AT&T Labs

Displaying 1-30 of 30 results

  • White Papers // Sep 2013

    EyeDecrypt - Private Interactions in Plain Sight

    The authors introduce EyeDecrypt, a novel technology for privacy-preserving human-computer interaction. EyeDecrypt allows only authorized users to decipher data shown on a public display, such as an electronic screen or printed material; in the former case, the authorized user can then interact with the system (e.g., by pressing buttons), without...

    Provided By AT&T Labs

  • White Papers // Nov 2012

    A Novel Bargaining Based Incentive Protocol for Opportunistic Networks

    Opportunistic networks are the emerging networks featured by partitions, long disconnections, and topology instability, where the message propagation depends on the cooperation of nodes to fulfill a "Store-carry-and-forward" fashion. But due to constrained energy and buffer, some nodes may behave selfishly, which will involve damage to the existing routing approaches...

    Provided By AT&T Labs

  • White Papers // Aug 2012

    Statistical Distortion: Consequences of Data Cleaning

    The authors introduce the notion of statistical distortion as an essential metric for measuring the effectiveness of data cleaning strategies. They use this metric to propose a widely applicable yet scalable experimental framework for evaluating data cleaning strategies along three dimensions: glitch improvement, statistical distortion and cost-related criteria. Existing metrics...

    Provided By AT&T Labs

  • White Papers // May 2012

    Writing on Insertion Paper

    The capacity of insertion channels, even in the presence of feedback, is an open problem in information theory. In this paper, the authors prove that the capacity of insertion channel with non-causal insertion information at the transmitter is 1 even when the receiver do not know the insertion pattern. This...

    Provided By AT&T Labs

  • White Papers // Sep 2011

    A Data Warehousing Architecture for Enabling Service Provisioning Process

    In this paper, the authors focus on the following problem in information management: given a large collection of recorded information and some knowledge of the process that is generating this data they want to build a compact, non-redundant collection of summary (aggregate) tables and indices to facilitate flexible decision support...

    Provided By AT&T Labs

  • White Papers // Sep 2011

    Optimizing Cloud Resources for Delivering IPTV Services through Virtualization

    Virtualized cloud-based services can take advantage of statistical multiplexing across applications to yield significant cost savings to the operator. However, achieving similar benefits with real-time services can be a challenge. In this paper, the authors seek to lower a provider's costs of real-time IPTV services through a virtualized IPTV architecture...

    Provided By AT&T Labs

  • White Papers // Sep 2011

    Characterizing Fairness for 3G Wireless Networks

    The end to end system data performance over a 3G cellular network depends on many factors such as the number of users, interference, multipath propagation, radio resource management techniques as well as the interaction between these mechanisms and the transport protocol's flow and congestion mechanisms. Using controlled experiments in a...

    Provided By AT&T Labs

  • White Papers // Aug 2011

    COPSS: An Efficient Content Oriented Publish/Subscribe System

    Content-Centric Networks (CCN) provides substantial flexibility for users to obtain information without regard to the source of the information or its current location. publish/subscribe (pub/sub) systems have gained popularity in society to provide the convenience of removing the temporal dependency of the user having to indicate an interest each time...

    Provided By AT&T Labs

  • White Papers // Aug 2011

    Geocast for Wireless Sensor Networks

    An important but relatively less studied class of network layer protocol for sensor networks is geocast. It allows a sensor node to send messages to all nodes in a given geographical area without the sender node having any knowledge about which nodes are present in that area. Developing a robust...

    Provided By AT&T Labs

  • White Papers // Jul 2011

    Scalable Geocast for Vehicular Networks

    This paper presents GeoVCom, a robust geocast protocol for vehicular networks. GeoVCom allows a vehicle to send geocast messages to all vehicles in a given geographical area without the sender having any knowledge about which vehicles are present in that area. GeoVCom is ad hoc, scalable and can handle communications...

    Provided By AT&T Labs

  • White Papers // May 2011

    Privacy Leakage Vs. Protection Measures: The Growing Disconnect

    Numerous research papers have listed different vectors of personally identifiable information leaking via traditional and mobile Online Social Networks (OSNs) and highlighted the ongoing aggregation of data about users visiting popular Web sites. The authors argue that the landscape is worsening and existing proposals (including the recent U.S. Federal Trade...

    Provided By AT&T Labs

  • White Papers // Apr 2011

    Vision: VPMN - Virtual Private Mobile Network Towards Mobility-as-a-Service

    In this paper the authors present their vision for a mobile network infrastructure that embraces advances in virtualization to dynamically create private, resource isolated, customizable, and end-to-end mobile networks. They describe an architecture for such a Virtual Private Mobile Network (VPMN) infrastructure and present a number of use cases that...

