scispace - formally typeset
Search or ask a question
Institution

AT&T Labs

Company
About: AT&T Labs is a based out in . It is known for research contribution in the topics: Network packet & The Internet. The organization has 1879 authors who have published 5595 publications receiving 483151 citations.


Papers
More filters
Proceedings ArticleDOI
24 Aug 2015
TL;DR: Simulation results show that the proposed scheme requires only a very few number of SDN switches in the hybrid SDN network to achieve fast recovery and guarantee 100% reachability from any single link failure and is able to better load-balance the post-recovery network comparing to IP Fast Reroute and shortest path re-calculation.
Abstract: As service providers have started deploying SDN in their networks, traditional IP routers are gradually upgraded to SDN enabled switches. In other words, the network will have traditional IP routers and SDN switches coexisting, and it is called a hybrid SDN network. With such a network, we take advantage of SDN and propose an approach to guarantee traffic reachability in the presence of any single link failure. By redirecting traffic on the failed link to SDN switches through pre-configured IP tunnels, the proposed approach is able to react to the failures very fast. With the help of coordination among SDN switches, we are also able to explore multiple backup paths for the failure recovery. This allows the proposed approach to avoid potential congestion in the post-recovery network by choosing proper backup paths. Simulation results show that our proposed scheme requires only a very few number of SDN switches in the hybrid SDN network to achieve fast recovery and guarantee 100% reachability from any single link failure. It also shows that the proposed approach is able to better load-balance the post-recovery network comparing to IP Fast Reroute and shortest path re-calculation.

100 citations

Proceedings ArticleDOI
27 May 2015
TL;DR: A new method which guarantees differential privacy is introduced, which specifies a probability distribution over possible outputs that is carefully defined to maximize the utility for the given input, while still providing the required privacy level.
Abstract: Protecting the privacy of individuals in graph structured data while making accurate versions of the data available is one of the most challenging problems in data privacy. Most efforts to date to perform this data release end up mired in complexity, overwhelm the signal with noise, and are not effective for use in practice. In this paper, we introduce a new method which guarantees differential privacy. It specifies a probability distribution over possible outputs that is carefully defined to maximize the utility for the given input, while still providing the required privacy level. The distribution is designed to form a 'ladder', so that each output achieves the highest 'rung' (maximum probability) compared to less preferable outputs. We show how our ladder framework can be applied to problems of counting the number of occurrences of subgraphs, a vital objective in graph analysis, and give algorithms whose cost is comparable to that of computing the count exactly. Our experimental study confirms that our method outperforms existing methods for counting triangles and stars in terms of accuracy, and provides solutions for some problems for which no effective method was previously known. The results of our algorithms can be used to estimate the parameters of suitable graph models, allowing synthetic graphs to be sampled.

100 citations

Proceedings ArticleDOI
18 Jul 2007
TL;DR: Using objective measures for privacy protection and page quality, this work examines the effectiveness of specific techniques to limit the diffusion of private information to third parties and the impact of these privacy protection techniques on the usability and quality of the Web pages returned.
Abstract: Various bits of information about users accessing Web sites. some of which are private, have been gathered since the inception of the Web. Increasingly the gathering, aggregation, and processing has been outsourced to third parties. The goal of this work is to examine the effectiveness of specific techniques to limit this diffusion of private information to third parties. We also examine the impact of these privacy protection techniques on the usability and quality of the Web pages returned. Using objective measures for privacy protection and page quality we examine their tradeoffs for different privacy protection techniques applied to a collection of popular Web sites as well as a focused set of sites with significant privacy concerns. We study privacy protection both at a browser and at a proxy.

100 citations

Journal ArticleDOI
TL;DR: By using link-length demands from an exemplary distance-diverse network, it is demonstrated that time-domain hybrid-QAM-enabled fine-grain rate-adaptable transponders can reduce network cost by more than 20 percent within a traditional, fixed-bandwidth, wavelength-division-multiplexed grid.
Abstract: We discuss the emerging rate-adaptable optical transmission technology and how this new technology may be employed to further reduce the transport network cost to meet ever growing bandwidth demand in the core network Two different types of transponders are considered: those adjusting either the transported bit rate (ie, client data rate) or the symbol rate (with a fixed bit rate) We propose a methodology for calculating the (normalized) cost to build out an entire long-haul transport network with several options for bit-rate-adaptable transponders By using link-length demands from an exemplary distance-diverse network, we demonstrate that time-domain hybrid-QAM-enabled fine-grain rate-adaptable transponders can reduce network cost by more than 20 percent within a traditional, fixed-bandwidth, wavelength-division-multiplexed grid We also argue that the total transponder expense using symbol-rate-adaptable technology will be greater than when using bit-rate-adaptable technology, as well as requiring more costly flex-grid ROADMs for channel routing

100 citations

Proceedings ArticleDOI
01 May 2000
TL;DR: A novel technique is introduced for converting static polynomial space search structures for ordered sets into fully-dynamic linear space data structures and optimal bounds for these structures are presented.
Abstract: We introduce a novel technique for converting static polynomial space search structures for ordered sets into fully-dynamic linear space data structures. Based on this we present optimal bounds for ...

100 citations


Authors

Showing all 1881 results

NameH-indexPapersCitations
Yoshua Bengio2021033420313
Scott Shenker150454118017
Paul Shala Henry13731835971
Peter Stone130122979713
Yann LeCun121369171211
Louis E. Brus11334763052
Jennifer Rexford10239445277
Andreas F. Molisch9677747530
Vern Paxson9326748382
Lorrie Faith Cranor9232628728
Ward Whitt8942429938
Lawrence R. Rabiner8837870445
Thomas E. Graedel8634827860
William W. Cohen8538431495
Michael K. Reiter8438030267
Network Information
Related Institutions (5)
Microsoft
86.9K papers, 4.1M citations

94% related

Google
39.8K papers, 2.1M citations

91% related

Hewlett-Packard
59.8K papers, 1.4M citations

89% related

Bell Labs
59.8K papers, 3.1M citations

88% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20225
202133
202069
201971
2018100
201791