references.bib

@conference{11572_101494,
  abstract = {Platooning, the idea of cars autonomously following their leaders to form a road train, has huge potentials to improve traffic flow efficiency and, most importantly, road traffic safety. Wireless communication is a fundamental building block - it is needed to manage and to maintain the platoons. To keep the system stable, strict constraints in terms of update frequency and reliability must be met. We developed communication strategies by explicitly taking into account the requirements of the controller, exploiting synchronized communication slots as well as transmit power adaptation. The proposed approaches are compared to two state of the art adaptive beaconing protocols that have been designed for generic message dissemination. Our simulation models have been parametrized and validated by means of real-world experiments. We clearly show how taking into account specific requirements can be extremely beneficial even in very crowded freeway scenarios.},
  address = {USA},
  author = {M  Segata  and  B  Bloessl  and  S  Joerer  and  C  Sommer  and  M  Gerla  and  R  Lo  Cigno  and  F  Dressler},
  booktitle = {7th IFIP/IEEE International Workshop on Communication Technologies for Vehicles (Nets4Cars 2014-Fall)},
  doi = {10.1109/Nets4CarsFall.2014.7000903},
  link = {http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=7000903&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D7000903},
  pages = {1--6},
  publisher = {IEEE},
  title = {Towards Inter-Vehicle Communication Strategies for Platooning Support},
  year = {2014}
}
@conference{11572_101495,
  abstract = {Cooperative driving in general and Cooperative Adaptive Cruise Control (CACC) or platooning in particular require blending control theory, communications and networking, as well as mechanics and physics. Given the lack of an integrated modeling framework and theory as well as the prohibitively high costs of using prototypes for what-if studies, simulation remains the fundamental instrument to evaluate entire cooperative driving systems. This work presents Plexe, an Open Source extension to Veins that offers researchers a simulation environment able to run experiments in realistic scenarios, taking into account physics and mechanics of the vehicles, communications and networking impairments, and Inter-Vehicle Communication (IVC) protocol stacks. Plexe is easily extensible and already implements protocols to support platooning and cooperative driving applications and several state of the art cruise control models. We describe the structure of the simulator and the control algorithms that Plexe implements and provide two use cases which show the potential of our framework as a powerful research tool for cooperative driving systems.},
  address = {USA},
  author = {M  Segata  and  S  Joerer  and  B  Bloessl  and  C  Sommer  and  F  Dressler  and  R  Lo Cigno},
  booktitle = {6th IEEE Vehicular Networking Conference (VNC 2014)},
  doi = {10.1109/VNC.2014.7013309},
  link = {http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=7013309&url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel7%2F6999007%2F7013298%2F07013309.pdf%3Farnumber%3D7013309},
  pages = {53--60},
  publisher = {IEEE},
  title = {PLEXE: A Platooning Extension for Veins},
  year = {2014}
}
@article{11572_101496,
  abstract = {We study the effect of radio signal shadowing dynamics, caused by vehicles and by buildings, on the performance of beaconing protocols in Inter-Vehicular Communication (IVC). Recent research indicates that beaconing, i.e., one hop message broadcast, shows excellent characteristics and can outperform other communication approaches for both safety and efficiency applications, which require low latency and wide area information dissemination, respectively. To mitigate the broadcast storm problem, adaptive beaconing solutions have been proposed and designed. We show how shadowing dynamics of moving obstacles hurt IVC, reducing the performance of beaconing protocols. To the best of our knowledge, this is one of the first studies on identifying the problem and the underlying challenges and proposing the opportunities presented by such challenges. Shadowing also limits the risk of overloading the wireless channel. We demonstrate how these challenges and opportunities can be taken into account and outline a novel approach to dynamic beaconing. It provides low-latency communication (i.e., very short beaconing intervals), while ensuring not to overload the wireless channel. The presented simulation results substantiate our theoretical considerations.},
  author = {C  Sommer  and  S  Joerer  and  M  Segata  and  O K  Tonguz  and  R  Lo Cigno  and  F  Dressler},
  doi = {10.1109/TMC.2014.2362752},
