Publications

For publications prior to 2011, see DBLP.

2025

  1. NSDI
    Enhancing Network Failure Mitigation with Performance-Aware Ranking
    Namyar, Pooria, Ghavidel, Arvin, Crankshaw, Daniel, Berger, Daniel S, Hsieh, Kevin, Kandula, Srikanth, Govindan, Ramesh, and Arzani, Behnaz
    In 22nd USENIX Symposium on Networked Systems Design and Implementation (NSDI 25) 2025
  2. NSDI
    Everything Matters in Programmable Packet Scheduling
    Alcoz, Albert Gran, Vass, Balázs, Namyar, Pooria, Arzani, Behnaz, Rétvári, Gábor, and Vanbever, Laurent
    In 22nd USENIX Symposium on Networked Systems Design and Implementation (NSDI 25) 2025
  3. NSDI
    Quicksand: Harnessing Stranded Datacenter Resources with Granular Computing
    Ruan, Zhenyuan, Li, Shihang, Fan, Kaiyan, Aguilera, Marcos K., Belay, Adam, Park, Seo Jin, and Schwarzkopf, Malte
    In 22nd USENIX Symposium on Networked Systems Design and Implementation (NSDI 25) 2025

2024

  1. MobiCom
    RECAP: 3D Traffic Reconstruction
    Shin, Christina, Pang, Weiwu, Li, Chuan, Bai, Fan, Ahmad, Fawad, Paek, Jeongyeup, and Govindan, Ramesh
    In Proceedings of the 30th Annual International Conference on Mobile Computing and Networking (MobiCom 24) 2024

    On-vehicle 3D sensing technologies, such as LiDARs and stereo cameras, enable a novel capability, 3D traffic reconstruction. This produces a volumetric video consisting of a sequence of 3D frames capturing the time evolution of road traffic. 3D traffic reconstruction can help trained investigators reconstruct the scene of an accident. In this paper, we describe the design and implementation of RECAP, a system that continuously and opportunistically produces 3D traffic reconstructions from multiple vehicles. RECAP builds upon prior work on point cloud registration, but adapts it to settings with minimal point cloud overlap (both in the spatial and temporal sense) and develops techniques to minimize error and computation time in multi-way registration. On-road experiments and trace-driven simulations show that RECAP can, within minutes, generate highly accurate reconstructions that have 2× or more lower errors than competing approaches.

  2. HotNets
    End-to-End Performance Analysis of Learning-enabled Systems
    Namyar, Pooria, Schapira, Michael, Govindan, Ramesh, Segarra, Santiago, Beckett, Ryan, Kakarla, Siva Kesava Reddy, and Arzani, Behnaz
    In Proceedings of the 23rd ACM Workshop on Hot Topics in Networks 2024

    We propose a performance analysis tool for learning-enabled systems that allows operators to uncover potential performance issues before deploying DNNs in their systems. The tools that exist for this purpose require operators to faithfully model all components (a white-box approach) or do inefficient black-box local search. We propose a gray-box alternative, which eliminates the need to precisely model all the system’s components. Our approach is faster and finds substantially worse scenarios compared to prior work. We show that a state-of-the-art learning-enabled traffic engineering pipeline can underperform the optimal by 6\texttimes — a much higher number compared to what the authors found.

  3. HotNets
    Towards Safer Heuristics With XPlain
    Karimi, Pantea, Pirelli, Solal, Kakarla, Siva Kesava Reddy, Beckett, Ryan, Segarra, Santiago, Li, Beibin, Namyar, Pooria, and Arzani, Behnaz
    In Proceedings of the 23rd ACM Workshop on Hot Topics in Networks 2024

    Many problems that cloud operators solve are computationally expensive, and operators often use heuristic algorithms (that are faster and scale better than optimal) to solve them more efficiently. Heuristic analyzers enable operators to find when and by how much their heuristics underperform. However, these tools do not provide enough detail for operators to mitigate the heuristic’s impact in practice: they only discover a single input instance that causes the heuristic to underperform (and not the full set) and they do not explain why.We propose XPlain, a tool that extends these analyzers and helps operators understand when and why their heuristics underperform. We present promising initial results that show such an extension is viable.

  4. IMC
    RPSLyzer: Characterization and Verification of Policies in Internet Routing Registries
    He, Sichang, Cunha, Italo, and Katz-Bassett, Ethan
    In Proceedings of the 2024 ACM Internet Measurement Conference 2024
  5. NSDI
    Finding Adversarial Inputs for Heuristics using Multi-level Optimization
    Namyar, Pooria, Arzani, Behnaz, Beckett, Ryan, Segarra, Santiago, Raj, Himanshu, Krishnaswamy, Umesh, Govindan, Ramesh, and Kandula, Srikanth
    In 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24) Apr 2024

    Production systems use heuristics because they are faster or scale better than their optimal counterparts. Yet, practitioners are often unaware of the performance gap between a heuristic and the optimum or between two heuristics in realistic scenarios. We present MetaOpt, a system that helps analyze heuristics. Users specify the heuristic and the optimal (or another heuristic) as input, and MetaOpt automatically encodes these efficiently for a solver to find performance gaps and their corresponding adversarial inputs. Its suite of built-in optimizations helps it scale its analysis to practical problem sizes. To show it is versatile, we used MetaOpt to analyze heuristics from three domains (traffic engineering, vector bin packing, and packet scheduling). We found a production traffic engineering heuristic can require 30% more capacity than the optimal to satisfy realistic demands. Based on the patterns in the adversarial inputs MetaOpt produced, we modified the heuristic to reduce its performance gap by 12.5×. We examined adversarial inputs to a vector bin packing heuristic and proved a new lower bound on its performance.

  6. NSDI
    LDB: An Efficient Latency Debugging Tool for Datacenter Applications
    Cho, Inho, Park, Seo Jin, Saeed, Ahmed, Alizadeh, Mohammad, and Belay, Adam
    In 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24) Apr 2024
  7. NSDI
    Solving Max-Min Fair Resource Allocations Quickly on Large Graphs
    Namyar, Pooria, Arzani, Behnaz, Kandula, Srikanth, Segarra, Santiago, Crankshaw, Daniel, Krishnaswamy, Umesh, Govindan, Ramesh, and Raj, Himanshu
    In 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24) Apr 2024

    We consider the max-min fair resource allocation problem. The best-known solutions use either a sequence of optimizations or waterfilling, which only applies to a narrow set of cases. These solutions have become a practical bottleneck in WAN traffic engineering and cluster scheduling, especially at larger problem sizes. We improve both approaches: (1) we show how to convert the optimization sequence into a single fast optimization, and (2) we generalize waterfilling to the multi-path case. We empirically show our new algorithms Pareto-dominate prior techniques: they produce faster, fairer, and more efficient allocations. Some of our allocators also have theoretical guarantees: they trade off a bounded amount of unfairness for faster allocation. We have deployed our allocators in Azure’s WAN traffic engineering pipeline, where we preserve solution quality and achieve a roughly 3× speedup.

  8. NSDI
    Sprinter: Speeding Up High-Fidelity Crawling of the Modern Web
    Goel, Ayush, Zhu, Jingyuan, Netravali, Ravi, and Madhyastha, Harsha V.
    In 21st USENIX Symposium on Networked Systems Design and Implementation Apr 2024

2023

  1. HotOS
    Unleashing True Utility Computing with Quicksand
    Ruan, Zhenyuan, Li, Shihang, Fan, Kaiyan, Aguilera, Marcos K., Belay, Adam, Park, Seo Jin, and Schwarzkopf, Malte
    In Proceedings of the 19th Workshop on Hot Topics in Operating Systems Apr 2023
  2. MobiCom
    UbiPose: Towards Ubiquitous Outdoor AR Pose Tracking Using Aerial Meshes
    Pang, Weiwu, Xia, Chunyu, Leong, Branden, Ahmad, Fawad, Paek, Jeongyeup, and Govindan, Ramesh
    In Proceedings of the 29th Annual International Conference on Mobile Computing and Networking Apr 2023
  3. SoCC
    Auxo: Efficient Federated Learning via Scalable Client Clustering
    Liu, Jiachen, Lai, Fan, Dai, Yinwei, Akella, Aditya, Madhyastha, Harsha V., and Chowdhury, Mosharaf
    In ACM Symposium on Cloud Computing Apr 2023
  4. IMC
    Reviving Dead Links on the Web with FABLE
    Zhu, Jingyuan, Nyayachavadi, Anish, Zhu, Jiangchen, Ruamviboonsuk, Vaspol, and Madhyastha, Harsha V.
    In Proceedings of the 23rd ACM Internet Measurement Conference Apr 2023
  5. Sigcomm
    Dragonfly: Higher Perceptual Quality For Continuous 360° Video Playback
    Ghabashneh, Ehab, Bothra, Chandan, Govindan, Ramesh, Ortega, Antonio, and Rao, Sanjay
    In Proceedings of the ACM SIGCOMM 2023 Conference Apr 2023

    When streaming 360° video, it is possible to reduce bandwidth by 5\texttimes with approaches that spatially segment video into tiles and only stream the user’s viewport. Unfortunately, it is difficult to accurately predict a user’s viewport even 2–3 seconds before playback. This results in rebuffering events owing to misprediction of a user’s viewport or network bandwidth dips, which hurts interactive experience. However, avoiding rebuffering by naively skipping tiles that do not arrive by the playback deadline may lead to incomplete viewports and degraded experience.In this paper, we describe Dragonfly, a new 360° system that preserves interactive experience by avoiding playback stalls while maintaining high perceptual quality. Dragonfly prudently skips tiles using a model that defines an overall utility function to decide which tiles to fetch, and at which qualities they should be fetched, with the goal of optimizing user experience. To minimize incomplete viewports, it also fetches a low quality masking stream. Using a user study with 26 users and emulation-based experiments we show that Dragonfly has higher quality, and lower overheads, than state-of-the-art 360° streaming approaches. For instance, in our study, 65% of sessions have a rating of 4 or higher (Good/Excellent) with Dragonfly, while only 16% of sessions with Pano, and 13% of sessions with Flare achieve this rating.

