Guido Appenzeller

Guido Appenzeller
Stanford University | SU · Department of Computer Science

Ph.D.

About

27
Publications
6,871
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,053
Citations
Citations since 2016
1 Research Item
1122 Citations
2016201720182019202020212022050100150200
2016201720182019202020212022050100150200
2016201720182019202020212022050100150200
2016201720182019202020212022050100150200

Publications

Publications (27)
Article
The queueing delay faced by a packet is arguably the largest source of uncertainty during its journey. It therefore seems crucial that we understand how big the buffers should be in Internet routers. Our 2004 Sigcomm paper revisited the existing rule of thumb that a buffer should hold one bandwidth-delay product of packets. We claimed that for long...
Article
Software-defined Networking (SDN) has emerged as a new paradigm of networking that enables network operators, owners, vendors, and even third parties to innovate and create new capabilities at a faster pace. The SDN paradigm shows potential for all domains of use, including data centers, cellular providers, service providers, enterprises, and homes...
Conference Paper
Full-text available
A persistent problem in computer network research is validation. When deciding how to evaluate a new feature or bug fix, a researcher or operator must trade-off realism (in terms of scale, actual user traffic, real equipment) and cost (larger scale costs more money, real user traffic likely requires downtime, and real equipment requires vendor adop...
Article
Full-text available
OpenFlow [4] has been demonstrated as a way for researchers to run networking experiments in their production network. Last year, we demonstrated how an OpenFlow controller running on NOX [3] could move VMs seamlessly around an OpenFlow network [1]. While OpenFlow has potential [2] to open control of the network, only one researcher can innovate on...
Article
Full-text available
Network virtualization has long been a goal of of the network research community. With it, multiple isolated logical networks each with potentially different addressing and forwarding mechanisms can share the same physical infrastructure. Typically this is achieved by taking advantage of the flexibility of software (e.g. (20, 23)) or by duplicating...
Conference Paper
Full-text available
We describe the implementation of an OpenFlow Switch on the NetFPGA platform. OpenFlow is a way to deploy exper- imental or new protocols in networks that carry production traffic. An OpenFlow network consists of simple flow-based switches in the datapath, with a remote controller to manage several switches. In practice, OpenFlow is most often adde...
Conference Paper
Identity-Based encryption is an asymmetric encryption system where identifiers such as email addresses, server names or phone numbers, can be used as public keys. Originally proposed by Adi Shamir in 1984, the first practical algorithm became available in 2001. Since then IBE has not only generated huge interest in academia, it has seen wide-scale...
Article
All Internet routers contain bu#ers to hold packets during times of congestion. Today, the size of the bu#ers is determined by the dynamics of TCP's congestion control algorithm. In particular, the goal is to make sure that when a link is congested, it is busy 100% of the time; which is equivalent to making sure its bu#er never goes empty. A widely...
Conference Paper
All Internet routers contain buffers to hold packets during times of congestion. Today, the size of the buffers is determined by the dynamics of TCP's congestion control algorithm. In particular, the goal is to make sure that when a link is congested, it is busy 100% of the time; which is equivalent to making sure its buffer never goes empty. A wid...
Article
Today all Internet routers are built with buffers that hold packets in times of congestion. These buffers can typically store between 250ms to one second worth of data. According to a widely used "rule-of-thumb", a link needs a buffer of size B = RT T × C, where RT T is the average round-trip time of a flow passing across the link, and C is the dat...
Article
Internet links operate at high speeds, and past trends predict that these speeds will continue to increase rapidly. Routers and Intrusion Detection Systems that operate at up to OC-768 speeds (40 Gigabits/second) are currently being developed. In this ...
Conference Paper
Full-text available
We are facing a growing user demand for ubiquitous Internet access. As result, network ports and wireless LANs are becoming common in public spaces inside buildings such as lounges, conference rooms and lecture halls. This introduces the problem of protecting networks accessible through these public ports from unauthorized use. In this paper, we st...
Conference Paper
A new concept for constructing an intelligent mobile system is proposed. We describe reasons for the necessity of a new architecture for mobile systems in intelligent spaces. The intelligent spaces are room or area that are equipped with sensors, network and computers. The intelligent spaces are expected to be authentic future environment. If envir...
Chapter
This chapter presents an approach to fuse sensor information from complementary sensors. The mobile robot PRIAMOS is used as an experimental testbed. A multisensor system supports the vehicle with odometric, sonar, visual, and laser scanner information. Sensor fusion is performed by matching the local perception of a laser scanner and a camera syst...
Conference Paper
Intelligent spaces are rooms or areas that are equipped with sensors which enable the spaces to perceive and understand what is happening in them. Intelligent spaces are expected to have a broad range of applications such in homes, offices, factories etc. However, intelligent space itself can not do any physical action. The intelligent space needs...
Conference Paper
Full-text available
Intelligent spaces are rooms or areas that are equipped with sensors such as microphones or cameras that enable them to perceive what is happening in them. In such spaces that have an intelligence of their own a world model no longer is something the robot has alone but a service offered by the information infrastructure of the space. In this artic...
Conference Paper
Real-time computer vision systems that observe the actions of people have received increasing attention as they are important for a broad range of applications. Examples are intelligent man-machine interfaces or intelligent rooms that have the capability to understand the actions of their inhabitants. In this paper we present the design of a stereo...
Conference Paper
In this paper the focus is on the second main channel of information, human pose and gesture. We present an architecture for a real-time, high precision stereo vision system to find humans, track the movement of their heads and hands and offer this data to other devices that are connected to the local area network. The system uses industry standard...
Conference Paper
The exploration and mapping of unknown environments is on important task for the new generation of mobile service robots. These robots are supposed to operate in dynamic and changing environments together with humans and in interaction with other stationary or moving objects. This requires a high flexibility and adaptability of the sensor-system to...
Conference Paper
Computer vision systems are today an important sensor for intelligent robotic systems. However, the design of a vision system that a robot can use as a fast and robust sensor in a complex, partially unknown and dynamic environment is still difficult. A main reason for this is that the parameters of vision systems are often adjusted by hand and rema...
Conference Paper
Full-text available
Adaptive filters and image enhancement techniques have repeatedly been suggested to make feature extraction more robust. Few comparative analysis exists between competing techniques and even the existing ones evaluate only the effect of the filter on the image but not its effect on a feature extraction process. We present an experimental approach f...
Article
Certificates in the Internet map online identities like DNS names to cryptographic keys. Since they are highly trusted entities that can only be issued by a few trusted certification authorities (CAs), they are a costly security component in today's Internet. These CAs have to do extensive checks to ensure that a server is trusted. However, a large...
Article
Full-text available
This document describes the security architecture required to implement identity-based encryption, a public-key encryption technology that uses a user's identity as a public key. It also defines data structures that can be used to implement the technology.
Article
People are the outsiders in the current communications revo lution. Computer hosts, pagers, and telephones are the addressable entities throughout the Int ernet and telephony systems. Human be- ings, however, still need application-specific tricks to beidentified, like email addresses, telephone numbers, and ICQ IDs. The key challenge today is to f...

Network

Cited By