Princeton University

Displaying 1-40 of 183 results

  • White Papers // Mar 2012

    Serval: An End-Host Stack for Service-Centric Networking

    Internet services run on multiple servers in different locations, serving clients that are often mobile and multi-homed. This does not match well with today's network stack, designed for communication between fixed hosts with topology-dependent addresses. As a result, online service providers resort to clumsy and management intensive work-arounds - forfeiting...

    Provided By Princeton University

  • White Papers // Mar 2012

    An Analytical Approach to the Adoption of Asymmetric Bidirectional Firewalls: Need for Regulation?

    Recent incidents of cyber-security violations have revealed the importance of having firewalls and other intrusion detection systems to monitor traffic entering and leaving access networks. But the adoption of such security measures is often stymied by 'Free-riding' effects and 'Shortsightedness' among Internet Service Providers (ISPs). In this paper, the authors...

    Provided By Princeton University

  • White Papers // Feb 2012

    Network Formation Games Among Relay Stations in Next Generation Wireless Networks

    The introduction of Relay Station (RS) nodes is a key feature in next generation wireless networks such as 3GPP's Long Term Evolution Advanced (LTE-Advanced), or the forthcoming IEEE 802.16j WiMAX standard. This paper presents, using game theory, a novel approach for the formation of the tree architecture that connects the...

    Provided By Princeton University

  • White Papers // Jan 2012

    Commensal Cuckoo: Secure Group Partitioning for Large-Scale Services

    The authors present commensal cuckoo, a secure group partitioning scheme for large-scale systems that maintains the correctness of many small groups, despite a Byzantine adversary that controls a constant (global) fraction of all nodes. In particular, the adversary is allowed to repeatedly rejoin faulty nodes to the system in an...

    Provided By Princeton University

  • White Papers // Jan 2012

    ILC: A Foundation for Automated Reasoning About Pointer Programs

    This paper shows how to use Girard's intuitionistic linear logic extended with a classical sublogic to reason about pointer programs. More specifically, first, the paper defines the proof theory for ILC (Intuitionistic Linear logic with Constraints) and shows it is well-defined via a proof of cut elimination. Second, inspired by...

    Provided By Princeton University

  • White Papers // Jan 2012

    A Distributed Sorting Framework for Ad Hoc Wireless Sensor Networks

    Wireless Sensor Networks (WSN) are distributed, self-organizing, pervasive systems, which perform collaborative computations to provide useful information about the underlying stochastic phenomenon. In this paper, the authors explore the ranking and sorting problems in distributed sensor networks which provide perspectives in understanding certain fundamental issues in WSN, as well as...

    Provided By Princeton University

  • White Papers // Dec 2011

    Multi-Resource Allocation: Fairness-Efficiency Tradeoffs in a Unifying Framework

    Quantifying the notion of fairness is under-explored when users request different ratios of multiple distinct resource types. A typical example is datacenters processing jobs with heterogeneous resource requirements on CPU, memory, etc. A generalization of max-min fairness to multiple resources was recently proposed in, but may suffer from significant loss...

    Provided By Princeton University

  • White Papers // Dec 2011

    Language Abstractions for Software-Defined Networks

    For the past 30 years, networks have been built the same way: out of special-purpose devices running distributed algorithms that provide functionality such as topology discovery, routing, traffic monitoring, and access control. Recent years, however, have seen growing interest in a new kind of network architecture in which a logically-centralized...

    Provided By Princeton University

  • White Papers // Nov 2011

    LearnPADS++ Incremental Inference of Ad Hoc Data Formats

    An ad hoc data source is any semi-structured, non-standard data source. The format of such data sources is often evolving and frequently lacking documentation. Consequently, off-the-shelf tools for processing such data often do not exist, forcing analysts to develop their own tools, a costly and time-consuming process. In this paper,...

