Now showing items 1-20 of 23

    • Approximate Matching for Peer-to-Peer Overlays with Cubit 

      Wong, Bernard; Slivkins, Alex; Sirer, Emin Gun (2008-12-16)
      Keyword search is a critical component in most content retrieval systems. Despite the emergence of completely decentralized and efficient peer-to-peer techniques for content distribution, there have not been similarly ...
    • Approximate Matching for Peer-to-Peer Overlays with Cubit 

      Wong, Bernard; Slivkins, Aleksandrs; Sirer, Emin Gun (2008-05-19)
      Keyword search is a critical component in most content retrieval systems. Despite the emergence of completely decentralized and efficient peer-to-peer techniques for content distribution, there have not been similarly ...
    • Automatic Code Placement Alternatives for Ad-Hoc And Sensor Networks 

      Sirer, Emin Gun; Barr, Rimon; Kim, T. W. Danny; Fung, Ian Yee Yan (Cornell University, 2001-10-08)
      Developing applications for ad-hoc and sensor networks poses significant challenges. Many interesting applications in these domains entail collaboration between components distributed throughout an ad-hoc network. Defining ...
    • Better than 1 Hop Lookup Performance with Proactive Caching 

      Ramasubramanian, Venugopalan; Sirer, Emin Gun (Cornell University, 2004-02-18)
      High lookup latencies prohibit peer-to-peer overlays from being used in many performance intensive applications, even though they provide self-organization, scalability, and failure resilience. In this paper, we show ...
    • Commodifying Replicated State Machines with OpenReplica 

      Altinbuken, Deniz; Sirer, Emin Gun (2012-06-05)
      This paper describes OpenReplica, an open service that provides replication and synchronization support for large-scale distributed systems. OpenReplica is designed to commodify Paxos replicated state machines by providing ...
    • Corona: A High Performance Publish-Subscribe System for the World Wide Web 

      Ramasubramanian, Venugopalan; Peterson, Ryan; Sirer, Emin Gun (Cornell University, 2005-11-29)
      Despite the abundance of frequently changing information, the Web lacks a publish-subscribe interface for delivering updates to clients. The use of naive polling for update detection leads to poor performance and limits ...
    • Distributed Constraint-based Location Discovery in Ad hoc Networks 

      Guha, Saikat; Sirer, Emin Gun (Cornell University, 2004-06-07)
      Location discovery is a fundamental building block for many mobile applications. Yet dedicated infrastructure for determining node locations is expensive, energy consuming, and simply unavailable under certain development ...
    • Heuristics Considered Harmful or Using Mathematical Optimization for Resource Management in Distributed Systems 

      Sirer, Emin Gun (Cornell University, 2005-12-12)
      Distributed systems often pose difficult to resolve resource management problems. These problems typically involve the partitioning of a critical resource, such as bandwidth, storage, or computational elements, between ...
    • Latency- and Bandwidth-Minimizing Optimal Failure Detectors 

      So, Kelvin; Sirer, Emin Gun (Cornell University, 2006-05-01)
      Failure detectors are fundamental building blocks in distributed systems. Multi-node failure detectors, where the detector is tasked with monitoring other nodes, play a critical role in overlay networks and peer-to-peer ...
    • A Lightweight Approach to Network Positioning 

      Wong, Bernard; Sirer, Emin Gun (Cornell University, 2004-08-04)
      This paper describes a peer-to-peer overlay network for performing location-aware node and path selection in large-scale distributed systems. Our system, Meridian, provides a simple, lightweight and scalable framework for ...
    • Logical Attestation: An Authorization Architecture for Trustworthy Computing 

      Sirer, Emin Gun; de Bruijn, William; Reynolds, Patrick; Shieh, Alan; Walsh, Kevin; Williams, Dan; Schneider, Fred (2011-09-20)
      ABSTRACT This paper describes the design and implementation of a new operating system authorization architecture to support trustworthy computing. Called logical attestation, this architecture provides a sound framework ...
    • A Measurement Study of a Publish Subscribe System 

      Liu, Hongzhou; Sirer, Emin Gun (Cornell University, 2005-05-16)
      While publish-subscribe systems have attracted much research interest in the last decade, few established benchmarks have emerged and there has been little characterization of how they are used in practice. This paper ...
    • Meridian: A Lightweight Framework for Network Positioning without Virtual Coordinates 

      Wong, Bernard; Slivkins, Aleksandrs; Sirer, Emin Gun (Cornell University, 2005-03-04)
      Selecting nodes based on their position in the network is a basic building block for many distributed systems. This paper describes a peer-to-peer overlay network for performing position-based node selection. Our system, ...
    • NetQuery: A General-Purpose Channel for Reasoning about Network 

      Shieh, Alan; Kennedy, Oliver; Sirer, Emin Gun; Schneider, Fred (2009-05-15)
      Although the configuration of modern networks has a significant impact on the performance, robustness, and security of applications, networks lack support for reporting these differences. This paper presents the design ...
    • Nexus Authorization Logic (NAL): Design Rationale and Applications 

      Schneider, Fred B.; Walsh, Kevin; Sirer, Emin Gun (2009-09-14)
      Nexus Authorization Logic (NAL) provides a principled basis for specifying and reasoning about credentials and authorization policies. It extends prior access control logics based on "says" and "speaksfor" operators, ...
    • Octant: A Comprehensive Framework for the Geolocalization of Internet Hosts 

      Wong, Bernard; Stoyanov, Ivan; Sirer, Emin Gun (Cornell University, 2006-07-17)
      This paper outlines a novel, comprehensive framework for geolocalization, that is, determining the physical location of Internet hosts based on network measurements. The core insight behind this framework is to pose the ...
    • Optimal Parameter Selection for Efficient Memory Integrity Verification Using Merkle Hash trees 

      Williams, Daniel; Sirer, Emin Gun (Cornell University, 2004-07-19)
      A secure, tamper proof execution environment is critical for trustworthy network computing. Newly emerging hardware, such as those developed as part of the TCPA and Palladium initiatives, enables operating systems to ...
    • Optimal Resource Utilization in Content Distribution Networks 

      Song, Yee Jiun; Ramasubramanian, Venugopalan; Sirer, Emin Gun (Cornell University, 2005-11-14)
      This paper examines replication in content distribution networks and proposes a novel mechanism for optimally resolving performance versus cost tradeoffs. The key insight behind our work is to formally and analytically ...
    • Peer-to-Peer Authentication with a Distributed Single Sign-On Service 

      Josephson, William; Sirer, Emin Gun; Schneider, Fred B. (Cornell University, 2004-02-16)
      CorSSO is a distributed service for authentication in networks. It allows application servers to delegate client identity checking to combinations of authentication servers potentially residing in separate administrative ...
    • Perils of Transitive Trust in the Domain Name System 

      Ramasubramanian, Venugopalan; Sirer, Emin Gun (Cornell University, 2005-05-16)
      The Domain Name System, DNS, is based on nameserver delegations, which introduce complex and subtle dependencies between names and nameservers. In this paper, we present results from a large scale survey of DNS that shows ...