Jia Wang

Jia Wang
  • PhD
  • Researcher at AT&T

About

103
Publications
17,398
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
7,521
Citations
Introduction
Skills and Expertise
Current institution
AT&T
Current position
  • Researcher
Additional affiliations
February 2001 - present
AT&T Labs Research
Position
  • Researcher
Education
September 1996 - January 2001
Cornell University
Field of study
  • Computer Science

Publications

Publications (103)
Conference Paper
Customer care calls have served as a primary and direct channel for mobile users to communicate their needs with cellular service providers. These customer needs can be quite diverse and usually include provisioning/upgrade, account/billing, device and service performance related issues. The resolution process of these customer needs is largely man...
Article
The explosive increase in cellular network traffic, users, and applications, as well as the corresponding shifts in user expectations, has created heavy needs and demands on cellular data providers. In this paper we address one such need: mining the logs of cellular voice and data traffic to rapidly detect network performance anomalies and other ev...
Article
Cellular network-based machine-to-machine (M2M) communication is fast becoming a market-changing force for a wide spectrum of businesses and applications such as telematics, smart metering, point-of-sale terminals, and home security and automation systems. In this paper, we aim to answer the following important question: Does traffic generated by M...
Conference Paper
Customer care calls serve as a direct channel for a service provider to learn feedbacks from their customers. They reveal details about the nature and impact of major events and problems observed by customers. By analyzing the customer care calls, a service provider can detect important events to speed up problem resolution. However, automating eve...
Article
Full-text available
IP Routers use sophisticated forwarding table (FIB) lookup algorithms that minimize lookup time, storage, and update time. This paper presents SMALTA, a practical, near-optimal FIB aggregation scheme that shrinks forwarding table size without modifying routing semantics or the external behavior of routers, and without requiring changes to FIB looku...
Article
Operational network data, management data such as customer care call logs and equipment system logs, is a very important source of information for network operators to detect problems in their networks. Unfortunately, there is lack of efficient tools to automatically track and detect anomalous events on operational data, causing ISP operators to re...
Article
Full-text available
BGP Route Reflectors (RR), which are commonly used to help scale Internal BGP (iBGP), can produce oscillations, forwarding loops, and path inefficiencies. ISPs avoid these pitfalls through careful topology design, RR placement, and link-metric assignment. This paper presents Address-Based Route Reflection (ABRR): the first iBGP solution that comple...
Conference Paper
Full-text available
Despite its importance in today’s Internet, network measurement was not an integral part of the original Internet architecture, i.e., there was (and still is) little native support for many essential measurement tasks. Targeting the inadequacy of counting/accounting capabilities of existing routers, many data streaming and sketching techniques have...
Article
Full-text available
Recent advances in residential broadband access technologies have led to a wave of commercial IPTV deployments. As IPTV services are rolled out at scale, it is essential for IPTV systems to maintain ultra-high reliability and performance. A major issue that disrupts IPTV service is the crash of the set-top box (STB) software. The STB directly resid...
Conference Paper
Full-text available
Understanding Internet traffic dynamics in large cellular networks is important for network design, troubleshooting, performance evaluation, and optimization. In this paper, we present the results from our study, which is based upon a week-long aggregated flow level mobile device traffic data collected from a major cellular operator's core network....
Article
A cardinal prerequisite for the proper and efficient management of a network, especially an ISP network, is to understand the traffic that it carries. Traffic profiling is a means to obtain knowledge of the traffic behavior. Previous work has been focusing on traffic profiling at the link level or the host level. However, network prefix-level traff...
Article
Full-text available
The 12 papers in this special issue are grouped into three sections: 1) assessments of today's global routing system; 2) techniques to improve the performance of the existing routing system; and 3) new solutions that are designed to address the routing scalability problem by changing the basic model of the Internet routing architecture.
