Social Networks Can Be Used to Tailor Content Staging Decisions to the User Base and Thereby Build Better Data Delivery Infrastructures

Total Page:16

File Type:pdf, Size:1020Kb

Social Networks Can Be Used to Tailor Content Staging Decisions to the User Base and Thereby Build Better Data Delivery Infrastructures Social Network Support for Data Delivery Infrastructures Nishanth Sastry St. John’s College University of Cambridge This dissertation is submitted for the degree of Doctor of Philosophy 2011 Declaration This dissertation is the result of my own work and includes nothing which is the outcome of work done in collaboration except where specifically indicated in the text. This dissertation does not exceed the regulation length of 60 000 words, including tables and footnotes. Social Network Support for Data Delivery Infrastructures Summary Network infrastructures often need to stage content so that it is accessible to consumers. The standard solution, deploying the content on a centralised server, can be inadequate in several situations. Our thesis is that information encoded in social networks can be used to tailor content staging decisions to the user base and thereby build better data delivery infrastructures. This claim is supported by two case studies, which apply social information in challenging situations where traditional content staging is infeasible. Our approach works by examining empirical traces to identify relevant social properties, and then exploits them. The first study looks at cost-effectively serving the “Long Tail” of rich- media user-generated content, which need to be staged close to viewers to control latency and jitter. Our traces show that a preference for the un- popular tail items often spreads virally and is localised to some part of the social network. Exploiting this, we propose Buzztraq, which decreases replication costs by selectively copying items to locations favoured by viral spread. We also design SpinThrift, which separates popular and unpopular content based on the relative proportion of viral accesses, and opportunisti- cally spins down disks containing unpopular content, thereby saving energy. The second study examines whether human face-to-face contacts can efficiently create paths over time between arbitrary users. Here, content is staged by spreading it through intermediate users until the destination is reached. Flooding every node minimises delivery times but is not scalable. We show that the human contact network is resilient to individual path fail- ures, and for unicast paths, can efficiently approximate flooding in delivery time distribution simply by randomly sampling a handful of paths found by it. Multicast by contained flooding within a community is also efficient. However, connectivity relies on rare contacts and frequent contacts are often not useful for data delivery. Also, periods of similar duration could achieve different levels of connectivity; we devise a test to identify good periods. We finish by discussing how these properties influence routing algorithms. Acknowledgements First of all, I would like to thank Jon Crowcroft. For allowing me to discover my own thesis topic and approach, without any pressure. For opening up a whole host of collaboration opportunities. For quick and efficient feedback on my paper (and dissertation) drafts. For trademark-worthy names like Buzztraq and SpinThrift. One should be so lucky in their choice of supervisors. I have had more than my fair share of excellent mentors. Karen Sollins took me under her wing at MIT during my first year. I thank her for making it possible for me to start my PhD at the other Cambridge, and for her gentle and caring support since then. Discussions with collaborators and others have greatly shaped my think- ing. D. Manjunath helped me with my first baby steps in using probabilistic arguments. Anthony Hylick pointed me towards storage subsystems, and this led to SpinThrift. An email exchange with Steve Hand and the wider netos group helped sharpen my thinking on Buzztraq. Discussions with Vito Latora led me to create and experiment with synthetic versions of the MIT and UCSD traces. I have also benefited from lively and stimulating conversations on a wide range of topics with many of my FN07 officemates, past and present: Derek, Malte, Ganesh, Steve, Jisun, Mark, Henry, Chris, Stephen, Periklis, Theo, and frequent FN07 visitor Eiko. At MIT, I had Rob, Chintan and Ji in my office, and Mythili upstairs. Given the subject of this dissertation, it seems fitting to acknowledge that in a wider sense, the same purpose has been served by my social network support during these PhD years: Lava, Alex, Klaudia, Sriram, Alka, Amitabha, Mohita, Kiran, Lavanya, Vijay, Roopsha and Olga. My wife, Viji, has played such a central role that I don’t know where to begin. She is usually the first guinea pig on whom I try out my ideas. Having to explain to a non-computer scientist makes my thinking clearer and my ideas simpler. She suffers through unpolished versions of my talks. She stays up late during