Papers published on a yearly basis
Papers
More filters
••
TL;DR: It is proved that the given planning goals cannot be achieved with a smaller area, given the modeling assumptions and data, so an alternate formalization of a minimum range size moving through time is proposed and used to achieve the revised goals, again with the smallest possible newly protected area.
Abstract: We introduce a new way of measuring and optimizing connectivity in conservation landscapes through time, accounting for both the biological needs of multiple species and the social and financial constraint of minimizing land area requiring additional protection. Our method is based on the concept of network flow; we demonstrate its use by optimizing protected areas in the Western Cape of South Africa to facilitate autogenic species shifts in geographic range under climate change for a family of endemic plants, the Cape Proteaceae. In 2005, P. Williams and colleagues introduced a novel framework for this protected area design task. To ensure population viability, they assumed each species should have a range size of at least 100 km 2 of predicted suitable conditions contained in protected areas at all times between 2000 and 2050. The goal was to design multiple dispersal corridors for each species, connecting suitable conditions between time periods, subject to each species' limited dispersal ability, and minimizing the total area requiring additional protection. We show that both minimum range size and limited dispersal abilities can be naturally modeled using the concept of network flow. This allows us to apply well-established tools from operations research and computer science for solving network flow problems. Using the same data and this novel modeling approach, we reduce the area requiring additional protection by a third compared to previous methods, from 4593 km 2 to 3062 km 2 , while still achieving the same conservation planning goals. We prove that this is the best solution mathematically possible: the given planning goals cannot be achieved with a smaller area, given our modeling assumptions and data. Our method allows for flexibility and refinement of the underlying climate-change, species-habitat-suitability, and dispersal models. In particular, we propose an alternate formalization of a minimum range size moving through time and use network flow to achieve the revised goals, again with the smallest possible newly protected area (2850 km 2 ). We show how to relate total dispersal distance to probability of successful dispersal, and compute a trade-off curve between this quantity and the total amount of extra land that must be protected.
160 citations
••
01 Jun 1997TL;DR: This paper presents a method for analysing feedback-based protocols with a Web-user-like input traffic where the source alternates between "transfer" periods followed by "think" periods, and the method based on the Engset model can be applied to analyze other feedback systems.
Abstract: Most of the studies of feedback-based flow and congestion control consider only persistent sources which always have data to send. However, with the rapid growth of Internet applications built on TCP/IP such as the World Wide Web and the standardization of traffic management schemes such as Available Bit Rate (ABR) in Asynchronous Transfer Mode (ATM) networks, it is essential to evaluate the performance of feedback-based protocols using traffic models which are specific to dominant applications. This paper presents a method for analysing feedback-based protocols with a Web-user-like input traffic where the source alternates between "transfer" periods followed by "think" periods. Our key results, which are presented for the TCP protocol, are:(1) The goodputs and the fraction of time that the system has some given number of transferring sources are insensitive to the distributions of transfer (file or page) sizes and think times except through the ratio of their means. Thus, apart from network round-trip times, only the ratio of average transfer sizes and think times of users need be known to size the network for achieving a specific quality of service.(2) The Engset model can be adapted to accurately compute goodputs for TCP and TCP over ATM, with different buffer management schemes. Though only these adaptations are given in the paper, the method based on the Engset model can be applied to analyze other feedback systems, such as ATM ABR, by finding a protocol specific adaptation. Hence, the method we develop is useful not only for analysing TCP using a source model significantly different from the commonly used persistent sources, but also can be useful for analysing other feedback schemes.(3) Comparisons of simulated TCP traffic to measured Ethernet traffic shows qualitatively similar autocorrelation when think times follow a Pareto distribution with infinite variance. Also, the simulated and measured traffic have long range dependence. In this sense our traffic model, which purports to be Web-user-like, also agrees with measured traffic.
159 citations
••
08 Jan 2001TL;DR: This work proposes and evaluates different enhancements to passive caching that reduce the fraction of HTTP connection establishments that are delayed by long DNS resolutions and demonstrates that a significant fraction of cache misses can be eliminated with a moderate overhead.