  6. Ubicomp/IMWUT
    AeroTraj: Trajectory Planning for Fast, and Accurate 3D Reconstruction Using a Drone-Based LiDAR
    Ahmad, Fawad, Shin, Christina Suyong, Ghosh, Rajrup, D’Ambrosio, John, Chai, Eugene, Sundaresan, Karthikeyan, and Govindan, Ramesh
    Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. Sep 2023

    This paper presents AeroTraj, a system that enables fast, accurate, and automated reconstruction of 3D models of large buildings using a drone-mounted LiDAR. LiDAR point clouds can be used directly to assemble 3D models if their positions are accurately determined. AeroTraj uses SLAM for this, but must ensure complete and accurate reconstruction while minimizing drone battery usage. Doing this requires balancing competing constraints: drone speed, height, and orientation. AeroTraj exploits building geometry in designing an optimal trajectory that incorporates these constraints. Even with an optimal trajectory, SLAM’s position error can drift over time, so AeroTraj tracks drift in-flight by offloading computations to the cloud and invokes a re-calibration procedure to minimize error. AeroTraj can reconstruct large structures with centimeter-level accuracy and with an average end-to-end latency below 250 ms, significantly outperforming the state of the art.

  7. NSDI
    ModelKeeper: Accelerating DNN Training via Automated Training Warmup
    Lai, Fan, Dai, Yinwei, Madhyastha, Harsha V., and Chowdhury, Mosharaf
    In 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23) Sep 2023

    With growing deployment of machine learning (ML) models, ML developers are training or re-training increasingly more deep neural networks (DNNs). They do so to find the most suitable model that meets their accuracy requirement while satisfying the resource and timeliness constraints of the target environment. In large shared clusters, the growing number of neural architecture search (NAS) and training jobs often result in models sharing architectural similarities with others from the same or a different ML developer. However, existing solutions do not provide a systematic mechanism to identify and leverage such similarities. We present ModelKeeper, the first automated training warmup system that accelerates DNN training by repurposing previously-trained models in a shared cluster. Our key insight is that initializing a training job’s model by transforming an already-trained model’s weights can jump-start it and reduce the total amount of training needed. However, models submitted over time can differ in their architectures and accuracy. Given a new model to train, ModelKeeper scalably identifies its architectural similarity with previously trained models, selects a parent model with high similarity and good model accuracy, and performs structure-aware transformation of weights to preserve maximal information from the parent model during the warmup of new model weights. Our evaluations across thousands of CV and NLP models show that ModelKeeper achieves 1.3×–4.3× faster training completion with little overhead and no reduction in model accuracy.

  8. ToN
    Optimal Oblivious Routing With Concave Objectives for Structured Networks
    Chitavisutthivong, K., Supittayapornpong, S., Namyar, P., Zhang, M., Yu, M., and Govindan, R.
    IEEE/ACM Transactions on Networking Apr 2023

    Oblivious routing distributes traffic from sources to destinations following predefined routes with rules independent of traffic demands. While finding optimal oblivious routing with a concave objective is intractable for general topologies, we show that it is tractable for structured topologies often used in datacenter networks. To achieve this, we apply graph automorphism and prove the existence of the optimal automorphism-invariant solution. This result reduces the search space to targeting the optimal automorphism-invariant solution. We design an iterative algorithm to obtain such a solution by alternating between convex optimization and a linear program. The convex optimization finds an automorphism-invariant solution based on representative variables and constraints, making the problem tractable. The linear program generates adversarial demands to ensure the final result satisfies all possible demands. Since the construction of the representative variables and constraints are combinatorial problems, we design polynomial-time algorithms for the construction. We evaluate the iterative algorithm in terms of throughput performance, scalability, and generality over three potential applications. The algorithm i) improves the throughput up to 87.5% for partially deployed FatTree and achieves up to 2.55\times throughput gain for DRing over heuristic algorithms, ii) scales for three considered topologies with a thousand switches, iii) applies to a general structured topology with non-uniform link capacity and server distribution.

  9. ICLR
    MCAL: Minimum Cost Human-Machine Active Labeling
    Qiu, Hang, Chintalapudi, Krishna, and Govindan, Ramesh
    In The Eleventh International Conference on Learning Representations Apr 2023

2022

  1. HotNets
    Making links on your web pages last longer than you
    Goel, Ayush, Zhu, Jingyuan, and Madhyastha, Harsha V.
    In Proceedings of the 21st ACM Workshop on Hot Topics in Networks Apr 2022

    It is common for the authors of a web page to include links to related pages on other sites. However, when users visit a page several years after it was last updated, they often find that some of the external links either do not work or point to unrelated content. To combat these problems of link rot and content drift, the solution used today is to capture a copy of the linked page when a link is created and serve this copy to users who choose to visit the link. We argue that this status quo ignores the reality that one does not always link to a page in order to point visitors to the content that existed on that page when the link was created. The utility of linking to a web page by simply directing users to that page’s URL is that they can benefit from any updates to the page’s content (e.g., corrections to news articles and new comments on a blog post) or access rich app-like functionality on the page (e.g., search). In this paper, we present a sketch of what it would take to make web links resilient while accounting for the dynamism of web pages.

  2. SoCC
    Quadrant: A Cloud-Deployable NF Virtualization Platform
    Wang, Jianfeng, Lévai, Tamás, Li, Zhuojin, Vieira, Marcos A. M., Govindan, Ramesh, and Raghavan, Barath
    In SoCC ’22: Proceedings of the ACM Symposium on Cloud Computing Apr 2022

    Network Functions (NFs) now touch a significant fraction of Internet traffic. The hope has been that software-based NF Virtualization (NFV) would enable rapid development of new NFs by vendors and leverage the power and economics of commodity computing infrastructure for NF deployment. To date, no cloud NFV systems achieve NF chaining, isolation, SLO-adherence, and scaling together with existing cloud computing infrastructure and abstractions, all while achieving generality, speed, and ease of deployment; these properties are taken for granted in other cloud contexts but unavailable for NF processing. We present Quadrant, an efficient and secure cloud-deployable NFV system, and show that Quadrant’s approach of adapting existing cloud infrastructure to support packet processing can achieve NF chaining, isolation, generality, and performance in NFV. Quadrant reuses common cloud infrastructure such as Kubernetes, cloud functions, the Linux kernel, NIC hardware, and switches. It enables easy NFV deployment while delivering up to double the performance per core compared to the state of the art.

  3. IMC
    Characterizing "permanently dead" links on Wikipedia
    Nyayachavadi, Anish, Zhu, Jingyuan, and Madhyastha, Harsha V.
    In Proceedings of the 22nd ACM Internet Measurement Conference Apr 2022

    It is common for a web page to include links which help visitors discover related pages on other sites. When a link ceases to work (e.g., because the page that it is pointing to either no longer exists or has been moved), users could rely on an archived copy of the linked page. However, due to the incompleteness of web archives, a sizeable fraction of dead links have no archived copies. We study this problem in the context of Wikipedia. Broken external references on Wikipedia which lack archived copies are marked as "permanently dead". But, we find this term to be a misnomer, as many previously dysfunctional links work fine today. For links which do not work, it is rarely the case that no archived copies exist. Instead, we find that the current policy for determining which archived copies for an URL are not erroneous is too conservative, and many URLs are archived for the first time only after they no longer work. We discuss the implications of our findings for Wikipedia and the web at large.

  4. ICML
    FedScale: Benchmarking Model and System Performance of Federated Learning at Scale
    Lai, Fan, Dai, Yinwei, Singapuram, Sanjay Sri Vallabh, Liu, Jiachen, Zhu, Xiangfeng, Madhyastha, Harsha V., and Chowdhury, Mosharaf
    In International Conference on Machine Learning Apr 2022

    We present FedScale, a federated learning (FL) benchmarking suite with realistic datasets and a scalable runtime to enable reproducible FL research. FedScale datasets encompass a wide range of critical FL tasks, ranging from image classification and object detection to language modeling and speech recognition. Each dataset comes with a unified evaluation protocol using real-world data splits and evaluation metrics. To reproduce realistic FL behavior, FedScale contains a scalable and extensible runtime. It provides high-level APIs to implement FL algorithms, deploy them at scale across diverse hardware and software backends, and evaluate them at scale, all with minimal developer efforts. We combine the two to perform systematic benchmarking experiments and highlight potential opportunities for heterogeneity-aware co-optimizations in FL. FedScale is open-source and actively maintained by contributors from different institutions at http://fedscale. ai. We welcome feedback and contributions from the community.

  5. OSDI
    Jawa: Web Archival in the Era of JavaScript
    Goel, Ayush, Zhu, Jingyuan, Netravali, Ravi, and Madhyastha, Harsha V.
    In 16th USENIX Symposium on Operating Systems Design and Implementation Apr 2022

    By repeatedly crawling and saving web pages over time, web archives (such as the Internet Archive) enable users to visit historical versions of any page. In this paper, we point out that existing web archives are not well designed to cope with the widespread presence of JavaScript on the web. Some archives store petabytes of JavaScript code, and yet many pages render incorrectly when users load them. Other archives which store the end-state of page loads (e.g., screen captures) break post-load interactions implemented in JavaScript. To address these problems, we present Jawa, a new design for web archives which significantly reduces the storage necessary to save modern web pages while also improving the fidelity with which archived pages are served. Key to enabling Jawa’s use at scale are our observations on a) the forms of non-determinism which impair the execution of JavaScript on archived pages, and b) the ways in which JavaScript’s execution fundamentally differs between live web pages and their archived copies. On a corpus of 1 million archived pages, Jawa reduces overall storage needs by 41%, when compared to the techniques currently used by the Internet Archive.

  6. MobiSys
    AutoCast: Scalable Infrastructure-Less Cooperative Perception for Distributed Collaborative Driving
    Qiu, Hang, Huang, Po-Han, Asavisanu, Namo, Liu, Xiaochen, Psounis, Konstantinos, and Govindan, Ramesh
    In Proceedings of the 20th Annual International Conference on Mobile Systems, Applications and Services Apr 2022

    Autonomous vehicles use 3D sensors for perception. Cooperative perception enables vehicles to share sensor readings with each other to improve safety. Prior work in cooperative perception scales poorly even with infrastructure support. AUTOCAST1 enables scalable infrastructure-less cooperative perception using direct vehicle-to-vehicle communication. It carefully determines which objects to share based on positional relationships between traffic participants, and the time evolution of their trajectories. It coordinates vehicles and optimally schedules transmissions in a distributed fashion. Extensive evaluation results under different scenarios show that, unlike competing approaches, AUTOCAST can avoid crashes and near-misses which occur frequently without cooperative perception, its performance scales gracefully in dense traffic scenarios providing 2-4x visibility into safety critical objects compared to existing cooperative perception schemes, its transmission schedules can be completed on the real radio testbed, and its scheduling algorithm is near-optimal with negligible computation overhead.