    Provided By Princeton University

  • White Papers // Oct 2011

    Pricing by Timing: Innovating Broadband Data Plans

    Wireless Internet data usage is doubling every year. Users are consuming more of high-bandwidth data applications, with usage concentrated on several peak hours in a day. The authors review many of the pricing schemes in practice today and analyze why they do not solve this problem of growing data traffic....

    Provided By Princeton University

  • White Papers // Aug 2011

    The Diversity-Multiplexing-Delay Tradeoff in MIMO Multihop Networks With ARQ

    The authors study the tradeoff between reliability, data rate, and delay for half-duplex MIMO multi-hop networks that utilize the Automatic-Retransmission-reQuest (ARQ) protocol both in the asymptotic high Signal-to-Noise Ratio (SNR) regime and in the finite SNR regime. They propose novel ARQ protocol designs that optimize these tradeoffs. In particular, they...

    Provided By Princeton University

  • White Papers // Aug 2011

    Fair Greening of Broadband Access: Spectrum Management for Energy-Efficient DSL Networks

    Dynamic Spectrum Management (DSM) is recognized as a promising technology to reduce power consumption in DSL access networks. However, the correct formulation of power-aware DSM problem statements requires a proper understanding of greening, i.e., reducing power consumption. In this paper, the authors therefore investigate greening and show that it can...

    Provided By Princeton University

  • White Papers // Aug 2011

    Toward a Lightweight Model of BGP Safety

    For the past ten years, researchers have used the Stable Paths Problem (SPP) to analyze the stability properties of the Border Gateway Protocol (BGP). Analysis of SPP has revealed several combinations of topologies and routing configurations (or gadgets) where BGP cannot converge to a unique stable solution. Researchers typically analyze...

    Provided By Princeton University

  • White Papers // Aug 2011

    Commensal Cuckoo: Secure Group Partitioning for LargeScale Services

    The authors present commensal cuckoo, a secure group partitioning scheme for large-scale systems that maintains the correctness of many small groups, despite a Byzantine adversary that controls a constant (global) fraction of all nodes. In particular, the adversary is allowed to repeatedly rejoin faulty nodes to the system in an...

    Provided By Princeton University

  • White Papers // Aug 2011

    ARIADNE: Agnostic Reconfiguration in a Disconnected Network Environment

    Extreme transistor technology scaling is causing increasing concerns in device reliability: the expected lifetime of individual transistors in complex chips is quickly decreasing, and the problem is expected to worsen at future technology nodes. With complex designs increasingly relying on Networks-on-Chip (NoCs) for on-chip data transfers, a NoC must continue...

    Provided By Princeton University

  • White Papers // Jul 2011

    Hiding Amongst the Clouds: A Proposal for Cloud-Based Onion Routing

    Internet censorship and surveillance have made anonymity tools increasingly critical for free and open Internet access. Tor, and its associated ecosystem of volunteer traffic relays, provides one of the most secure and widely-available means for achieving Internet anonymity today. Unfortunately, Tor has limitations, including poor performance, inadequate capacity, and a...

    Provided By Princeton University

  • White Papers // Jun 2011

    Coercing Clients Into Facilitating Failover for Object Delivery

    Application-level protocols used for object delivery, such as HTTP, are built atop TCP/IP and inherit its host-to-host abstraction. Given that these services are replicated for scalability, this unnecessarily exposes failures of individual servers to their clients. While changes to both client and server applications can be used to mask such...

    Provided By Princeton University

  • White Papers // May 2011

    Levels of Awareness: Design Considerations for Web Crawlers and Censorware Detection

    Search engines are tremendous force-multipliers for end-hosts trying to discover content on the Web. As the amount of content online grows, so does dependence on web crawlers to discover content. The desire for adversaries to censor search engines from detecting content on the Internet has scaled accordingly. Web crawlers, programs...

