraqi and Raouf Boutaba. Supporting MPEG video VBR traffic in wireless networks. Comput. Commun., 24(12):1188--1201, 2001. [ DOI | http ]
[7] Lili Qiu, Yin Zhang, and Srinivasan Keshav. Understanding the performance of many TCP flows. Comput. Networks, 37(3/4):277--306, 2001. [ DOI | http ]
[8] Bernard Wong and D. Ross Jeffery. Cognitive structures of software evaluation: A means-end chain analysis of quality. In Product Focused Software Process Improvement, Third International Conference, PROFES 2001, Kaiserslautern, Germany, September 10-13, 2001, Proceedings, volume 2188 of Lecture Notes in Computer Science, pages 6--26. Springer, 2001. [ DOI | http ]
[9] Raouf Boutaba and Andreas Polyrakis. Towards extensible policy enforcement points. In Policies for Distributed Systems and Networks, International Workshop, POLICY 2001 Bristol, UK, January 29-31, 2001, Proceedings, volume 1995 of Lecture Notes in Computer Science, pages 247--262. Springer, 2001. [ DOI | http ]
[10] Tim Brecht, Eshrat Arjomandi, Chang Li, and Hang Pham. Controlling garbage collection and heap growth to reduce the execution time of java applications. In Proceedings of the 2001 ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages and Applications, OOPSLA 2001, Tampa, Florida, USA, October 14-18, 2001, pages 353--366. ACM, 2001. [ DOI | http ]
[11] Youssef Iraqi and Raouf Boutaba. Is it worth involving several cooperating agents for multimedia user's admission in cellular networks? In Management of Multimedia on the Internet, 4th IFIP/IEEE International Conference on Management of Multimedia Networks and Services, MMNS 2001, Chicago, IL, USA October 29 - November 1, 2001, Proceedings, volume 2216 of Lecture Notes in Computer Science, pages 57--70. Springer, 2001. [ DOI | http ]
[12] Martin Karsten. Experimental extensions to RSVP - remote client and one-pass signalling. In Quality of Service - IWQoS 2001, 9th International Workshop Karlsruhe, Germany, June 6-8, 2001, Proceedings, volume 2092 of Lecture Notes in Computer Science, pages 269--274. Springer, 2001. [ DOI | http ]
[13] Utz Roedig, Manuel Görtz, Martin Karsten, and Ralf Steinmetz. RSVP as firewall signalling protocol. In Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 3-5 July 2001, Hammamet, Tunisia, pages 57--62. IEEE Computer Society, 2001. [ DOI | http ]
[14] Youssef Iraqi and Raouf Boutaba. Performance evaluation of a distributed call admission control for qos-sensitive wireless mobile networks. In Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 3-5 July 2001, Hammamet, Tunisia, pages 540--545. IEEE Computer Society, 2001. [ DOI | http ]
[15] Martin Karsten, Jens B. Schmitt, and Ralf Steinmetz. Implementation and evaluation of the KOM RSVP engine. In Proceedings IEEE INFOCOM 2001, The Conference on Computer Communications, Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies, Twenty years into the communications odyssey, Anchorage, Alaska, USA, April 22-26, 2001, pages 1290--1299. IEEE Comptuer Society, 2001. [ DOI | http ]
[16] Mahamat Hissein Guiagoussou, Raouf Boutaba, and Michel Kadoch. A java API for advanced faults management. In 2001 IEEE/IFIP International Symposium on Integrated Network Management, IM 2001, Seattle, USA, May 14-18, 2001. Proceedings, pages 483--498. IEEE, 2001. [ DOI | http ]
[17] Luanne Burns, Joseph L. Hellerstein, Sheng Ma, Chang-Shing Perng, David A. Rabenhorst, and David J. Taylor. Towards discovery of event correlation rules. In 2001 IEEE/IFIP International Symposium on Integrated Network Management, IM 2001, Seattle, USA, May 14-18, 2001. Proceedings, pages 345--359. IEEE, 2001. [ DOI | http ]
[18] Johannes Schmitt, Frank A. Zdarsky, Martin Karsten, and Ralf Steinmetz. Heterogeneous multicast in heterogeneous qos networks. In Proceedings 9th IEEE International Conference on Networks, ICON 2001, Bangkok, Thailand, October 10-11, 2001, pages 349--354. IEEE, 2001. [ DOI | http ]
[19] Sunning Go, Johnny W. Wong, and Zheng Da Wu. Protocol design of MPEG-4 media delivery with active networks. In Networking - ICN 2001, First International Conference, Colmar, France, July 9-13, 2001 Proceedings, Part 2, volume 2094 of Lecture Notes in Computer Science, pages 639--647. Springer, 2001. [ DOI | http ]
[20] Paul A. S. Ward and David J. Taylor. A hierarchical cluster algorithm for dynamic, centralized timestamps. In Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), Phoenix, Arizona, USA, April 16-19, 2001, pages 585--593. IEEE Computer Society, 2001. [ DOI | http ]
[21] Youssef Iraqi and Raouf Boutaba. When is it worth involving several cells in the call admission control process for multimedia cellular networks? In IEEE International Conference on Communications, ICC 2001, June 11-14, Helsinki, Finland, pages 336--340. IEEE, 2001. [ DOI | http ]
[22] Jia Wang, Yu Zhang, and Srinivasan Keshav. Understanding end-to-end performance: testbed and primary results. In Proceedings of the Global Telecommunications Conference, 2001. GLOBECOM '01, San Antonio, TX, USA, 25-29 November, 2001, pages 1632--1636. IEEE, 2001. [ DOI | http ]
[23] Ahmed Mehaoua and Raouf Boutaba. A cooperative qos control framework for streaming video applications. In Proceedings of the Global Telecommunications Conference, 2001. GLOBECOM '01, San Antonio, TX, USA, 25-29 November, 2001, pages 2470--2474. IEEE, 2001. [ DOI | http ]
[24] Yanni Ellen Liu and Johnny W. Wong. Deadline based channel scheduling. In Proceedings of the Global Telecommunications Conference, 2001. GLOBECOM '01, San Antonio, TX, USA, 25-29 November, 2001, pages 2358--2362. IEEE, 2001. [ DOI | http ]
[25] Oliver Heckmann, Vasilios Darlagiannis, Martin Karsten, and Ralf Steinmetz. A price communication protocol for a multi-service internet. In Tagungsband der GI/OCG-Jahrestagung - 31. Jahrestagung der Gesellschaft für Informatik, Wirtschaft und Wissenschaft in der Network Economy - Visionen und Wirklichkeit, Jahrestagung der Österreichischen Computer Gesellschaft 2001, INFORMATIK/OCG 2001, Vienna, Austria, September 25-28, 2001, Band 1, volume 157 of Schriftenreihe der Österreichischen Computer-Gesellschaft, pages 112--119. Konstanz UVK-Verl.-Ges., 2001.
[26] Paul A. S. Ward and David J. Taylor. Self-organizing hierarchical cluster timestamps. In Euro-Par 2001: Parallel Processing, 7th International Euro-Par Conference Manchester, UK August 28-31, 2001, Proceedings, volume 2150 of Lecture Notes in Computer Science, pages 46--56. Springer, 2001. [ DOI | http ]
[27] Johnny W. Wong, David Evans, and Michael Kwok. On staleness and the delivery of web pages. In Proceedings of the 2001 conference of the Centre for Advanced Studies on Collaborative Research, November 5-7, 2001, Toronto, Ontario, Canada, page 17. IBM, 2001. [ http ]