  7. INFOCOM
    Optimal Oblivious Routing for Structured Networks
    Supittayapornpong, Sucha, Namyar, Pooria, Zhang, Mingyang, Yu, Minlan, and Govindan, Ramesh
    In IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Apr 2022

    Oblivious routing distributes traffic from sources to destinations following predefined routes with rules independent of traffic demands. While finding optimal oblivious routing is intractable for general topologies, we show that it is tractable for structured topologies often used in datacenter networks. To achieve this, we apply graph automorphism and prove the existence of the optimal automorphism-invariant solution. This result reduces the search space to targeting the optimal automorphism-invariant solution. We design an iterative algorithm to obtain such a solution by alternating between two linear programs. The first program finds an automorphism-invariant solution based on representative variables and constraints, making the problem tractable. The second program generates adversarial demands to ensure the final result satisfies all possible demands. Since, the construction of the representative variables and constraints are combinatorial problems, we design polynomial-time algorithms for the construction. We evaluate proposed iterative algorithm in terms of throughput performance, scalability, and generality over three potential applications. The algorithm i) improves the throughput up to 87.5% over a heuristic algorithm for partially deployed FatTree, ii) scales for FatClique with a thousand switches, iii) is applicable to a general structured topology with non-uniform link capacity and server distribution.

  8. NSDI
    CloudCluster: Unearthing the Functional Structure of a Cloud Service
    Pang, Weiwu, Panda, Sourav, Amjad, Jehangir, Diot, Christophe, and Govindan, Ramesh
    In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22) Apr 2022

    In their quest to provide customers with good tools to manage cloud services, cloud providers are hampered by having very little visibility into cloud service functionality; a provider often only knows where VMs of a service are placed, how the virtual networks are configured, how VMs are provisioned, and how VMs communicate with each other. In this paper, we show that, using the VM-to-VM traffic matrix, we can unearth the functional structure of a cloud service and use it to aid cloud service management. Leveraging the observation that cloud services use well-known design patterns for scaling (e.g., replication, communication locality), we show that clustering the VM-to-VM traffic matrix yields the functional structure of the cloud service. Our clustering algorithm, CloudCluster, must overcome challenges imposed by scale (cloud services contain tens of thousands of VMs) and must be robust to orders-of-magnitude variability in traffic volume and measurement noise. To do this, CloudCluster uses a novel combination of feature scaling, dimensionality reduction, and hierarchical clustering to achieve clustering with over 92% homogeneity and completeness. We show that CloudCluster can be used to explore opportunities to reduce cost for customers, identify anomalous traffic and potential misconfigurations.

2021

  1. SoCC
    Scrooge: A Cost-Effective Deep Learning Inference System
    Hu, Yitao, Ghosh, Rajrup, and Govindan, Ramesh
    In SoCC ’21: Proceedings of the ACM Symposium on Cloud Computing Apr 2021

    Advances in deep learning (DL) have prompted the development of cloud-hosted DL-based media applications that process video and audio streams in real-time. Such applications must satisfy throughput and latency objectives and adapt to novel types of dynamics, while incurring minimal cost. Scrooge, a system that provides media applications as a service, achieves these objectives by packing computations efficiently into GPU-equipped cloud VMs, using an optimization formulation to find the lowest cost VM allocations that meet the performance objectives, and rapidly reacting to variations in input complexity (e.g., changes in participants in a video). Experiments show that Scrooge can save serving cost by 16-32% (which translate to tens of thousands of dollars per year) relative to the state-of-the-art while achieving latency objectives for over 98% under dynamic workloads.

  2. TMC
    Synthesis of Large-Scale Instant IoT Networks
    Ghosh, Pradipta, Bunton, Jonathan, Pylorof, Dimitrios, Vieira, Marcos A. M., Chan, Kevin, Govindan, Ramesh, Sukhatme, Gaurav S., Tabuada, Paulo, and Verma, Gunjan
    IEEE Transactions on Mobile Computing Apr 2021

    While most networks have long lifetimes, temporary network infrastructure is often useful for special events, pop-up retail, or disaster response. An instant IoT network is one that is rapidly constructed, used for a few days, then dismantled. We consider the synthesis of instant IoT networks in urban settings. This synthesis problem must satisfy complex and competing constraints: sensor coverage, line-of-sight visibility, and network connectivity. The central challenge in our synthesis problem is quickly scaling to large regions while producing cost-effective solutions. We explore two qualitatively different representations of the synthesis problems using satisfiability modulo convex optimization (SMC), and mixed-integer linear programming (MILP). The former is more expressive, for our problem, than the latter, but is less well-suited for solving optimization problems like ours. We show how to express our network synthesis in these frameworks. To scale to problem sizes beyond what these frameworks are capable of, we develop a hierarchical synthesis technique that independently synthesizes networks in sub-regions of the deployment area, then combines these. We find that, while MILP outperforms SMC in some settings for smaller problem sizes, the fact that SMC’s expressivity matches our problem ensures that it uniformly generates better quality solutions at larger problem sizes.

  3. SIGCOMM
    A Throughput-Centric View of the Performance of Datacenter Topologies
    Namyar, Pooria, Supittayapornpong, Sucha, Zhang, Mingyang, Yu, Minlan, and Govindan, Ramesh
    In Proceedings of the 2021 ACM SIGCOMM 2021 Conference Apr 2021

    While prior work has explored many proposed datacenter designs, only two designs, Clos-based and expander-based, are generally considered practical because they can scale using commodity switching chips. Prior work has used two different metrics, bisection bandwidth and throughput, for evaluating these topologies at scale. Little is known, theoretically or practically, how these metrics relate to each other. Exploiting characteristics of these topologies, we prove an upper bound on their throughput, then show that this upper bound better estimates worst-case throughput than all previously proposed throughput estimators and scales better than most of them. Using this upper bound, we show that for expander-based topologies, unlike Clos, beyond a certain size of the network, no topology can have full throughput, even if it has full bisection bandwidth; in fact, even relatively small expander-based topologies fail to achieve full throughput. We conclude by showing that using throughput to evaluate datacenter performance instead of bisection bandwidth can alter conclusions in prior work about datacenter cost, manageability, and reliability.

  4. ANRW
    Tools for Disambiguating RFCs
    Yen, Jane, Govindan, Ramesh, and Raghavan, Barath
    In Proceedings of the Applied Networking Research Workshop Apr 2021

    For decades, drafting Internet protocols has taken significant amounts of human supervision due to the fundamental ambiguity of natural language. Given such ambiguity, it is also not surprising that protocol implementations have long exhibited bugs. This pain and overhead can be significantly reduced with the help of natural language processing (NLP).We recently applied NLP to identify ambiguous or under-specified sentences in RFCs, and to generate protocol implementations automatically when the ambiguity is clarified. However this system is far from general or deployable. To further reduce the overhead and errors due to ambiguous sentences, and to improve the generality of this system, much work remains to be done. In this paper, we consider what it would take to produce a fully-general and useful system for easing the natural-language challenges in the RFC process.

  5. ArXiv
    Galleon: Reshaping the Square Peg of NFV
    Wang, Jianfeng, Lévai, Tamás, Li, Zhuojin, Vieira, Marcos A. M., Govindan, Ramesh, and Raghavan, Barath
    In Apr 2021

    Software is often used for Network Functions (NFs) – such as firewalls, NAT, deep packet inspection, and encryption – that are applied to traffic in the network. The community has hoped that NFV would enable rapid development of new NFs and leverage commodity computing infrastructure. However, the challenge for researchers and operators has been to align the square peg of high-speed packet processing with the round hole of cloud computing infrastructures and abstractions, all while delivering performance, scalability, and isolation. Past work has led to the belief that NFV is different enough that it requires novel, custom approaches that deviate from today’s norms. To the contrary, we show that we can achieve performance, scalability, and isolation in NFV judiciously using mechanisms and abstractions of FaaS, the Linux kernel, NIC hardware, and OpenFlow switches. As such, with our system Galleon, NFV can be practically-deployable today in conventional cloud environments while delivering up to double the performance per core compared to the state of the art.

  6. IoTDI
    Rim: Offloading Inference to the Edge
    Hu, Yitao, Pang, Weiwu, Liu, Xiaochen, Ghosh, Rajrup, Ko, Bongjun, Lee, Wei-Han, and Govindan, Ramesh
    In Proceedings of the 6th ACM/IEEE Conference on Internet of Things Design and Implementation, 2021 Apr 2021
  7. SIGCOMM
    Semi-Automated Protocol Disambiguation and Code Generation
    Yen, Jane, Lévai, Tamás, Ye, Qinyuan, Ren, Xiang, Govindan, Ramesh, and Raghavan, Barath
    In Proceedings of the 2021 ACM SIGCOMM 2021 Conference Apr 2021

    For decades, Internet protocols have been specified using natural language. Given the ambiguity inherent in such text, it is not surprising that protocol implementations have long exhibited bugs. In this paper, we apply natural language processing (NLP) to effect semi-automated generation of protocol implementations from specification text. Our system, Sage, can uncover ambiguous or under-specified sentences in specifications; once these are clarified by the author of the protocol specification, Sage can generate protocol code automatically.Using Sage, we discover 5 instances of ambiguity and 6 instances of under-specification in the ICMP RFC; after fixing these, Sage is able to automatically generate code that interoperates perfectly with Linux implementations. We show that Sage generalizes to sections of BFD, IGMP, and NTP and identify additional conceptual components that Sage needs to support to generalize to complete, complex protocols like BGP and TCP.