    Provided By Princeton University

  • White Papers // Apr 2011

    Identifying Performance Bottlenecks in CDNs Through TCP-Level Monitoring

    Content Distribution Networks (CDNs) need to make decisions, such as server selection and routing, to improve performance for their clients. The performance may be limited by various factors such as packet loss in the network, a small receive buffer at the client, or constrained server CPU and disk resources. Conventional...

    Provided By Princeton University

  • White Papers // Apr 2011

    A List-Machine Benchmark for Mechanized Metatheory

    The authors propose a benchmark to compare theorem-proving systems on their ability to express proofs of compiler correctness. In contrast to the first POPL-mark, they emphasize the connection of proofs to compiler implementations, and they point out that much can be done without binders or alpha-conversion. They propose specific criteria...

    Provided By Princeton University

  • White Papers // Apr 2011

    Modular Protections Against Non-Control Data Attacks

    This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by declaring critical data types and ascribing these critical types to important data structures. YARRA guarantees that such critical data is only written through pointers with the...

    Provided By Princeton University

  • White Papers // Mar 2011

    Frenetic: A Network Programming Language

    Modern networks provide a variety of interrelated services including routing, traffic monitoring, load balancing, and access control. Unfortunately, the languages used to program today's networks lack modern features they are usually defined at the low level of abstraction supplied by the underlying hardware and they fail to provide even rudimentary...

    Provided By Princeton University

  • White Papers // Mar 2011

    Time-Dependent Broadband Pricing: Feasibility and Benefits

    Charging different prices for Internet access at different times induces users to spread out their bandwidth consumption across times of the day. Potential impact on ISP revenue, congestion management, and consumer behavior can be significant, yet some fundamental questions remain: is it feasible to operate time dependent pricing and how...

    Provided By Princeton University

  • White Papers // Mar 2011

    Profiling Network Performance for Multi-Tier Data Center Applications

    Network performance problems are notoriously tricky to diagnose, and this is magnified when applications are often split into multiple tiers of application components spread across thousands of servers in a data center. Problems often arise in the communication between the tiers, where either the application or the network (or both!)...

    Provided By Princeton University

  • White Papers // Mar 2011

    SSDAlloc: Hybrid SSD/RAM Memory Management Made Easy

    The authors introduce SSDAlloc, a hybrid main memory management system that allows developers to treat Solid-State Disk (SSD) as an extension of the RAM in a system. SSDAlloc moves the SSD upward in the memory hierarchy, usable as a larger, slower form of RAM instead of just a cache for...

    Provided By Princeton University

  • White Papers // Feb 2011

    A Macroeconomic Model With A Financial Sector

    This paper studies the full equilibrium dynamics of an economy with financial frictions. Due to highly non-linear amplification effects, the economy is prone to instability and occasionally enters volatile episodes. Risk is endogenous and asset price correlations are high in down turns. In an environment of low exogenous risk experts...

    Provided By Princeton University

  • White Papers // Feb 2011

    Investing In Schooling In Chile: The Role Of Information About Financial Aid For Higher Education

    Recent economic research shows that imperfect information about Mincer returns to education (in developing countries) or about financial aid (in the US) may undermine investments in schooling and exacerbate inequalities in access to education. The authors extend this literature by presenting the results of an experiment that provided children and...

    Provided By Princeton University

  • White Papers // Feb 2011

    Let the Market Drive Deployment: A Strategy for Transitioning to BGP Security

    With a cryptographic root-of-trust for Internet routing (RPKI) on the horizon, the authors can finally start planning the deployment of one of the secure interdomain routing protocols proposed over a decade ago (Secure BGP, secure origin BGP). However, if experience with IPv6 is any indicator, this will be no easy...

    Provided By Princeton University

  • White Papers // Feb 2011

    A Survey of Virtual LAN Usage in Campus Networks

    VLANs are widely used in today's enterprise networks to improve Ethernet scalability and support network policies. However, manuals and textbooks offer very little information about how VLANs are actually used in practice. Through discussions with network administrators and analysis of configuration data, the authors describe how three university campuses and...