2000

[1] Martin Karsten. QoS signalling and charging in a multi-service internet using RSVP. PhD thesis, Darmstadt University of Technology, Germany, 2000. [ .pdf ]
[2] Xiaotie Deng, Nian Gu, Tim Brecht, and KaiCheng Lu. Preemptive scheduling of parallel jobs on multiprocessors. SIAM J. Comput., 30(1):145--160, 2000. [ DOI | http ]
[3] Youssef Iraqi, Raouf Boutaba, and Alberto Leon-Garcia. Qos control in wireless ATM. Mob. Networks Appl., 5(2):137--145, 2000. [ DOI | http ]
[4] Youssef Iraqi and Raouf Boutaba. Resource management issues in future wireless multimedia networks. J. High Speed Networks, 9(3-4):231--260, 2000. [ http ]
[5] Matthew Izatt, Patrick Chan, and Tim Brecht. Ajents: towards an environment for parallel, distributed and mobile java applications. Concurr. Pract. Exp., 12(8):667--685, 2000. [ DOI | http ]
[6] Martin Karsten, Jens B. Schmitt, Burkhard Stiller, and Lars C. Wolf. Charging for packet-switched network communication - motivation and overview. Comput. Commun., 23(3):290--302, 2000. [ DOI | http ]
[7] Donna Bergmark and Srinivasan Keshav. Building blocks for IP telephony. IEEE Commun. Mag., 38(4):88--94, 2000. [ DOI | http ]
[8] Youssef Iraqi and Raouf Boutaba. A novel distributed call admission control for wireless mobile multimedia networks. In Proceedings of the Third ACM International Workshop on Wireless Mobile Multimedia, WOWMOM 2000, Boston, Massachusetts, USA, August 11, 2000, pages 21--27. ACM, 2000. [ DOI | http ]
[9] Youssef Iraqi and Raouf Boutaba. An adaptive distributed call admission control for qos-sensitive wireless mobile networks. In 2000 IEEE Wireless Communications and Networking Conference, WCNC 2000, Chicago, IL, USA, September 23-28, 2000, pages 449--453. IEEE, 2000. [ DOI | http ]
[10] Kenneth Salem, Kevin S. Beyer, Roberta Cochrane, and Bruce G. Lindsay. How to roll a join: Asynchronous incremental view maintenance. In Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, May 16-18, 2000, Dallas, Texas, USA, pages 129--140. ACM, 2000. [ DOI | http ]
[11] Martin Karsten, Jens B. Schmitt, Nicole Beriér, and Ralf Steinmetz. On the feasibility of RSVP as general signalling interface. In Quality of Future Internet Services, First COST 263 International Workshop, QofIS 2000, Berlin, Germany, September 25-26, 2000, Proceedings, volume 1922 of Lecture Notes in Computer Science, pages 105--116. Springer, 2000. [ DOI | http ]
[12] Karima Boudaoud, Houda Labiod, Raouf Boutaba, and Zahia Guessoum. Network security management with intelligent agents. In The Networked Planet: Management Beyond 2000, 7th IEEE/IFIP Network Operations and Management Symposium, NOMS 2000, Honolulu, HI, USA, April 10-14, 2000. Proceedings, pages 579--592. IEEE, 2000. [ DOI | http ]
[13] Martin Karsten. Design and implementation of RSVP based on object-relationships. In NETWORKING 2000, Broadband Communications, High Performance Networking, and Performance of Communication Networks, IFIP-TC6 / European Commission International Conference, Paris, France, May 14-19, 2000, Proceedings, volume 1815 of Lecture Notes in Computer Science, pages 325--337. Springer, 2000. [ DOI | http ]
[14] Jens B. Schmitt, Martin Karsten, and Ralf Steinmetz. Layered network qos signalling - motivation, implementation & measurements. In Proceedings 27th Conference on Local Computer Networks, Tampa, Florida, USA, 8-10 November, 2000, pages 48--57. IEEE Computer Society, 2000. [ DOI | http ]
[15] Xiaodong Lin, Johnny W. Wong, and Weidong Kou. Performance analysis of secure web server based on SSL. In Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, volume 1975 of Lecture Notes in Computer Science, pages 249--261. Springer, 2000. [ DOI | http ]
[16] Martin Karsten, Jens B. Schmitt, and Ralf Steinmetz. Generalizing rsvp's traffic and policy control interface. In Seventh International Conference on Parallel and Distributed Systems Workshops, ICPADS 2000 Workshops, Iwate, Japan, July 4-7, 2000, pages 249--254. IEEE Computer Society, 2000. [ DOI | http ]
[17] Biswaroop Mukherjee and Tim Brecht. Time-lined TCP for the tcp-friendly delivery of streaming media. In Eighth Annual International Conference on Network Protocols, ICNP 2000, 14-17 November, 2000, Osaka, Japan, pages 165--176. IEEE Computer Society, 2000. [ DOI | http ]
[18] Johnny W. Wong and Yanni Ellen Liu. Deadline based network resource management. In Proceedings Ninth International Conference on Computer Communications and Networks, ICCCN 2000, 16-18 October 2000, Las Vegas, Nevada, USA, pages 264--268. IEEE, 2000. [ DOI | http ]
[19] David J. Taylor, Nagui Halim, Joseph L. Hellerstein, and Sheng Ma. Scalable visualization of event data. In Services Management in Intelligent Networks, 11th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2000, Austin, Texas, USA, December 4-6, 2000, Proceedings, volume 1960 of Lecture Notes in Computer Science, pages 47--58. Springer, 2000. [ DOI | http ]
[20] Youssef Iraqi and Raouf Boutaba. A multi-agent system for resource management in wireless mobile multimedia networks. In Services Management in Intelligent Networks, 11th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2000, Austin, Texas, USA, December 4-6, 2000, Proceedings, volume 1960 of Lecture Notes in Computer Science, pages 218--229. Springer, 2000. [ DOI | http ]