    Provided By AT&T Labs

  • White Papers // Apr 2011

    Circuit Planning Tool Over Heterogeneous Networks

    Currently, there is no existing solution or tool to efficiently route a high-speed circuit over heterogeneous DWDM networks under multi-vendor environment, although each vendor may provide a planning tool to route a circuit within its own sub-network domain. This is mainly due to the lack of common technology for optical...

    Provided By AT&T Labs

  • White Papers // Jan 2011

    Consistency in a Stream Warehouse

    A stream warehouse is a Data Stream Management System (DSMS) that stores a very long history, e.g. years or decades; or equivalently a data warehouse that is continuously loaded. A stream warehouse enables queries that seamlessly range from real-time alerting and diagnostics to long-term data mining. However, continuously loading data...

    Provided By AT&T Labs

  • White Papers // Jan 2011

    Making Designer Schemas With Colors

    XML schema design has two opposing goals: elimination of update anomalies requires that the schema be as normalized as possible; yet higher query performance and simpler query expression are often obtained through the use of schemas that permit redundancy. In this paper, the authors show that the recently proposed MCT...

    Provided By AT&T Labs

  • White Papers // Jan 2011

    Implementing Pushback: Router-Based Defense Against DDoS Attacks

    Pushback is a mechanism for defending against Distributed Denial-of-Service (DDoS) attacks. DDoS attacks are treated as a congestion-control problem, but because most such congestion is caused by malicious hosts not obeying traditional end-to-end congestion control, the problem must be handled by the routers. Functionality is added to each router to...

    Provided By AT&T Labs

  • White Papers // Jan 2011

    Network Programmability Is the Answer!

    Recent developments in the broader networking community involve the decomposing and/or refactoring of network functions in order to ease the introduction of new protocols and services and indeed new networking architectures. At first blush this appears to be a most desirable development from a service provider point of view, because...

    Provided By AT&T Labs

  • White Papers // Jan 2011

    Efficient and Resilient Backbones for Multihop Wireless Networks

    The authors consider the problem of finding "Backbones" in multi-hop wireless networks. The backbone provides end-to-end connectivity, allowing non-backbone nodes to save energy since they do not have to route non-local data or participate in the routing protocol. Ideally, such a backbone would be small, consist primarily of high capacity...

    Provided By AT&T Labs

  • White Papers // Jan 2011

    Aggregate-Based Congestion Control

    Recent events have illustrated the Internet's vulnerability to both Denial of Service (DoS) attacks and flash crowds in which links (or servers) in the network become severely congested. In both DoS attacks and flash crowds, the congestion is neither due to a single flow, nor due to a general increase...

    Provided By AT&T Labs

  • White Papers // Jan 2011

    Satem: Trusted Service Code Execution Across Transactions

    Web services and service oriented architectures are becoming the de facto standard for Internet computing. A main problem faced by users of such services is how to ensure that the service code is trusted. While methods that guarantee trusted service code execution before starting a client-service transaction exist, there is...

    Provided By AT&T Labs

  • White Papers // Jan 2011

    Look Back at "Security Problems in the TCP/IP Protocol Suite"

    About fifteen years ago, the author wrote a paper on security problems in the TCP/IP protocol suite, In particular, the author focused on protocol-level issues, rather than implementation flaws. It is instructive to look back at that paper, to see where the author's focus and predictions were accurate, where he...

    Provided By AT&T Labs

  • White Papers // Jan 2011

    Using Link Cuts to Attack Internet Routing

    Attacks on the routing system, with the goal of diverting traffic past an enemy-controlled point for purposes of eavesdropping or connection-hijacking, have long been known. In principle, at least, these attacks can be countered by use of appropriate authentication techniques. The authors demonstrate a new attack, based on link-cutting, that...

    Provided By AT&T Labs

  • White Papers // Jan 2011

    Some Foundational Problems in Interdomain Routing

    The substantial complexity of inter-domain routing in the Internet comes from the need to support flexible policies while scaling to a large number of Autonomous Systems. Despite impressive progress in characterizing the various ills of the Border Gateway Protocol (BGP), many problems remain unsolved, and the behavior of the routing...

    Provided By AT&T Labs

  • White Papers // Jun 2010

    Privacy Leakage in Mobile Online Social Networks

    Mobile Online Social Networks (mOSNs) have recently grown in popularity. With the ubiquitous use of mobile devices and a rapid shift of technology and access to OSNs, it is important to examine the impact of mobile OSNs from a privacy standpoint. The authors present a taxonomy of ways to study...