  journal = {IEEE TRANSACTIONS ON MOBILE COMPUTING},
  link = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6920079&queryText%3D10.1109%2FTMC.2014.2362752},
  pages = {1--12},
  title = {How Shadowing Hurts Vehicular Communications and How Dynamic Beaconing Can Help},
  volume = {pp},
  year = {2014}
}
@article{11572_101512,
  abstract = {This paper proposes a dynamic downlink load control scheme that jointly employs dynamic load threshold management and virtual coverage management schemes to reduce the degree of performance degradation due to traffic overload in two-tier femtocell networks. With the proposed scheme, the downlink load in a serving macrocell is controlled with a load threshold which is adjusted dynamically depending on the varying downlink load conditions of neighboring macrocells. In addition, traffic overloading is alleviated by virtually adjusting the coverage of the overloaded serving macrocell, based on the adjusted load threshold of the serving macrocell. Simulation results show that the proposed scheme improves the performance of two-tier femtocell networks in terms of the outage probability and sum throughput. This improvement is significantly increased with appropriate values of load thresholds and with an intermediate-level adjustment of the virtual coverage area (i.e., handover hysteresis margin: HOM). Furthermore, the proposed scheme outperforms both a previously proposed load control scheme with a static load threshold and the LTE system without a HOM adjustment.},
  author = {C S   Kang  and  T D  Nguyen  and  J  Kim  and  R  Lo Cigno},
  doi = {10.3837/tiis.2013.11.003},
  journal = {TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS},
  link = {http://dx.doi.org/10.3837/tiis.2013.11.003},
  pages = {2597--2615},
  title = {A Downlink Load Control Scheme with a Dynamic Load Threshold and Virtual Coverage Management for Two-Tier Femtocell Networks},
  volume = {7},
  year = {2013}
}
@conference{11572_101514,
  abstract = {Current optical networks, while offering outstanding reliability, still suffer from occasional failures. A resource-efficient procedure to handle these failures in un-protected scenarios is to perform restoration, i.e., to dynamically setup a backup lightpath after the primary one stops working, which leads to traffic losses while such operation completes. In this paper we propose a technique, applicable to optical networks with centralized control, to better handle failures with slow transients. The idea is to proactively perform the backup lightpath's setup, triggered by either a fixed or an adaptive threshold. The latter is chosen so as to balance the need of offsetting the setup time with the need of preventing unnecessary setups. Simulations show that the adaptive threshold provides better performance than the fixed one, in terms of both timely restorations and unnecessary setup operations.},
  address = {USA},
  author = {D  Siracusa  and  F  Pederzolli  and  E  Salvadori  and  R  Lo Cigno  and  I T  Monroy},
  booktitle = {16th International Conference on Transparent Optical Networks (ICTON)},
  doi = {10.1109/ICTON.2014.6876450},
  link = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6876450},
  pages = {1--4},
  publisher = {IEEE},
  title = {Proactive restoration of slow-failures in optical networks},
  year = {2014}
}
@misc{11572_108894,
  abstract = {A message level SIP anomaly detection architecture that analyses SIP messages to classify them as “good” or “bad” depending on their structure and content is proposed in [1, 2]. Though these papers contain a detailed discussion on the motivation of the work and development of the architecture, technical details of the system architecture are discussed very briefly. This report fills that gap and contains discussions of several technical aspects, such as, feature selection and dataset preparation, which are fundamental for the efficient and precise classification. It also includes download links of our developed applications and sample data, which are freely available for the community. Moreover, guidelines to configure the application and to perform experiments with the developed applications are included.},
  address = {Trento},
  author = {Ferdous  Raihana  and  Cigno  Renato Lo  and  Zorat  Alessandro},
  pages = {1--24},
  publisher = {University of Trento},
  title = {Message Level SIP Anomaly Detection: Configuration and Measures Setup},
  year = {2015}
}
@misc{11572_112227,