1999

[1] Jens B. Schmitt, Lars C. Wolf, Martin Karsten, and Ralf Steinmetz. A taxonomy of interaction models for internet and ATM quality of service architectures. Telecommun. Syst., 11(1-2):105--125, 1999. [ DOI | http ]
[2] Harjinder S. Sandhu, Tim Brecht, and D. Moscoso. Multiple-writer entry consistency. Scalable Comput. Pract. Exp., 2(2), 1999. [ http ]
[3] Ahmed Mehaoua, Zhong Fan, Spyros G. Denazis, and Raouf Boutaba. Activenet: Principles and applications. Netw. Inf. Syst. J., 2(1):25--46, 1999.
[4] Mahamat Guiagoussou, Raouf Boutaba, and Gregor von Bochmann. A framework for alarm correlation and fault diagnostics. Netw. Inf. Syst. J., 2(4):459--482, 1999.
[5] Raouf Boutaba, Joakim Kalvenes, and Guy Pujolle. Editorial - resource management in mobile wireless communication networks. Mob. Networks Appl., 4(2):83--86, 1999.
[6] Raouf Boutaba and Abdelhakim Hafid. A generic platform for scalable access to multimedia-on-demand systems. IEEE J. Sel. Areas Commun., 17(9):1599--1613, 1999. [ DOI | http ]
[7] Youssef Iraqi, Raouf Boutaba, and Rachida Dssouli. Statistical properties of MPEG video traffic and their impact on bandwidth allocation in wireless ATM networks. In 1999 IEEE Wireless Communications and Networking Conference, WCNC 1999, September 21-24, 1999, New Orleans, Louisiana, USA, pages 998--1002. IEEE, 1999. [ DOI | http ]
[8] Tim Brecht and Harjinder S. Sandhu. The region trap library: Handling traps on application-defined regions of memory. In Proceedings of the 1999 USENIX Annual Technical Conference, June 6-11, 1999, Monterey, California, USA, pages 85--99. USENIX, 1999. [ .pdf ]
[9] Arunprasad P. Marathe and Kenneth Salem. Query processing techniques for arrays. In SIGMOD 1999, Proceedings ACM SIGMOD International Conference on Management of Data, June 1-3, 1999, Philadelphia, Pennsylvania, USA, pages 323--334. ACM Press, 1999. [ DOI | http ]
[10] Jia Wang and Srinivasan Keshav. Efficient and accurate ethernet simulation. In Proceedings 26th Conference on Local Computer Networks, Lowell, Massachusetts, USA, 17-20 October, 1999, pages 182--191. IEEE Computer Society, 1999. [ DOI | http ]
[11] Martin Karsten, Jens B. Schmitt, Lars C. Wolf, and Ralf Steinmetz. Cost and price calculation for internet integrated services. In Kommunikation in Verteilten Systemen, ITG/GI-Fachtagung, Darmstadt, 2.-5. März 1999, Informatik Aktuell, pages 46--57. Springer, 1999. [ DOI | http ]
[12] Matthew Izatt, Patrick Chan, and Tim Brecht. Ajents: Towards an environment for parallel, distributed and mobile java applications. In Proceedings of the ACM 1999 Conference on Java Grande, JAVA '99, San Francisco, CA, USA, June 12-14, 1999, pages 15--24. ACM, 1999. [ DOI | http ]
[13] Ahmed Mehaoua, Raouf Boutaba, Jean-Pierre Claudé, and Guy Pujolle. Proposal of an audiovisual SSCS with forward error correction. In Proceedings of the Fourth IEEE Symposium on Computers and Communications (ISCC 1999), 6-8 July 1999, Sharm El Sheikh, Red Sea, Egypt, pages 121--127. IEEE Computer Society, 1999. [ DOI | http ]
[14] X. W. Huang, Rosen Sharma, and Srinivasan Keshav. The ENTRAPID protocol development environment. In Proceedings IEEE INFOCOM '99, The Conference on Computer Communications, Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies, The Future Is Now, New York, NY, USA, March 21-25, 1999, pages 1107--1115. IEEE Computer Society, 1999. [ DOI | http ]
[15] Salima Omari, Raouf Boutaba, and Omar Cherkaoui. Policies in snmpv3-based management. In 1999 IEEE/IFIP International Symposium on Integrated Network Management, IM 1999, Boston, USA, May 24-28, 1999. Proceedings, pages 797--812. IEEE, 1999. [ DOI | http ]
[16] Walfrey Ng, Andrew Do-Sung Jun, HungKei Keith Chow, Raouf Boutaba, and Alberto Leon-Garcia. Miblets: A practical approach to virtual network management. In 1999 IEEE/IFIP International Symposium on Integrated Network Management, IM 1999, Boston, USA, May 24-28, 1999. Proceedings, pages 201--216. IEEE, 1999. [ DOI | http ]
[17] Lili Qiu, Yin Zhang, and Srinivasan Keshav. On individual and aggregate TCP performance. In Seventh Annual International Conference on Network Protocols, ICNP 1999, 31 October - 3 November, 1999, Toronto, Canada, Proceedings, pages 203--212. IEEE Computer Society, 1999. [ DOI | http ]
[18] Srinivasan Keshav and Sanjoy Paul. Centralized multicast. In Seventh Annual International Conference on Network Protocols, ICNP 1999, 31 October - 3 November, 1999, Toronto, Canada, Proceedings, pages 59--68. IEEE Computer Society, 1999. [ DOI | http ]
[19] Ahmed Mehaoua, Raouf Boutaba, Song Pu, Yasser Rasheed, and Alberto Leon-Garcia. Towards an efficient ATM best effort video delivery service. In 1999 IEEE International Conference on Communications: Global Convergence Through Communications, ICC 1999, Vancouver, BC, Canada, June 18-22, 1999, pages 1352--1356. IEEE, 1999. [ DOI | http ]
[20] Ahmed Mehaoua and Raouf Boutaba. The impacts of errors and delays on the performance of MPEG2 video communications. In Proceedings of the 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP '99, Phoenix, Arizona, USA, March 15-19, 1999, pages 2195--2198. IEEE Computer Society, 1999. [ DOI | http ]
[21] Salima Omari, Raouf Boutaba, and Omar Cherkaoui. Directory supported management with snmpv3. In Active Technologies for Network and Service Management, 10th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM '99, Zurich, Switzerland, October 11-13, 1999, Proceedings, volume 1700 of Lecture Notes in Computer Science, pages 121--132. Springer, 1999. [ DOI | http ]
[22] Youssef Iraqi and Raouf Boutaba. A dynamic bandwidth allocation algorithm for MPEG video sources in wireless networks. In Proceedings of the 3rd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DIAL-M 1999), Seattle, Washington, USA, August 20, 1999, pages 86--92. ACM, 1999. [ DOI | http ]

1998

[1] Martin Karsten, Jens B. Schmitt, Lars C. Wolf, and Ralf Steinmetz. Abrechnungsverfahren für paketvermittelte diensteintegrierende kommunikationsnetze. Prax. Inf.verarb. Kommun., 21(4):211--218, 1998. [ http ]
[2] Nazim Agoulmine and Raouf Boutaba. Evolution of telecommunication management towards distributed intelligent cost-effective architectures. Netw. Inf. Syst. J., 1(4-5):433--468, 1998.
[3] Andrew T. Campbell and Srinivasan Keshav. Quality of service in distributed systems. Comput. Commun., 21(4):291--293, 1998. [ DOI | http ]
[4] Ahmed Mehaoua and Raouf Boutaba. Performance analysis of cell discarding techniques for best effort video communications over ATM networks. Comput. Networks ISDN Syst., 29(17-18):2021--2037, 1998. [ DOI | http ]
[5] Srinivasan Keshav and Rosen Sharma. Issues and trends in router design. IEEE Commun. Mag., 36(5):144--151, 1998. [ DOI | http ]

