Skip to main content

Showing 1–42 of 42 results for author: Helmy, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:1904.02243  [pdf, other

    eess.SP cs.LG q-bio.QM stat.ML

    Optimized Preprocessing and Machine Learning for Quantitative Raman Spectroscopy in Biology

    Authors: Emily E Storey, Amr S. Helmy

    Abstract: Raman spectroscopy's capability to provide meaningful composition predictions is heavily reliant on a pre-processing step to remove insignificant spectral variation. This is crucial in biofluid analysis. Widespread adoption of diagnostics using Raman requires a robust model which can withstand routine spectra discrepancies due to unavoidable variations such as age, diet, and medical background. A… ▽ More

    Submitted 3 April, 2019; originally announced April 2019.

  2. arXiv:1903.07588  [pdf

    cs.CL cs.LG

    A Multilingual Encoding Method for Text Classification and Dialect Identification Using Convolutional Neural Network

    Authors: Amr Adel Helmy

    Abstract: This thesis presents a language-independent text classification model by introduced two new encoding methods "BUNOW" and "BUNOC" used for feeding the raw text data into a new CNN spatial architecture with vertical and horizontal convolutional process instead of commonly used methods like one hot vector or word representation (i.e. word2vec) with temporal CNN architecture. The proposed model can be… ▽ More

    Submitted 18 March, 2019; originally announced March 2019.

    Comments: A dissertation submitted to the AASTMT on February 2019 in partial fulfillment of the requirements for the degree of Master of Science in Computer Science. arXiv admin note: text overlap with arXiv:1807.10854 by other authors without attribution

  3. An Innovative Word Encoding Method For Text Classification Using Convolutional Neural Network

    Authors: Amr Adel Helmy, Yasser M. K. Omar, Rania Hodhod

    Abstract: Text classification plays a vital role today especially with the intensive use of social networking media. Recently, different architectures of convolutional neural networks have been used for text classification in which one-hot vector, and word embedding methods are commonly used. This paper presents a new language independent word encoding method for text classification. The proposed model conv… ▽ More

    Submitted 11 March, 2019; originally announced March 2019.

    Comments: Accepted @ 14th International Computer Engineering Conference (ICENCO2018), Faculty of Engineering , Cairo University, Egypt, Dec. 29-30, 2018

  4. arXiv:1903.00951  [pdf, other

    cs.NI

    Practical Prediction of Human Movements Across Device Types and Spatiotemporal Granularities

    Authors: Babak Alipour, Leonardo Tonetto, Roozbeh Ketabi, Aaron Yi Ding, Jörg Ott, Ahmed Helmy

    Abstract: Understanding and predicting mobility are essential for the design and evaluation of future mobile edge caching and networking. Consequently, research on prediction of human mobility has drawn significant attention in the last decade. Employing information-theoretic concepts and machine learning methods, earlier research has shown evidence that human behavior can be highly predictable. Despite e… ▽ More

    Submitted 3 March, 2019; originally announced March 2019.

    ACM Class: I.6.4; C.2.5; J.1

  5. arXiv:1812.06518  [pdf

    cs.SI cs.NI

    Interest-Aware Delivery for Mobile Social Networks: A TRACE-driven Approach

    Authors: Ahmed Helmy

    Abstract: We envision future mobile networks to be human-centric supporting interest-aware delivery, where an interest maybe based on behavior, such as mobility pattern, location, or web browsing (or user profile) such as affiliation, attributes, or activity. An essential capability in future networks will be the ability to provide scalable group communication. Current communication paradigms, including uni… ▽ More

    Submitted 16 December, 2018; originally announced December 2018.

    Comments: 18 pages, 7 figures, successful project proposal 2008-2013, published for sharing and educational purposes to benefit other potential proposers

    MSC Class: 68 ACM Class: I.6.4; C.2.5; J.1

  6. arXiv:1809.02298  [pdf, other

    cs.CE

    Playing with Matches: Vehicular Mobility through Analysis of Trip Similarity and Matching

    Authors: Roozbeh Ketabi, Babak Alipour, Ahmed Helmy

    Abstract: Understanding city-scale vehicular mobility and trip patterns is essential to addressing many problems, from transportation and pollution to public safety, among others. Using spatio-temporal analysis of vehicular mobility, promising solutions can be proposed to alleviate these major challenges, utilizing shared mobility and crowd-sourcing. The rise of transportation networks (e.g. Uber, Lyft), is… ▽ More

    Submitted 9 November, 2018; v1 submitted 6 September, 2018; originally announced September 2018.