conference deadlines, for moral support. Once, she v vi even spell-checked my paper at 3 A.M. in the morning. At crucial junctures, she has completely taken over on the domestic front, allowing me to focus on work. In short, this dissertation is what it is because of (or inspite of) her. She is also responsible for ViVa, whom I need to thank separately for 1.5 years of pure fun. Amma and Nana planted the seeds for this dissertation a long while ago, when they bought me the eminently readable Chitra Kathegalu (Picture Stories) and later (what must have been for them an expensive book), The Children’s Book of Questions and Answers. I am forever in their debt. My sister Nikhila, five years younger, and therefore in need of teaching, was the first “student” I bossed over. That must have been the formative experience that set me off on an academic path. Finally, my sincere thanks to my College, St. John’s, for generously sup- porting me with a Benefactors’ Scholarship, and to The Cambridge Philo- sophical Society, who awarded me a Research Studentship. Contents Contents vii 1 Introduction1 1.1 The content staging problem . .1 1.2 Thesis and its substantiation . .6 1.3 List of publications . 14 1.4 Contributions and chapter outlines . 15 2 Social Networks: an overview 17 2.1 Different varieties of social networks . 18 2.2 Properties of social networks . 24 2.3 Anti-properties . 30 2.4 Social network-based systems . 34 2.5 Present dissertation and future outlook . 38 3 Akamaising the Long Tail 39 3.1 Introduction . 39 3.2 The tail of Internet-based catalogues: Long Tail versus Super Star Effect . 42 3.3 The tail of user-generated content . 47 3.4 Saving energy in the storage subsystem . 62 3.5 Tailoring content delivery for the tail . 71 3.6 Selective replication for viral workloads . 78 3.7 Conclusions . 89 vii viii CONTENTS 4 Data delivery properties of human contact networks 91 4.1 The Pocket Switched Network . 93 4.2 Setup and methodology . 97 4.3 Delivery over fixed number of contacts . 102 4.4 Delivery over fixed duration windows . 109 4.5 Understanding path delays . 115 4.6 Evaluating the effect of failures . 124 4.7 Multicast within communities . 134 4.8 Related work . 136 4.9 Design recommendations . 138 5 Reflections and future work 141 5.1 Summary of contributions . 142 5.2 A Unifying Social Information Plane . 143 5.3 On adding social network support at a systems level . 145 Bibliography 149 CHAPTER 1 Introduction 1.1 The content staging problem In this dissertation, we are interested in supporting “eyeball” information flows, where the consumer or target of the flow is a human being. In many eyeball information flows, the producer or source of the flow is also human, but this is not essential. Examples of such flows include instant-messaging, VoIP conversations, email, or a user-generated video being streamed online. A data communications network is only useful insofar as it is able to deliver content effectively to its consumers. Often, in eyeball information flows, the producer of the content and the consumers cannot be guaranteed to connect to the network infrastructure at the same time. In this situation, some intermediate infrastructure needs to play the key role of staging the content so that it becomes accessible to the consumer asynchronously. A simple, well understood staging mechanism is to deploy the content on a centralised server. The server increases the availability of the content in the temporal dimension by acting as an always-on proxy for the producer. This kind of asynchronous access is enabled by Bulletin Board Services (BBSes), news servers, online video and photo sharing sites, etc. However, a centralised server may be inadequate either because of spe- cial characteristics of the content, or because of inadequate support from 1 2 CHAPTER 1. INTRODUCTION the network itself1. For example, certain content, like rich-media video streams, have strict delivery constraints and require tight control over la- tency and jitter. This may be difficult to achieve with a centralised server and a globally distributed consumer base, given the best-effort nature of the current Internet. To resolve this, the producer needs to be proxied in space as well as in the time dimension, by mirroring the content in different parts of the network. Specialised global replication infrastructures called Content Delivery Networks (CDNs) have been developed for this purpose. Delay-tolerant networks like the Pocket Switched Network (PSN) [HCS+05] offer even lesser support and might not even guarantee any-any connectivity. In a PSN, content is opportunistically transmitted hop-by-hop over face- to-face contacts and connectivity is achieved over time through a sequence of social contacts. Clearly, each user involved as an intermediate node is mobile and can be thought of as increasing the availability of the content in a particular region of space-time where they are located, by acting as a proxy for the producer. Because of the extremely constrained connectivity, the coverage of individual proxies can be limited.