1997

[1] Charles R. Kalmanek, Srinivasan Keshav, William T. Marshall, Samuel P. Morgan, and Robert C. Restrick. Xunet 2 lessons from an early wide-area ATM testbed. IEEE/ACM Trans. Netw., 5(1):40--55, 1997. [ DOI | http ]
[2] Matthias Grossglauser, Srinivasan Keshav, and David N. C. Tse. RCBR: a simple and efficient service for multiple time-scale traffic. IEEE/ACM Trans. Netw., 5(6):741--755, 1997. [ DOI | http ]
[3] Sedat Akyürek and Kenneth Salem. Adaptive block rearrangement under UNIX. Softw. Pract. Exp., 27(1):1--23, 1997. [ DOI | http ]
[4] Tim Brecht, Xiaotie Deng, and Nian Gu. Competitive dynamic multiprocessor allocation for parallel applications. Parallel Process. Lett., 7(1):89--100, 1997. [ DOI | http ]
[5] Alexander E. Kaplan, Srinivasan Keshav, Norman L. Schryer, and J. H. Venutolo. An internet accessible telepresence. Multim. Syst., 5(2):140--144, 1997. [ DOI | http ]
[6] Johnny W. Wong, Kelly A. Lyons, David Evans, Rolf J. Velthuys, Gregor von Bochmann, Eric Dubois, Nicolas D. Georganas, Gerald W. Neufeld, M. Tamer Özsu, Jeff Brinskelle, Abdelhakim Hafid, Norman C. Hutchinson, Paul Iglinski, Brigitte Kerhervé, Louise Lamont, Dwight J. Makaroff, and Duane Szafron. Enabling technology for distributed multimedia applications. IBM Syst. J., 36(4):489--507, 1997. [ DOI | http ]
[7] Michael A. Bauer, Richard B. Bunt, Asham El Rayess, Patrick J. Finnigan, Thomas Kunz, Hanan Lutfiyya, Andrew D. Marshall, Patrick Martin, Gregory M. Oster, Wendy Powley, Jerome A. Rolia, David J. Taylor, and C. Murray Woodside. Services supporting management of distributed applications and systems. IBM Syst. J., 36(4):508--526, 1997. [ DOI | http ]
[8] Twan Basten, Thomas Kunz, James P. Black, Michael H. Coffin, and David J. Taylor. Vector time and causality among abstract events in distributed computations. Distributed Comput., 11(1):21--39, 1997. [ DOI | http ]
[9] Raouf Boutaba, Karim El Guemhioui, and Petre Dini. An outlook on intranet management. IEEE Commun. Mag., 35(10):92--99, 1997. [ DOI | http ]
[10] Thomas Kunz, James P. Black, David J. Taylor, and Twan Basten. Poet: Target-system independent visualizations of complex distributed-application executions. Comput. J., 40(8):499--512, 1997. [ DOI | http ]
[11] Arunprasad P. Marathe and Kenneth Salem. A language for manipulating arrays. In VLDB'97, Proceedings of 23rd International Conference on Very Large Data Bases, August 25-29, 1997, Athens, Greece, pages 46--55. Morgan Kaufmann, 1997. [ .PDF ]
[12] Jeff Edmonds, Donald D. Chinn, Tim Brecht, and Xiaotie Deng. Non-clairvoyant multiprocessor scheduling of jobs with changing execution characteristics (extended abstract). In Proceedings of the Twenty-Ninth Annual ACM Symposium on the Theory of Computing, El Paso, Texas, USA, May 4-6, 1997, pages 120--129. ACM, 1997. [ DOI | http ]
[13] Martin Karsten and Ralf Steinmetz. An approach to pricing of connectionless network services. In Management of Multimedia Networks and Services, IEEE/IFIP TC6/WG6.4/WG6.6 International Conference on Management of Multimedia Networks and Services, 8-10 July 1997, Montreal, Canada, volume 112 of IFIP Conference Proceedings, pages 219--230. Chapman & Hall, 1997.
[14] Ahmed Mehaoua, Raouf Boutaba, and Guy Pujolle. An adaptive and selective cell drop policy with dynamic data partitioning for best effort video over ATM. In 22nd IEEE Conference on Local Computer Networks (LCN '97), 2-5 November 1997, Minneapolis, Minnesota, USA, Proceedings, pages 519--528. IEEE Computer Society, 1997. [ DOI | http ]
[15] Tim Brecht. An experimental evaluation of processor pool-based scheduling for shared-memory NUMA multiprocessors. In Job Scheduling Strategies for Parallel Processing, IPPS'97 Workshop, Geneva, Switzerland, April 5, 1997, Proceedings, volume 1291 of Lecture Notes in Computer Science, pages 139--165. Springer, 1997. [ DOI | http ]
[16] Ahmed Mehaoua, Raouf Boutaba, and Guy Pujolle. An extended priority data partition scheme for MPEG video connections over ATM. In Proceedings of the Second IEEE Symposium on Computers and Communications (ISCC 1997), July 1-3, 1997, Alexandria, Egypt, pages 62--67. IEEE Computer Society, 1997. [ DOI | http ]
[17] Mahamat Guiagoussou and Raouf Boutaba. A TMN framework for faults diagnostic in wireless telecommunication networks. In Proceedings of the Second IEEE Symposium on Computers and Communications (ISCC 1997), July 1-3, 1997, Alexandria, Egypt, pages 424--432. IEEE Computer Society, 1997. [ DOI | http ]
[18] Srinivasan Keshav and Samuel P. Morgan. SMART retransmission: Performance with overload and random losses. In Proceedings IEEE INFOCOM '97, The Conference on Computer Communications, Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies, Driving the Information Revolution, Kobe, Japan, April 7-12, 1997, pages 1131--1138. IEEE Computer Society, 1997. [ DOI | http ]
[19] Petre Dini and Raouf Boutaba. Deriving variabel polling frequency policies for pro-activce management in networks and distributed systems. In Integrated Network Management V, Integrated management in a virtual world, Proceedings of the Fifth IFIP/IEEE International Symposium on Integrated Network Management, San Diego, CA, USA, May 12-16, 1997, volume 86 of IFIP Conference Proceedings, pages 541--552. Chapman & Hall, 1997.
[20] Abdelhakim Hafid and Raouf Boutaba. A scalable access scheme to access multimedia documents with quality of service guarantees. In Interactive Distributed Multimedia Systems and Telecommunication Services, 4th International Workshop, IDMS '97, Darmstadt, Germany, September 10-12, 1997, Proceedings, volume 1309 of Lecture Notes in Computer Science, pages 386--396. Springer, 1997. [ DOI | http ]
[21] Ahmed Mehaoua, Raouf Boutaba, and Guy Pujolle. Proposal of an extended AAL5 for VBR MPEG-2 over ATM. In Proceedings of the International Conference on Multimedia Computing and Systems, ICMCS 1997, Ottawa, Ontario, Canada, June 3-6, 1997, pages 618--619. IEEE Computer Society, 1997. [ DOI | http ]
[22] Thomas Kunz, David J. Taylor, and James P. Black. Poet: Target-system-independent visualizations of complex distributed executions. In 30th Annual Hawaii International Conference on System Sciences (HICSS-30), 7-10 January 1997, Maui, Hawaii, USA, pages 452--461. IEEE Computer Society, 1997. [ DOI | http ]

1996

[1] Ritesh Ahuja, Srinivasan Keshav, and Huzur Saran. Design, implementation, and performance measurement of a native-mode ATM transport layer (extended version). IEEE/ACM Trans. Netw., 4(4):502--515, 1996. [ DOI | http ]
[2] Peter Triantafillou and David J. Taylor. VELOS: A new approach for efficiently achieving high availability in partitioned distributed systems. IEEE Trans. Knowl. Data Eng., 8(2):305--321, 1996. [ DOI | http ]
[3] Tim Brecht and Kaushik Guha. Using parallel program characteristics in dynamic processor allocation policies. Perform. Evaluation, 27/28(4):519--539, 1996.
[4] Verna J. Friesen, Janelle J. Harms, and Johnny W. Wong. Resource management with virtual paths in ATM networks. IEEE Netw., 10(5):10--20, 1996. [ DOI | http ]
[5] Peter A. Buhr, Martin Karsten, and Jun Shih. KDB: a multi-threaded debugger for multi-threaded applications. In Proceedings of the SIGMETRICS symposium on Parallel and distributed tools, SPDT '96, Philadelphia, Pennsylvania, USA, pages 80--87. ACM, 1996. [ DOI | http ]
[6] Xiaotie Deng, Nian Gu, Tim Brecht, and KaiCheng Lu. Preemptive scheduling of parallel jobs on multiprocessors. In Proceedings of the Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, 28-30 January 1996, Atlanta, Georgia, USA, pages 159--167. ACM/SIAM, 1996. [ http ]
[7] Tim Brecht, Harjinder S. Sandhu, Meijuan Shan, and Jimmy Talbot. Paraweb: towards world-wide supercomputing. In Proceedings of the 7th ACM SIGOPS European Workshop: Systems Support for Worldwide Applications, 1996, Connemara, Ireland, September 9-11, 1996, pages 181--188. ACM, 1996. [ DOI | http ]
[8] Ahmed Mehaoua, Raouf Boutaba, and Guy Pujolle. A picture quality control framework for MPEG video over ATM. In Protocols for High-Speed Networks V, TC6 WG6.1/6.4 Fifth International Workshop on Protocols for High-Speed Networks (PfHSN '96), 28-30 October 1996, Sophia Antipolis, France, volume 73 of IFIP Conference Proceedings, pages 49--59. Chapman & Hall, 1996.
[9] Matthias Grossglauser and Srinivasan Keshav. On CBR service. In Proceedings IEEE INFOCOM '96, The Conference on Computer Communications, Fifteenth Annual Joint Conference of the IEEE Computer and Communications Societies, Networking the Next Generation, San Francisco, CA, USA, March 24-28, 1996, pages 129--137. IEEE Computer Society, 1996. [ DOI | http ]
[10] Ritesh Ahuja, Srinivasan Keshav, and Huzur Saran. Design, implementation, and performance of a native mode ATM transport layer. In Proceedings IEEE INFOCOM '96, The Conference on Computer Communications, Fifteenth Annual Joint Conference of the IEEE Computer and Communications Societies, Networking the Next Generation, San Francisco, CA, USA, March 24-28, 1996, pages 206--214. IEEE Computer Society, 1996. [ DOI | http ]
[11] Paul Freedman, Daniel Gaudreau, Raouf Boutaba, and Ahmed Mehaoua. The two real-time solitudes: computerized control and telecommunications. In 2nd IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '96), 21-25 October 1996, Montreal, Canada, pages 87--90. IEEE Computer Society, 1996. [ DOI | http ]
[12] Chung-Min Chen, Kenneth Salem, and Miron Livny. The DBC: processing scientific data over the internet. In Proceedings of the 16th International Conference on Distributed Computing Systems, Hong Kong, May 27-30, 1996, pages 673--682. IEEE Computer Society, 1996. [ DOI | http ]
[13] David J. Taylor, Thomas Kunz, and James P. Black. A tool for debugging OSF DCE applications. In COMPSAC '96 - 20th Computer Software and Applications Conference, August 19-23, 1996, Seoul, Korea, pages 440--446. IEEE Computer Society, 1996. [ DOI | http ]