    Comments: Poster presented at SIGSPATIAL 2018. 4 page paper available in proceedings

  7. On the Relation Between Mobile Encounters and Web Traffic Patterns: A Data-driven Study

    Authors: Babak Alipour, Mimonah Al Qathrady, Ahmed Helmy

    Abstract: Mobility and network traffic have been traditionally studied separately. Their interaction is vital for generations of future mobile services and effective caching, but has not been studied in depth with real-world big data. In this paper, we characterize mobility encounters and study the correlation between encounters and web traffic profiles using large-scale datasets (30TB in size) of WiFi and… ▽ More

    Submitted 5 November, 2018; v1 submitted 11 August, 2018; originally announced August 2018.

    Comments: Technical report with details for conference paper at MSWiM 2018, v3 adds GitHub link

    ACM Class: I.6.4; C.2.5; J.1

  8. arXiv:1801.02705  [pdf, other

    cs.NI

    Analyzing Mobility-Traffic Correlations in Large WLAN Traces: Flutes vs. Cellos

    Authors: Babak Alipour, Leonardo Tonetto, Aaron Ding, Roozbeh Ketabi, Jörg Ott, Ahmed Helmy

    Abstract: Two major factors affecting mobile network performance are mobility and traffic patterns. Simulations and analytical-based performance evaluations rely on models to approximate factors affecting the network. Hence, the understanding of mobility and traffic is imperative to the effective evaluation and efficient design of future mobile networks. Current models target either mobility or traffic, but… ▽ More

    Submitted 21 August, 2020; v1 submitted 8 January, 2018; originally announced January 2018.

    Comments: 12 pages, 17 figures, conference paper at IEEE INFOCOM 2018, plus appendix (v3 fixes some typographical errors)

    MSC Class: 68 ACM Class: I.6.4; C.2.5; J.1

  9. arXiv:1612.08545  [pdf, other

    cs.IT

    Performance and Compensation of I/Q Imbalance in Differential STBC-OFDM

    Authors: Lei Chen, Ahmed G. Helmy, Guangrong Yue, Shaoqian Li, Naofal Al-Dhahir

    Abstract: Differential space time block coding (STBC) achieves full spatial diversity and avoids channel estimation overhead. Over highly frequency-selective channels, STBC is integrated with orthogonal frequency division multiplexing (OFDM) to achieve high performance. However, low-cost implementation of differential STBC-OFDM using direct-conversion transceivers is sensitive to In-phase/Quadrature-phase i… ▽ More

    Submitted 27 December, 2016; originally announced December 2016.

    Comments: 7 pages, 2 figures, IEEE GLOBECOM 2016

  10. Performance Analysis and Compensation of Joint TX/RX I/Q Imbalance in Differential STBC-OFDM

    Authors: Lei Chen, Ahmed G. Helmy, Guangrong Yue, Shaoqian Li, Naofal Al-Dhahir

    Abstract: Differential space time block coding (STBC) achieves full spatial diversity and avoids channel estimation overhead. Over highly frequency-selective channels, STBC is integrated with orthogonal frequency division multiplexing (OFDM) to efficiently mitigate intersymbol interference effects. However, low-cost implementation of STBC-OFDM with direct-conversion transceivers is sensitive to In-phase/Qua… ▽ More

    Submitted 27 December, 2016; originally announced December 2016.

    Comments: IEEE Transactions on Vehicular Technology, 15 pages, 11 figures

  11. arXiv:1612.05710  [pdf

    cs.NI cs.SI

    Multi-modal Mining and Modeling of Big Mobile Networks Based on Users Behavior and Interest

    Authors: Saeed Moghaddam, Ahmed Helmy

    Abstract: Usage of mobile wireless Internet has grown very fast in recent years. This radical change in availability of Internet has led to communication of big amount of data over mobile networks and consequently new challenges and opportunities for modeling of mobile Internet characteristics. While the traditional approach toward network modeling suggests finding a generic traffic model for the whole netw… ▽ More

    Submitted 17 December, 2016; originally announced December 2016.