    Provided By AT&T Labs

  • White Papers // Apr 2010

    Community-Based Analysis of Netflow for Early Detection of Security Incidents

    Detection and remediation of security incidents (e.g., attacks, compromised machines, policy violations) is an increasingly important task of system administrators. While numerous tools and techniques are available (e.g., Snort, nmap, netflow), novel attacks and low-grade events may still be hard to detect in a timely manner. In this paper, the...

    Provided By AT&T Labs

  • White Papers // Jan 2010

    Combining Routing and Traffic Data for Detection of IP Forwarding Anomalies

    For rapid problem-diagnosis in data-transmission over the internet, the use of an innovative technology that detects forwarding anomalies uses a combined feature system with routing. One of the important features about solving the anomalies pertains to the robustness of the mechanism that detects the problems. The system is of a...

    Provided By AT&T Labs

  • White Papers // Aug 2009

    Fast Rerouting for IP Multicast in Managed IPTV Networks

    Recent deployment of IP based multimedia distribution; especially broadcast TV distribution has increased the importance of simple and fast restoration during IP network failures for service providers. In this paper, the authors propose and evaluate a simple but efficient method for fast rerouting of IP multicast traffic during link failures...

    Provided By AT&T Labs

  • White Papers // Jul 2009

    Avoiding Ties in Shortest Path First Routing

    First the authors discuss problems associated with ties and flow splitting with shortest path first protocols such as OSPF and IS-IS. The problems relate to uncertainty in the splitting when there is multiple shortest path from a source to a destination. Even if routers are configured for even splitting, there...

    Provided By AT&T Labs

  • White Papers // Jul 2009

    Channel Access Throttling for Improving WLAN QoS

    The de facto QoS channel access method for the IEEE 802.11 Wireless LANs is the Enhanced Distributed Channel Access (EDCA) mechanism, which differentiates transmission treatments for data frames belonging to different traffic categories with four different levels of channel access priority. In this paper, the authors propose extending EDCA with...

    Provided By AT&T Labs

  • White Papers // Nov 2008

    Semantics of Ranking Queries for Probabilistic Data and Expected Ranks

    When dealing with massive quantities of data, top-k queries are a powerful technique for returning only the k most relevant tuples for inspection, based on a scoring function. The problem of efficiently answering such ranking queries has been studied and analyzed extensively within traditional database settings. The importance of the...

    Provided By AT&T Labs

  • White Papers // Jan 2011

    Making Designer Schemas With Colors

    XML schema design has two opposing goals: elimination of update anomalies requires that the schema be as normalized as possible; yet higher query performance and simpler query expression are often obtained through the use of schemas that permit redundancy. In this paper, the authors show that the recently proposed MCT...

    Provided By AT&T Labs

  • White Papers // Apr 2011

    Vision: VPMN - Virtual Private Mobile Network Towards Mobility-as-a-Service

    In this paper the authors present their vision for a mobile network infrastructure that embraces advances in virtualization to dynamically create private, resource isolated, customizable, and end-to-end mobile networks. They describe an architecture for such a Virtual Private Mobile Network (VPMN) infrastructure and present a number of use cases that...

    Provided By AT&T Labs

  • White Papers // Jan 2011

    Implementing Pushback: Router-Based Defense Against DDoS Attacks

    Pushback is a mechanism for defending against Distributed Denial-of-Service (DDoS) attacks. DDoS attacks are treated as a congestion-control problem, but because most such congestion is caused by malicious hosts not obeying traditional end-to-end congestion control, the problem must be handled by the routers. Functionality is added to each router to...

    Provided By AT&T Labs

  • White Papers // Jan 2011

    Network Programmability Is the Answer!

    Recent developments in the broader networking community involve the decomposing and/or refactoring of network functions in order to ease the introduction of new protocols and services and indeed new networking architectures. At first blush this appears to be a most desirable development from a service provider point of view, because...

    Provided By AT&T Labs

  • White Papers // Jul 2009

    Channel Access Throttling for Improving WLAN QoS

    The de facto QoS channel access method for the IEEE 802.11 Wireless LANs is the Enhanced Distributed Channel Access (EDCA) mechanism, which differentiates transmission treatments for data frames belonging to different traffic categories with four different levels of channel access priority. In this paper, the authors propose extending EDCA with...

    Provided By AT&T Labs

  • White Papers // Jan 2011

    Efficient and Resilient Backbones for Multihop Wireless Networks

    The authors consider the problem of finding "Backbones" in multi-hop wireless networks. The backbone provides end-to-end connectivity, allowing non-backbone nodes to save energy since they do not have to route non-local data or participate in the routing protocol. Ideally, such a backbone would be small, consist primarily of high capacity...