Abstract: The resolution of a host name to an IP-address is a necessary predecessor to connection establishment and HTTP exchanges. Nonetheless, DNS resolutions often involve multiple remote name-servers and prolong Web response times. To alleviate this problem name servers and Web browsers cache query results. Name servers currently incorporate passive cache management where records are brought into the cache only as a result of clients' requests and are used for the TTL duration (a TTL value is provided with each record). We propose and evaluate different enhancements to passive caching that reduce the fraction of HTTP connection establishments that are delayed by long DNS resolutions. Renewal policies refresh selected expired cached entries by issuing unsolicited queries. Trace-based simulations using Web proxy logs demonstrated that a significant fraction of cache misses can be eliminated with a moderate overhead. Simultaneous-validation (SV) transparently uses expired records. A DNS query is issued if the respective cached entry is no longer fresh, but concurrently, the expired entry is used to connect to the Web server and fetch the requested content. The content is served only if the expired records used turn out to be in agreement with the query response.
159 citations
••
TL;DR: Just Fast Keying is described, a new key-exchange protocol primarily designed for use in the IP security architecture that is simple, efficient, and secure; a proof of the latter property is sketched.
Abstract: We describe Just Fast Keying (JFK), a new key-exchange protocol, primarily designed for use in the IP security architecture. It is simple, efficient, and secure; we sketch a proof of the latter property. JFK also has a number of novel engineering parameters that permit a variety of tradeoffs, most notably the ability to balance the need for perfect forward secrecy against susceptibility to denial-of-service attacks.
159 citations
••
TL;DR: It is shown that the low-priority steady-state waiting-time can be expressed as a geometric random sum of i.i.d. random variables, just like the M/G/1 FIFO waiting- time distribution, and asymptotic results for cases with long-tail service-time distributions are established.
Abstract: We consider the classical M/G/1 queue with two priority classes and the nonpreemptive and preemptive-resume disciplines. We show that the low-priority steady-state waiting-time can be expressed as a geometric random sum of i.i.d. random variables, just like the M/G/1 FIFO waiting-time distribution. We exploit this structures to determine the asymptotic behavior of the tail probabilities. Unlike the FIFO case, there is routinely a region of the parameters such that the tail probabilities have non-exponential asymptotics. This phenomenon even occurs when both service-time distributions are exponential. When non-exponential asymptotics holds, the asymptotic form tends to be determined by the non-exponential asymptotics for the high-priority busy-period distribution. We obtain asymptotic expansions for the low-priority waiting-time distribution by obtaining an asymptotic expansion for the busy-period transform from Kendall’s functional equation. We identify the boundary between the exponential and non-exponential asymptotic regions. For the special cases of an exponential high-priority service-time distribution and of common general service-time distributions, we obtain convenient explicit forms for the low-priority waiting-time transform. We also establish asymptotic results for cases with long-tail service-time distributions. As with FIFO, the exponential asymptotics tend to provide excellent approximations, while the non-exponential asymptotics do not, but the asymptotic relations indicate the general form. In all cases, exact results can be obtained by numerically inverting the waiting-time transform.
159 citations
Authors
Showing all 1881 results
Name | H-index | Papers | Citations |
---|---|---|---|
Yoshua Bengio | 202 | 1033 | 420313 |
Scott Shenker | 150 | 454 | 118017 |
Paul Shala Henry | 137 | 318 | 35971 |
Peter Stone | 130 | 1229 | 79713 |
Yann LeCun | 121 | 369 | 171211 |
Louis E. Brus | 113 | 347 | 63052 |
Jennifer Rexford | 102 | 394 | 45277 |
Andreas F. Molisch | 96 | 777 | 47530 |
Vern Paxson | 93 | 267 | 48382 |
Lorrie Faith Cranor | 92 | 326 | 28728 |
Ward Whitt | 89 | 424 | 29938 |
Lawrence R. Rabiner | 88 | 378 | 70445 |
Thomas E. Graedel | 86 | 348 | 27860 |
William W. Cohen | 85 | 384 | 31495 |
Michael K. Reiter | 84 | 380 | 30267 |