By Topic

2003 IEEE Conference onOpen Architectures and Network Programming.

4-5 April 2003

Filter Results

Displaying Results 1 - 14 of 14
  • 2003 IEEE Conference on Open Architecture and Network Programming Proceedings. OPENARCH 2003 (Cat. No.03TH8686)

    Publication Year: 2003
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2003, Page(s): 131
    Request permission for commercial reuse | PDF file iconPDF (24 KB)
    Freely Available from IEEE
  • Efficient programmable middleboxes for scaling large distributed applications

    Publication Year: 2003, Page(s):65 - 74
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1024 KB) | HTML iconHTML

    A range of application classes is emerging in the Internet whose characteristics differ considerably from those of the point-to-point request/response protocols, which have dominated its recent past. Sensor applications, peer-to-peer systems, and massive multiplayer on-line games are multi-point applications that share both a need for the timely correlation of data generated by different participa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OPCA: robust interdomain policy routing and traffic control

    Publication Year: 2003, Page(s):55 - 64
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1059 KB) | HTML iconHTML

    An increasing number of ASes have been connecting to the Internet through the BGP inter-domain routing protocol. With increasing stress on the scale of this system and increasing reliance on Internet connectivity, more participants demand additional functionality from interdomain routing that BGP cannot handle. For example, we believe that the recent trend towards multihomed stub networks exhibits... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User-specified adaptive scheduling in a streaming media network

    Publication Year: 2003, Page(s):87 - 96
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1104 KB) | HTML iconHTML

    In disaster and combat situations, mobile cameras and other sensors transmit real-time data, used by many operators or analysis tools. Unfortunately, in the face of limited, unreliable resources, and varying demands, not all users may be able to get the fidelity they require. This paper describes MediaNet, a distributed stream processing system designed with the above scenarios in mind. Unlike pas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A generic set-formation service

    Publication Year: 2003, Page(s):109 - 119
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1094 KB) | HTML iconHTML

    Dynamic group formation and discovery is an important component of several emerging end system applications and network services including peer-to-peer and overlay systems, network storage/caching systems, and reliable multicast/distribution services. In our previous work, we proposed a programmable, scalable grouping service based on multicast and concast. In this paper, we present a generalized ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Run-time support for extensible protocol stacks

    Publication Year: 2003, Page(s):43 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (997 KB) | HTML iconHTML

    By implementing an extensible network protocol stack in the AMP operating system, we have demonstrated support for fine-grained replacement of low-level network processing components. Furthermore, our compiler technology approach provides the means to support multiple hardware architectures and a framework for enforcing safety and security properties during runtime code generation. Our preliminary... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An open service platform for deploying and managing services at network edges

    Publication Year: 2003, Page(s):77 - 86
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1188 KB) | HTML iconHTML

    Over the past several years, in response to demands from users that access to networked information and services be both customized and rapid, services and content have increasingly been 'pushed' towards network edges by providers. In turn, this has resulted in an increased need for a software framework that provides an open and systematic way for providers to deploy and manage such network edge s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Controlling the XenoServer Open Platform

    Publication Year: 2003, Page(s):3 - 11
    Cited by:  Papers (8)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (957 KB) | HTML iconHTML

    This paper presents the design of the XenoServer Open Platform: a public infrastructure for wide-area computing, capable of hosting tasks that span the full spectrum of distributed programming. The platform integrates resource management, charging and auditing. We emphasize the control-plane aspects of the system, showing how it supports service deployment with a low cost of entry and how it forms... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bees: a secure, resource-controlled, Java-based execution environment

    Publication Year: 2003, Page(s):97 - 106
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1092 KB) | HTML iconHTML

    Mobile code makes it possible for users to define the processing and protocols used to communicate with a remote node, while still allowing the remote administrator to set the terms of interaction with that node. However, mobile code cannot do anything useful without a rich execution environment, and no administrator would install a rich environment that did not also provide strict controls over t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transparent and scalable client-side server selection using Netlets

    Publication Year: 2003, Page(s):120 - 129
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (981 KB) | HTML iconHTML

    Replication of web content in the Internet has been found to improve service response time, performance and reliability offered by web services. When working with such distributed server systems, the location of servers with respect to client nodes is found to affect service response time perceived by clients in addition to server load conditions. This is due to the characteristics of the network ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Code revocation for active networks

    Publication Year: 2003, Page(s):12 - 22
    Cited by:  Papers (2)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1039 KB) | HTML iconHTML

    Active networks are placed at considerable risk by running code that arrives over the network. Careful crafting of authorization policy and stringent enforcement provide considerable protection against such risks. However, there still might be reasons why a packet that is executing in accordance with the authorization policy might cause damage. For example, the code might have bugs or may have bee... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid resource control of active extensions

    Publication Year: 2003, Page(s):23 - 31
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1035 KB) | HTML iconHTML

    The ability of active networks technology to allow customized router computation critically depends on having resource control techniques that prevent buggy, malicious, or greedy code from affecting the integrity or availability of node resources. It is hard to choose between static and dynamic checking for resource control. Dynamic checking has the advantage of basing its decisions on precise rea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic packet processors-a new abstraction for router extensibility

    Publication Year: 2003, Page(s):35 - 42
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (978 KB) | HTML iconHTML

    The history of the Internet is one of rapid change and adaptability. The simple IP service model and the informal standardization process have fostered rapid evolution of systems and services. However, as the Internet has transformed from an academic playground to an essential commercial infrastructure the service model and the standardization process have become more complex. While outsourcing an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.