Recommended publications
  • A DATA-ORIENTED NETWORK ARCHITECTURE Doctoral Dissertation
    TKK Dissertations 140 Espoo 2008 A DATA-ORIENTED NETWORK ARCHITECTURE Doctoral Dissertation Teemu Koponen Helsinki University of Technology Faculty of Information and Natural Sciences Department of Computer Science and Engineering TKK Dissertations 140 Espoo 2008 A DATA-ORIENTED NETWORK ARCHITECTURE Doctoral Dissertation Teemu Koponen Dissertation for the degree of Doctor of Science in Technology to be presented with due permission of the Faculty of Information and Natural Sciences for public examination and debate in Auditorium T1 at Helsinki University of Technology (Espoo, Finland) on the 2nd of October, 2008, at 12 noon. Helsinki University of Technology Faculty of Information and Natural Sciences Department of Computer Science and Engineering Teknillinen korkeakoulu Informaatio- ja luonnontieteiden tiedekunta Tietotekniikan laitos Distribution: Helsinki University of Technology Faculty of Information and Natural Sciences Department of Computer Science and Engineering P.O. Box 5400 FI - 02015 TKK FINLAND URL: http://cse.tkk.fi/ Tel. +358-9-4511 © 2008 Teemu Koponen ISBN 978-951-22-9559-3 ISBN 978-951-22-9560-9 (PDF) ISSN 1795-2239 ISSN 1795-4584 (PDF) URL: http://lib.tkk.fi/Diss/2008/isbn9789512295609/ TKK-DISS-2510 Picaset Oy Helsinki 2008 AB ABSTRACT OF DOCTORAL DISSERTATION HELSINKI UNIVERSITY OF TECHNOLOGY P. O. BOX 1000, FI-02015 TKK http://www.tkk.fi Author Teemu Koponen Name of the dissertation A Data-Oriented Network Architecture Manuscript submitted 09.06.2008 Manuscript revised 12.09.2008 Date of the defence 02.10.2008 Monograph X Article dissertation (summary + original articles) Faculty Information and Natural Sciences Department Computer Science and Engineering Field of research Networking Opponent(s) Professor Jon Crowcroft Supervisor Professor Antti Ylä-Jääski Instructor(s) Dr.
    [Show full text]
  • Communications of the Acm
    COMMUNICATIONS CACM.ACM.ORG OF THEACM 11/2014 VOL.57 NO.11 Scene Understanding by Labeling Pixels Evolution of the Product Manager The Data on Diversity On Facebook, Most Ties Are Weak Keeping Online Reviews Honest Association for Computing Machinery tvx-full-page.pdf-newest.pdf 1 11/10/2013 12:03 3-5 JUNE, 2015 BRUSSELS, BELGIUM Course and Workshop C proposals by M 15 November 2014 Y CM Paper Submissions by MY 12 January 2015 CY CMY K Work in Progress, Demos, DC, & Industrial Submissions by 2 March 2015 Welcoming Submissions on Content Production Systems & Infrastructures Devices & Interaction Techniques Experience Design & Evaluation Media Studies Data Science & Recommendations Business Models & Marketing Innovative Concepts & Media Art TVX2015.COM [email protected] ACM Books M MORGAN& CLAYPOOL &C PUBLISHERS Publish your next book in the ACM Digital Library ACM Books is a new series of advanced level books for the computer science community, published by ACM in collaboration with Morgan & Claypool Publishers. I’m pleased that ACM Books is directed by a volunteer organization headed by a dynamic, informed, energetic, visionary Editor-in-Chief (Tamer Özsu), working closely with a forward-looking publisher (Morgan and Claypool). —Richard Snodgrass, University of Arizona books.acm.org ACM Books ◆ will include books from across the entire spectrum of computer science subject matter and will appeal to computing practitioners, researchers, educators, and students. ◆ will publish graduate level texts; research monographs/overviews of established and emerging fields; practitioner-level professional books; and books devoted to the history and social impact of computing. ◆ will be quickly and attractively published as ebooks and print volumes at affordable prices, and widely distributed in both print and digital formats through booksellers and to libraries and individual ACM members via the ACM Digital Library platform.