  12. arXiv:1505.03231  [pdf, other

    cs.NI

    An Information-theoretic Model for Knowledge Sharing in Opportunistic Social Networks

    Authors: Mai ElSherief, Tamer ElBatt, Ahmed Zahran, Ahmed Helmy

    Abstract: In this paper we establish fundamental limits on the performance of knowledge sharing in opportunistic social net- works. In particular, we introduce a novel information-theoretic model to characterize the performance limits of knowledge sharing policies. Towards this objective, we first introduce the notions of knowledge gain and its upper bound, knowledge gain limit, per user. Second, we charact… ▽ More

    Submitted 12 May, 2015; originally announced May 2015.

  13. arXiv:1407.1875  [pdf, ps, other

    cs.NI cs.IT

    A Novel Spectrally-Efficient Scheme for Physical Layer Network Coding

    Authors: Ahmed G. Helmy, Tamer Khattab, Mazen O. Hasna

    Abstract: In this paper, we propose a novel three-time-slot transmission scheme combined with an efficient embedded linear channel equalization (ELCE) technique for the Physical layer Network Coding (PNC). Our transmission scheme, we achieve about 33% increase in the spectral efficiency over the conventional two-time-slot scheme while maintaining the same end-toend BER performance.We derive an exact express… ▽ More

    Submitted 3 July, 2014; originally announced July 2014.

  14. arXiv:1202.0549  [pdf, ps, other

    cs.CV

    Comparing Background Subtraction Algorithms and Method of Car Counting

    Authors: Gautam S. Thakur, Mohsen Ali, Pan Hui, Ahmed Helmy

    Abstract: In this paper, we compare various image background subtraction algorithms with the ground truth of cars counted. We have given a sample of thousand images, which are the snap shots of current traffic as records at various intersections and highways. We have also counted an approximate number of cars that are visible in these images. In order to ascertain the accuracy of algorithms to be used for t… ▽ More

    Submitted 29 January, 2012; originally announced February 2012.

  15. arXiv:1105.4151  [pdf, ps, other

    cs.NI stat.AP

    Towards Realistic Vehicular Network Modeling Using Planet-scale Public Webcams

    Authors: Gautam S. Thakur, Pan Hui, Hamed Ketabdar, Ahmed Helmy

    Abstract: Realistic modeling of vehicular mobility has been particularly challenging due to a lack of large libraries of measurements in the research community. In this paper we introduce a novel method for large-scale monitoring, analysis, and identification of spatio-temporal models for vehicular mobility using the freely available online webcams in cities across the globe. We collect vehicular mobility t… ▽ More

    Submitted 19 May, 2011; originally announced May 2011.

  16. arXiv:1009.3567  [pdf, other

    cs.NI cs.RO cs.SI

    Mobile Testbeds with an Attitude

    Authors: Sungwook Moon, Ahmed Helmy

    Abstract: There have been significant recent advances in mobile networks, specifically in multi-hop wireless networks including DTNs and sensor networks. It is critical to have a testing environment to realistically evaluate such networks and their protocols and services. Towards this goal, we propose a novel, mobile testbed of two main components. The first consists of a network of robots with personality-… ▽ More

    Submitted 18 September, 2010; originally announced September 2010.

    Comments: Demonstration of the mobile testbeds presented at MobiCom 2010 and GlobeCom 2010

  17. arXiv:1008.4904  [pdf

    cs.NI

    Spatio-Temporal Modeling of Wireless Users Internet Access Patterns Using Self-Organizing Maps

    Authors: Saeed Moghaddam, Ahmed Helmy

    Abstract: User online behavior and interests will play a central role in future mobile networks. We introduce a systematic method for large-scale multi-dimensional analysis of online activity for thousands of mobile users across 79 buildings over a variety of web domains. We propose a modeling approach based on self-organizing maps (SOM) for discovering, organizing and visualizing different mobile users' tr… ▽ More

    Submitted 29 August, 2010; originally announced August 2010.