    Provided By Princeton University

  • White Papers // Jan 2011

    A Service Access Layer, at Your Service

    Historically, Internet services provided clients with access to the resources of a particular host. However, today's services are no longer defined by a single host or confined to a fixed location. Yet, the network architecture continues to impose an unfortunate coupling between hosts and services by binding connections to topology-dependent...

    Provided By Princeton University

  • White Papers // Jan 2011

    Is There Learning By Exporting: Evidence From The Automobile Industry In China

    Do exporters learn from their exporting experience? While this question seems to have been proven in theory, it nevertheless needs to be tested empirically. In this paper, the author uses an approach, suggested by De Loecker, which corrects for econometric and consistency problems, to estimate productivity. Using data from the...

    Provided By Princeton University

  • White Papers // Jan 2011

    There's Something About MRAI: Timing Diversity May Exponentially Worsen BGP Convergence

    To better support interactive applications, individual network operators are decreasing the timers that affect BGP convergence, leading to greater diversity in the timer settings across the Internet. While decreasing timers is intended to improve routing convergence, the authors show that, ironically, the resulting timer heterogeneity can make routing convergence substantially...

    Provided By Princeton University

  • White Papers // Jan 2011

    BGP Safety With Spurious Updates

    The authors explore BGP safety, the question of whether a BGP system converges to a stable routing, in light of several BGP implementation features that have not been fully included in the previous theoretical analyses. They show that Route Flap Damping, MRAI timers, and other intra-router features can cause a...

    Provided By Princeton University

  • White Papers // Jan 2011

    Job Search And Job Finding In A Period Of Mass Unemployment: Evidence From High-Frequency Longitudinal Data

    Several findings in this paper shed light on job search behavior in a depressed job market. Some findings are consistent with the Mortensen (1977) sequential job search model and others are inconsistent with it. In contrast to the prediction of sequential, stationary job search model, the authors find that the...

    Provided By Princeton University

  • White Papers // Jan 2011

    Routing as a Service

    In Internet routing, there is a fundamental tussle between the end users who want control over the end-to-end paths and the Autonomous Systems (ASes) who want control over the flow of traffic through their infrastructure. To resolve this tussle and offer flexible routing control across multiple routing domains, the authors...

    Provided By Princeton University

  • White Papers // Jan 2011

    A Blueprint for Introducing Disruptive Technology Into the Internet

    This paper argues that a new class of geographically distributed network services is emerging, and that the most effective way to design, evaluate, and deploy these services is by using an overlay - based testbed. Unlike conventional network testbeds, however, the authors advocate an approach that supports both researchers that...

    Provided By Princeton University

  • White Papers // Jan 2011

    Connection Conditioning: Architecture-Independent Support for Simple, Robust Servers

    For many network server applications, extracting the maximum performance or scalability from the hardware may no longer be much of a concern, given today's pricing a $300 system can easily handle 100 Mbps of Web server traffic, which would cost nearly $30,000 per month in most areas. Freed from worrying...

    Provided By Princeton University

  • White Papers // Jan 2011

    CoMon: A Mostly-Scalable Monitoring System for PlanetLab

    CoMon is an evolving, mostly-scalable monitoring system for PlanetLab that has the goal of presenting environment tailored information for both the administrators and users of the PlanetLab global testbed. In addition to passively reporting metrics provided by the operating system, CoMon also actively gathers a number of metrics useful for...

    Provided By Princeton University

  • White Papers // Jan 2011

    PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services

    Detecting network path anomalies generally requires examining large volumes of traffic data to find misbehavior. The authors observe that wide-area services, such as peer-to-peer systems and content distribution networks, exhibit large traffic volumes, spread over large numbers of geographically-dispersed endpoints. This makes them ideal candidates for observing wide-area network behavior....