1995

[1] Peter Triantafillou and David J. Taylor. The location based paradigm for replication: Achieving efficiency and availability in distributed systems. IEEE Trans. Software Eng., 21(1):1--18, 1995. [ DOI | http ]
[2] Sedat Akyürek and Kenneth Salem. Adaptive block rearrangement. ACM Trans. Comput. Syst., 13(2):89--121, 1995. [ DOI | http ]
[3] Sedat Akyürek and Kenneth Salem. Management of partially safe buffers. IEEE Trans. Computers, 44(3):394--407, 1995. [ DOI | http ]
[4] Srinivasan Keshav, Carsten Lund, Steven J. Phillips, Nick Reingold, and Huzur Saran. An empirical evaluation of virtual circuit holding time policies in ip-over-atm networks. IEEE J. Sel. Areas Commun., 13(8):1371--1382, 1995. [ DOI | http ]
[5] Hector Garcia-Molina and Kenneth Salem. Non-deterministic queue operations. J. Comput. Syst. Sci., 51(2):211--222, 1995. [ DOI | http ]
[6] Srinivasan Keshav. A control-theoretic approach to flow control. Comput. Commun. Rev., 25(1):188--201, 1995. [ DOI | http ]
[7] Raouf Boutaba and Simon Znaty. An architectural approach for integrated network and systems management. Comput. Commun. Rev., 25(5):13--38, 1995. [ DOI | http ]
[8] Tim Brecht, Xiaotie Deng, and Nian Gu. Competitive dynamic multiprocessor allocation for parallel applications. In Proceedings of the Seventh IEEE Symposium on Parallel and Distributed Processing, SPDP 1995, San Antonio, Texas , USA, October 25-28, 1995, pages 448--455. IEEE, 1995. [ DOI | http ]
[9] Matthias Grossglauser, Srinivasan Keshav, and David N. C. Tse. RCBR: A simple and efficient service for multiple time-scale traffic. In Proceedings of the ACM SIGCOMM 1995 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, Cambridge, MA, USA, August 28 - September 1, 1995, pages 219--230. ACM, 1995. [ DOI | http ]
[10] Verna J. Friesen and Johnny W. Wong. A case study in local area migration to ATM. In Proceedings of the 4th International Conference on Computer Communications and Networks (ICCCN '95), September 20-23, 1995, Las Vegas, Nevada, USA, page 442. IEEE Computer Society, 1995. [ DOI | http ]
[11] Michael A. Bauer, Hanan Lutfiyya, James W. Hong, James P. Black, Thomas Kunz, David J. Taylor, Patrick Martin, Richard B. Bunt, Derek L. Eager, Patrick J. Finnigan, Jerome A. Rolia, C. Murray Woodside, and Toby J. Teorey. MANDAS: management of distributed applications and systems. In 5th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS 1995), August 28-30, 1995, Chenju, Korea, Proceedings, pages 200--206. IEEE Computer Society, 1995. [ DOI | http ]
[12] Yuh Ming Yong and David J. Taylor. Performing replay in an OSF DCE environment. In Proceedings of the 1995 Conference of the Centre for Advanced Studies on Collaborative Research, November 7-9, 1995, Toronto, Ontario, Canada, page 62. IBM, 1995. [ http ]
[13] David J. Taylor, Thomas Kunz, and James P. Black. Achieving target-system independence in event visualisation. In Proceedings of the 1995 Conference of the Centre for Advanced Studies on Collaborative Research, November 7-9, 1995, Toronto, Ontario, Canada, page 58. IBM, 1995. [ http ]

1994

[1] Timothy B. Brecht. Multiprogrammed parallel application scheduling in NUMA multiprocessors. PhD thesis, University of Toronto, Canada, 1994. [ http ]
[2] Peter Triantafillou and David J. Taylor. Multiclass replicated data management: Exploiting replication to improve efficiency. IEEE Trans. Parallel Distributed Syst., 5(2):121--138, 1994. [ DOI | http ]
[3] Kenneth Salem, Hector Garcia-Molina, and Jeannie Shands. Altruistic locking. ACM Trans. Database Syst., 19(1):117--165, 1994. [ DOI | http ]
[4] Jing-Fei Ren, Jon W. Mark, and Johnny W. Wong. Performance analysis of a leaky-bucket controlled ATM multiplexer. Perform. Evaluation, 19(1):73--101, 1994. [ DOI | http ]
[5] Huzur Saran, Srinivasan Keshav, and Charles R. Kalmanek. A scheduling discipline and admission control policy for xunet 2. Multim. Syst., 2(3):118--128, 1994. [ DOI | http ]
[6] Michael A. Bauer, Neil Coburn, Doreen L. Erickson, Patrick J. Finnigan, James W. Hong, Per-Åke Larson, Jan K. Pachl, Jacob Slonim, David J. Taylor, and Toby J. Teorey. A distributed system architecture for a distributed application environment. IBM Syst. J., 33(3):399--425, 1994. [ DOI | http ]
[7] Hector Garcia-Molina and Kenneth Salem. Services for a workflow management system. IEEE Data Eng. Bull., 17(1):40--44, 1994. [ .pdf ]
[8] Ahmed E. Kamal, Johnny W. Wong, and Hossam S. Hassanein. An algorithm for slot reuse in DQDB networks with erasure nodes. Comput. Networks ISDN Syst., 26(6-8):695--710, 1994. [ DOI | http ]
[9] Rosen Sharma and Srinivasan Keshav. Signaling and operating system support for native-mode ATM applications. In Proceedings of the ACM SIGCOMM '94 Conference on Communications Architectures, Protocols and Applications, London, UK, August 31 - September 2, 1994, pages 149--157. ACM, 1994. [ DOI | http ]
[10] Raouf Boutaba and Simon Znaty. Towards integrated network management : A domain/policy approach and its application to A high speed multi-network. In Proceedings of NOMS '94, IEEE Network Operations and Management Symposium, Hyatt Orlando, Kissimee, Florida, USA, February 14-17,1 994, pages 777--789. IEEE, 1994. [ DOI | http ]
[11] Richard T. Hurley, James P. Black, and Johnny W. Wong. Limited effects of finite storage on a beneficial file migration policy. In Proceedings 19th Conference on Local Computer Networks, Minneapolis, Minnesota, USA, October 2-5, 1994, pages 432--439. IEEE Computer Society, 1994. [ DOI | http ]
[12] Huzur Saran and Srinivasan Keshav. An empirical evaluation of virtual circuit holding times in ip-over-atm networks. In Proceedings IEEE INFOCOM '94, The Conference on Computer Communications, Thirteenth Annual Joint Conference of the IEEE Computer and Communications Societies, Networking for Global Communications, Toronto, Ontario, Canada, June 12-16, 1994, pages 1132--1140. IEEE Computer Society, 1994. [ DOI | http ]
[13] Hossam S. Hassanein, Johnny W. Wong, and Jon W. Mark. An effective erasure node algorithm for slot reuse in DQDB. In Proceedings IEEE INFOCOM '94, The Conference on Computer Communications, Thirteenth Annual Joint Conference of the IEEE Computer and Communications Societies, Networking for Global Communications, Toronto, Ontario, Canada, June 12-16, 1994, pages 1302--1309. IEEE Computer Society, 1994. [ DOI | http ]
[14] David J. Taylor and Michael H. Coffin. Integrating real-time and partial-order information in event-data displays. In Proceedings of the 1994 Conference of the Centre for Advanced Studies on Collaborative Research, October 31 - November 3, 1994, Toronto, Ontario, Canada, page 66. IBM, 1994. [ http ]
[15] Khuzaima S. Daudjee and Anestis A. Toptsis. A technique for automatically organizing software libraries for software reuse. In Proceedings of the 1994 Conference of the Centre for Advanced Studies on Collaborative Research, October 31 - November 3, 1994, Toronto, Ontario, Canada, page 12. IBM, 1994. [ http ]
[16] Raouf Boutaba and Bertil Folliot. Program and file allocation algorithm for large scale distributed systems. In Applications in Parallel and Distributed Computing, Proceedings of the IFIP WG10.3 Working Conference on Applications in Parallel and Distributed Computing, Caracas, Venezuela, 18-22 April, 1994, volume A-44 of IFIP Transactions, pages 165--173. North-Holland, 1994.

