direkt zum Inhalt springen

direkt zum Hauptnavigationsmenü

Sie sind hier

TU Berlin

Page Content

Publications by Type: Technical Reports

next >> [2]

2013

Kim, Juhoon and Chatzis, Nikolaos and Siebke, Matthias and Feldmann, Anja (2013). Tigers vs Lions: Towards Characterizing Solitary and Group User Behavior in MMORPG [6]. (Technical Report)


Levin, Dan and Canini, Marco and Schmid, Stefan and Feldmann, Anja (2013). Panopticon: Reaping the Benefits of Partial SDN Deployment in Enterprise Networks [7]. (Technical Report)


2012

Mehmood, Amir and Sarrar, Nadi and Uhlig, Steve and Feldmann, Anja (2012). How happy are your flows: an empirical study of packet losses in router buffers [8]. (Technical Report)


Schiöberg, Doris and Schneider, Fabian and Trédan, Gilles and Uhlig, Steve and Feldmann, Anja (2012). Revisiting Content Availability in Distributed Online Social Networks [9]. (Technical Report)


Frank, Benjamin and Poese, Ingmar and Smaragdakis, Georgios and Uhlig, Steve and Feldmann, Anja (2012). Content-aware Traffice Engineering [10]. (Technical Report)


2011

Levin, Dan and Wundsam, Andreas and Feldmann, Anja and Seethamaran, Srini and Kobayashi, Masayoshi and Parulkar, Guru (2011). A first look at OpenFlow Control Plane Behavior from a Test Deployment [11]. (Technical Report)


Pignolet, Yvonne Anne and Schmid, Stefan and Trédan, Gilles (2011). Misleading Stars: What Cannot Be Measured in the Internet? [12]. (Technical Report)


Leung, Ian X. Y. and Chan, Shu-Yan and Hui, Pan and Lio', Pietro (2011). Intra-City Urban Network and Traffic Flow Analysis from GPS Mobility Trace [13]. (Technical Report)


Kosta, Sokol and Aucinas, Andrius and Hui, Pan and Mortier, Richard and Zhang, Xinwen (2011). Unleashing the Power of Mobile Cloud Computing using ThinkAir [14]. (Technical Report)


Thakur, Gautam S. and Hui, Pan and Ketabdar, Hamed and Helmy, Ahmed (2011). Towards Realistic Vehicular Network Modeling Using Planet-scale Public Webcams [15]. (Technical Report)


Pal, Ranjan and Hui, Pan (2011). Modeling Internet Security Investments: The Case of Dealing with Information Uncertainty [16]. (Technical Report)


Arora, Dushyant and Bienkowski, Marcin and Feldmann, Anja and Schaffrath, Gregor and Schmid, Stefan (2011). Online Strategies for Intra and Inter Provider Service Migration in Virtual Networks [17]. (Technical Report)


Pal, Ranjan and Hui, Pan (2011). On the Economics of Cloud Markets [18]. (Technical Report)


Poese, Ingmar and Kaafar, Mohamed Ali and Donnet, Benoit and Gueye, Bamba and Uhlig, Steve (2011). IP Geolocation Databases: Unreliable? [19]. (Technical Report)


Meier, Dominic and Pignolet, Yvonne Anne and Schmid, Stefan and Wattenhofer, Roger (2011). On the Windfall and Price of Friendship: Inoculation Strategies on Social Networks [20]. (Technical Report)


Even, Guy and Medina, Moti and Schaffrath, Gregor and Schmid, Stefan (2011). Competitive and Deterministic Embeddings of Virtual Networks [21]. (Technical Report)


Xu, Tianyin and Chen, Yang and Jaio, Lei and Zhao, Ben Y. and Hui, Pan and Fu, Xiaoming (2011). Cuckoo: Scaling Microblogging Services with Divergent Traffic Demands [22]. (Technical Report)


Kuznetsov, Petr and Ravi, Srivatsan (2011). On the Cost of Concurrency in Transactional Memory [23]. (Technical Report)


Saarinen, Aki and Siekkinen, Mattia and Xiao, Yu and Nurminen, Jukka K. and Kemppainen, Matti and Hui, Pan (2011). Offloadable Apps using SmartDiet: Towards an analysis toolkit for mobile application developers [24]. (Technical Report)


2010

Rehunathan, Devan and Hui, Pan (2010). vNurse – Using Virtualisation on Mobile Phones for Remote Health Monitoring [25]. (Technical Report)


Arora, Dushyant and Feldmann, Anja and Schaffrath, Gregor and Schmid, Stefan (2010). On the Benefit of Virtualization: Strategies for Flexible Server Allocation [26]. (Technical Report)


Richa, Andréa and Scheideler, Christian and Schmid, Stefan and Zhang, Jin (2010). AntiJam: Efficient Medium Access despite Adaptive and Reactive Jamming [27]. (Technical Report)


Richa, Andréa and Scheideler, Christian and Schmid, Stefan and Zhang, Jin (2010). A Jamming-Resistant MAC Protocol for Multi-Hop Wireless Networks [28]. (Technical Report)


Hameed, Sufian and Hui, Pan (2010). LENS: LEveraging anti-social Network against Spam [29]. (Technical Report)