Article
Full-text available
Scalable event detection and trouble shooting capabili-ties are critical for ensuring high levels of network re-liability and performance. Although network operations systems are typically well designed for dealing with hard network outages (e.g., link failures), detecting and ana-lyzing chronic conditions -particularly those associated with short...
Conference Paper
Full-text available
Ideally, enterprise administrators could specify fine-grain policies that drive how the underlying switches forward, drop, and measure traffic. However, existing techniques for flow-based networking rely too heavily on centralized controller software that installs rules reactively, based on the first packet of each flow. In this paper, we propose D...
Conference Paper
Full-text available
Networks continue to change to support new applications, improve reliability and performance and reduce the operational cost. The changes are made to the network in the form of upgrades such as software or hardware upgrades, new network or service features and network configuration changes. It is crucial to monitor the network when upgrades are mad...
Article
A Shrew attack, which uses a low-rate burst carefully designed to exploit TCP's retransmission timeout mechanism, can throttle the bandwidth of a TCP flow in a stealthy manner. While such an attack can significantly degrade the perfor- mance of all TCP-based protocols and services including Internet routing (e.g., BGP), no existing scheme clearly s...
Conference Paper
Full-text available
Router syslogs are messages that a router logs to describe a wide range of events observed by it. They are considered one of the most valuable data sources for monitoring network health and for trou- bleshooting network faults and performance anomalies. However, router syslog messages are essentially free-form text with only a minimal structure, an...
Conference Paper
Full-text available
Social media sites such as Twitter continue to grow at a fast pace. People of all generations use social media to exchange messages and share experiences of their life in a timely fashion. Most of these sites make their data available. An intriguing question is can we exploit this real-time and massive data-flow to improve business in a measurable...
Conference Paper
Full-text available
IPTV is increasingly being deployed and offered as a commercial service to residential broadband customers. Compared with traditional ISP networks, an IPTV distribution network (i) typically adopts a hierarchical instead of mesh-like structure, (ii) imposes more stringent requirements on both reliability and performance, (iii) has different distrib...
Article
Full-text available
The convergence time of the interdomain routing protocol, BGP, can last as long as 30 minutes [14], [15]. Yet, routing behavior during BGP route convergence is poorly understood. BGP can experience transient loss of reachability during route convergence. We refer to this transient loss of reachability during route convergence as transient routing f...
Conference Paper
This paper presents ViAggre (Virtual Aggregation), a "configuration-only" approach to shrinking the routing table on routers. ViAggre does not require any changes to router software and routing protocols and can be deployed independently and autonomously by any ISP. ViAggre is effectively a scalability technique that allows an ISP to modify its int...
Conference Paper
Full-text available
Prefix hijacking is one of the top known threats on to- day's Internet. A number of measurement based so- lutions have been proposed to detect prefix hijacking events. In this paper we take these solutions one step fur- ther by addressing the problem of locating the attacker in each of the detected hijacking event. Being able to locate the attacker...
Conference Paper
A Shrew attack, which uses a low-rate burst carefully designed to exploit TCP's retransmission timeout mechanism, can throttle the bandwidth of a TCP flow in a stealthy manner. While such an attack can significantly degrade the performance of all TCP-based protocols and services including Internet routing (e.g., BGP), no existing scheme clearly sol...
Conference Paper
Full-text available
Understanding the channel popularity or content popularity is an important step in the workload characterization for modern infor- mation distribution systems (e.g., World Wide Web, peer-to-peer file-sharing systems, video-on-demand systems). In this paper, we focus on analyzing the channel popularity in the context of Inter- net Protocol Televisio...
Conference Paper
Full-text available
Internet Protocol Television (IPTV) has emerged as a new deliv- ery method for TV. In contrast with native broadcast in traditional cable and satellite TV system, video streams in IPTV are encoded in IP packets and distributed using IP unicast and multicast. This new architecture has been strategically embraced by ISPs across the globe, recognizing...