1993

[1] Alan Berenbaum, Joe Dixon, Ananad Iyengar, and Srinivasan Keshav. A flexible atm-host interface for XUNET II. IEEE Netw., 7(4):18--23, 1993. [ DOI | http ]
[2] Sedat Akyürek and Kenneth Salem. Adaptive block rearrangement under UNIX. In Proceedings of the Summer 1993 USENIX Conference, Cincinnati, OH, USA, June 21-25, 1993, pages 307--321. USENIX Association, 1993. [ http ]
[3] Huzur Saran, Srinivasan Keshav, Charles R. Kalmanek, and Stephen P. Morgan. A scheduling discipline and admission control policy for xunet 2. In Network and Operating System Support for Digital Audio and Video, 4th International Workshop, NOSSDAV '93, Lancaster, UK, November 3-5, 1993, Proceedings, volume 846 of Lecture Notes in Computer Science, pages 89--101. Springer, 1993. [ DOI | http ]
[4] Johnny W. Wong. Performance modeling of atm-based networks. In Messung, Modellierung und Bewertung von Rechen- und Kommunikationssystemen, 7. ITG/GI-Fachtagung, Aachen, Germany, 21.-23. September 1993, Informatik Aktuell, pages 15--26. Springer, 1993. [ DOI | http ]
[5] Verna J. Friesen and Johnny W. Wong. The effect of multiplexing, switching and other factors on the performance of broadband networks. In Proceedings IEEE INFOCOM '93, The Conference on Computer Communications, Twelfth Annual Joint Conference of the IEEE Computer and Communications Societies, Networking: Foundation for the Future, San Francisco, CA, USA, March 28 - April 1, 1993, pages 1194--1203. IEEE Computer Society, 1993. [ DOI | http ]
[6] Anindo Banerjea and Srinivasan Keshav. Queueing delays in rate controlled ATM networks. In Proceedings IEEE INFOCOM '93, The Conference on Computer Communications, Twelfth Annual Joint Conference of the IEEE Computer and Communications Societies, Networking: Foundation for the Future, San Francisco, CA, USA, March 28 - April 1, 1993, pages 547--556. IEEE Computer Society, 1993. [ DOI | http ]
[7] Sedat Akyürek and Kenneth Salem. Adaptive block rearrangement. In Proceedings of the Ninth International Conference on Data Engineering, April 19-23, 1993, Vienna, Austria, pages 182--189. IEEE Computer Society, 1993. [ DOI | http ]
[8] Richard T. Hurley, Soon Aun Yeap, Johnny W. Wong, and James P. Black. Potential benefits of file migration in a heterogeneous distributed file system. In Computing and Information - ICCI'93, Fifth International Conference on Computing and Information, Sudbury, Ontario, Canada, May 27-29, 1993, Proceedings, pages 123--127. IEEE Computer Society, 1993.
[9] David J. Taylor. The use of process clustering in distributed-system event displays. In Proceedings of the 1993 Conference of the Centre for Advanced Studies on Collaborative Research, October 24-28, 1993, Toronto, Ontario, Canada, 2 Volumes, pages 505--512. IBM, 1993. [ http ]
[10] Raouf Boutaba, Bertil Folliot, and Pierre Sens. Efficient ressources management in local area networks. In Advanced Information Processing Techniques for LAN and MAN Management, Proceedings of the IFIP TC6/WG6.4 International Conference on Advanced Information Processing Techniques for LAN and MAN Management, Versailles, France, 7-9 April, 1993, volume C-17 of IFIP Transactions, pages 101--114. North-Holland, 1993.
[11] Raouf Boutaba. A methodology for structuring management of networked systems. In Advanced Information Processing Techniques for LAN and MAN Management, Proceedings of the IFIP TC6/WG6.4 International Conference on Advanced Information Processing Techniques for LAN and MAN Management, Versailles, France, 7-9 April, 1993, volume C-17 of IFIP Transactions, pages 225--242. North-Holland, 1993.

1992

[1] Hector Garcia-Molina and Kenneth Salem. Main memory database systems: An overview. IEEE Trans. Knowl. Data Eng., 4(6):509--516, 1992. [ DOI | http ]
[2] Srinivasan Keshav. Report on the workshop on quality of service issues in high speed networks. Comput. Commun. Rev., 22(5):74--85, 1992. [ DOI | http ]
[3] Raouf Boutaba and Bertil Folliot. Load balancing in local area networks. In Computer Networks, Architecture and Applications, Proceedings of the IFIP TC6 Working Conference on Computer Networks, Architecture and Applications, NETWORKS '92, Trivandrum, India, 28-29 October, 1992, volume C-13 of IFIP Transactions, pages 67--78. North-Holland, 1992.
[4] Raouf Boutaba and Amine Benkiran. A framework for distributed systems management. In Computer Networks, Architecture and Applications, Proceedings of the IFIP TC6 Working Conference on Computer Networks, Architecture and Applications, NETWORKS '92, Trivandrum, India, 28-29 October, 1992, volume C-13 of IFIP Transactions, pages 287--298. North-Holland, 1992.
[5] Kenneth Salem, Daniel Barbará, and Richard J. Lipton. Probabilistic dignosis of hot spots. In Proceedings of the Eighth International Conference on Data Engineering, February 3-7, 1992, Tempe, Arizona, USA, pages 30--39. IEEE Computer Society, 1992. [ DOI | http ]
[6] Richard T. Hurley, James P. Black, and Johnny W. Wong. Modeling and investigation of a primitive file transfer operation. In Computing and Information - ICCI'92, Fourth International Conference on Computing and Information, Toronto, Ontario, Canada, May 28-30, 1992, Proceedings, pages 461--465. IEEE Computer Society, 1992.