    [Show full text]
  • NORTHWESTERN UNIVERSITY Adopting a Gateway Centric View
    NORTHWESTERN UNIVERSITY Adopting a Gateway Centric View for Cellular Network Content Delivery A DISSERTATION SUBMITTED TO THE GRADUATE SCHOOL IN PARTIAL FULFILLMENT OF THE REQUIREMENTS for the degree DOCTOR OF PHILOSOPHY Field of Computer Science By John Paul Rula EVANSTON, ILLINOIS June 2017 2 c Copyright by John Paul Rula 2017 All Rights Reserved 3 Committee Fabi´anBustamante (Chair), Northwestern University Aleksandar Kuzmanovic, Northwestern University Peter Dinda, Northwestern University Jon Crowcroft, University of Cambridge 4 ABSTRACT Adopting a Gateway Centric View for Cellular Network Content Delivery John Paul Rula Mobile traffic is expected to grow tenfold by 2019, topping 24 exabytes of monthly traffic and accounting for nearly half of all Internet traffic. This growth is driven by the increasing number of smart phones and tablets, and the data demands of high bandwidth services enabled by next-generation cellular networks such as LTE/5G. As in the wired Internet, network usage is dominated by content consumption, with the vast majority served through content delivery networks (CDNs). CDNs host and replicate popular content across thousands of servers worldwide, directing users to \nearby" servers. This replica selection is a key determinant of client performance, yet replica selection for cellular clients has previously been overlooked, due to high radio latency, inconsistent throughput, and a limited number of ingress locations which dominated end-to-end latency. NGCNs and their improved performance place a renewed emphasis on replica selection policies for cellular clients. We find that the performance of existing replica selection systems in cellular networks is hindered by their opacity, the dynamic assignment of clients to infrastructure components, the emergence of centralized DNS within cellular networks, and the growth of public DNS in global mobile operators.
    [Show full text]
  • 3 Is Not a Crowd, It's an Anecdote
    3 is Not a Crowd, It’s an Anecdote Jon Crowcroft Marconi Professor of Communications Systems, Computer Laboratory University of Cambridge Cambridge, UK [email protected] Abstract has been crowd-sourced from the Internet, we should all be Crowd-sourcing measurements from the Internet, for the extremely aware of this non-trivial risk. In some areas of Internet, and by the Internet, is naturally popular due to the studies (e.g. censorship, hacktivism,cybercrime), the risk cost scaling that this approach offers. It appears to offer a of such re-identification to some members of our crowds low barrier to entry to new researchers, when compared with may be extremely high. We are all social scientists, now. the difficulties in obtaining data about operational networks ACM CCS Concepts: C.2, Networks from their owners. Keywords: Internet Measurement, Crowdsourcing, Privacy In this talk I will outline some precautions that should be taken by researchers, including: Sample Bias – Ground truth must be established about your sample. The very fact that you are using people on the internet prepared (assuming you have informed consent – you do, don’t you?) to be part of an experiment, means you have selection bias. Establish what it is by old fashioned means. Subject Privacy – You may get more buy-in from more users, and in more ways, if you can offer assurances about maintaining their privacy: o “No, this app won’t (unlike 70% of smart phone apps) leak lots of your Personal Data”, o How you achieve this, best practice with sandboxes and cryptography and security processes, o AAA applied to your logging databases, BIO o Long term fate, care and curation.
    [Show full text]
  • Privacy Engineering for Social Networks
    UCAM-CL-TR-825 Technical Report ISSN 1476-2986 Number 825 Computer Laboratory Privacy engineering for social networks Jonathan Anderson December 2012 15 JJ Thomson Avenue Cambridge CB3 0FD United Kingdom phone +44 1223 763500 http://www.cl.cam.ac.uk/ c 2012 Jonathan Anderson This technical report is based on a dissertation submitted July 2012 by the author for the degree of Doctor of Philosophy to the University of Cambridge, Trinity College. Technical reports published by the University of Cambridge Computer Laboratory are freely available via the Internet: http://www.cl.cam.ac.uk/techreports/ ISSN 1476-2986 Privacy engineering for social networks Jonathan Anderson In this dissertation, I enumerate several privacy problems in online social net- works (OSNs) and describe a system called Footlights that addresses them. Foot- lights is a platform for distributed social applications that allows users to control the sharing of private information. It is designed to compete with the performance of today’s centralised OSNs, but it does not trust centralised infrastructure to en- force security properties. Based on several socio-technical scenarios, I extract concrete technical problems to be solved and show how the existing research literature does not solve them. Addressing these problems fully would fundamentally change users’ interactions with OSNs, providing real control over online sharing. I also demonstrate that today’s OSNs do not provide this control: both user data and the social graph are vulnerable to practical privacy attacks. Footlights’ storage substrate provides private, scalable, sharable storage using untrusted servers. Under realistic assumptions, the direct cost of operating this storage system is less than one US dollar per user-year.