    Provided By AT&T Labs

  • White Papers // Jul 2011

    Scalable Geocast for Vehicular Networks

    This paper presents GeoVCom, a robust geocast protocol for vehicular networks. GeoVCom allows a vehicle to send geocast messages to all vehicles in a given geographical area without the sender having any knowledge about which vehicles are present in that area. GeoVCom is ad hoc, scalable and can handle communications...

    Provided By AT&T Labs

  • White Papers // Aug 2011

    Geocast for Wireless Sensor Networks

    An important but relatively less studied class of network layer protocol for sensor networks is geocast. It allows a sensor node to send messages to all nodes in a given geographical area without the sender node having any knowledge about which nodes are present in that area. Developing a robust...

    Provided By AT&T Labs

  • White Papers // Jul 2009

    Avoiding Ties in Shortest Path First Routing

    First the authors discuss problems associated with ties and flow splitting with shortest path first protocols such as OSPF and IS-IS. The problems relate to uncertainty in the splitting when there is multiple shortest path from a source to a destination. Even if routers are configured for even splitting, there...

    Provided By AT&T Labs

  • White Papers // Sep 2011

    Characterizing Fairness for 3G Wireless Networks

    The end to end system data performance over a 3G cellular network depends on many factors such as the number of users, interference, multipath propagation, radio resource management techniques as well as the interaction between these mechanisms and the transport protocol's flow and congestion mechanisms. Using controlled experiments in a...

    Provided By AT&T Labs

  • White Papers // Aug 2012

    Statistical Distortion: Consequences of Data Cleaning

    The authors introduce the notion of statistical distortion as an essential metric for measuring the effectiveness of data cleaning strategies. They use this metric to propose a widely applicable yet scalable experimental framework for evaluating data cleaning strategies along three dimensions: glitch improvement, statistical distortion and cost-related criteria. Existing metrics...

    Provided By AT&T Labs

  • White Papers // May 2012

    Writing on Insertion Paper

    The capacity of insertion channels, even in the presence of feedback, is an open problem in information theory. In this paper, the authors prove that the capacity of insertion channel with non-causal insertion information at the transmitter is 1 even when the receiver do not know the insertion pattern. This...

    Provided By AT&T Labs

  • White Papers // Apr 2011

    Circuit Planning Tool Over Heterogeneous Networks

    Currently, there is no existing solution or tool to efficiently route a high-speed circuit over heterogeneous DWDM networks under multi-vendor environment, although each vendor may provide a planning tool to route a circuit within its own sub-network domain. This is mainly due to the lack of common technology for optical...

    Provided By AT&T Labs

  • White Papers // Aug 2009

    Fast Rerouting for IP Multicast in Managed IPTV Networks

    Recent deployment of IP based multimedia distribution; especially broadcast TV distribution has increased the importance of simple and fast restoration during IP network failures for service providers. In this paper, the authors propose and evaluate a simple but efficient method for fast rerouting of IP multicast traffic during link failures...

    Provided By AT&T Labs

  • White Papers // Aug 2011

    COPSS: An Efficient Content Oriented Publish/Subscribe System

    Content-Centric Networks (CCN) provides substantial flexibility for users to obtain information without regard to the source of the information or its current location. publish/subscribe (pub/sub) systems have gained popularity in society to provide the convenience of removing the temporal dependency of the user having to indicate an interest each time...

    Provided By AT&T Labs

  • White Papers // Nov 2012

    A Novel Bargaining Based Incentive Protocol for Opportunistic Networks

    Opportunistic networks are the emerging networks featured by partitions, long disconnections, and topology instability, where the message propagation depends on the cooperation of nodes to fulfill a "Store-carry-and-forward" fashion. But due to constrained energy and buffer, some nodes may behave selfishly, which will involve damage to the existing routing approaches...

    Provided By AT&T Labs

  • White Papers // Sep 2011

    Optimizing Cloud Resources for Delivering IPTV Services through Virtualization

    Virtualized cloud-based services can take advantage of statistical multiplexing across applications to yield significant cost savings to the operator. However, achieving similar benefits with real-time services can be a challenge. In this paper, the authors seek to lower a provider's costs of real-time IPTV services through a virtualized IPTV architecture...

    Provided By AT&T Labs

  • White Papers // Jan 2010

    Combining Routing and Traffic Data for Detection of IP Forwarding Anomalies

    For rapid problem-diagnosis in data-transmission over the internet, the use of an innovative technology that detects forwarding anomalies uses a combined feature system with routing. One of the important features about solving the anomalies pertains to the robustness of the mechanism that detects the problems. The system is of a...