1991

[1] Hector Garcia-Molina, Dieter Gawlick, Johannes Klein, Karl Kleissner, and Kenneth Salem. Modeling long-running activities as nested sagas. IEEE Data Eng. Bull., 14(1):14--18, 1991. [ .pdf ]
[2] Songnian Zhou and Tim Brecht. Processor-pool-based scheduling for large-scale NUMA multiprocessors. In Proceedings of the 1991 ACM SIGMETRICS conference on Measurement and modeling of computer systems, San Diego, California, USA, May 21-24, 1991, pages 133--142. ACM, 1991. [ DOI | http ]
[3] Hui Zhang and Srinivasan Keshav. Comparison of rate-based service disciplines. In SIGCOMM '91, Proceedings of the Conference on Communications Architecture & Protocols, Zürich, Switzerland, September 3-6, 1991, pages 113--121. ACM, 1991. [ DOI | http ]
[4] Srinivasan Keshav. A control-theoretic approach to flow control. In SIGCOMM '91, Proceedings of the Conference on Communications Architecture & Protocols, Zürich, Switzerland, September 3-6, 1991, pages 3--15. ACM, 1991. [ DOI | http ]
[5] Hector Garcia-Molina and Kenneth Salem. Non-deterministic queue operations. In Proceedings of the Tenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, May 29-31, 1991, Denver, Colorado, USA, pages 53--62. ACM Press, 1991. [ DOI | http ]
[6] Timothy D. Korson, Nelson Hazeltine, Tim Hilgenberg, Reed Philip, and David J. Taylor. Managing the transition to object-oriented technology (panel). In Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA'91), Sixth Annual Conference, Phoenix, Arizona, USA, October 6-11, 1991, Proceedings, pages 355--358. ACM, 1991. [ DOI | http ]
[7] Peter Triantafillou and David J. Taylor. Efficiently maintaining availability in the presence of partitionings in distributed systems. In Proceedings of the Seventh International Conference on Data Engineering, April 8-12, 1991, Kobe, Japan, pages 34--41. IEEE Computer Society, 1991. [ DOI | http ]
[8] Peter Triantafillou and David J. Taylor. Using multiple replica classes to improve performance in distributed systems. In 10th International Conference on Distributed Computing Systems (ICDCS 1991), May 20-24, 1991, Arlington, Texas, USA, pages 420--428. IEEE Computer Society, 1991. [ DOI | http ]
[9] Hector Garcia-Molina, Dieter Gawlick, Johannes Klein, Karl Kleissner, and Kenneth Salem. Coordinating activities through extended sagas: a summary. In Compcon Spring '91, San Francisco, California, USA, February 25 - March 1, 1991. Digest of Papers, pages 568--573. IEEE Computer Society, 1991. [ DOI | http ]

1990

[1] Kenneth Salem and Hector Garcia-Molina. System M: A transaction processing testbed for memory resident data. IEEE Trans. Knowl. Data Eng., 2(1):161--172, 1990. [ DOI | http ]
[2] Ian J. Davis and David J. Taylor. Local correction of mod(k) lists. J. Syst. Softw., 11(3):205--214, 1990. [ DOI | http ]
[3] Peter Triantafillou and David J. Taylor. A new paradigm for high availability and efficiency in replicated distributed databases. In Proceedings of the Second IEEE Symposium on Parallel and Distributed Processing, SPDP 1990, Dallas, Texas, USA, December 9-13, 1990, pages 136--143. IEEE Computer Society, 1990. [ DOI | http ]
[4] Hans R. Müller, Mehdi Nassehi, Johnny W. Wong, Erwin A. Zurfluh, Werner Bux, and Pitro Zafiropulo. DQMA and CRMA: new access schemes for gbit/s lans and mans. In Proceedings IEEE INFOCOM '90, The Conference on Computer Communications, Ninth Annual Joint Conference of the IEEE Computer and Communications Societies, The Multiple Facets of Integration, San Francisco, CA, USA, June 3-7, 1990, pages 185--191. IEEE Computer Society, 1990. [ DOI | http ]
[5] David J. Taylor. Error models for robust storage structures. In Proceedings of the 20th International Symposium on Fault-Tolerant Computing, FTCS 1990, Newcastle Upon Tyne, UK, 26-28 June, 1990, pages 416--422. IEEE Computer Society, 1990. [ DOI | http ]
[6] Hector Garcia-Molina, Robert K. Abbott, Chris Clifton, Carl Staelin, and Kenneth Salem. Data management with massive memory: A summary. In Parallel Database Systems, PRISMA Workshop, Noordwijk, The Netherlands, September 24-26, 1990, Proceedings, volume 503 of Lecture Notes in Computer Science, pages 63--70. Springer, 1990. [ DOI | http ]

1989

[1] Timothy B. Brecht and Charles J. Colbourn. Multiplicative improvements in network reliability bounds. Networks, 19(5):521--529, 1989. [ DOI | http ]
[2] Alan J. Demers, Srinivasan Keshav, and Scott Shenker. Analysis and simulation of a fair queueing algorithm. In SIGCOMM '89, Proceedings of the ACM Symposium on Communications Architectures & Protocols, Austin, TX, USA, September 19-22, 1989, pages 1--12. ACM, 1989. [ DOI | http ]
[3] Kenneth Salem and Hector Garcia-Molina. Checkpointing memory-resident databases. In Proceedings of the Fifth International Conference on Data Engineering, February 6-10, 1989, Los Angeles, California, USA, pages 452--462. IEEE Computer Society, 1989. [ DOI | http ]

1988

[1] Hector Garcia-Molina and Kenneth Salem. The impact of disk striping on reliability. IEEE Data Eng. Bull., 11(1):26--39, 1988. [ .pdf ]
[2] Timothy B. Brecht and Charles J. Colbourn. Lower bounds on two-terminal network reliability. Discret. Appl. Math., 21(3):185--198, 1988. [ DOI | http ]
[3] H. D. Dykeman and Johnny W. Wong. A performance study of broadcast information delivery systems. In Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?, INFOCOM 1988, New Orleans, LA, USA, pages 739--745. IEEE, 1988. [ DOI | http ]

1987

[1] Mostafa H. Ammar and Johnny W. Wong. On the optimality of cyclic transmission in teletext systems. IEEE Trans. Commun., 35(1):68--73, 1987. [ DOI | http ]
[2] Johnny W. Wong, Andrew J. Vernon, and James A. Field. Evaluation of a path-finding algorithm for interconnected local area networks. IEEE J. Sel. Areas Commun., 5(9):1463--1470, 1987. [ DOI | http ]
[3] Rafael Alonso, Hector Garcia-Molina, and Kenneth Salem. Concurrency control and recovery for global procedures in federated database systems. IEEE Data Eng. Bull., 10(3):5--11, 1987. [ .pdf ]
[4] Hector Garcia-Molina and Kenneth Salem. Sagas. In Proceedings of the Association for Computing Machinery Special Interest Group on Management of Data 1987 Annual Conference, San Francisco, CA, USA, May 27-29, 1987, pages 249--259. ACM Press, 1987. [ DOI | http ]
[5] Kenneth Salem, Hector Garcia-Molina, and Rafael Alonso. Altruistic locking: A strategy for coping with long lived transactions. In High Performance Transaction Systems, 2nd International Workshop, Asilomar Conference Center, Pacific Grove, California, USA, September 28-30, 1987, Proceedings, volume 359 of Lecture Notes in Computer Science, pages 175--199. Springer, 1987. [ DOI | http ]

1986

[1] David J. Taylor. Concurrency and forward recovery in atomic actions. IEEE Trans. Software Eng., 12(1):69--78, 1986. [ DOI | http ]
[2] David J. Taylor and Carl-Johan H. Seger. Robust storage structures for crash recovery. IEEE Trans. Computers, 35(4):288--295, 1986. [ DOI | http ]
[3] David J. Taylor and James P. Black. Experimenting with data structures. Softw. Pract. Exp., 16(5):443--456, 1986. [ DOI | http ]
[4] Timothy B. Brecht and Charles J. Colbourn. Improving reliability bounds in computer networks. Networks, 16(4):369--380, 1986. [ DOI | http ]
[5] Johnny W. Wong and Mostafa H. Ammar. Response time performance of videotex systems. IEEE J. Sel. Areas Commun., 4(7):1174--1180, 1986. [ DOI | http ]
[6] David J. Taylor and James P. Black. A locally correctable b-tree implementation. Comput. J., 29(3):269--276, 1986. [ DOI | http ]
[7] David J. Taylor. How big can an atomic action be? In Fifth Symposium on Reliability in Distributed Software and Database Systems, SRDS 1986, Los Angeles, California, USA, January 13-15, 1986, Proceedings, pages 121--124. IEEE Computer Society, 1986.
[8] Kenneth Salem and Hector Garcia-Molina. Disk striping. In Proceedings of the Second International Conference on Data Engineering, February 5-7, 1986, Los Angeles, California, USA, pages 336--342. IEEE Computer Society, 1986. [ DOI | http ]
[9] H. D. Dykeman, Mostafa H. Ammar, and Johnny W. Wong. Scheduling algorithms for videotex systems under broadcast delivery. In IEEE International Conference on Communications: Integrating the World Through Communications, ICC 1986, Toronto, Canada, June 22-25, 1986, Proceedings, pages 1847--1851. IEEE, 1986.