  18. arXiv:1007.0960  [pdf

    cs.NI

    Analysis of Spatio-Temporal Preferences and Encounter Statistics for DTN Performance

    Authors: Gautam S. Thakur, Udayan Kumar, Ahmed Helmy, Wei-Jen Hsu

    Abstract: Spatio-temporal preferences and encounter statistics provide realistic measures to understand mobile user's behavioral preferences and transfer opportunities in Delay Tolerant Networks (DTNs). The time dependent behavior and periodic reappearances at specific locations can approximate future online presence while encounter statistics can aid to forward the routing decisions. It is theoretically sh… ▽ More

    Submitted 6 July, 2010; originally announced July 2010.

  19. arXiv:1006.2552  [pdf

    cs.NI

    Similarity Analysis and Modeling in Mobile Societies: The Missing Link

    Authors: Gautam Thakur, Ahmed Helmy, Wei-Jen Hsu

    Abstract: A new generation of "behavior-aware" delay tolerant networks is emerging in what may define future mobile social networks. With the introduction of novel behavior-aware protocols, services and architectures, there is a pressing need to understand and realistically model mobile users behavioral characteristics, their similarity and clustering. Such models are essential for the analysis, performance… ▽ More

    Submitted 13 June, 2010; originally announced June 2010.

    Comments: 8 pages, 6 figures

  20. arXiv:1005.5180  [pdf

    cs.NI

    Data-driven Co-clustering Model of Internet Usage in Large Mobile Societies

    Authors: Saeed Moghaddam, Ahmed Helmy, Sanjay Ranka, Manas Somaiya

    Abstract: Design and simulation of future mobile networks will center around human interests and behavior. We propose a design paradigm for mobile networks driven by realistic models of users' on-line behavior, based on mining of billions of wireless-LAN records. We introduce a systematic method for large-scale multi-dimensional coclustering of web activity for thousands of mobile users at 79 locations. We… ▽ More

    Submitted 27 May, 2010; originally announced May 2010.

    Comments: 10 pages, 10 figures

  21. Understanding periodicity and regularity of nodal encounters in mobile networks: A spectral analysis

    Authors: Sungwook Moon, Ahmed Helmy

    Abstract: Study on human mobility is gaining increasing attention from the research community with its multiple applications to use in mobile networks, particularly for the purpose of message delivery in the Delay Tolerant Networks. To better understand the potential of mobile nodes as message relays, our study investigates the encounter pattern of mobile devices. Specifically, we examine the extensive netw… ▽ More

    Submitted 17 August, 2010; v1 submitted 26 April, 2010; originally announced April 2010.

    Comments: Shorter version has been accepted to IEEE GlobeCom 2010

  22. arXiv:1004.4356  [pdf

    cs.NI

    SHIELD: Social sensing and Help In Emergency using mobiLe Devices

    Authors: Gautam S. Thakur, Mukul Sharma, Ahmed Helmy

    Abstract: School and College campuses face a perceived threat of violent crimes and require a realistic plan against unpredictable emergencies and disasters. Existing emergency systems (e.g., 911, campus-wide alerts) are quite useful, but provide delayed response (often tens of minutes) and do not utilize proximity or locality. There is a need to augment such systems with proximity-based systems for more im… ▽ More

    Submitted 25 April, 2010; originally announced April 2010.

  23. arXiv:1004.4326  [pdf, ps, other

    cs.NI

    PROTECT: Proximity-based Trust-advisor using Encounters for Mobile Societies

    Authors: Udayan Kumar, Gautam Thakur, Ahmed Helmy

    Abstract: Many interactions between network users rely on trust, which is becoming particularly important given the security breaches in the Internet today. These problems are further exacerbated by the dynamics in wireless mobile networks. In this paper we address the issue of trust advisory and establishment in mobile networks, with application to ad hoc networks, including DTNs. We utilize encounters in… ▽ More

    Submitted 25 April, 2010; originally announced April 2010.

  24. arXiv:0810.3935  [pdf, ps, other

    cs.NI

    Modeling Spatial and Temporal Dependencies of User Mobility in Wireless Mobile Networks

    Authors: Wei-jen Hsu, Thrasyvoulos Spyropoulos, Konstantinos Psounis, Ahmed Helmy

    Abstract: Realistic mobility models are fundamental to evaluate the performance of protocols in mobile ad hoc networks. Unfortunately, there are no mobility models that capture the non-homogeneous behaviors in both space and time commonly found in reality, while at the same time being easy to use and analyze. Motivated by this, we propose a time-variant community mobility model, referred to as the TVC mod… ▽ More

    Submitted 21 October, 2008; originally announced October 2008.