Conference Paper
Full-text available
Recent studies reveal that the routing structures of operational net- works are much more complex than a simple BGP/IGP hierarchy, highlighted by the presence of many distinct instances of routing protocols. However, the glue (how routing protocol instances inter- act and exchange routes among themselves) is still little understood or studied. For...
Conference Paper
Full-text available
Abstract—As the Internet steadily increases in importance, it is still based on a quite fragile routing design. From network operators perspective it is therefore crucial to detect end-to- end path performance due to routing outages early to either mitigate them directly or contact other entities to mitigate them. In this work we demonstrate the fe...
Conference Paper
Full-text available
Chronic network conditions are caused by performance im- pairing events that occur intermittently over an extended pe- riod of time. Such conditions can cause repeated perfor- mance degradation to customers, and sometimes can even turn into serious hard failures. It is therefore critical to trou- bleshoot and repair chronic network conditions in a...
Conference Paper
Full-text available
Today’s Internet routing infrastructure exhibits high homogeneity. This constitutes a serious threat to the resilience of the network, since a bug or security vulnerability in an implementation could make all routers running that implementation become simultaneously unusable. This situation could arise as a result of a defective software upgrade or...
Article
This paper presents ViAggre (Virtual Aggregation), a \congur ation-only" approach to shrinking the routing table on routers. ViAggre applies to legacy routers and can be adopted independently and au- tonomously by any ISP. ViAggre is ee ctively a scal- ability technique that allows an ISP to modify its internal routing such that individual routers...
Article
Prefix hijacking is known as one of the security threats on today’s Internet. A number of measurement based solutions have been proposed to detect prefix hijacking events. In this paper we take these solutions one step further by addressing the problem of locating the attacker in each of the detected hijacking event. Being able to locate an attacke...
Conference Paper
Full-text available
As more and more Internet IP prefix hijacking incidents are being reported, the value of hijacking detection services has become evident. Most of the current hijacking detection approaches monitor IP prefixes on the control plane and detect inconsistencies in route advertisements and route qualities. We propose a different approach that utilizes in...
Conference Paper
Full-text available
Reliability is a critical requirement of the Internet. The availability and resilience of the Internet under failures can have significant global effects. However, in the current Internet routing architecture, achieving the high level of reliability demanded by many mission critical activities can be costly. In this paper, we first propose a novel...
Article
Achieving design closure is one of the biggest challenges for modern very large-scale integration system designers. This problem is exacerbated by the lack of high-level design-automation tools that consider the increasingly important impact of physical features, such as interconnect, on integrated circuit area, performance, and power consumption....
Article
Full-text available
Traffic application classification is an essential step in the network management process to provide high availability of network ser-vices. However, network management has seen limited use of traf-fic classification because of the significant overheads of existing techniques. In this context we explore the feasibility and perfor-mance of lightweig...
Conference Paper
In this work, we present the novel idea of route normalization by correcting on the fly routing traffic on behalf of a local router to protect the local network from malicious and misconfigured routing updates. Analogous to traffic normalization for network intrusion detection systems, the proposed RouteNormalizer patches ambiguities and eliminates...
Conference Paper
Packet classification is the foundation of many Internet functions such as QoS and security. A long thread of research has proposed efficient software-based solutions to this problem. Such software solutions are attractive because they require cheap memory systems for implementation, thus bringing down the overall cost of the system. In contrast, h...
Conference Paper
Full-text available
We consider a geometric model for the problem of minimiz- ing access control lists (ACLs) in network routers, a model that also has applications to rectilinear picture compression and figure drawing in common graphics software packages. Here the goal is to create a colored rectilinear pattern within an initially white rectangular canvas, and the ba...
Conference Paper
Routing dynamics heavily influence Internet data plane performance. Existing studies only narrowly focused on a few destinations and did not consider the predictability of the impact of routing changes on performance metrics such as reachability. In this work, we propose an efficient framework to capture coarse-grained but important performance deg...
Conference Paper
Full-text available
Entropy has recently gained considerable signicance as an important metric for network measurement. Previous re- search has shown its utility in clustering trac and detect- ing trac anomalies. While measuring the entropy of the trac observed at a single point has already been studied, an interesting open problem is to measure the entropy of the tra...
