scispace - formally typeset
T

Timothy Wood

Researcher at George Washington University

Publications -  97
Citations -  8190

Timothy Wood is an academic researcher from George Washington University. The author has contributed to research in topics: Virtual machine & Cloud computing. The author has an hindex of 35, co-authored 90 publications receiving 7615 citations. Previous affiliations of Timothy Wood include Rutgers University & University of Massachusetts Amherst.

Papers
More filters
Proceedings ArticleDOI

The feasibility of launching and detecting jamming attacks in wireless networks

TL;DR: This paper proposes four different jamming attack models that can be used by an adversary to disable the operation of a wireless network, and evaluates their effectiveness in terms of how each method affects the ability of a Wireless node to send and receive packets.
Proceedings Article

Black-box and gray-box strategies for virtual machine migration

TL;DR: This work presents Sandpiper, a system that automates the task of monitoring and detecting hotspots, determining a new mapping of physical to virtual resources and initiating the necessary migrations, and implements a black- box approach that is fully OS- and application-agnostic and a gray-box approach that exploits OS-and- application-level statistics.
Journal ArticleDOI

Agile dynamic provisioning of multi-tier Internet applications

TL;DR: A novel dynamic provisioning technique for multi-tier Internet applications that employs a flexible queuing model to determine how much of the resources to allocate to each tier of the application, and a combination of predictive and reactive methods that determine when to provision these resources, both at large and small time scales is proposed.
Journal ArticleDOI

NetVM: High Performance and Flexible Networking Using Virtualization on Commodity Platforms

TL;DR: This evaluation shows how NetVM can compose complex network functionality from multiple pipelined VMs and still obtain throughputs up to 10 Gbps, an improvement of more than 250% compared to existing techniques that use SR-IOV for virtualized networking.
Proceedings ArticleDOI

Channel surfing and spatial retreats: defenses against wireless denial of service

TL;DR: This paper presents two strategies that may be employed by wireless devices to evade a MAC/PHY-layer jamming-style wireless denial of service attack, and studies both of these strategies for three broad wireless communication scenarios: two-party radio communication, an infrastructured wireless network, and an ad hoc wireless network.