2020

  1. ArXiv
    Grab: Fast and Accurate Sensor Processing for Cashier-Free Shopping
    Liu, Xiaochen, Jiang, Yurong, Kim, Kyu-Han, and Govindan, Ramesh
    In Apr 2020
  2. NSDI
    CarMap-Fast 3D Feature Map Updates for Automobiles
    Ahmad, Fawad, Qiu, Hang, Eells, Ray, Bai, Fan, and Govindan, Ramesh
    In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20) Apr 2020
  3. ICCCN
    Rapid Top-Down Synthesis of Large-Scale IoT Networks
    Ghosh, Pradipta, Bunton, Jonathan, Pylorof, Dimitrios, Vieira, Marcos, Chan, Kevin, Govindan, Ramesh, Sukhatme, Gaurav, Tabuada, Paulo, and Verma, Gunjan
    In Proceedings of the IEEE International Conference on Computer Communications and Networks (ICCCN) Apr 2020
  4. IoTJ
    New Frontiers in IoT: Networking, Systems, Reliability, and Security Challenges
    Bagchi, Saurabh, Abdelzaher, Tarek F, Govindan, Ramesh, Shenoy, Prashant, Atrey, Akanksha, Ghosh, Pradipta, and Xu, Ran
    IEEE Internet of Things Journal Apr 2020
  5. IROS
    Persistent Connected Power Constrained Surveillance with Unmanned Aerial Vehicles
    Ghosh, Pradipta, Tabuada, Paulo, Govindan, Ramesh, and Sukhatme, Gaurav S
    In Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) Apr 2020
  6. CoNEXT
    Meeting SLOs in Cross-Platform NFV
    Yen, Jane, Wang, Jianfeng, Supittayapornpong, Sucha, Vieira, Marcos A M, Govindan, Ramesh, and Raghavan, Barath
    In Proceedings of the 16th International Conference on Emerging Networking EXperiments and Technologies Apr 2020

    Network Functions (NFs) perform on-path processing of network traffic. ISPs are deploying NF Virtualization (NFV) with software NFs run on commodity servers. ISPs aim to ensure that NF chains, directed acyclic graphs of NFs, do not violate Service Level Objectives (SLOs) promised by the ISP to its customers. To meet SLOs, NFV systems sometimes leverage on-path hardware (such as programmable switches and smart NICs) to accelerate NF execution.Lemur places and executes NF chains across heterogeneous hardware while meeting SLOs. Lemur’s novel placement algorithm yields an SLO-satisfying NF placement while weighing many constraints: hardware memory and processing stages, server cores, link capacity, NF profiles, and NF chain interactions. Lemur’s metacompiler automatically generates code and rules (in P4, Python, eBPF, C++, and OpenFlow) to stitch cross-platform NF chain execution while also optimizing resource usage. Our experiments show that Lemur is alone among competing strategies in meeting SLOs for canonical NF chains while maximizing marginal throughput (the traffic rate in excess of the service-level objective).

2019

  1. CoNEXT
    AViC: A Cache for Adaptive Bitrate Video
    Akhtar, Zahaib, Li, Yaguang, Govindan, Ramesh, Halepovic, Emir, Liu, Yan, Hao, Shuai, and Sen, Subhabrata
    In 15th ACM Conference on emerging Networking EXperiments and Technologies (CoNEXT) Orlando, Florida, U.S. December 9-12, 2019 Apr 2019
  2. SenSys
    Caesar: Cross-camera Complex Activity Recognition
    Liu, Xiaochen, Ghosh, Pradipta, Ulutan, Oytun, Manjunath, B.S., Chan, Kevin, and Govindan, Ramesh
    In 15th ACM Conference on emerging Networking EXperiments and Technologies (CoNEXT) Orlando, Florida, U.S. December 9-12, 2019 Apr 2019
  3. SIGCOMM
    Towards Highly Available Clos-Based WAN Routers
    Supittayapornpong, Sucha, Raghavan, Barath, and Govindan, Ramesh
    In 15th ACM Conference on emerging Networking EXperiments and Technologies (CoNEXT) Orlando, Florida, U.S. December 9-12, 2019 Apr 2019

    The performance and availability of cloud and content providers often depends on the wide area networks (WANs) they use to interconnect their datacenters. WAN routers, which connect to each other using trunks (bundles of links), are sometimes built using an internal Clos topology connecting merchant-silicon switches. As such, these routers are susceptible to internal link and switch failures, resulting in reduced capacity and low availability. Based on the observation that today’s WAN routers use relatively simple trunk wiring and routing techniques, we explore the design of novel wiring and more sophisticated routing techniques to increase failure resilience. Specifically, we describe techniques to 1) optimize trunk wiring to increase effective internal router capacity so as to be resilient to internal failures, 2) compute the effective capacity under different failure patterns, and 3) use these to compute compact routing tables under different failure patterns, since switches have limited routing table sizes. Our evaluations show that our approach can mask failures of up to 75% of switches in some cases without exceeding routing table limits, whereas competing techniques can sometimes lose half of a WAN router’s capacity with a single failure.

  4. NSDI
    Understanding Lifecycle Management Complexity of Datacenter Topologies
    Zhang, Mingyang, Mysore, Radhika Niranjan, Supittayapornpong, Sucha, and Govindan, Ramesh
    In 15th ACM Conference on emerging Networking EXperiments and Technologies (CoNEXT) Orlando, Florida, U.S. December 9-12, 2019 Apr 2019

2018

  1. Middleware
    Olympian: Scheduling GPU Usage in a Deep Neural Network Model Serving System
    Hu, Yitao, Rallapalli, Swati, Ko, Bongjun, and Govindan, Ramesh
    In Proceedings of the 19th International Middleware Conference Apr 2018
  2. IMC
    Understanding Video Management Planes
    Akhtar, Zahaib, Nam, Yun Seong, Chen, Jessica, Govindan, Ramesh, Katz-Bassett, Ethan, Rao, Sanjay, Zhan, Jibin, and Zhang, Hui
    In Proceedings of the Internet Measurement Conference 2018 Apr 2018
  3. ICDCS
    Will Distributed Computing Revolutionize Peace? The Emergence of Battlefield IoT
    Abdelzaher, Tarek, Ayanian, Nora, Basar, Tamer, Diggavi, Suhas, Diesner, Jana, Ganesan, Deepak, Govindan, Ramesh, Jha, Susmit, Lepoint, Tancrede, Marlin, Ben, Nahrstedt, Klara, Nicol, David, Rajkumar, Raj, Russell, Stephen, Seshia, Sanjit, Sha, Fei, Shenoy, Prashant, Srivastava, Mani, Saukhatme, Gaurav, Swami, Ananthram, Tabuada, Paulo, Towsley, Don, Vaidya, Nitin, and Veeravalli, Venu
    In Proceedings of the Internet Measurement Conference 2018 Apr 2018

    An upcoming frontier for distributed computing might literally save lives in future military operations. In civilian scenarios, significant efficiencies were gained from interconnecting devices into networked services and applications that automate much of everyday life from smart homes to intelligent transportation. The ecosystem of such applications and services is collectively called the Internet of Things (IoT). Can similar benefits be gained in a military context by developing an IoT for the battlefield? This paper describes unique challenges in such a context as well as potential risks, mitigation strategies, and benefits.

  4. FUSION
    QuickSketch: Building 3D Representations in Unknown Environments Using Crowdsourcing
    Ahmad, Fawad, Qiu, Hang, Liu, Xiaochen, Bai, Fan, and Govindan, Ramesh
    In 2018 21st International Conference on Information Fusion (FUSION) Apr 2018
  5. IoTDI
    Kestrel: Video Analytics for Augmented Multi-Camera Vehicle Tracking
    Qiu, H, Liu, X, Rallapalli, S, Bency, A J, Chan, K, Urgaonkar, R, Manjunath, B S, and Govindan, R
    In 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI) Apr 2018
  6. Eurosys
    Wide-Area Analytics with Multiple Resources
    Hung, Chien-Chun, Ananthanarayanan, Ganesh, Golubchik, Leana, Yu, Minlan, and Zhang, Mingyang
    In 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI) Apr 2018

    Running data-parallel jobs across geo-distributed sites has emerged as a promising direction due to the growing need for geo-distributed cluster deployment. A key difference between geo-distributed and intra-cluster jobs is the heterogeneous (and often constrained) nature of compute and network resources across the sites. We propose Tetrium, a system for multi-resource allocation in geo-distributed clusters, that jointly considers both compute and network resources for task placement and job scheduling. Tetrium significantly reduces job response time, while incorporating several other performance goals with simple control knobs. Our EC2 deployment and trace-driven simulations suggest that Tetrium improves the average job response time by up to 78% compared to existing data-locality-based solutions, and up to 55% compared to Iridium, the recently proposed geo-distributed analytics system.

  7. TVT
    Towards Robust Vehicular Context Sensing
    Qiu, H, Chen, J, Jain, S, Jiang, Y, McCartney, M, Kar, G, Bai, F, Grimm, D K, Gruteser, M, and Govindan, R
    IEEE Transactions on Vehicular Technology Apr 2018
  8. Mobisys
    AVR: Augmented Vehicular Reality
    Qiu, Hang, Ahmad, Fawad, Bai, Fan, Gruteser, Marco, and Govindan, Ramesh
    In Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services (Mobisys) Apr 2018

    Autonomous vehicle prototypes today come with line-of-sight depth perception sensors like 3D cameras. These 3D sensors are used for improving vehicular safety in autonomous driving, but have fundamentally limited visibility due to occlusions, sensing range, and extreme weather and lighting conditions. To improve visibility and performance, we explore a capability called Augmented Vehicular Reality (AVR). AVR broadens the vehicle’s visual horizon by enabling it to wirelessly share visual information with other nearby vehicles. We show that AVR is feasible using off-the-shelf wireless technologies, and it can qualitatively change the decisions made by autonomous vehicle path planning algorithms. Our AVR prototype achieves positioning accuracies that are within a few percentages of car lengths and lane widths, and it is optimized to process frames at 30fps.