Conference Paper
Full-text available
Compared to attacks against end hosts, Denial of Ser- vice (DoS) attacks against the Internet infrastructure such as those targeted at routers can be more devastating due to their global impact on many networks. We discover that the recently identied low-rate TCP-targeted DoS attacks can have severe impact on the Border Gateway Protocol (BGP). As t...
Conference Paper
Full-text available
The overall efficiency, reliability, and availability of a firewall is crucial in enforcing and administrating securit y, especially when the network is under attack. The continuous growth of th e Internet, coupled with the increasing sophistication of th e attacks, is placing stringent demands on firewall performance. These ch allenges require new...
Article
Full-text available
Per-flow traffic measurement is critical for usage accounting, traffic engineering, and anomaly detection. Previous methodologies are either based on random sampling (e.g., Cisco's NetFlow), which is inaccurate, or only account for the "elephants." We introduce a novel technique for measuring per-flow traffic approximately, for all flows regardless...
Conference Paper
IP routing scalability is based on hierarchical routing, which requires that the IP address hierarchy be aligned with the physical topology. Both site multi-homing and switching ISPs without renumbering break this alignment, resulting in large routing tables. This paper presents CRIO: a new approach to IP scalability for both global and VPN routing...
Conference Paper
Full-text available
Extensive measurement studies have shown that end-to-end Inter- net path performance degradation is correlated with routing dynam- ics. However, the root cause of the correlation between routing dynamics and such performance degradation is poorly understood. In particular, how do routing changes result in degraded end-to- end path performance in th...
Article
Measurements related to security are being carried out on many sites on the Internet at network ingress points, be- tween specic points on the Internet, and across the wide area Internet. The goals range from identifying sources of and possibly ltering unwanted trafc, to characteriz- ing and coming up with new mechanisms for deterring attacks. Most...
Conference Paper
Full-text available
The overall performance of a firewall is crucial in enforcing and administrating security, especially when the network is under attack. The continuous growth of the Internet, coupled with the increasing sophistication of the attacks, is placing stringent demands on firewall performance. In this paper, we describe a traffic-aware optimization framew...
Conference Paper
Full-text available
Serving as the core component in many packet forwarding, differentiating and filtering schemes, packet classification continues to grow its importance in today's IP networks. Currently, most vendors use Ternary CAMs (TCAMs) for packet classification. TCAMs usually use brute-force paral- lel hardware to simultaneously check for all rules. One of the...
Article
Estimation of traffic matrices, which provide critical input for network capacity planning and traffic engineering, has recently been recognized us an important research problem. Most of the previous approaches infer traffic matrix from either SNMP link loads or sampled NetFlow records. In this work, we design novel inference techniques that, by st...
Conference Paper
Full-text available
The overall performance of a firewall is crucial in enforcing and administrating security, especially when the network is under attack. The continuous growth of the Internet, coupled with the increasing sophistication of the attacks, is placing stringent demands on firewall performance. Under such circumstances it becomes very vital to understand t...
Conference Paper
Recent research on data streaming algorithms has provided powerful tools to efficiently monitor various characteristics of traffic passing through a single network link or node. However, it is often desirable to perform data streaming analysis on the traffic aggregated over hundreds or even thousands of links/nodes, which will provide network opera...
Conference Paper
Full-text available
Estimation of trafc matrices, which provide critical input for net- work capacity planning and trafc engineering, has recently been recognized as an important research problem. Most of the previ- ous approaches infer trafc matrix from either SNMP link loads or sampled NetFlow records. In this work, we design novel infer- ence techniques that, by st...
Conference Paper
Full-text available
The convergence time of the interdomain routing protocol, BGP, can last as long as 30 minutes. Yet, routing behavior during BGP route convergence is poorly understood. BGP can experience transient loss of reachability during route convergence. We refer to this transient loss of reachability during route convergence as transient routing failure. Tra...