1985

[1] Johnny W. Wong and Mostafa H. Ammar. Analysis of broadcast delivery in a videotex system. IEEE Trans. Computers, 34(9):863--866, 1985. [ DOI | http ]
[2] Mostafa H. Ammar and Johnny W. Wong. The design of teletext broadcast cycles. Perform. Evaluation, 5(4):235--242, 1985. [ DOI | http ]
[3] P. M. Gopal and Johnny W. Wong. Analysis of a hybrid token-scma/cd protocol for bus networks. Comput. Networks, 9:131--141, 1985. [ DOI | http ]

1984

[1] P. M. Gopal, Johnny W. Wong, and Jayanti C. Majithia. Analysis of playout strategies for voice transmission using packet switching techniques. Perform. Evaluation, 4(1):11--18, 1984. [ DOI | http ]
[2] Johnny W. Wong and P. M. Gopal. Analysis of a token ring protocol for voice transmission. Comput. Networks, 8:339--346, 1984. [ DOI | http ]
[3] Darwyn R. Peachey, Richard B. Bunt, Carey L. Williamson, and Tim Brecht. An experimental investigation of scheduling strategies for UNIX. In Proceedings of the 1984 ACM SIGMETRICS conference on Measurement and modeling of computer systems, Cambridge, Massachusetts, USA, August 21-24, 1984, pages 158--166. ACM, 1984. [ DOI | http ]

1983

[1] Johnny W. Wong and Gita Gopal. Analysis of reliable broadcast in local-area networks. In SIGCOMM '83, Proceedings of the Eighth Symposium on Data Communications, North Falmouth, Massachusetts, USA, October 3-6, 1983, pages 158--163. ACM, 1983. [ DOI | http ]
[2] Werner Bux, Bernd Meister, and Johnny W. Wong. Bridges for interconnection of ring networks: A simulation study. In Information Processing 83, Proceedings of the IFIP 9th World Computer Congress, Paris, France, September 19-23, 1983, pages 181--185. North-Holland/IFIP, 1983.

1982

[1] Johnny W. Wong, Jacques Philippe Sauvé, and James A. Field. A study of fairness in packet-switching networks. IEEE Trans. Commun., 30(2):346--353, 1982. [ DOI | http ]
[2] David J. Taylor and James P. Black. Principles of data structure error correction. IEEE Trans. Computers, 31(7):602--608, 1982. [ DOI | http ]
[3] Gaston H. Gonnet, Per-Åke Larson, J. Ian Munro, Doron Rotem, David J. Taylor, and Frank Wm. Tompa. Database storage structures research at the university of waterloo. IEEE Database Eng. Bull., 5(1):49--52, 1982. [ .pdf ]

1981

[1] Gita Gopal and Johnny W. Wong. Delay analysis of broadcast routing in packet-switching networks. IEEE Trans. Computers, 30(12):915--922, 1981. [ DOI | http ]
[2] James P. Black, David J. Taylor, and David E. Morgan. A case study in fault tolerant software. Softw. Pract. Exp., 11(2):145--157, 1981. [ DOI | http ]
[3] James P. Black, David J. Taylor, and David E. Morgan. A robust b-tree implementation. In Proceedings of the 5th International Conference on Software Engineering, San Diego, California, USA, March 9-12, 1981, pages 63--70. IEEE Computer Society, 1981. [ http ]

1980

[1] David J. Taylor, David E. Morgan, and James P. Black. Redundancy in data structures: Some theoretical result. IEEE Trans. Software Eng., 6(6):595--604, 1980. [ DOI | http ]
[2] David J. Taylor, David E. Morgan, and James P. Black. Redundancy in data structures: Improving software fault tolerance. IEEE Trans. Software Eng., 6(6):585--594, 1980. [ DOI | http ]
[3] Shashi K. Mehra, Johnny W. Wong, and Jayanti C. Majithia. A comparative study of some two-processor organizations. IEEE Trans. Computers, 29(1):44--49, 1980. [ DOI | http ]
[4] Wilfred L. W. Yu, Jayanti C. Majithia, and Johnny W. Wong. Access protocols for circuit/packet switching networks. Comput. Networks, 4:271--283, 1980. [ DOI | http ]
[5] J. Kent Peacock, Johnny W. Wong, and Eric G. Manning. Synchronization of distributed simulation using broadcast algorithms. Comput. Networks, 4:3--10, 1980. [ DOI | http ]

1979

[1] Johnny W. Wong. Technical note - response time distribution of the M/M/m/N queueing model. Oper. Res., 27(6):1196--1202, 1979. [ DOI | http ]
[2] J. Kent Peacock, Johnny W. Wong, and Eric G. Manning. Distributed simulation using a network of processors. Comput. Networks, 3:44--56, 1979. [ DOI | http ]
[3] J. Kent Peacock, Johnny W. Wong, and Eric G. Manning. A distributed approach to queueing network simulation. In Proceedings of the 11th conference on Winter simulation, WSC 1979, San Diego, CA, USA, December 3-5, 1979, pages 399--406. ACM, 1979. [ http ]
[4] J. Kent Peacock, Eric G. Manning, and Johnny W. Wong. Synchronization of distributed simulation using braodcast algorithms. In Proceedings of the Fourth Berkeley Workshop on Distributed Data Management and Computer Networks, August 28-30, 1979, page 237. Technical Information Department, Lawrence Berkeley Laboratory, University of California, Berkeley CA, 1979.

1978

[1] Johnny W. Wong. Queueing network modeling of computer communication networks. ACM Comput. Surv., 10(3):343--351, 1978. [ DOI | http ]
[2] Johnny W. Wong. Flow control in message-switched communications networks. Comput. Commun., 1(2):67--74, 1978. [ DOI | http ]
[3] Johnny W. Wong. Distribution of end-to-end delay in message-switched networks. Comput. Networks, 2:44--49, 1978. [ DOI | http ]
[4] J. Kent Peacock, Johnny W. Wong, and Eric G. Manning. Distributed simulation using a network of microcomputers. In Proceedings of the Third Berkeley Workshop on Distributed Data Management and Computer Networks, August 29-31, 1978, pages 358--371. Technical Information Department, Lawrence Berkeley Laboratory, University of California, Berkeley CA, 1978.

1977

[1] David E. Morgan, David J. Taylor, and G. Custeau. A survey of methods for improving computer network reliability and availability. Computer, 10(11):42--50, 1977. [ DOI | http ]
[2] David E. Morgan and David J. Taylor. Special feature A survey of methods of achieving reliable software. Computer, 10(2):44--53, 1977. [ DOI | http ]
[3] Johnny W. Wong and Mehmet S. Unsoy. Analysis of flow control in switched data networks. In Information Processing, Proceedings of the 7th IFIP Congress 1977, Toronto, Canada, August 8-12, 1977, pages 315--320. North-Holland, 1977.