  9. MobiSys
    TAR: Enabling Fine-Grained Targeted Advertising in Retail Stores
    Liu, Xiaochen, Jiang, Yurong, Jain, Puneet, and Kim, Kyu-Han
    In Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services (Mobisys) Apr 2018
  10. MobiSys
    Gnome: A Practical Approach to NLOS Mitigation for GPS Positioning in Smartphones
    Liu, Xiaochen, Nath, Suman, and Govindan, Ramesh
    In Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services (Mobisys) Apr 2018
  11. SIGCOMM
    Oboe: Auto-tuning Video ABR Algorithms to Network Conditions
    Akhtar, Zahaib, Nam, Yun Seong, Govindan, Ramesh, Rao, Sanjay, Chen, Jessica, Katz-Bassett, Ethan, Ribeiro, Bruno, Zhan, Jibin, and Zhang, Hui
    In Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication (SIGCOMM) Apr 2018
  12. ToN
    Scalability and Satisfiability of Quality-of-Information in Wireless Networks
    Rager, Scott T, Ciftcioglu, Ertugrul N, Ramanathan, Ram, Porta, Thomas F La, and Govindan, Ramesh
    IEEE/ACM Trans. Netw. Apr 2018

2017

  1. ICDCS
    Decision-Driven Execution: A Distributed Resource Management Paradigm for the Age of IoT
    Abdelzaher, T, Amin, M T A, Bar-Noy, A, Dron, W, Govindan, R, Hobbs, R, Hu, S, Kim, J, Lee, J, Marcus, K, Yao, S, and Zhao, Y
    In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) Apr 2017
  2. TSMC
    Shortest Processing Time Scheduling to Reduce Traffic Congestion in Dense Urban Areas
    Ahmad, Fawad, Mahmud, SA, and Yousaf, FZ
    IEEE Transactions on Systems, Man, and Cybernetics: Systems Apr 2017
  3. HotMobile
    Augmented Vehicular Reality: Enabling Extended Vision for Future Vehicles
    Qiu, Hang, Ahmad, Fawad, Govindan, Ramesh, Gruteser, Marco, and Bai, Gorkem Kar Fan
    In the 18th Workshop on Mobile Computing Systems and Applications (HotMobile 2017) Apr 2017

    Like today’s autonomous vehicle prototypes, vehicles in the future will have rich sensors to map and identify objects in the environment. For example, many autonomous vehicle prototypes today come with line-of-sight depth perception sensors like 3D cameras. These cameras are used for improving vehicular safety in autonomous driving, but have fundamentally limited visibility due to occlusions, sensing range, and extreme weather and lighting conditions. To improve visibility and performance, not just for autonomous vehicles but for other Advanced Driving Assistance Systems (ADAS), we explore a capability called Augmented Vehicular Reality (AVR). AVR broadens the vehicle’s visual horizon by enabling it to share visual information with other nearby vehicles, but requires careful techniques to align coordinate frames of reference, and to detect dynamic objects. Preliminary evaluations hint at the feasibility of AVR and also highlight research challenges in achieving AVR’s potential to improve autonomous vehicles and ADAS.

  4. SIGCOMM
    SilkRoad: Making Stateful Layer-4 Load Balancing Fast and Cheap Using Switching ASICs
    Miao, Rui, Zeng, Hongyi, Kim, Changhoon, Lee, Jeongkeun, and Yu, Minlan
    In Proceedings of the Conference of the ACM Special Interest Group on Data Communication Apr 2017
  5. SEC
    Real-time Traffic Estimation at Vehicular Edge Nodes
    Kar, Gorkem, Jain, Shubham, Gruteser, Marco, Bai, Fan, and Govindan, Ramesh
    In Proceedings of the Second ACM/IEEE Symposium on Edge Computing Apr 2017
  6. SEC
    PredriveID: Pre-trip Driver Identification from In-vehicle Data
    Kar, Gorkem, Jain, Shubham, Gruteser, Marco, Chen, Jinzhu, Bai, Fan, and Govindan, Ramesh
    In Proceedings of the Second ACM/IEEE Symposium on Edge Computing Apr 2017

2016

  1. OSDI
    The SNOW Theorem and Latency-Optimal Read-Only Transactions
    Lu, Haonan, Hodsdon, Christopher, Ngo, Khiem, Mu, Shuai, and Lloyd, Wyatt
    In the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI ’16) Apr 2016
  2. UbiComp
    ALPS: Accurate Landmark Positioning at City Scales
    Hu, Yitao, Liu, Xiaochen, Nath, Suman, and Govindan, Ramesh
    In the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2016) Apr 2016
  3. Internet-QoE
    BingeOn Under the Microscope: Understanding T-Mobile’s Zero-Rating Implementation
    Kakhki, A M, Li, F, Choffnes, D, Mislove, A, and Katz-Bassett, Ethan
    In ACM SIGCOMM Workshop on Internet Quality of Experience, 2016 Apr 2016
  4. SIGCOMM
    Evolve or Die: High-Availability Design Principles Drawn from Google’s Network Infrastructure
    Govindan, Ramesh, Minei, Ina, Kallahalla, Mahesh, Koley, Bikash, and Vahdat, Amin
    In Proceedings of the ACM Conference of the Special Interest Group on Data Communication (SIGCOMM ’16) Apr 2016
  5. SIGCOMM
    An Internet-Wide Analysis of Traffic Policing
    Flach, Tobias, Papageorge, Pavlos, Terzis, Andreas, Pedrosa, Luis, Cheng, Yuchung, Karim, Tayeb, Katz-Bassett, Ethan, and Govindan, Ramesh
    In Proceedings of the ACM Conference of the Special Interest Group on Data Communication (SIGCOMM ’16) Apr 2016
  6. SIGCOMM
    WebPerf: Evaluating “What-If” Scenarios for Cloud-hosted Web Applications
    Jiang, Yurong, Ravindranath, Lenin, Nath, Suman, and Govindan, Ramesh
    In Proceedings of the ACM Conference of the Special Interest Group on Data Communication (SIGCOMM ’16) Apr 2016
  7. SIGCOMM
    Trumpet: Timely and Precise Triggers in Data Centers
    Moshref, Masoud, Yu, Minlan, Govindan, Ramesh, and Vahdat, Amin
    In Proceedings of the ACM Conference of the Special Interest Group on Data Communication (SIGCOMM ’16) Apr 2016
  8. MobiHoc
    High-rate WiFi Broadcasting in Crowded Scenarios via Lightweight Coordination of Multiple Access Points
    Qiu, Hang, Psounis, Konstantinos, Caire, Giuseppe, Chugg, Keith M, and Wang, Kaidong
    In Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc ’16) Apr 2016
  9. NSDI
    FlowRadar: A Better NetFlow for Data Centers
    Li, Yuliang, Miao, Rui, Kim, Changhoon, and Yu, Minlan
    In Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI’16) Apr 2016
  10. ICASSP
    Context adaptive thresholding and entropy coding for very low complexity JPEG transcoding
    Xu, Xing, Akhtar, Zahaib, Govindan, Ramesh, Lloyd, Wyatt, and Ortega, Antonio
    In 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) Apr 2016
  11. PAM
    Modeling HTTP/2 Speed from HTTP/1 Traces
    Zarifis, Kyriakos, Holland, Mark, Jain, Manish, Katz-Bassett, Ethan, and Govindan, Ramesh
    In Passive and Active Measurement Conference (PAM ’16) Apr 2016
  12. NSDI
    Sibyl: A Practical Internet Route Oracle
    Marchetta, Pietro, Cunha, Italo, Calder, Matt, Chiu, Yi-Ching, Machado, Bruno Vinicius Ávila, Schlinker, Brandon, Pescapè, Antonio, Giotsas, Vasileios, Madhyastha, Harsha V, and Katz-Bassett, Ethan
    In Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI’16) Apr 2016
  13. CACM
    Helping Conference Attendees Better Understand Research Presentations
    Katz-Bassett, Ethan, Sherry, J, Huang, T -Y, Kazandjieva, M, Partridge, C, and Dogar, F
    In Communications of the ACM (CACM) Apr 2016
  14. PLoSONE
    Do Emotions Expressed Online Correlate with Actual Changes in Decision-Making?: The Case of Stock Day Traders
    Liu, Bin, Govindan, Ramesh, and Uzzi, Brian
    PLoSONE Apr 2016
  15. ComNet
    DBit: Assessing statistically significant differences in CDN performance
    Akhtar, Zahaib, Hussain, Alefiya, Katz-Bassett, Ethan, and Govindan, Ramesh
    Computer Networks Apr 2016
  16. PLoSONE
    Do Emotions Expressed Online Correlate with Actual Changes in Decision-Making?: The Case of Stock Day Traders
    Liu, Bin, Govindan, Ramesh, and Uzzi, Brian
    PLoSONE Apr 2016