    Provided By Princeton University

  • White Papers // Jan 2011

    Optimality Certificate of Dynamic Spectrum Management in Multi-Carrier Interference Channels

    The multi-carrier interference channel where interference is treated as additive white Gaussian noise, is a very active topic of research, particularly important in the area of Dynamic Spectrum Management (DSM) for Digital Subscriber Lines (DSL). Here, multiple users optimize their transmit power spectra so as to maximize the total weighted...

    Provided By Princeton University

  • White Papers // Jan 2009

    Protecting DNS From Routing Attacks: A Comparison of Two Alternative Anycast Implementations

    DNS is a critical piece of the Internet supporting the majority of Internet applications. Because it is organized in a hierarchy, its correct operation is dependent on the availability of a small number of servers at the upper levels of the hierarchy. These backbone servers are vulnerable to routing attacks...

    Provided By Princeton University

  • White Papers // Jun 2009

    Can DREs Provide Long-Lasting Security?: The Case of Return-Oriented Programming and the AVC Advantage

    A secure voting machine design must withstand new attacks devised throughout its multi-decade service lifetime. This paper gives a case study of the long-term security of a voting machine, the Sequoia AVC Advantage, whose design dates back to the early 80s. The AVC Advantage was designed with promising security features:...

    Provided By Princeton University

  • White Papers // Apr 2009

    Comparing the Security Performance of Network-Layer and Application-Layer Anycast

    It provides a theoretical analysis of the security performance of two any cast techniques that could be used as a countermeasure against DNS attacks exploiting vulnerabilities in the inter domain routing system. It argues that that the performance of the two techniques - network and ideal application layer any cast...

    Provided By Princeton University

  • White Papers // Jul 2009

    Hardware-Assisted Application-Level Access Control

    Applications typically rely on the operating system to en-force access control policies such as MAC, DAC, or other policies. How-ever, in the face of a compromised operating system, such protection mechanisms may be ineffective. Since security-sensitive applications are most motivated to maintain access control to their secret or sensitive in-formation,...

    Provided By Princeton University

  • White Papers // Jan 2010

    Network Security Management With High-Level Security Policies

    A key issue in network security management is how to define a formal security policy. A good policy specification should be easy to get right and relatively stable, even in a dynamically changing network. Much work has been done in automating network security management. But the policy languages used are...

    Provided By Princeton University

  • White Papers // Feb 2009

    HashCache: Cache Storage for the Next Billion

    This paper presents HashCache, a configurable cache storage engine designed to meet the needs of cache storage in the developing world. With the advent of cheap commodity laptops geared for mass deployments, developing regions are poised to become major users of the Internet, and given the high cost of bandwidth...

    Provided By Princeton University

  • White Papers // Jan 2010

    Understanding and Addressing Blocking-Induced Network Server Latency

    This paper investigate the origin and components of network server latency under various loads and find that filesystem-related kernel queues exhibit head-of-line blocking, which leads to bursty behavior in event delivery and process scheduling. In turn, these problems degrade the existing fairness and scheduling policies in the operating system, causing...

    Provided By Princeton University

  • White Papers // May 2010

    Wide-Area Network Acceleration for the Developing World

    Wide-Area Network (WAN) accelerators operate by compressing redundant network traffic from point-to-point communications, enabling higher effective bandwidth. Unfortunately, while network bandwidth is scarce and expensive in the developing world, current WAN accelerators are designed for enterprise use, and are a poor fit in these environments. Authors of this paper present...

    Provided By Princeton University

  • White Papers // Oct 2009

    The C-LINK System for Collaborative Web Usage: A Real-World Deployment in Rural Nicaragua

    Information exchange is one of the most crucial elements of education and business in the modern world. Therefore, equipping developing regions with access to the internet is becoming increasingly important. Though many regions will not receive broadband, wired connections in the near future, limited connectivity is rapidly become available. The...