Kuznetsov, Petr and Schmid, Stefan (2010). Towards Network Games with Social Preferences [30]. (Technical Report)


Schaffrath, Gregor and Schmid, Stefan and Feldmann, Anja (2010). Generalized and Resource-Efficient VNet Embeddings with Migrations [31]. (Technical Report)


Gafni, Eli and Kuznetsov, Petr (2010). On L-Resilient Adversaries, Hitting Sets and Colorless Tasks [32]. (Technical Report)


Aucinas, Andrius and Hui, Pan (2010). Performance and Energy Efficiency Improvement using ThinkAir [33]. (Technical Report)


Liu, Chi Harald and Hui, Pan (2010). Efficient Network Management for Context-Aware Participatory Sensing [34]. (Technical Report)


2009

Jacob, Riko and Ritscher, Stephan and Scheideler, Christian and Schmid, Stefan (2009). A Self-Stabilizing and Local Delaunay Graph Construction [35]. (Technical Report)


Gafni, Eli and Kuznetsov, Petr (2009). On Set Consensus Numbers [36]. (Technical Report)


Feldmann, Anja and Gladisch, Andreas and Kind, Mario and Smaragdakis, Georgios and Westphal, Fritz-Joachim (2009). Energy Trade-offs among Content Delivery Architectures [37]. (Technical Report)


Wundsam, Andreas and Mehmood, Amir and Feldmann, Anja and Maennel, Olaf (2009). Improving Network Troubleshooting using Virtualization [38]. (Technical Report)


Scheideler, Christian and Schmid, Stefan (2009). A Distributed and Oblivious Heap [39]. (Technical Report)


Gafni, Eli and Kuznetsov, Petr (2009). The Weakest Failure Detector for Solving k-Set Agreement [40]. (Forschungsbericht (Research report))


Suchara, Martin and Avramopoulos, Ioannis (2009). Comparing the Security Performance of Network-Layer and Application-Layer Anycast [41]. (Technical Report)


Baumgart, Matthias and Scheideler, Christian and Schmid, Stefan (2009). A DoS-Resilient Information System for Dynamic Data Management [42]. (Technical Report)


Manilici, Vlad and Wundsam, Andreas and Feldmann, Anja and Zerfos, Petros and Sombrutzki, Robert and Singh, Jatinder P. and Vidales, Pablo (2009). On the Potential of Flow-Based Routing in Multihomed Environments [43]. (Technical Report)


Kuznetsov, Petr (2009). Simple CHT: A New Derivation of the Weakest Failure Detector for Consensus [44]. (Forschungsbericht (Research report))


Sengul, Cigdem and Carneiro Viana, Aline and Friedman, Roy and Bertier, Marin and Kermarrec, Anne-Marie (2009). Adaptive Forwarding to Match Mobility Characteristics in Delay Tolerant Networks [45]. (Research Report)


Papadimitriou, Anthonis and Le Fessant, Fabrice and Carneiro Viana, Aline and Sengul, Cigdem (2009). Fighting Sinkhole Attacks in Tree-based Routing Topologies [46]. (Research Report)


Le Fessant, Fabrice and Sengul, Cigdem and Kermarrec, Anne-Marie (2009). Pacemaker: Fighting Selfishness in Availability-Aware Large-Scale Networks [47]. (Research Report)


Kafsi, Mohamed and Papadimitratos, Panos and Dousse, Olivier and Alpcan, Tansu and Hubaux, Jean-Pierre (2009). VANET Connectivity Analysis [48]. (arXiv.org Technical Report)


Liebeherr, Jorg and Burchard, Almut and Ciucu, Florin (2009). Delay Bounds for Networks with Heavy-Tailed and Self-Similar Traffic [49]. (Technical Report)


2008

Gall, Dominik and Jacob, Riko and Richa, Andréa and Scheideler, Christian and Schmid, Stefan and Täubig, Hanjo (2008). Modeling Scalability in Distributed Self-Stabilization: The Case of Graph Linearization [50]. (Technical Report)


Günes, Mesut and Blywis, Bastian and Juraschek, Felix and Schmidt, Philipp (2008). Practical Issues of Implementing a Hybrid Multi-NIC Wireless Mesh-Network [51]. (Technical Report)


Feldmann, Anja and Bush, Randy and Cittadini, Luca and Maennel, Olaf and Mühlbauer, Wolfgang (2008). HAIR: Hierarchical Architecture for Internet Routing [52]. (Technical Report)


2007

Eidenbenz, Raphael and Oswald, Yvonne Anne and Schmid, Stefan and Wattenhofer, Roger (2007). Mechanism Design by Creditability [53]. (Technical Report)


Hui, Pan and Crowcroft, Jon (2007). Bubble Rap: Forwarding in small world DTNs in ever decreasing circles [54]. (Technical Report)


Aggarwal, Vinay and Feldmann, Anja and Scheideler, Christian (2007). Enabling Cooperation between ISPs and P2P systems [55]. (Technical Report)


next >> [57]
------ Links: ------

Zusatzinformationen / Extras

Quick Access:

Schnellnavigation zur Seite über Nummerneingabe

Copyright TU Berlin 2008