2015

  1. CoNEXT
    SCREAM: Sketch Resource Allocation for Software-defined Measurement
    Moshref, Masoud, Yu, Minlan, Govindan, Ramesh, and Vahdat, Amin
    In ACM International Conference on emerging Networking EXperiments and Technologies (CoNEXT) Apr 2015
  2. RTSS
    Data Acquisition for Real-Time Decision-Making under Freshness Constraints
    Hu, S, Yao, S, Jin, H, Zhao, Y, Hu, Y, Liu, X, Naghibolhosseini, N, Li, S, Kapoor, A, Dron, W, Su, L, Bar-Noy, A, Szekely, P, Govindan, R, Hobbs, R, and Abdelzaher, T F
    In 2015 IEEE Real-Time Systems Symposium Apr 2015
  3. HotNets
    Re-evaluating Measurement Algorithms in Software
    Alipourfard, Omid, Moshref, Masoud, and Yu, Minlan
    In In Proceedings of the 14th ACM Workshop on Hot Topics in Networks (HotNets) Apr 2015
  4. SenSys
    CARLOC: Precisely Tracking Automobile Position
    Jiang, Yurong, Qiu, Hang, McCartney, Matthew, Sukhatme, Gaurav, Gruteser, Marco, Bai, Fan, Grimm, Donald, and Govindan, Ramesh
    In Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems (SenSys) Apr 2015
  5. SOSP
    Existential Consistency: Measuring and Understanding Consistency at Facebook
    Lu, Haonan, Veeraraghavan, Kaushik, Ajoux, Philippe, Hunt, Jim, Song, Yee Jiun, Tobagus, Wendy, Kumar, Sanjeev, and Lloyd, Wyatt
    In Proceedings of the 25th ACM Symposium on Operating Systems Principles (SOSP’15) Apr 2015
  6. IMC
    Investigating Interdomain Routing Policies in the Wild
    Anwar, R, Niaz, H, Choffnes, D, Cunha, I, Gill, P, and Katz-Bassett, Ethan
    In ACM Internet Measurement Conference (IMC) Apr 2015
  7. IMC
    Analyzing the Performance of an Anycast CDN
    Calder, Matt, Flavel, Ashley, Katz-Bassett, Ethan, Mahajan, R, and Padhye, J
    In ACM Internet Measurement Conference (IMC) Apr 2015
  8. IMC
    Are We One Hop Away from a Better Internet?
    Chiu, Yi-Ching, Schlinker, Brandon, Radhakrishnan, Abhishek Balaji, Katz-Bassett, Ethan, and Govindan, Ramesh
    In ACM Internet Measurement Conference (IMC) Apr 2015
  9. SIGCOMM
    Condor: Better Topologies Through Declarative Design
    Schlinker, Brandon, Mysore, Radhika Niranjan, Smith, Sean, Mogul, Jeffrey C, Vahdat, Amin, Yu, Minlan, Katz-Bassett, Ethan, and Rubin, Michael
    In Proceedings of the ACM Conference of the Special Interest Group on Data Communication (SIGCOMM ’15) Apr 2015
  10. DCOSS
    On Exploiting Logical Dependencies for Minimizing Additive Cost Metrics in Resource-Limited Crowdsensing
    Hu, S, Li, S, Yao, S, Su, L, Govindan, R, Hobbs, R, and Abdelzaher, T F
    In 2015 International Conference on Distributed Computing in Sensor Systems Apr 2015
  11. NSDI
    A General Approach to Network Configuration Analysis
    Fogel, Ari, Fung, Stanley, Pedrosa, Luis, Walraed-Sullivan, Meg, Govindan, Ramesh, Mahajan, Ratul, and Millstein, Todd
    In 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15) Apr 2015
  12. TMA
    Assessing Affinity Between Users and CDN Sites
    Fan, Xun, Katz-Bassett, Ethan, and Heidemann, John
    In Workshop on Traffic Monitoring and Analysis (TMA) Apr 2015
  13. INFOCOM
    Rapier: Integrating routing and scheduling for coflow-aware data center networks
    Zhao, Y, Chen, K, Bai, W, Yu, M, Tian, C, Geng, Y, Zhang, Y, Li, D, and Wang, S
    In 2015 IEEE Conference on Computer Communications (INFOCOM) Apr 2015
  14. PAM
    Investigating Transparent Web Proxies in Cellular Networks
    Xu, Xing, Jiang, Yurong, Flach, Tobias, Katz-Bassett, Ethan, Choffnes, David, and Govindan, Ramesh
    In Proceedings of the Passive and Active Measurement Conference (PAM ’15) Apr 2015
  15. NSDI
    Analyzing Protocol Implementations for Interoperability
    Pedrosa, Luis, Fogel, Ari, Kothari, Nupur, Govindan, Ramesh, Mahajan, Ratul, and Millstein, Todd
    In 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15) Apr 2015
  16. IMC
    The Dark Menace: Characterizing Network-based Attacks in the Cloud
    Miao, Rui, Potharaju, Rahul, Yu, Minlan, and Jain, Navendu
    In Proceedings of the 2015 Internet Measurement Conference Apr 2015
  17. SIGMETRICS PER
    Speculation-aware Cluster Scheduling
    Ren, Xiaoqi, Ananthanarayanan, Ganesh, Wierman, Adam, and Yu, Minlan
    SIGMETRICS Perform. Eval. Rev. Apr 2015
  18. MobiSys
    Efficient Privilege De-Escalation for Ad Libraries in Mobile Apps
    Liu, Bin, Liu, Bin, Jin, Hongxia, and Govindan, Ramesh
    In Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services Apr 2015
  19. SIGCOMM
    Hopper: Decentralized Speculation-aware Cluster Scheduling at Scale
    Ren, Xiaoqi, Ananthanarayanan, Ganesh, Wierman, Adam, and Yu, Minlan
    In Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication Apr 2015
  20. FAST
    RIPQ: Advanced Photo Caching on Flash for Facebook
    Tang, Linpeng, Huang, Qi, Lloyd, Wyatt, Kumar, Sanjeev, and Li, Kai
    In 13th USENIX Conference on File and Storage Technologies (FAST 15) Apr 2015
  21. CoNEXT
    Magus: Minimizing Cellular Service Disruption During Network Upgrades
    Xu, Xing, Broustis, Ioannis, Ge, Zihui, Govindan, Ramesh, Mahimkar, Ajay, Shankaranarayanan, N K, and Wang, Jia
    In Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies Apr 2015
  22. ComNet
    Joint VM placement and topology optimization for traffic scalability in dynamic datacenter networks
    Zhao, Yangming, Huang, Yifan, Chen, Kai, Yu, Minlan, Wang, Sheng, and Li, DongSheng
    Computer Networks Apr 2015
  23. SoCC
    Scheduling Jobs Across Geo-distributed Datacenters
    Hung, Chien-Chun, Golubchik, Leana, and Yu, Minlan
    In Proceedings of the Sixth ACM Symposium on Cloud Computing Apr 2015
  24. SenSys
    Poster: Accurate Vehicle Detection in Intelligent Transportation Systems (ITS) Using Wireless Magnetic Sensors
    Ahmad, Fawad, and Mahmud, Sahibzada Ali
    In Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems Apr 2015

2014

  1. NSFCloud
    Flexible Internet Routing for Cloud Tenants and Cloud Researchers
    Katz-Bassett, Ethan, and Schlinker, Brandon
    In NSFCloud Workshop on Experimental Support for Cloud Computing Apr 2014
  2. SenSys
    CarLog: A Platform for Flexible and Efficient Automotive Sensing
    Jiang, Yurong, Qiu, Hang, McCartney, Matthew, Halfond, William G J, Bai, Fan, Grimm, Donald, and Govindan, Ramesh
    In Proceedings of the 12th ACM Conference on Embedded Networked Sensor Systems (SenSys’14) Apr 2014
  3. HotNets
    PEERING: An AS for Us
    Schlinker, Brandon, Zarifis, Kyriakos, Cunha, Italo, Feamster, Nick, and Katz-Bassett, Ethan
    In Proceedings of the 13th ACM Workshop on Hot Topics in Networks (HotNets) Apr 2014
  4. OSDI
    Extracting More Concurrency from Distributed Transactions
    Mu, Shuai, Cui, Yang, Zhang, Yang, Lloyd, Wyatt, and Li, Jinyang
    In Symposium on Operating Systems Design and Implementation (OSDI) Apr 2014
  5. OSDI
    f4: Facebook’s Warm BLOB Storage System
    Muralidhar, Subramanian, Lloyd, Wyatt, Roy, Sabyasachi, Hill, Cory, Lin, Ernest, Liu, Weiwen, Pan, Satadru, Shankar, Shiva, Sivakumar, Viswanath, Tang, Linpeng, and Kumar, Sanjeev
    In Symposium on Operating Systems Design and Implementation (OSDI) Apr 2014
  6. ICSME
    An Empirical Study of the Energy Consumption of Android Applications
    Li, Ding, Hao, Shuai, Gui, Jiaping, and Halfond, William G J
    In Proceedings of the 30th International Conference on Software Maintenance and Evolution (ICSME’14) Apr 2014
  7. SIGCOMM
    SDX: A Software Defined Internet Exchange
    Gupta, Arpit, Vanbever, Laurent, Shahbaz, Muhammad, Donovan, Sean P, Schlinker, Brandon, Feamster, Nick, Rexford, Jennifer, Shenker, Scott, Clark, Russ, and Katz-Bassett, Ethan
    In Proceedings of the ACM Conference of the Special Interest Group on Data Communication (SIGCOMM ’14) Apr 2014
  8. HotSDN
    Flow-level State Transition as a New Switch Primitive for SDN
    Moshref, Masoud, Bhargava, Apoorv, Gupta, Adhip, Yu, Minlan, and Govindan, Ramesh
    In Proceedings of the ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN’14) Apr 2014
  9. SIGCOMM
    DREAM: Dynamic Resource Allocation for Software-defined Measurement
    Moshref, Masoud, Yu, Minlan, Govindan, Ramesh, and Vahdat, Amin
    In Proceedings of the ACM Conference of the Special Interest Group on Data Communication (SIGCOMM ’14) Apr 2014
  10. MobiSys
    PUMA: Programmable UI-Automation for Large-Scale Dynamic Analysis of Mobile Apps
    Hao, Shuai, Liu, Bin, Nath, Suman, Halfond, William G J, and Govindan, Ramesh
    In Proceedings of the 12th International Conference on Mobile Systems, Applications, and Services (MobiSys’14) Apr 2014
  11. NSDI
    DECAF: Detecting and Characterizing Ad Fraud in Mobile Apps
    Liu, Bin, Nath, Suman, Govindan, Ramesh, and Liu, Jie
    In Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI’14) Apr 2014
  12. NSDI
    GRASS: Trimming Stragglers in Approximation Analytics
    Ananthanarayanan, Ganesh, Hung, Michael Chien-Chun, Ren, Xiaoqi, Stoica, Ion, Wierman, Adam, and Yu, Minlan
    In Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI’14) Apr 2014
  13. NSDI
    FlowTags: Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions
    Fayazbakhsh, Seyed Kaveh, Chiang, Luis, Sekar, Vyas, Yu, Minlan, and Mogul, Jeff
    In Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI’14) Apr 2014
  14. INFOCOM
    Loss Differentiation: Moving onto High-Speed Wireless LANs
    Anwar, Ruwaifa, Nishat, Kamran, Ali, Mohsin, Akhtar, Zahaib, Niaz, Haseeb, and Qazi, Ihsan Ayyub
    In IEEE International Conference on Computer Communications (INFOCOM ’14) Apr 2014
  15. EuroSys
    DIBS: Just-in-time Congestion Mitigation for Data Centers
    Miao, Kyriakos Zarifis Rui, Calder, Matt, Katz-Bassett, Ethan, Yu, Minlan, and Padhye, Jitendra
    In Ninth Eurosys Conference 2014, EuroSys 2014 Apr 2014
  16. USC TR
    Investigating Transparent Web Proxies in Cellular Networks
    Xu, Xing, Jiang, Yurong, Flach, Tobias, Katz-Bassett, Ethan, Choffnes, David, and Govindan, Ramesh
    In Ninth Eurosys Conference 2014, EuroSys 2014 Apr 2014
  17. ONS
    Try Before you Buy: SDN Emulation with (Real) Interdomain Routing
    Schlinker, Brandon, Zarifis, Kyriakos, Cunha, Italo, Feamster, Nick, Katz-Bassett, Ethan, and Yu, Minlan
    In Proceedings of the 2014 Open Networking Summit (ONS), published by USENIX Apr 2014
  18. ONS
    Extending SDN to Handle Dynamic Middlebox Actions via FlowTags
    Fayazbakhsh, Seyed Kaveh, Chiang, Luis, Sekar, Vyas, Yu, Minlan, and Mogul, Jeff
    In Proceedings of the 2014 Open Networking Summit (ONS), published by USENIX Apr 2014
  19. ONS
    Jive: Performance Driven Abstraction and Optimization for SDN
    Lazaris, Aggelos, Tahara, Daniel, Huang, Xin, Li, Li Erran, Voellmy, Andreas, Yang, Richard Y, and Yu, Minlan
    In Proceedings of the 2014 Open Networking Summit (ONS), published by USENIX Apr 2014
  20. ONS
    SENSS: Software-defined Security Service
    Yu, Minlan, Zhang, Ying, Mirkovic, Jelena, and Alwabel, Abdulla
    In Proceedings of the 2014 Open Networking Summit (ONS), published by USENIX Apr 2014
  21. PAM
    Diagnosing Path Inflation of Mobile Client Traffic
    Zarifis, Kyriakos, Flach, Tobias, Nori, Srikanth, Choffnes, David, Govindan, Ramesh, Katz-Bassett, Ethan, Mao, Morley Z, and Welsh, Matt
    In Passive and Active Measurement Conference (PAM ’14) Apr 2014
  22. PAM
    Mobile Network Performance from User Devices: A Longitudinal, Multidimensional Analysis
    Nikravesh, Ashkan, Choffnes, David R, Katz-Bassett, Ethan, Mao, Morley Z, and Welsh, Matt
    In Passive and Active Measurement Conference (PAM ’14) Apr 2014
  23. PAM
    Peering at the Internet’s Frontier: A First Look at ISP Interconnectivity in Africa
    Gupta, Arpit, Calder, Matt, Feamster, Nick, Chetty, Marshini, Calandro, Enrico, and Katz-Bassett, Ethan
    In Passive and Active Measurement Conference (PAM ’14) Apr 2014
  24. PAM
    The Need for End-to-End Evaluation of Cloud Availability
    Hu, Zi, Zhu, Liang, Ardi, Calvin, Katz-Bassett, Ethan, Madhyastha, Harsha V, Heidemann, John, and Yu, Minlan
    In Passive and Active Measurement Conference (PAM ’14) Apr 2014
  25. PAM
    Dissection Round Trip Time on the Slow Path Using a One-Packet Approach
    Marchetta, Pietro, Botta, Alessio, Katz-Bassett, Ethan, and Pescapè, Antonio
    In Passive and Active Measurement Conference (PAM ’14) Apr 2014
  26. CCR
    NOSIX: A Lightweight Portability Layer for the SDN OS
    Yu, Minlan, Wundsam, Andreas, and Raju, Muruganantham
    In Computer Communications Reivew (CCR) Apr 2014
  27. ONS
    SENSS: Software Defined Security Service
    Yu, Minlan, Zhang, Ying, Mirkovic, Jelena, and Alwabel, Abdulla
    In Presented as part of the Open Networking Summit 2014 (ONS 2014) Apr 2014