  abstract = {Botnets, i.e., large systems of controlled agents, have become the most sophisticated and dangerous way of spreading malware. Their damaging actions can range from massive dispatching of e-mail spam messages, to denial of service attacks, to collection of private and sensitive information. Unlike standard computer viruses or worms, botnets spread silently without actively operating their damaging activity, and then are activated in a coordinated way to maximize the “benefit” of the malware. In this paper we propose two models based on compartmental differential equations derived from “standard” models in biological disease spreading. These models offer insight into the general behavior of botnets, allowing both the optimal tuning of botnets’ characteristics, and possible countermeasures to prevent them. We analyze, in closed form, some simple instances of the models whose parameters have non-ambiguous interpretation. We conclude the paper by discussing possible model extensions, which can be used to fine-tune the analysis of specific epidemic malware in the case that some parameters can be obtained from actual measurements of the botnet behavior.},
  address = {Trento, Italia},
  author = {Ajelli  Marco  and  Lo Cigno  Renato  and  Montresor  Alberto},
  pages = {1--10},
  publisher = {Università di Trento},
  title = {Compartmental differential equations models of botnets and epidemic malware},
  year = {2010}
}
@conference{11572_119005,
  abstract = {Automated and coordinated vehicles' driving (platooning) is gaining more and more attention today and it represents a challenging scenario heavily relying on wireless Inter-Vehicular Communication (IVC). In this paper, we propose a novel controller for vehicle platooning based on consensus. Opposed to current approaches where the logical control topology is fixed a priori and the control law designed consequently, we design a system whose control topology can be reconfigured depending on the actual network status. Moreover, the controller does not require the vehicles to be radar equipped and automatically compensates outdated information caused by network delays. We define the control law and analyze it in both analytical and simulative way, showing its robustness in different network scenarios. We consider three different wireless network settings: uncorrelated Bernoullian losses, correlated losses using a Gilbert-Elliott channel, and a realistic traffic scenario with interferences caused by other vehicles. Finally, we compare our strategy with another state of the art controller. The results show the ability of the proposed approach to maintain a stable string of vehicles even in the presence of strong interference, delays, and fading conditions, providing higher comfort and safety for platoon drivers.},
  address = {Piscattaway, NJ, USA},
  author = {Santini  S  and  Salvi  A  and  Valente  A S  and  Pescapè  A  and  Segata  M  and  Lo Cigno  R},
  booktitle = {34th IEEE Conference on Computer Communications (INFOCOM 2015)},
  doi = {10.1109/INFOCOM.2015.7218490},
  link = {http://infocom2015.ieee-infocom.org/},
  pages = {1158--1166},
  publisher = {IEEE},
  title = {A Consensus-based Approach for Platooning with Inter-Vehicular Communications},
  year = {2015}
}
@conference{11572_124720,
  abstract = {Networks, due to the affinity to both technical and social characteristics of such networks. It can help binding together communities, it provides a good means for inclusion of people as well to deliver information and local events. Video streaming in community networks is still problematic; this work describes a project for the adaptation of PeerStreamer, an open source peer-to-peer video streaming platform, to an existing Community Network in the city of Florence, Italy. The paper exposes the motivations that make PeerStreamer a perfect match with the philosophy and the technical features of a community network and describes how the community network of Florence can be a very good testbed given the mixture of technical and social skills that animate it. The proposed adaptation and implementation exploits a so-far underused feature of PeerStreamer: the possibility of separating the streaming engine from the play-out part on different hosts. This feature makes it possible to install the streaming engine, which is very efficient and has a very small memory footprint, directly on the community network routing nodes, so that the streaming topology can be adapted to the community network topology by directly accessing routing information. On the other hand, the player can run on standard PCs and use standard streaming protocols to access the stream.},
  address = {New York, NY, USA},
  author = {Maccari  Leonardo  and  Baldesi  Luca  and  Lo Cigno  Renato  and  Forconi  Jacopo  and  Caiazza  Alessio},
  booktitle = {Proceedings of the 2015 Workshop on Do-it-yourself Networking: An Interdisciplinary Approach (DIYNetworking '15)},
  doi = {10.1145/2753488.2753491},
  keyword = {community networks, p2p video streaming, wireless mesh networks},
  link = {http://www.sigmobile.org/mobisys/2015/},