    Provided By Princeton University

  • White Papers // Jan 2010

    Botz?4?Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds

    Recent denial of service attacks are mounted by professionals using Botnets of tens of thousands of compromised machines. To circumvent detection, attackers are increasingly moving away from bandwidth floods to attacks that mimic the Web browsing behavior of a large number of clients, and target expensive higher-layer resources such as...

    Provided By Princeton University

  • White Papers // Apr 2010

    NoHype: Virtualized Cloud Infrastructure Without the Virtualization

    Cloud computing is a disruptive trending that is changing the way the one use computers. The key underlying technology in cloud infrastructures is virtualization - so much so that many consider virtualization to be one of the key features rather than simply an implementation detail. Unfortunately, the use of virtualization...

    Provided By Princeton University

  • White Papers // Apr 2010

    Automated and Scalable QoS Control for Network Convergence

    Network convergence is becoming increasingly important for cost reduction and management simplification. However, this convergence requires strict performance isolation while keeping fine-grained control of each service (e.g. VoIP, video conference etc.). It is difficult to guarantee the performance requirements for various services with manual configuration of the Quality-of-Service (QoS) knobs...

    Provided By Princeton University

  • White Papers // Aug 2009

    Travel Time Derivative, Dynamic Road Toll on QoS-Market Analysis and Pricing Issues

    In this paper, travel time derivative is introduced as a new form of dynamic road toll to change user behavior, a new funding tool for the traffic projects, a new hedging tool against transportation related risk and a promising investment for investors. The potential market is analyzed and the benefits...

    Provided By Princeton University

  • White Papers // Jan 2010

    Extensible Security Architectures for Java

    This paper considers the problem of securely supporting mobile code on real-world systems. Unlike traditional operating systems, Web browsers must rely on software mechanisms for basic memory safety, both for portability and performance. Currently, there is no standard for constructing secure services above basic memory safety primitives. This paper explain...

    Provided By Princeton University

  • White Papers // Apr 2010

    The "Platform as a Service" Model for Networking

    Decoupling infrastructure management from service management can lead to innovation, new business models, and a reduction in the complexity of running services. It is happening in the world of computing, and is poised to happen in networking. While many have considered this in the context of network virtualization, they all...

    Provided By Princeton University

  • White Papers // Oct 2010

    SPORC: Group Collaboration Using Untrusted Cloud Resources

    Cloud-based services are an attractive deployment model for user-facing applications like word processing and calendaring. Unlike desktop applications, cloud services allow multiple users to edit shared state concurrently and in real-time, while being scalable, highly available, and globally accessible. Unfortunately, these benefits come at the cost of fully trusting cloud...

    Provided By Princeton University

  • White Papers // Jun 2009

    Transit Portal: Bringing Connectivity to the Cloud

    Computing in the cloud is becoming more common as companies migrate their applications into cloud computing platforms to reduce maintenance costs and increase availability. Cloud hosting platforms, such as Amazon's EC2, provide a virtual hosting environment that is easy for a service provider to provision in response to dynamically changing...

    Provided By Princeton University

  • White Papers // Mar 2010

    Making Cloud Intermediate Data Fault-Tolerant

    Parallel dataflow programs generate enormous amounts of distributed data that are short-lived, yet are critical for completion of the job and for good run-time performance. The authors call this class of data as intermediate data. This paper is the first to address intermediate data as a first-class citizen, specifically targeting...

    Provided By Princeton University

  • White Papers // Sep 2010

    Estimating Risk Preferences: Evidence From Online Sports Gambling

    The authors examine individual decision-making under risk using a unique panel dataset of consumer betting activity in an online sportsbook. This econometric model accounts for individual heterogeneity in risk preferences both between and within rational and behavioral theories of choice under risk. Besides being able to estimate individual-level utility parameters...