2013

  1. CoNEXTW
    Towards Impactful Routing Research: Running Your Own (Emulated) AS on the (Real) Internet
    Schlinker, Brandon, Zarifis, Kyriakos, Cunha, Italo, Feamster, Nick, Katz-Bassett, Ethan, and Yu, Minlan
    In Proceedings of the ACM CoNEXT Student Workshop Apr 2013
  2. CoNEXTW
    Don’t Trust Traceroute (Completely)
    Marchetta, Pietro, Persico, Valerio, Katz-Bassett, Ethan, and Pescapè, Antonio
    In Proceedings of the ACM CoNEXT Student Workshop Apr 2013
  3. CoNEXTW
    Diagnosing Slow Web Page Access at the Client Side
    Flach, Tobias, Katz-Bassett, Ethan, and Govindan, Ramesh
    In Proceedings of the ACM CoNEXT Student Workshop Apr 2013
  4. ICCVE
    Shortest remaining processing time based schedulers for reduction of traffic congestion
    Ahmad, Fawad, Mahmud, S A, Khan, G M, and Yousaf, F Z
    In 2013 International Conference on Connected Vehicles and Expo (ICCVE) Apr 2013
  5. ICCVE
    Real time evaluation of shortest remaining processing time based schedulers for traffic congestion control using wireless sensor networks
    Ahmad, Fawad, Khan, I, Mahmud, S A, Khan, G M, and Yousaf, F Z
    In 2013 International Conference on Connected Vehicles and Expo (ICCVE) Apr 2013
  6. ICCVE
    Feasibility of deploying wireless sensor based road side solutions for Intelligent Transportation Systems
    Ahmad, Fawad, Basit, A, Ahmad, H, Mahmud, S A, Khan, G M, and Yousaf, F Z
    In 2013 International Conference on Connected Vehicles and Expo (ICCVE) Apr 2013
  7. ICCVE
    Implementation of shortest remaining processing time based schedulers on a 32 bit serial based processing platform
    Ahmad, Fawad, Ali, M, Mahmud, S A, Khan, G M, and Yousaf, F Z
    In 2013 International Conference on Connected Vehicles and Expo (ICCVE) Apr 2013
  8. HotNets
    AdReveal: Improving Transparency into Online Targeted Advertising
    Liu, Bin, Sheth, Anmol, Weinsberg, Udi, Chandrashekar, Jaideep, and Govindan, Ramesh
    In Proceedings of the 12th ACM Workshop on Hot Topics in Networks (HotNets) Apr 2013
  9. ATS
    A New March Test for Process-Variation Induced Delay Faults in SRAMs
    Cheng, Da, Hsiung, Hsunwei, Liu, Bin, Chen, Jianing, Zeng, Jia, Govindan, Ramesh, and Gupta, Sandeep
    In IEEE Asian Test Symposium Apr 2013
  10. ATS
    Interplay of Failure Rate, Perfromance, and Test Cost in TCAM under Process Variations
    Hsiung, Hsunwei, Cheng, Da, Liu, Bin, Govindan, Ramesh, and Gupta, Sandeep
    In IEEE Asian Test Symposium Apr 2013
  11. SOSP
    CSPAN: Cost-Effective Geo-Replicated Storage Spanning Multiple Cloud Services (To Appear)
    Wu, Zhe, Butkiewicz, Michael, Perkins, Dorian, Katz-Bassett, Ethan, and Madhyastha, Harsha
    In Proceedings of the 24th ACM Symposium on Operating Systems Principles (SOSP ’13) Apr 2013
  12. IMC
    Mapping the Expansion of Google’s Serving Infrastructure
    Calder, Matt, Fan, Xun, Hu, Zi, Katz-Bassett, Ethan, Heidemann, John, and Govindan, Ramesh
    In Proceedings of the ACM Internet Measurement Conference (IMC ’13) Apr 2013
  13. SIGCOMM
    SIMPLE-fying Middlebox Policy Enforcement Using SDN
    Qazi, Zafar, Tu, Cheng-chun, Chiang, Luis, Miao, Rui, Sekar, Vyas, and Yu, Minlan
    In Proceedings of the ACM Conference of the Special Interest Group on Data Communication (SIGCOMM ’13) Apr 2013
  14. SIGCOMM
    PoiRoot: Investigating the Root Cause of Interdomain Path Changes
    Javed, Umar, Cunha, Italo, Choffnes, David R, Katz-Bassett, Ethan, Anderson, Thomas, and Krishnamurthy, Arvind
    In Proceedings of the ACM Conference of the Special Interest Group on Data Communication (SIGCOMM ’13) Apr 2013
  15. SIGCOMM
    Reducing Web Latency: the Virtue of Gentle Aggression
    Flach, Tobias, Dukkipati, Nandita, Terzis, Andreas, Raghavan, Barath, Cardwell, Neal, Cheng, Yuchung, Jain, Ankur, Hao, Shuai, Katz-Bassett, Ethan, and Govindan, Ramesh
    In Proceedings of the ACM Conference of the Special Interest Group on Data Communication (SIGCOMM ’13) Apr 2013
  16. HotSDN
    Resource/Accuracy Tradeoffs in Software-Defined Measurement
    Moshref, Masoud, Yu, Minlan, and Govindan, Ramesh
    In Proceedings of the ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN 2013) Apr 2013

    to be updated

  17. HotSDN
    FlowTags: Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions
    Fayazbakhsh, Seyed, Sekar, Vyas, Yu, Minlan, and Mogul, Jeff
    In Proceedings of the ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN 2013) Apr 2013
  18. IETF
    TCP Instant Recovery: Incorporating Forward Error Correction in TCP
    Flach, Tobias, Dukkipati, Nandita, Cheng, Yuchung, and Raghavan, Barath
    In Proceedings of the ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN 2013) Apr 2013
  19. ISSTA
    Calculating Source Line Level Energy Information for Android Applications
    Li, Ding, Hao, Shuai, Halfond, William G J, and Govindan, Ramesh
    In Proceedings of the International Symposium in Software Testing and Analysis (ISSTA 2013) Apr 2013

    The popularity of mobile apps continues to grow as developers take advantage of the sensors and data available on mobile devices. However, the increased functionality comes with a higher energy cost, which can cause a problem for users on battery constrained mobile devices. To improve the energy consumption of mobile apps, developers need detailed information about the energy consumption of their applications. Existing techniques have drawbacks that limit their usefulness or provide information at too high of a level of granularity, such as components or methods. Our approach is able to calculate source line level energy consumption information. It does this by combining hardware-based power measurements with program analysis and statistical modeling. Our empirical evaluation of the approach shows that it is fast and accurate.