    Comments: 14 pages, 9 figures

  25. arXiv:0807.1153  [pdf, ps, other

    cs.NI

    CSI: A Paradigm for Behavior-oriented Delivery Services in Mobile Human Networks

    Authors: Wei-jen Hsu, Debojyoti Dutta, Ahmed Helmy

    Abstract: We propose behavior-oriented services as a new paradigm of communication in mobile human networks. Our study is motivated by the tight user-network coupling in future mobile societies. In such a paradigm, messages are sent to inferred behavioral profiles, instead of explicit IDs. Our paper provides a systematic framework in providing such services. First, user behavioral profiles are constructed… ▽ More

    Submitted 7 July, 2008; originally announced July 2008.

    Comments: 12 pages, 12 figures

  26. arXiv:0706.4035  [pdf

    cs.NI cs.CR

    Encounter-based worms: Analysis and Defense

    Authors: Sapon Tanachaiwiwat, Ahmed Helmy

    Abstract: Encounter-based network is a frequently-disconnected wireless ad-hoc network requiring immediate neighbors to store and forward aggregated data for information disseminations. Using traditional approaches such as gateways or firewalls for deterring worm propagation in encounter-based networks is inappropriate. We propose the worm interaction approach that relies upon automated beneficial worm ge… ▽ More

    Submitted 27 June, 2007; originally announced June 2007.

    Comments: Submitted to a journal

  27. arXiv:0706.2025  [pdf

    cs.CR cs.NI

    On the Performance Evaluation of Encounter-based Worm Interactions Based on Node Characteristics

    Authors: Sapon Tanachaiwiwat, Ahmed Helmy

    Abstract: An encounter-based network is a frequently disconnected wireless ad-hoc network requiring nearby neighbors to store and forward data utilizing mobility and encounters over time. Using traditional approaches such as gateways or firewalls for deterring worm propagation in encounter-based networks is inappropriate. Because this type of network is highly dynamic and has no specific boundary, a distr… ▽ More

    Submitted 13 June, 2007; originally announced June 2007.

  28. arXiv:cs/0606002  [pdf, ps, other

    cs.NI

    Mining Behavioral Groups in Large Wireless LANs

    Authors: Wei-jen Hsu, Debojyoti Dutta, Ahmed Helmy

    Abstract: One vision of future wireless networks is that they will be deeply integrated and embedded in our lives and will involve the use of personalized mobile devices. User behavior in such networks is bound to affect the network performance. It is imperative to study and characterize the fundamental structure of wireless user behavior in order to model, manage, leverage and design efficient mobile net… ▽ More

    Submitted 30 June, 2007; v1 submitted 31 May, 2006; originally announced June 2006.

    Comments: 14 pages, 12 figures

    ACM Class: C.2.5

  29. arXiv:cs/0508010  [pdf

    cs.NI

    ATTENTION: ATTackEr traceback using MAC layer abNormality detecTION

    Authors: Yong** Kim, Ahmed Helmy

    Abstract: Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promising solution to take a proper countermeasure near the attack origins, to discourage attackers from launching attacks, and for forensics. However, attacker traceback in Mobile Ad-hoc Networks (MANETs) is a challenging p… ▽ More

    Submitted 2 August, 2005; originally announced August 2005.

  30. arXiv:cs/0508009  [pdf, ps, other

    cs.NI

    IMPACT: Investigation of Mobile-user Patterns Across University Campuses using WLAN Trace Analysis

    Authors: Wei-jen Hsu, Ahmed Helmy

    Abstract: We conduct the most comprehensive study of WLAN traces to date. Measurements collected from four major university campuses are analyzed with the aim of develo** fundamental understanding of realistic user behavior in wireless networks. Both individual user and inter-node (group) behaviors are investigated and two classes of metrics are devised to capture the underlying structure of such behavi… ▽ More

    Submitted 1 August, 2005; originally announced August 2005.