Conference Paper
Full-text available
Most important commercial Web sites maintain multiple replicas of their server infrastructure to increase both reliability and performance. In this paper, we study how many replicas should be used and where they should be placed in order to improve client network performance, including both the latency (e.g., round-trip time) between clients and th...
Conference Paper
Full-text available
The ability to discover the AS-level path between two end-points is valuable for network diagnosis, performance optimization, and reliability enhancement. Virtually all existing techniques and tools for path discovery require direct access to the source. However, the uncooperative nature of the Internet makes it difficult to get direct access to an...
Conference Paper
Full-text available
The traffic volume between origin/destination (OD) pairs in a network, known as traffic matrix, is essential for efficient network provisioning and traffic engineering. Existing approaches of estimating the traffic matrix, based on statistical inference and/or packet sampling, usually cannot achieve very high estimation accuracy. In this work, we t...
Conference Paper
Recent advances in Internet measurement tools have made it possible to locate bottleneck links that constrain the available bandwidth of Internet paths. In this paper, we provide a detailed study of Internet path bottlenecks. We focus on the following four aspects: the persistence of bottleneck location, the sharing of bottlenecks among destination...
Conference Paper
Full-text available
The performance of a backbone network is vulnerable to interdomain routing changes that affect how traffic trav- els to destinations in other Autonomous Systems (ASes). Despite having poor visibility into these routing changes, operators often need to react quickly by tuning the net- work configuration to alleviate congestion or by notify- ing othe...
Conference Paper
Full-text available
The ability to locate network bottlenecks along end-to-end paths on the Internet is of great interest to both network operators and researchers. For example, knowing where bottleneck links are, network operators can apply traffic engineering either at the interdomain or intradomain level to improve routing. Existing tools either fail to identify th...
Article
The ability to locate network bottlenecks along end-to-end paths on the Internet is of great interest to both network operators and researchers. For example, knowing where bottleneck links are, network operators can apply traffic engineering either at the interdomain or intradomain level to improve routing. Existing tools either fail to identify th...
Article
Today, most large companies maintain virtual private networks (VPNs) to connect their remote locations into a single secure network. VPNs can be quite large covering more than 1000 locations and in most cases use standard Internet protocols and services. Such VPNs are implemented using a diverse set of technologies such as Frame Relay, MPLS, or IPS...
Conference Paper
Full-text available
Knowing the distribution of the sizes of traffic flows passing through a network link helps a network operator to characterize network resource usage, infer traffic demands, detect traffic anomalies, and accommodate new traffic demands through better traffic engineering. Previous work on estimating the flow size distribution has been focused on mak...
Article
The use of peer-to-peer (P2P) applications is growing dramatically, particularly for sharing large video/audio files and software. In this paper, we analyze P2P traffic by measuring flow-level information collected at multiple border routers across a large ISP network, and report our investigation of three popular P2P systems-FastTrack, Gnutella, a...
Conference Paper
Per-flow traffic measurement is critical for usage accounting, traffic engineering, and anomaly detection. Previous methodologies are either based on random sampling (e.g., Cisco's NetFlow), which is inaccurate, or only account for the "elephants". We introduce a novel technique for measuring per-flow traffic approximately, for all flows regardless...
Conference Paper
Full-text available
Traceroute is used heavily by network operators and researchers to identify the IP forwarding path from a source to a destination. In practice, knowing the autonomous system (AS) associated with each hop in the path is also quite valuable. In previous work we showed that the IP-to-AS mapping extracted from BGP routing tables is not sufficient for d...
Article
Per-flow traffic measurement is critical for usage accounting, traffic engineering, and anomaly detection. Previous methodologies are either based on random sampling (e.g., Cisco's NetFlow), which is inaccurate, or only account for the "elephants". We introduce a novel technique for measuring perflow traffic approximately, for all flows regardless...