    Provided By Princeton University

  • White Papers // Jan 2010

    DFS: A File System for Virtualized Flash Storage

    This paper presents the design, implementation and evaluation of Direct File System (DFS) for virtualized flash storage. Instead of using traditional layers of abstraction, the layers of abstraction are designed for directly accessing flash memory devices. DFS has two main novel features. First, it lays out its files directly in...

    Provided By Princeton University

  • White Papers // Oct 2009

    Goal-Setting, Social Comparison, And Self-Control

    This paper addresses the role of self-set, non-binding goals as a source of internal motivation to attenuate the self-control problem of a hyperbolic discounter. Agents have linear reference-dependent preferences and endogenously set a goal that serves as the reference point. They face an infinite horizon, optimal stopping problem in continuous...

    Provided By Princeton University

  • White Papers // Jun 2009

    Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems

    The well-studied task of learning a linear function with errors is a seemingly hard problem and the basis for several cryptographic schemes. Here the authors demonstrate additional applications that enjoy strong security properties and a high level of efficiency. Namely, they construct: Public-key and symmetric-key cryptosystems that provide security for...

    Provided By Princeton University

  • White Papers // Nov 2010

    Career Services: At Princeton University

    Job satisfaction is closely linked to having an interest in the tasks you perform. This includes the things you enjoy doing and the mental and physical activities that you find stimulating. Doing something that you are passionate about can make it easier to become successful at what you do. To...

    Provided By Princeton University

  • White Papers // Jan 2011

    A Blueprint for Introducing Disruptive Technology Into the Internet

    This paper argues that a new class of geographically distributed network services is emerging, and that the most effective way to design, evaluate, and deploy these services is by using an overlay - based testbed. Unlike conventional network testbeds, however, the authors advocate an approach that supports both researchers that...

    Provided By Princeton University

  • White Papers // Jul 2009

    Virtual Ring Routing Trends

    Virtual Ring Routing (VRR) schemes were introduced in the context of wireless ad hoc networks and Internet anycast overlays. They build a network-routing layer using ideas from distributed hash table design, utilizing randomized virtual identities along a ring. This makes maintenance practical when nodes may enter or leave. Previously, VRR...

    Provided By Princeton University

  • White Papers // Apr 2009

    Object Storage on CRAQ: High-Throughput Chain Replication for Read-Mostly Workloads

    Massive storage systems typically replicate and partition data over many potentially-faulty components to provide both reliability and scalability. Yet many commercially deployed systems, especially those designed for interactive use by customers, sacrifice stronger consistency properties in the desire for greater availability and higher throughput. This paper describes the design, implementation,...

    Provided By Princeton University

  • White Papers // Feb 2009

    NetReview: Detecting When Interdomain Routing Goes Wrong

    Despite many attempts to fix it, the Internet's interdomain routing system remains vulnerable to configuration errors, buggy software, flaky equipment, protocol oscillation, and intentional attacks. Unlike most existing solutions that prevent specific routing problems, the approach is to detect problems automatically and to identify the offending party. Fault detection is...

    Provided By Princeton University

  • White Papers // Jan 2011

    Connection Conditioning: Architecture-Independent Support for Simple, Robust Servers

    For many network server applications, extracting the maximum performance or scalability from the hardware may no longer be much of a concern, given today's pricing a $300 system can easily handle 100 Mbps of Web server traffic, which would cost nearly $30,000 per month in most areas. Freed from worrying...

    Provided By Princeton University

  • White Papers // Jan 2011

    CoMon: A Mostly-Scalable Monitoring System for PlanetLab

    CoMon is an evolving, mostly-scalable monitoring system for PlanetLab that has the goal of presenting environment tailored information for both the administrators and users of the PlanetLab global testbed. In addition to passively reporting metrics provided by the operating system, CoMon also actively gathers a number of metrics useful for...