    Comments: 16 pages, 31 figures

    ACM Class: C.2.1

  31. arXiv:cs/0504111  [pdf

    cs.NI

    Efficient and Robust Geocasting Protocols for Sensor Networks

    Authors: Karim Seada, Ahmed Helmy

    Abstract: Geocasting is the delivery of packets to nodes within a certain geographic area. For many applications in wireless ad hoc and sensor networks, geocasting is an important and frequent communication service. The challenging problem in geocasting is distributing the packets to all the nodes within the geocast region with high probability but with low overhead. According to our study we notice a cle… ▽ More

    Submitted 29 April, 2005; originally announced April 2005.

  32. arXiv:cs/0504073  [pdf

    cs.NI

    Rendezvous Regions: A Scalable Architecture for Resource Discovery and Service Location in Large-Scale Mobile Networks

    Authors: Karim Seada, Ahmed Helmy

    Abstract: In large-scale wireless networks such as mobile ad hoc and sensor networks, efficient and robust service discovery and data-access mechanisms are both essential and challenging. Rendezvous-based mechanisms provide a valuable solution for provisioning a wide range of services. In this paper, we describe Rendezvous Regions (RRs) - a novel scalable rendezvous-based architecture for wireless network… ▽ More

    Submitted 14 April, 2005; originally announced April 2005.

  33. arXiv:cs/0208025  [pdf

    cs.NI

    Efficient Micro-Mobility using Intra-domain Multicast-based Mechanisms (M&M)

    Authors: Ahmed Helmy, Muhammad Jaseemuddin, Ganesha Bhaskara

    Abstract: One of the most important metrics in the design of IP mobility protocols is the handover performance. The current Mobile IP (MIP) standard has been shown to exhibit poor handover performance. Most other work attempts to modify MIP to slightly improve its efficiency, while others propose complex techniques to replace MIP. Rather than taking these approaches, we instead propose a new architecture… ▽ More

    Submitted 16 August, 2002; originally announced August 2002.

    Comments: 12 pages, 11 figures

    ACM Class: C.2.1; C.2.2

  34. arXiv:cs/0208024  [pdf

    cs.NI

    Contact-Based Architecture for Resource Discovery (CARD) in Large Scale MANets

    Authors: Saurabh Garg, Priyatham Pamu, Nitin Nahata, Ahmed Helmy

    Abstract: In this paper we propose a novel architecture, CARD, for resource discovery in large scale Mobile Ad hoc Networks (MANets) which, may scale up to thousands of nodes and may span wide geographical regions. Unlike previously proposed schemes, our architecture avoids expensive mechanisms such as global flooding as well as complex coordination between nodes to form a hierarchy. CARD is also independ… ▽ More

    Submitted 16 August, 2002; originally announced August 2002.

    Comments: 10 pages, 15 figures

    ACM Class: C.2.1; C.2.2

  35. The STRESS Method for Boundary-point Performance Analysis of End-to-end Multicast Timer-Suppression Mechanisms

    Authors: Ahmed Helmy, Sandeep Gupta, Deborah Estrin

    Abstract: Evaluation of Internet protocols usually uses random scenarios or scenarios based on designers' intuition. Such approach may be useful for average-case analysis but does not cover boundary-point (worst or best-case) scenarios. To synthesize boundary-point scenarios a more systematic approach is needed.In this paper, we present a method for automatic synthesis of worst and best case scenarios for… ▽ More

    Submitted 16 August, 2002; originally announced August 2002.

    Comments: 24 pages, 10 figures, IEEE/ACM Transactions on Networking (ToN) [To appear]

    ACM Class: C.2.1; C.2.2

  36. arXiv:cs/0207069  [pdf

    cs.NI

    Small Large-Scale Wireless Networks: Mobility-Assisted Resource Discovery

    Authors: Ahmed Helmy

    Abstract: In this study, the concept of small worlds is investigated in the context of large-scale wireless ad hoc and sensor networks. Wireless networks are spatial graphs that are usually much more clustered than random networks and have much higher path length characteristics. We observe that by adding only few random links, path length of wireless networks can be reduced drastically without affecting… ▽ More

    Submitted 17 July, 2002; originally announced July 2002.