    Provided By AT&T Labs

  • White Papers // Jan 2011

    Aggregate-Based Congestion Control

    Recent events have illustrated the Internet's vulnerability to both Denial of Service (DoS) attacks and flash crowds in which links (or servers) in the network become severely congested. In both DoS attacks and flash crowds, the congestion is neither due to a single flow, nor due to a general increase...

    Provided By AT&T Labs

  • White Papers // Jun 2010

    Privacy Leakage in Mobile Online Social Networks

    Mobile Online Social Networks (mOSNs) have recently grown in popularity. With the ubiquitous use of mobile devices and a rapid shift of technology and access to OSNs, it is important to examine the impact of mobile OSNs from a privacy standpoint. The authors present a taxonomy of ways to study...

    Provided By AT&T Labs

  • White Papers // Jan 2011

    Satem: Trusted Service Code Execution Across Transactions

    Web services and service oriented architectures are becoming the de facto standard for Internet computing. A main problem faced by users of such services is how to ensure that the service code is trusted. While methods that guarantee trusted service code execution before starting a client-service transaction exist, there is...

    Provided By AT&T Labs

  • White Papers // Jan 2011

    Look Back at "Security Problems in the TCP/IP Protocol Suite"

    About fifteen years ago, the author wrote a paper on security problems in the TCP/IP protocol suite, In particular, the author focused on protocol-level issues, rather than implementation flaws. It is instructive to look back at that paper, to see where the author's focus and predictions were accurate, where he...

    Provided By AT&T Labs

  • White Papers // Jan 2011

    Using Link Cuts to Attack Internet Routing

    Attacks on the routing system, with the goal of diverting traffic past an enemy-controlled point for purposes of eavesdropping or connection-hijacking, have long been known. In principle, at least, these attacks can be countered by use of appropriate authentication techniques. The authors demonstrate a new attack, based on link-cutting, that...

    Provided By AT&T Labs

  • White Papers // Jan 2011

    Some Foundational Problems in Interdomain Routing

    The substantial complexity of inter-domain routing in the Internet comes from the need to support flexible policies while scaling to a large number of Autonomous Systems. Despite impressive progress in characterizing the various ills of the Border Gateway Protocol (BGP), many problems remain unsolved, and the behavior of the routing...

    Provided By AT&T Labs

  • White Papers // May 2011

    Privacy Leakage Vs. Protection Measures: The Growing Disconnect

    Numerous research papers have listed different vectors of personally identifiable information leaking via traditional and mobile Online Social Networks (OSNs) and highlighted the ongoing aggregation of data about users visiting popular Web sites. The authors argue that the landscape is worsening and existing proposals (including the recent U.S. Federal Trade...

    Provided By AT&T Labs

  • White Papers // Jan 2011

    Consistency in a Stream Warehouse

    A stream warehouse is a Data Stream Management System (DSMS) that stores a very long history, e.g. years or decades; or equivalently a data warehouse that is continuously loaded. A stream warehouse enables queries that seamlessly range from real-time alerting and diagnostics to long-term data mining. However, continuously loading data...

    Provided By AT&T Labs

  • White Papers // Sep 2013

    EyeDecrypt - Private Interactions in Plain Sight

    The authors introduce EyeDecrypt, a novel technology for privacy-preserving human-computer interaction. EyeDecrypt allows only authorized users to decipher data shown on a public display, such as an electronic screen or printed material; in the former case, the authorized user can then interact with the system (e.g., by pressing buttons), without...

    Provided By AT&T Labs

  • White Papers // Apr 2010

    Community-Based Analysis of Netflow for Early Detection of Security Incidents

    Detection and remediation of security incidents (e.g., attacks, compromised machines, policy violations) is an increasingly important task of system administrators. While numerous tools and techniques are available (e.g., Snort, nmap, netflow), novel attacks and low-grade events may still be hard to detect in a timely manner. In this paper, the...

    Provided By AT&T Labs

  • White Papers // Nov 2008

    Semantics of Ranking Queries for Probabilistic Data and Expected Ranks

    When dealing with massive quantities of data, top-k queries are a powerful technique for returning only the k most relevant tuples for inspection, based on a scoring function. The problem of efficiently answering such ranking queries has been studied and analyzed extensively within traditional database settings. The importance of the...

    Provided By AT&T Labs

  • White Papers // Sep 2011

    A Data Warehousing Architecture for Enabling Service Provisioning Process

    In this paper, the authors focus on the following problem in information management: given a large collection of recorded information and some knowledge of the process that is generating this data they want to build a compact, non-redundant collection of summary (aggregate) tables and indices to facilitate flexible decision support...

    Provided By AT&T Labs