    [Show full text]
  • NARSEO VALLINA-RODRIGUEZ Curriculum Vitae
    NARSEO VALLINA-RODRIGUEZ Curriculum Vitae IMDEA Networks Institute Avenida del Mar Mediterraneo, 22. 28918 Leganes,´ Madrid B [email protected] mhttp://people.networks.imdea.org/˜narseo_vallina/ Google Scholar: https://scholar.google.es/citations?user=yOlNzfcAAAAJ ORCID: https://orcid.org/0000-0002-5420-6835 Research interests Internet measurements, network protocols, privacy and security, transparency, adTech, consumer protection, and privacy regulation. Education 2009-2013 Ph.D in Computer Science, University of Cambridge (U.K.) Thesis: Cross-layer analysis of energy and spectrum waste of mobile applications Advisor: Prof. Jon Crowcroft 2001-2007 Telecommunications Engineering, University of Oviedo (Spain) MsC dissertation completed at the University of Cambridge Advisors: Prof. Jon Crowcroft (University of Cambridge) and Prof. Roberto Garcia (University of Oviedo) Experience 2019-Present AppCensus Inc. San Francisco (USA) Co-Founder 2016-Present IMDEA Networks Institute Madrid (Spain) Research Assistant Professor 2014-Present International Computer Science Institute Berkeley (USA) Research Scientist 2013-2014 International Computer Science Institute Berkeley (USA) Postdoctoral Researcher 2009-2013 University of Cambridge Cambridge (U.K.) Undergraduate Student Supervisor 2011, 2012 Telefonica Research Barcelona (Spain) Research Intern 2009 T-Labs (Telekom Innovation Labs) Berlin (Germany) Research Intern 2008-2009 Vodafone R&D Newbury (U.K.) Research Engineer 2007 Telefonica Research Barcelona (Spain) Research Intern 2006-2007 University of Cambridge Cambridge (U.K.) Visitor Student Curriculum Vitae - Narseo Vallina-Rodriguez Page 2 Awards and recognition 2020 Caspar Bowden Award for Outstanding Research in Privacy Enhancing Technologies “Won’t somebody think of the Children?” Examining COPPA Compliance at Scale, with Irwin Reyes, Primal Wijesekera, Joel Reardon, Amit Elazari Bar On, Abbas Razaghpanah, and Serge Egelman.
    [Show full text]
  • Norah Boyce Science Lectures Archives (In Academic Year Order – Most Recent First)
    University of the Third Age in Cambridge (CIO) Norah Boyce Science lectures archives (in academic year order – most recent first) 2020 - 2021 SPRING TERM 2021 19 January Epidemiology: from Covid-19 to protecting food security Prof Chris Gilligan CBE, Department of Plant Sciences 2 February Can we refreeze the Arctic? Dr Hugh Hunt, Reader in Engineering Dynamics and Vibration 23 February Antimicrobial resistance – why you should care Dame Sally Davies FRS, Master of Trinity College and former Chief Medical Officer for England 2 March SARS-CoV-2 Infection – Where are we now? Prof Paul Lehner FMedSci, Professor of Immunology and Medicine 9 March Beauty and the Beast: Matter, Antimatter and the Large Hadron Collider Prof Valerie Gibson, Head of High Energy Physics Research Group, Cavendish Laboratory 27 April Dyslexia, rhythm, language and the developing brain 11 May Under the volcano Professor Marian Holness 18 May Vaxxers: The making of the Oxford vaccine Professor Cath Green 2019 - 2020 AUTUMN TERM 2019 15 October Applications of Graphene and Related Materials Professor Andrea Ferrari (Director of The Graphene Centre) 12 November How Insects Jump so Far and so Fast Professor Malcolm Burrows FRS (Former Head of Department of Zoology) 26 November The Fuel of Life Sir John Walker FRS (Nobel Laureate in Chemistry) 10 December Plastic Planet Dr. Claire Barlow (Deputy Head of Department of Engineering) SPRING TERM 2019 21 January Will the Earth become too hot for your grandchildren to handle? Prof Herbert Huppert FRS, Institute of Theoretical
    [Show full text]
  • NARSEO VALLINA-RODRIGUEZ Curriculum Vitae
    NARSEO VALLINA-RODRIGUEZ Curriculum Vitae IMDEA Networks Institute Avenida del Mar Mediterraneo, 22. 