    Comments: 12 pages, 12 figures

    ACM Class: C.2.1; C.2.2

  37. arXiv:cs/0204011  [pdf

    cs.NI

    Fair Stateless Aggregate Traffic Marking using Active Queue Management Techniques

    Authors: Abhimanyu Das, Deboyjoti Dutta, Ahmed Helmy

    Abstract: In heterogeneous networks such as today's Internet, the differentiated services architecture promises to provide QoS guarantees through scalable service differentiation. Traffic marking is an important component of this framework. In this paper, we propose two new aggregate markers that are stateless, scalable and fair. We leverage stateless Active Queue Management (AQM) algorithms to enable fai… ▽ More

    Submitted 8 April, 2002; originally announced April 2002.

    Comments: 7 pages

    ACM Class: C.2.6

  38. arXiv:cs/0109005  [pdf

    cs.NI

    Architectural Framework for Large-Scale Multicast in Mobile Ad Hoc Networks

    Authors: Ahmed Helmy

    Abstract: Emerging ad hoc networks are infrastructure-less networks consisting of wireless devices with various power constraints, capabilities and mobility characteristics. An essential capability in future ad hoc networks is the ability to provide scalable multicast services. This paper presents a novel adaptive architecture to support multicast services in large-scale wide-area ad hoc networks. Existin… ▽ More

    Submitted 5 September, 2001; originally announced September 2001.

    Comments: 10 pages, 4 figures

    ACM Class: C.2; C.2.1

  39. arXiv:cs/0105031  [pdf

    cs.NI

    State Analysis and Aggregation Study for Multicast-based Micro Mobility

    Authors: Ahmed Helmy

    Abstract: IP mobility addresses the problem of changing the network point-of-attachment transparently during movement. Mobile IP is the proposed standard by IETF. Several studies, however, have shown that Mobile IP has several drawbacks, such as triangle routing and poor handoff performance. Multicast-based mobility has been proposed as a promising solution to the above problems, incurring less end-to-end… ▽ More

    Submitted 23 May, 2001; originally announced May 2001.

    Comments: 15 pages, 17 figures, Keywords Micro Mobility, Multicast State, Efficient Handoff, Network Simulation, State Aggregation

    ACM Class: C.2; C.2.1; C.2.2

  40. arXiv:cs/0007005  [pdf, ps, other

    cs.NI cs.DS

    Systematic Testing of Multicast Routing Protocols: Analysis of Forward and Backward Search Techniques

    Authors: Ahmed Helmy, Deborah Estrin, Sandeep Gupta

    Abstract: In this paper, we present a new methodology for develo** systematic and automatic test generation algorithms for multipoint protocols. These algorithms attempt to synthesize network topologies and sequences of events that stress the protocol's correctness or performance. This problem can be viewed as a domain-specific search problem that suffers from the state space explosion problem. One goal… ▽ More

    Submitted 4 July, 2000; originally announced July 2000.

    Comments: 26 pages, 20 figures

    ACM Class: C.2.2, C.2.0

  41. arXiv:cs/0006029  [pdf, ps, other

    cs.NI cs.DS

    Systematic Performance Evaluation of Multipoint Protocols

    Authors: Ahmed Helmy, Sandeep Gupta, Deborah Estrin, Alberto Cerpa, Yan Yu

    Abstract: The advent of multipoint (multicast-based) applications and the growth and complexity of the Internet has complicated network protocol design and evaluation. In this paper, we present a method for automatic synthesis of worst and best case scenarios for multipoint protocol performance evaluation. Our method uses a fault-oriented test generation (FOTG) algorithm for searching the protocol and… ▽ More

    Submitted 17 June, 2000; originally announced June 2000.

    Comments: 23 pages, 12 figures

    ACM Class: C.2.2; C.2.0

  42. arXiv:cs/0006022  [pdf

    cs.NI cs.PF

    Multicast-based Architecture for IP Mobility: Simulation Analysis and Comparison with Basic Mobile IP

    Authors: Ahmed Helmy

    Abstract: With the introduction of a newer generation of wireless devices and technologies, the need for an efficient architecture for IP mobility is becoming more apparent. Several architectures have been proposed to support IP mobility. Most studies, however, show that current architectures, in general, fall short from satisfying the performance requirements for wireless applications, mainly audio. Othe… ▽ More

    Submitted 10 June, 2000; originally announced June 2000.

    Comments: 14 pages, 14 pages (.pdf file)

    ACM Class: C.2.1; C.2.2