CLC section - Methodologies
A. Papachristodoulou, L. Li, J.C. Doyle
“Methodological frameworks for large-scale network analysis and design”,
"ACM SIGCOMM Computer Communication Review", vol.34, July 2004, #3, pp. 7 - 20
ResiliNets Keywords: cross-layer optimization, stability, modeling
Abstract: "This paper emphasizes the need for methodological frameworks for analysis and design of large scale networks which are independent of specific design innovations and their advocacy, with the aim of making networking a more systematic engineering discipline. Networking problems have largely confounded existing theory, and innovation based on intuition has dominated design. This paper will illustrate potential pitfalls of this practice. The general aim is to illustrate universal aspects of theoretical and methodological research that can be applied to network design and verification. The issues focused on will include the choice of models, including the relationship between flow and packet level descriptions, the need to account for uncertainty generated by modelling abstractions, and the challenges of dealing with network scale. The rigorous comparison of proposed schemes will be illustrated using various abstractions. While standard tools from robust control theory have been applied in this area, we will also illustrate how network-specific challenges can drive the development of new mathematics that expand their range of applicability, and how many enormous challenges remain."
G. Dimitrakopoulos,V. Paliouras
“A novel architecture and a systematic graph-based optimization methodology for modulo multiplication”,
"IEEE Transactions on Circuits and Systems I", vol.51, Februar 2004, #2, pp. 354- 370
ResiliNets Keywords: cross-layer optimization, modeling
Abstract: "A novel hardware algorithm, a VLSI architecture, and an optimization methodology for residue multipliers are introduced in this paper. The proposed design approach identifies certain properties of the bit products that participate in the residue product computation and subsequently exploits them to reduce the complexity of the implementation. A set of introduced theorems is used to identify the particular properties. The introduced theorems are of significant practical importance because they allow the definition of a graph-based design methodology. In addition, a bit-product weight encoding scheme is investigated in a systematic way, and exploited in order to minimize the number of bit products processed in the proposed multiplier. Performance data reveal that the introduced architecture achieves area × time complexity reduction of up to 55%, when compared to the most efficient previously reported design."
D. Alderson, L. Lun, W. Willinger, J.C. Doyle
“Understanding Internet topology: principles, models, and validation”,
"IEEE/ACM Transactions on Networking", vol.13, December 2005, #6, pp. 1205- 1218
ResiliNets Keywords: cross-layer optimization, topology, modeling
Abstract: "Building on a recent effort that combines a first-principles approach to modeling router-level connectivity with a more pragmatic use of statistics and graph theory, we show in this paper that for the Internet, an improved understanding of its physical infrastructure is possible by viewing the physical connectivity as an annotated graph that delivers raw connectivity and bandwidth to the upper layers in the TCP/IP protocol stack, subject to practical constraints (e.g., router technology) and economic considerations (e.g., link costs). More importantly, by relying on data from Abilene, a Tier-1 ISP, and the Rocketfuel project, we provide empirical evidence in support of the proposed approach and its consistency with networking reality. To illustrate its utility, we: 1) show that our approach provides insight into the origin of high variability in measured or inferred router-level maps; 2) demonstrate that it easily accommodates the incorporation of additional objectives of network design (e.g., robustness to router failure); and 3) discuss how it complements ongoing community efforts to reverse-engineer the Internet."
“Cognestion games with player specific payoff functions ”,
"Games and Economic Behavior", vol.13, 1996, pp. 111-124
ResiliNets Keywords: cross-layer control, strategies, stability
Abstract: "A class of noncooperative games in which the players share a common set of strategies is described. The payoff a player receives for playing a particular strategy depends only on the total number of players playing the same strategy and decreases with that number in a manner which is specific to the particular player. It is shown that each game in this class possesses at least one Nash equilibrium in pure strategies. Best-reply paths in which players, one at a time, shift to best-reply strategies may be cyclic. But there is always at least one such path that connects an arbitrary initial point to an equilibrium"
“ Fuzzy Logic for Cross-layer Optimization in Cognitive Radio Networks ”,
"Consumer Communications and Networking Conference, 2007. CCNC 2007. 4th IEEE", January 2007, pp. 1128-1133
ResiliNets Keywords: fuzzy logic, cross-layer optimization
Abstract: "The search for the ultimate architecture for cross- layer optimization in cognitive radio networks is characterized by challenges such as modularity, scalability, complexity and interpretability constraints. In this paper we propose Fuzzy Logic as an effective means of meeting these challenges, as far as both knowledge representation and control implementation are concerned. "
G. Singaraju, L. Teo, Y. Zheng
“ A Testbed for Quantitative Assessment of Intrusion Detection Systems using Fuzzy Logic ”,
"Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)", 2004, p. 79
ResiliNets Keywords: ' fuzzy logic, quantitative assessments, intrusion detection system
Abstract: "The current Intrusion Detection System (IDS) technologyis a major investment for a firm and its evaluation is desiredprior to a commitment. A testbed compares differentIDSs on a common platform. A major challenge in evaluatingIDSs stems from the fact that they are generally testedin specific environments. A real-world environment couldbe different from the environment designed for a testbed.The results obtained, from such testbeds, may not be accurateand reliable. Hence, a quantitative and metrics basedevaluation of IDSs is desired.We propose Testbed for evaluating Intrusion DetectionSystems (TIDeS), that allows a user to select the best IDSfor a specific customized environment. A quantitative analysisis provided by TIDeS, using fuzzy logic, under varyingnetwork loads. We also propose robust metrics to evaluatean IDS. We follow up with recommendations, based on ourexperience, on the general practices in the field of IDSs."