28918 Leganes,´ Madrid B [email protected] mhttp://people.networks.imdea.org/˜narseo_vallina/ Google Scholar: https://scholar.google.es/citations?user=yOlNzfcAAAAJ ORCID: https://orcid.org/0000-0002-5420-6835 Research interests Internet measurements, network protocols, privacy and security, transparency, adTech, consumer protection, and privacy regulation. Education 2009-2013 Ph.D in Computer Science, University of Cambridge (U.K.) Thesis: Cross-layer analysis of energy and spectrum waste of mobile applications Advisor: Prof. Jon Crowcroft 2001-2007 Telecommunications Engineering, University of Oviedo (Spain) MsC dissertation completed at the University of Cambridge Advisors: Prof. Jon Crowcroft (University of Cambridge) and Prof. Roberto Garcia (University of Oviedo) Experience 2019-Present AppCensus Inc. San Francisco (USA) Co-Founder 2016-Present IMDEA Networks Institute Madrid (Spain) Research Assistant Professor 2014-Present International Computer Science Institute Berkeley (USA) Research Scientist 2013-2014 International Computer Science Institute Berkeley (USA) Postdoctoral Researcher 2009-2013 University of Cambridge Cambridge (U.K.) Undergraduate Student Supervisor 2011, 2012 Telefonica Research Barcelona (Spain) Research Intern 2009 T-Labs (Telekom Innovation Labs) Berlin (Germany) Research Intern 2008-2009 Vodafone R&D Newbury (U.K.) Research Engineer 2007 Telefonica Research Barcelona (Spain) Research Intern 2006-2007
    [Show full text]
  • Peer Review College Newsletter
    Peer Review College Newsletter Summer 2013 Introduction CONTENTS The feature article in this issue looks at the results of the College Member General 1. EPSRC Peer Review Survey for 2013, which many of you were able to complete. We hope you will find College Member General the results interesting. We are also currently undertaking a refresh of the College Survey 2013 – page 1 membership, and there is an article explaining what this involves. We are expecting the updated College On-Line Training to be available very shortly and give some further 2. College refresh information about this. A list of new members appointed to the College since the last community nomination College Refresh is included. process – page 6 3. Update to College Online EPSRC Peer Review College Member General Survey Training – page 6 2013 4. Membership Matters – page 7 Since the last College Newsletter we approached all College members to take part in an on-line survey which covered a range of topics including the peer review process, 5. Editors End Piece – college management, and college communications. page 10 Thank you very much for your excellent response – of the 3800 College members contacted 1149 members completed the survey, which included 128 new members. For both new and existing members this is about 1/3rd of all members, which is an excellent response rate. We greatly appreciate you making the time to provide this information, which we will use to inform and improve our operational arrangements for the college and our engagement with College members. The information provided indicates (as shown in the charts below) a good spread of experience both in terms of length of service on the college and in terms of the numbers of reviews undertaken to date.
    [Show full text]
  • Publications
    List of publications R. J. Gibbens Dr R. J. Gibbens Department of Computer Science and Technology The Computer Laboratory University of Cambridge William Gates Building 15 JJ Thomson Avenue Cambridge, CB3 0FD, UK k [email protected] m www.cl.cam.ac.uk/users/rg31/ � orcid.org/0000-0003-3717-3258 May 2018 List of publications: R. J. Gibbens May 2018 Publications 2018 James Cruise, Lisa Flatley, Richard Gibbens, and Stan Zachary (2018). “Control of Energy Storage with Market Impact: Lagrangian Approach and Horizons”. In: Operations Research. Accepted for publication. ? pages. Katherine Meadows, Richard Gibbens, Caroline Gerrard, and Alain Vuylsteke (Mar. 2018). “Prediction of Patient Length of Stay on the Intensive Care Unit Following Cardiac Surgery: A Logistic Regres- sion Analysis Based on the Cardiac Operative Mortality Risk Calculator, EuroSCORE”. In: Journal of Cardiothoracic and Vascular Anesthesia. URL: https://doi.org/10.1053/j.jvca.2018.03.007. 7 pages. 2017 Yeon-sup Lim, Erich M. Nahum, Don Towsley, and Richard J. Gibbens (2017). “ECF: An MPTCP Path Scheduler to Manage Heterogeneous Paths”. In: Proceedings of the 2017 ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems. Extended abstract. ACM, pp. 33–34. (2 pages). Yeon-sup Lim, Erich Nahum, Don Towsley, and Richard Gibbens (Dec. 2017). “ECF: An MPTCP Path Scheduler to Manage Heterogeneous Paths”. In: 13th International Conference on emerging Networking EXperiments and Technologies, ACM CoNEXT. (13 pages). 2016 Andrei Bejan, Richard Gibbens, Robert Hancock, and Don Towsley (2016). “Capacity bounds and robustness in multipath networks”. In: 9th EAI International Conference on Performance Evaluation Methodologies and Tools.
