CS 396M (Spring 2017) Reading List and References

Instructor:  Simon S. Lam

Packet scheduling with end-to-end delay bounds

[XL95]

Geoffrey G. Xie and Simon S. Lam,

Delay Guarantee of Virtual Clock Server,

IEEE/ACM Transactions on Networking, Vol. 3, No. 6, December 1995.  ( pdf )

[GLV97]

Pawan Goyal, Simon S. Lam, and Harrick Vin,

Determining End-to-End Delay Bounds in Heterogeneous Networks,

ACM/Springer-Verlag Multimedia Systems, Vol. 5, No. 3, May 1997.   ( pdf )

[LX97]

Simon S. Lam and Geoffrey G. Xie,

Group Priority Scheduling,

IEEE/ACM Transactions on Networking, Vol. 5, No. 2, April 1997.  ( pdf )

            References

[DKS89] 

Demers, S. Keshav, S. Shenker,

Analysis and simulation of a fair queueing algorithm,

Proceedings of ACM SIGCOMM, 1989.  ( pdf )

[Zhang90]

Lixia Zhang,

Virtual clock: a new traffic control algorithm for packet-switching networks,

Proceedings of ACM SIGCOMM, 1990.  ( pdf )

[PG93]

Parekh and R. Gallager,

A generalized processor-sharing approach to flow control in integrated services networks: the single node case,

IEEE/ACM Trans. on Networking, June 1993.   ( pdf )

[PG94]

Parekh and R. Gallager,

A generalized processor-sharing approach to flow control in integrated services networks: the multiple node case,

IEEE/ACM Trans Networking, April 1994.  ( pdf )

[LX97]

Simon S. Lam and Geoffrey G. Xie,

Burst Scheduling Networks,

Performance Evaluation, Special Issue on ATM Traffic Management, Vol. 31, November 1997.  ( pdf )

TCP congestion control and throughput

[MSM97] Matthew Mathis, Jeffrey Semke, Jamshid Mahdavi,The Macroscopic Behavior of the TCP Congestion Avoidance Algorithm, ACM Computer Communicatons Review, 27(3), pp. 67-82, 1997.  ( pdf )

[PFTK98] Jitendra Padhye, Victor Firoiu, Don Towsley, and Jim Kurose, Modeling TCP Throughput: A Simple Model and its Empirical Validation, Proceedings ACM SIGCOMM,  1998.   ( pdf

[YL00] Y. Richard Yang and Simon Lam, General AIMD Congestion Control, Proceedings ICNP 2000, Osaka, Japan, November 2000. ( pdf )

Bloom filters

[BM04] A. Broder and M. Mitzenmacher, Network applications of Bloom filters: A survey, Internet Mathematics, vol. 1 no. 4, pp. 485-509, 2004. ( pdf )

[Fan00]  L. Fan, P. Cao, J. Almeida, A. Broder, Summary cache: a scalable wide-area web cache sharing protocol. IEEE/ACM Transactions on Networking, June 2000.   ( pdf )

Erasure codes

[Rizzo97] Luigi Rizzo, Effective Erasure Codes for Reliable Computer Communication Protocols, ACM SIGCOMM Computer Communication Review, April 1997.  ( pdf

How to share secrets

[Shamir79] Adi Shamir, How to Share a Secret, CACM, November 1979. ( pdf )

[WGL98] Chung Kei Wong, Mohamed Gouda, and Simon S. Lam, Secure Group Communications Using Key Graphs, Proceedings ACM SIGCOMM '98, Vancouver, B.C., September 1998. ( pdf , journal version )

[Blom85] R. Blom, An optimal class of symmetric key generation systems, Advances in Cryptology: Proceedings of EUROCRYPT 84, Lecture Notes in Computer Science, Springer-Verlag, 209:335–338, 1985. ( pdf )

References on system design

[ZLLY03] X. Brian Zhang, Simon S. Lam, Don-Young Lee, and Y. Richard Yang, Protocol Design for Scalable and Reliable Group Rekeying, IEEE/ACM Transactions on Networking, December 2003. ( pdf )

[DDHV03] Wenliang Du, Jing Deng, Yunghsiang S. Han, and Pramod Varshney, A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks, Proceedings of the 10th ACM Conference on Computer and Communications Security,   Washington DC, October 2003. ( pdf )

Digital signatures for flows and multicasts          

[WL99] Chung Kei Wong and Simon S. Lam, Digital Signatures for Flows and Multicasts, IEEE/ACM Transactions on Networking, August 1999. ( pdf )

Network verification using Atomic Predicates

[YL13] Hongkun Yang and Simon S. Lam,  Real-time Verification of Network Properties Using Atomic Predicates,  Proceedings of IEEE ICNP 2013, Göttingen, Germany, October 2013 ( pdf ); an extended version in IEEE/ACM Transactions on Networking, 2015.

 

[YL16] Hongkun Yang and Simon S. Lam, Scalable Verification of Networks with Packet Transformers using Atomic Predicates, The University of Texas at Austin, Department of Computer Science.  Technical Report TR-16-12, August 16, 2016.  (pdf)

Greedy routing by distributed Delaunay triangulation                      

[LQ11] Simon S. Lam and Chen Qian, Geographic Routing in d-dimensional Spaces with Guaranteed Delivery and Low Stretch, Proceedings ACM SIGMETRICS, June 2011. ( pdf , journal version )

 

       References on applications

       [QL15] Chen Qian and Simon S. Lam, Greedy Routing by Network Distance Embedding, IEEE/ACM Transactions on Networking, published as IEEE Early Access Article, 2015.  ( pdf )

        [QL16] Chen Qian and Simon S. Lam, A Scalable and Resilient Layer-2 Network with Ethernet Compatibility, IEEE/ACM Transactions on Networking, Feb. 2016, Vol. 24, No. 1, pages 231-244 (first published as IEEE Early Access Article, 2014. pdf )

        Seminal reference

        [DL07] Dong-Young Lee and Simon S. Lam, Protocol Design for Dynamic Delaunay Triangulation, Proceedings of 27th IEEE ICDCS, Toronto, June 2007.  ( pdf )    

Book references

The following books are placed on 2-hour reserve in the PCL Library.  They are for those who would like to learn more:

[KR2017] James Kurose and Keith Ross, Computer Network - A Top-Down Approach, Pearson, 2017 (textbook for CS 356).

[Kleinrock75] Leonard Kleinrock, Queueing Systems, Vol. 1: Theory, Wiley Interscience, 1975.

[Kleinrock76] Leonard Kleinrock, Queueing Systems, Vol. 2: Computer Applications, Wiley Interscience, 1976.