Article
Per-flow traffic measurement is critical for usage accounting, traffic engineering, and anomaly detection. Previous methodologies are either based on random sampling (e.g., Cisco's NetFlow), which is inaccurate, or only account for the "elephants". Our paper introduces a novel technique for measuring per-flow traffic approximately, for all flows re...
Article
Full-text available
The Border Gateway Protocol (BGP) plays a crucial role in the delivery of traffic in the Internet. Fluctuations in BGP routes cause degradation in user performance, increased processing load on routers, and changes in the distribution of traffic load over the network. Although earlier studies have raised concern that BGP routes change quite often,...
Article
cTd[e<fhgWigj k eZl.m&kIn;oGpWqVjVfiEqVrZif&f&etsuqViMmIe<nlviMrZwnkIetmIdWxyqVir<r<jzo|{~} A  "'MOQ;`1I^Se<jFmIdWjFg[kIj Ge<npWf&rt3jVf_m;lWnz>liMrZwnkIetmIdWx rZwnkIetmIdW %Ggj k"^p[mIfEe<f 310 m;lWnz>liM eZf&e<nlm&kIjVjf_m&kIpWq"mIp[kIj~l[r<eZj eb^p[mIfVFd[n$^jVj kz^e d[eZq*djViq*dl[n;o[j 70 l[r<eZj 28900-47310 kIj g[kIjVf&jVl.mIfid.Ggj kIgWrZi...
Article
This paper introduces a classification algorithm called HyperCuts. Like the previously best known algorithm, HiCuts, HyperCuts is based on a decision tree structure. Unlike HiCuts, however, in which each node in the decision tree represents a hyperplane, each node in the HyperCuts decision tree represents a k-dimensional hypercube. Using this extra...
Article
Full-text available
Manual configuration of IP routers is an expensive, time-consuming, and error prone process. For large Internet service providers, establishing service for new customers is a major part of the financial cost of running the network. Increasingly, these customers want to exchange routing information with their provider(s) using the Border Gateway Pro...
Article
Full-text available
Longest Prefix Matching (LPM) is the problem of finding which string from a given set is the longest prefix of another, given string. LPM is a core problem in many applications, including IP routing, network data clustering, and telephone network management. These applications typically require very fast matching of bounded strings, i.e., strings t...
Article
Full-text available
Content Distribution Networks (CDNs) attempt to improve Web performance by delivering Web content to end-users from servers located at the edge of the network. An important factor contributing to the performance improvement is the ability of a CDN to select servers in the proximity of the requesting clients. Most CDNs today use the Domain Name Syst...
Conference Paper
INTRODUCTION Peer-to-Peer (P2P) applications [4], [6], [2], [3] have increased traffic significantly. We propose application specific peering that allows searches for a resource (using existing or modified P2P protocols) to be directed to a copy of resource on an ISP&apos;s network, using a novel technique that automatically classifies traffic (sho...
Article
Several recent studies have focused on generating Internet topology graphs. Topology graphs have been used to predict growth patterns of prefixes and traffic flow as well as for designing better protocols. Internet topology graphs can be studied at either inter-domain level or router level. For some applications, inter-domain level topology graph i...
Article
The Internet is inc reasingly beingc alled upon to provide di#erent levels of servic e to di#erent applic ations and users. A prac tic al problem in doing so is that although Ethernet is one of the hops for nearly all c ommunic ation in the Internet, it does not provide any QoS guarantees. A natural question, therefore, is the e#ec t of o#ered load...
Article
Being able to identify the groups of clients that are responsible for a significantportionofaWeb site's requests can be helpful to both the Web site and the clients. In a Web application, it is beneficial to movecontent closer to groups of clients that are responsible for large subsets of requests to an origin server. Weintroduce clusters---a group...
Conference Paper
As the Internet infrastructure evolves to include quality of service (QoS), a lot of work has been done on how to allocate network resources to satisfy the QoS requirements of IP flows. Less attention is being paid to mapping the network QoS specifications, e.g., network delay and loss rate, to the (perceived) end-to-end performance of user applica...