  20. USCTR
    Mapping the Expansion of Google’s Serving Infrastructure
    Calder, Matt, Fan, Xun, Hu, Zi, Katz-Bassett, Ethan, Heidemann, John, and Govindan, Ramesh
    In Proceedings of the International Symposium in Software Testing and Analysis (ISSTA 2013) Apr 2013
  21. USCTR
    Diagnosing Path Inflation of Mobile Clients
    Zarifis, Kyriakos, Flach, Tobias, Nori, Srikanth, Choffnes, David, Govindan, Ramesh, Katz-Bassett, Ethan, Mao, Morley, and Welsh, Matt
    In Proceedings of the International Symposium in Software Testing and Analysis (ISSTA 2013) Apr 2013
  22. MDM
    Building a Delay-Tolerant Cloud for Mobile Data
    Hao, Shuai, Agrawal, Nitin, Aranya, Akshat, and Ungureanu, Cristian
    In Proceedings of the 14th International Conference on Mobile Data Management (MDM 2013) Apr 2013

    Mobile data usage is on a tremendous rise, due not only to increasing number of users but also to an increase in the number of applications that transfer data over the network. Moreover, applications for sharing, sensing, and collaboration have become more popular, causing significant amounts of data to be generated on devices. Managing this data –syncing it to the cloud, or with other users or devices– is a crucial and often challenging part of writing mobile apps and services. In spite of plenty of good advice and best practices from OS vendors and network operators, storing and transferring mobile data is fraught with issues. On the one hand, an app developer needs to worry about the semantics of data storage and synchronization, while on the other, about the end-user experience, which maybe impacted by poor and intermittent network connectivity. To address the needs of the app developers and the end-users, we have built Izzy: a platform to rapidly develop and deploy data-centric mobile apps. Izzy provides well-defined and easy to use semantics for accessing local storage and for synchronizing data with a remote, scalable, global store. Izzy also provides global store access to the cloud-resident part of the applications (if any) through a similar server API. Last but not least, Izzy is designed to be frugal: it conserves mobile device resources by applying delay-tolerance and data reduction techniques (message coalescing and compression) across applications on a mobile device. In this paper we present the design of Izzy and our early experiences with using it.

  23. MobiSys
    SIF: A Selective Instrumentation Framework for Mobile Applications
    Hao, Shuai, Li, Ding, Halfond, William G J, and Govindan, Ramesh
    In Proceedings of the 11th International Conference on Mobile Systems, Applications, and Services (MobiSys’13) Apr 2013

    Mobile app ecosystems have experienced tremendous growth in the last five years. As researchers and developers turn their attention to understanding the ecosystem and its different apps, instrumentation of mobile apps is a much needed emerging capability. In this paper, we explore a selective instrumentation capability that allows users to express instrumentation specifications at a high level of abstraction; these specifications are then used to automatically insert instrumentation into binaries. The challenge in our work is to develop expressive abstractions for instrumentation that can also be implemented efficiently. Designed using requirements derived from recent research that has used instrumented apps, our selective instrumentation framework, SIF, contains abstractions that allow users to compactly express precisely which parts of the app need to be instrumented. It also contains a novel path inspection capability, and provides users feedback on the approximate overhead of the instrumentation specification. Using experiments on our SIF implementation for Android, we show that SIF can be used to compactly (in 20-30 lines of code in most cases) specify instrumentation tasks previously reported in the literature. SIF’s overhead is under 2% in most cases, and its instrumentation overhead feedback is within 15% in many cases. As such, we expect that SIF can accelerate studies of the mobile app ecosystem.

  24. ICSE
    Estimating Mobile Application Energy Consumption Using Program Analysis
    Hao, Shuai, Li, Ding, Halfond, William G J, and Govindan, Ramesh
    In 35th International Conference on Software Engineering (ICSE 2013) Apr 2013

    Optimizing the energy efficiency of mobile applications can greatly increase user satisfaction. However, developers lack viable techniques for estimating the energy consumption of their applications. This project proposes a new approach that is both lightweight in terms of its developer requirements and provides fine-grained estimates of energy consumption at the code level. It achieves this using a novel combination of program analysis and per-instruction energy modeling. In evaluation, our approach is able to estimate energy consumption to within 10% of the ground truth for a set of mobile applications from the Google Play store. Additionally, it provides useful and meaningful feedback to developers that helps them to understand application energy consumption behavior.

  25. IPSN
    MediaScope: Selective On-Demand Media Retrieval from Mobile Devices
    Jiang, Yurong, Xu, Xing, Terlecky, Peter, Abdelzaher, Tarek, Bar-Noy, Amotz, and Govindan, Ramesh
    In Proceedings of the 12nd ACM/IEEE Conference on Information Processing in Sensor Networks (IPSN’13) Apr 2013

    to be updated

  26. NSDI
    P3: Toward Privacy-Preserving Photo Sharing
    Ra, Moo-Ryong, Govindan, Ramesh, and Ortega, Antonio
    In Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI’13) Apr 2013

    to be updated

  27. NSDI
    Software defined traffic measurement with OpenSketch
    Yu, Minlan, Jose, Lavanya, and Miao, Rui
    In Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI’13) Apr 2013

    to be updated

  28. NSDI
    Scalable Rule Management for Data Centers
    Moshref, Masoud, Yu, Minlan, Sharma, Abhishek, and Govindan, Ramesh
    In Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI’13) Apr 2013

    to be updated

2012

  1. IMC
    Quantifying Violations of Destination-based Forwarding in the Internet
    Flach, Tobias, Katz-Bassett, Ethan, and Govindan, Ramesh
    In Proceedings of the ACM Internet Measurement Conference (IMC ’12) Apr 2012
  2. SenSys
    Cloud-Enabled Privacy-Preserving Collaborative Learning for Mobile Sensing
    Liu, Bin, Jiang, Yurong, Sha, Fei, and Govindan, Ramesh
    In Proceedings of the 10th ACM Conference on Embedded Networked Sensor Systems (SenSys) Apr 2012

    to be updated

  3. HotNets
    Towards Systematic Roadmaps for Networked Systems
    Liu, Bin, Hsiung, Hsunwei, Cheng, Da, Govindan, Ramesh, and Gupta, Sandeep
    In Proceedings of the 11th ACM Workshop on Hot Topics in Networks (HotNets) Apr 2012
  4. Ubicomp
    Improving Energy Efficiency of Personal Sensing Applications with Heterogeneous Multi-Processors
    Ra, Moo-Ryong, Priyantha, Bodhi, Kansal, Aman, and Liu, Jie
    In Proceedings of the 14th ACM International Conference on Ubiquitous Computing (Ubicomp’12) Apr 2012

    The availability of multiple sensors on mobile devices offers a significant new capability to enable rich user and context aware applications. Many of these applications run in the background to continuously sense user context. However, running these applications on mobile devices can impose a significant stress on the battery life, and the use of supplementary low-power processors has been proposed on mobile devices for continuous background activities. In this paper, we experimentally and analytically investigate the design considerations that arise in the efficient use of the low power processor and provide a thorough understanding of the problem space. We answer fundamental questions such as which segments of the application are most efficient to be hosted on the low power processor, and how to select an appropriate low power processor. We discuss our measurements, analysis, and results using multiple low power processors and existing phone platforms

  5. SIGCOMM
    LIFEGUARD: Practical Repair of Persistent Route Failures
    Katz-Bassett, Ethan, Scott, Colin, Choffnes, Dave, Cunha, Italo, Valancius, V, Feamster, Nick, Madhyastha, Harsha, Anderson, Tom, and Krishnamurthy, Arvind
    In Proceedings of the ACM Conference of the Special Interest Group on Data Communication (SIGCOMM ’12) Apr 2012
  6. HotCloud
    vCRIB: Virtual Cloud Rule Information Base
    Moshref, Masoud, Yu, Minlan, Sharma, Abhishek, and Govindan, Ramesh
    In Proceedings of the 4th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud’12) Apr 2012

    Cloud operators increasingly need many fine-grained rules to better control individual network flows for various management tasks. While previous approaches have advocated placing rules either on hypervisors or switches, we argue that future data centers would benefit from leveraging rule processing capabilities at both for better scalability and performance. In this paper, we propose vCRIB, a virtualized Cloud Rule Information Base that allows operators to freely define different management policies without the need to consider underlying resource constraints. The challenge in our approach is the design of a vCRIB manager that automatically partitions and places rules at both hypervisors and switches to achieve a good trade-off between resource usage and performance.

  7. GREENS
    Estimating Android Applications’ CPU Energy Usage via Bytecode Profiling
    Hao, Shuai, Li, Ding, Halfond, William G J, and Govindan, Ramesh
    In First International Workshop on Green and Sustainable Software (GREENS), in conjunction with ICSE 2012 Apr 2012

    Optimizing the energy efficiency of mobile applications can greatly increase user satisfaction. However, developers lack easily applied tools for estimating the energy consumption of their applications. This paper proposes a new approach, eCalc, that is lightweight in terms of its developer requirements and provides code-level estimates of energy consumption. The approach achieves this using estimation techniques based on program analysis of the mobile application. In evaluation, eCalc is able to estimate energy consumption within 9.5% of the ground truth for a set of mobile applications. Additionally, eCalc provides useful and meaningful feedback to the developer that helps to characterize energy consumption of the application.

  8. MobiSys
    Medusa: A Programming Framework for Crowd-Sensing Applications
    Ra, Moo-Ryong, Liu, Bin, Porta, Tom La, and Govindan, Ramesh
    In Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services (MobiSys’12) Apr 2012

    The ubiquity of smartphones and their on-board sensing capabilities motivates crowd-sensing, a capability which harnesses the power of crowds to collect sensor data from a large number of mobile phone users. Unlike previous work on wireless sensing, crowd-sensing poses several novel requirements: support for humans-in-the-loop to trigger sensing actions or review results, the need for incentives, as well as privacy and security. In this paper, we design and implement Medusa, a novel programming framework for crowd sensing that satisfies these requirements. Medusa provides high-level abstractions for specifying the steps required to complete a crowd-sensing task, and employs a distributed runtime system that coordinates the execution of these tasks between smartphones and a cluster on the cloud. We have implemented ten crowd-sensing tasks on a prototype of Medusa. We find that Medusa task descriptions are two orders of magnitude smaller than standalone systems required to implement those crowd-sensing tasks, and the runtime has low overhead and is robust to dynamics and resource attacks.

  9. TPDS
    Optimizing Information Credibility in Social Swarming Applications
    Liu, Bin, Terlecky, Peter, Bar-Noy, Amotz, Govindan, Ramesh, Neely, Micheal J, and Rawitz, Dror
    IEEE Transactions on Parallel and Distributed Systems Apr 2012
  10. DCOSS
    Timely Report Delivery in Social Swarming Applications
    Liu, Bin, Terlecky, Peter, Xu, Xing, Bar-Noy, Amotz, Govindan, Ramesh, and Rawitz, Dror
    In IEEE Conference on Distributed Computing in Sensor Systems (DCOSS) Apr 2012