    [Show full text]
  • 10 Networking Papers: Recommended Reading Jon Crowcroft University of Cambridge Computer Laboratory William Gates Building 15
    10 Networking Papers: Recommended Reading Jon Crowcroft University of Cambridge Computer Laboratory William Gates Building 15 JJ Thomson Avenue Cambridge CB3 0FD UK http://www.cl.cam.ac.uk/~jac22/ In the last issue ACM Computer Communication Review, Christophe Diot, the Editor-in-Chief kicked off a series of contributions to CCR by members of our technical community on networking papers that they would recommend to others. Of course, we all have our lists of favourites (I have 4 book lists on Amazon!), but this is more than just stamp collecting. Search engines and citation indexes have several problems, including: it is hard to balance recency of an article with popularity – a single dimension index doesn’t really tell you whether a paper is seminal or just popular; some material is not available (too old, or not there any more; the average of everyone’s opinion may not be as useful as a subjective view by someone you trust (or distrust); one day, these problems may be solved by contextualizing information that is retrieved and presenting the recommendation network that your retrieval was made by (Some search engines like http://beta.previewseek.com/ are starting to do this). Until that day, lists like this are a good substitute, and they are also fun starting points for discussion. My list is explicitly not my “top ten” papers ever. Rather, it represents a sample made at a snapshot. These are papers that came up in recent discussions in PhD supervision, research project work, and in reviewing papers for conferences. For each paper, I’ve given some indication of the value I got from the paper.
    [Show full text]
  • IC2E Conference Booklet
    CONFERENCE PROGRAM conferences.computer.org/IC2E conferences.computer.org/IoTDI 2 3 TABLE OF CONTENT IC2E 6-31 Welcome Messages 8 Committees 12 Program 18 Invited Talk 28 Proceedings 31 IoTDI 32-49 Welcome Messages 34 Committees 38 Program 40 Proceedings 49 IC2E & IoTDI 50-87 Keynotes 51 Panel 58 Welcome Reception 18 Conference Banquet 59 Tutorials 62 Workshops 77 Local Information Conference Venue 82 About Berlin 83 Campus Map 84 Floorplan 85 Wi-Fi Information 86 Notes 87 Copyright IEEE ©2016 4 5 IC2E IC2E 2016 is sponsored by: 6 7 IC2E IC2E MESSAGE FROM THE GENERAL CHAIRS We like to welcome you, with great pleasure, to IEEE IC2E 2016, the 4th edition of the IEEE annual international conference on cloud engineering. This year, IC2E will be held in Berlin, Germany’s capital and one of Europe’s main digital hubs of scientists, creative talents and entrepreneurs. IEEE IC2E is a high-quality forum to bring An excellent team has worked very hard to Last but not least, we would like to thank the together experts working on different levels of organize IEEE IC2E 2016. First, we would like IC2E Steering Committee and especially Hui the cloud stack – systems, storage, networking, to thank the TPC Co-Chairs Lucy Cherkaso- Lei for his continuous support of the IC2E con- platforms, databases, and applications – to ad- va, Peter Pietzuch, and Cho-Li Wang for their ference series, both as spokesman of the Stee- dress challenges needed to shape the future leadership and for ensuring a high-quality ring Committee and as Chair of IEEE TCBIS, the of cloud-transformed business and society.
    [Show full text]