Conference Paper
INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella [2], [7] have gained much attention recently. These applications are mainly designed and used for largescale sharing of MP3 files. In such systems, end-hosts self-organize into an overlay network and share content with each other. Compared to the traditional clien...
Article
As the Internet infrastructure evolves to include Quality of Service (QoS), it is necessary to map application quality requirements to network performance specifications in terms of delay and loss rate. In this paper, we first propose a new testbed by using a combination of simulation and emulation technics. Next, we use this testbed in studying th...
Article
The World Wide Web can be considered as a large distributed information system that provides access to shared data objects. As one of the most popular applications currently running on the Internet, the World Wide Web is of an exponential growth in size, which results in network congestion and server overloading. Web caching has been recognized as...
Article
Regarding the set of all information sources as the universe of discourse, we used a nonnegative monotone set function defined on its power set to describe the importance of each individual information source and their varied combinations. Such a set function is called an importance measure or a fuzzy measure. The Sugeno integral with respect to th...
Article
As the Internet infrastructure evolves to include Quality of Service (QoS), it is necessary to map application quality requirements to the the network performance specifications in terms of delay and loss rate. While past work has addressed the dependency of audio and video applications on these underlying QoS metrics, little work has been done in...
Article
Due to some inherent interactions among diverse information sources, the classical weighted average method is not adequate for information fusion in many real problems. To describe the interactions, an intuitive and effective way is to use an appropriate nonadditive set function. Instead of the weighted average method, which is essentially the Lebe...
Article
As a classical aggregation tool, the weighted average method is widely used in information fusion. It is the Lebesgue integral with respect to the weights essentially. Due to some inherent interaction among diverse information sources, the weighted average method does not work well in many real problems. To describe the interaction, an intuitive an...
Article
Belief measures and plausibility measures are two common types of semicontinuous fuzzy measures used for modeling uncertainty. Utilizing the Choquet integral for describing a multi-input one-output nonlinear system, we describe a method for determining a belief measure or a plausibility measure from given input-output data. A special neural network...
Conference Paper
Regarding the Choquet integral as a multi-input single-output system, one can use a set of input-output data to determine the belief measure or plausibility measure for the Choquet integral concerned. The least square method and a genetic algorithm are applied for this purpose
Conference Paper
Constructing fuzzy measures in systems is an important topic in system research. Revising a set function to be a desirable fuzzy measure is one of the practicable strategies of the construction. In this paper, the following fitting problem is investigated: given a universal set and a set function, which is not necessarily a λ-fuzzy measure, defined...
Conference Paper
If the input-output relation of a multi-input system can be represented by some kind of integral with respect to a nonnegative monotone set function, which is not necessarily additive, then the construction of the system may be entirely described by the monotone set function. After obtaining input-output data from such a system, the set function ca...
Conference Paper
Determining some special types of fuzzy measures is an important topic in system research. Some construction strategies, such as statistics from given input-output data, have been developed recently. This paper investigates another strategies of construction - belief measure and plausibility measure - using genetic algorithm. This algorithm is simi...
Article
Full-text available
The World Wide Web can be considered as a large distributed information system that provides access to shared data objects. As one of the most popular applications currently running on the Internet, the World Wide Web is of an exponential growth in size, which results in network congestion and server overloading. Web caching has been recognized as...
Article
We consider a geometric model for the problem of minimizing access control lists (ACLs) in network routers, a model that also has applications to rectilinear picture compression and gure drawing in common graphics software packages. Here the goal is to create a colored rectilinear pattern within an initially white rectangular canvas, and the basic...
Article
This paper presents Virtual Aggregation, an architecture that attempts to tackle the Internet routing scal- ability problem. Our approach does not require any changes to router software and routing protocols and can be deployed by any ISP without the cooperation of other ISPs. Hence, Virtual Aggregation is a configuration-only solution. The key ins...

Network

Cited By