    Provided By Princeton University

  • White Papers // Jul 2009

    Who Files? Developing Country Participation In GATT/WTO Adjudication

    The potential for international law to reduce power asymmetries depends on weaker countries learning to navigate the legal system. This paper examines the use of courts by developing countries to defend their trade interests. Power relations and low capacity may prevent these countries from fully participating in the international trade...

    Provided By Princeton University

  • White Papers // Feb 2009

    Is The WTO Still Relevant?

    Ten years ago, the World Trade Organization (WTO) was making front page news. In this still fresh post Cold War period, journalists reveled at reports of modern-day wars fought over issues of beef and bananas with Roquefort cheese and cashmere sweaters as weapons. Policy-makers debated which issues to include in...

    Provided By Princeton University

  • White Papers // Sep 2010

    Financial Regulation In A System Context

    The global financial crisis raises questions about the proper objectives of financial regulation and how best to meet them. Traditionally, capital requirements have been the cornerstone of bank regulation. However, the run on the investment bank Bear Stearns in March 2008 led to its demise even though Bear Stearns met...

    Provided By Princeton University

  • White Papers // Jan 2009

    Parallel Generation of l Sequences

    The generation of pseudo-random sequences at a high rate is an important issue in modern communication schemes. The representation of a sequence can be scaled by decimation to obtain parallelism and more precisely a sub-sequences generator. Sub-sequences generators and therefore decimation have been extensively used in the past for Linear...

    Provided By Princeton University

  • White Papers // Apr 2009

    Europe And The Management Of Globalization: Responding To Globalization Pressures

    Globalization defined here as the increased flows of goods, services, capital, people, and information across borders - has been the source of many worries in Europe over the past decade, way before the global financial meltdown of 2008. In many European countries, globalization is more often perceived as a threat...

    Provided By Princeton University

  • White Papers // Jan 2010

    The Exporters Behaviors: Evidence From The Automobile Industry In China

    In this paper, the author presents some evidence about the Chinese exporters in the automobile industry. In particular, the author finds that productivity is linked positively with exports, although this relationship is not significant in some sectors, as well as when we control for the state and foreign capital. More...

    Provided By Princeton University

  • White Papers // Jan 2011

    PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services

    Detecting network path anomalies generally requires examining large volumes of traffic data to find misbehavior. The authors observe that wide-area services, such as peer-to-peer systems and content distribution networks, exhibit large traffic volumes, spread over large numbers of geographically-dispersed endpoints. This makes them ideal candidates for observing wide-area network behavior....

    Provided By Princeton University

  • White Papers // Jan 2011

    Is There Learning By Exporting: Evidence From The Automobile Industry In China

    Do exporters learn from their exporting experience? While this question seems to have been proven in theory, it nevertheless needs to be tested empirically. In this paper, the author uses an approach, suggested by De Loecker, which corrects for econometric and consistency problems, to estimate productivity. Using data from the...

    Provided By Princeton University

  • White Papers // Jan 2010

    A Transport Layer Approach for Improving End-to-End Performance and Robustness Using Redundant Paths

    Recent work on Internet measurement and overlay networks has shown that redundant paths are common between pairs of hosts and that one can often achieve better end-to-end performance by adaptively choosing an alternate path. In this paper, the authors propose an end-to-end transport layer protocol, mTCP, which can aggregate the...

    Provided By Princeton University

  • White Papers // Jun 2010

    Markups And Exporting Behavior

    Estimating markups has a long tradition in industrial organization and international trade. Economists and policy makers are interested in measuring the effect of various competition and trade policies on market power, typically measured by markups. The empirical methods that were developed in empirical industrial organization often rely on the availability...

    Provided By Princeton University

  • White Papers // Aug 2010

    Multi-product Firms And Exchange Rate Fluctuations

    The paper studies the effect of exchange rate shocks on the pricing decisions of multi-product firms. The authors construct a model to illustrate how firms adjust their prices, as well as quantities and product scope, in the event of an exchange rate depreciation. Firms' markups depend on their productivity levels...

    Provided By Princeton University