  pages = {1--6},
  publisher = {ACM},
  title = {Live Video Streaming for Community Networks, Experimenting with PeerStreamer on the Ninux Community},
  year = {2015}
}
@article{11572_124850,
  abstract = {Peer-to-peer live-streaming (P2P-TV) systems' goal is disseminating real-time video content using peer-to-peer technology. Their performance is driven by the overlay topology, i.e., the virtual topology that peers use to exchange video chunks. Several proposals have been made in the past to optimize it, yet few experimental studies have corroborated results. The aim of this paper is to provide a comprehensive experimental comparison based on PeerStreamer in order to benchmark different strategies for the construction and maintenance of the overlay topology in P2P-TV systems. We present only experimental results in which fully distributed strategies are evaluated in both controlled experiments and the Internet using thousands of peers. Results confirm that the topological properties of the overlay have a deep impact on both user quality of experience and network load. Strategies based solely on random peer selection are greatly outperformed by smart yet simple and actually implementable strategies. The most performing strategy we devise guarantees to deliver almost all chunks to all peers with a playout delay as low as 6 s even when system load approaches 1, and in almost adversarial network scenarios. PeerStreamer is open-source to make results reproducible and allow further research by the community.},
  author = {Stefano  Traverso  and  Luca  Abeni  and  Robert  Birke  and  Csaba  Kiraly  and  Emilio Leonardi  Lo Cigno  Renato  and  Marco  Mellia},
  doi = {10.1109/TNET.2014.2307157},
  journal = {IEEE-ACM TRANSACTIONS ON NETWORKING},
  keyword = {overlay networks;peer-to-peer computing;telecommunication network topology;television broadcasting;video streaming;Internet;P2P-TV systems;Peer Streamer;design comparison;experimental comparison;neighborhood filtering strategies;overlay construction;overlay topology;peer-to-peer live-streaming;peer-to-peer technology;topological properties;video chunks;video content;virtual topology;Bandwidth;Benchmark testing;Measurement;Network topology;Peer-to-peer computing;Streaming media;Topology;Overlay networks;peer-to-peer computing;streaming media},
  link = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6766806},
  pages = {741--754},
  title = {Neighborhood Filtering Strategies for Overlay Construction in P2P-TV Systems: Design and Experimental Comparison},
  volume = {23},
  year = {2015}
}
@article{11572_124861,
  abstract = {An increasing fraction of the electrical energy produced in western countries is being consumed by Internet infrastructure; reducing its energy footprint is therefore of utmost importance for the scalability of the Internet. We address optical transport backbones and propose a novel method to reduce the energy consumed by dynamically adjusting the number of active optical carriers to support the short-term load of the network with a small and controllable margin. This is achieved in a nondisruptive manner that does not interact with routing strategies and does not rely on any specific control plane, but exploits automated traffic profiling and prediction of the well-known circadian traffic cycle. The proposed approach works with both fixed and flexible grid optical networks. We describe a method to automatically learn these patterns and multiple techniques to predict incoming traffic. Furthermore, we present an algorithm that tunes the parameters of the proposed system in order to achieve a target a posteriori probability of causing traffic losses. The behavior of the system is studied, using simulations, under a variety of conditions. Results show that the proposed prediction algorithms can significantly reduce the number of active optical carriers, even in nonoptimal scenarios, while guaranteeing low traffic losses.},
  author = {Pederzolli  Federico  and  Siracusa  Domenico  and  Lo Cigno  Renato  and  Salvadori  Elio},
  doi = {10.1109/JSYST.2015.2476559},
  journal = {IEEE SYSTEMS JOURNAL},
  link = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=7274675},
  pages = {1--14},
  title = {Energy Saving Through Traffic Profiling in Self-Optimizing Optical Networks},
  volume = {PP},
  year = {2015}
}
@article{11572_126549,
  abstract = {Abstract Wireless Community Networks (WCNs) are bottom-up broadband networks empowering people with their on-line communication means. Too often, however, services tailored for their characteristics are missing, with the consequence that they have worse performance than what they could. We present here an adaptation of an Open Source P2P live streaming platform that works efficiently, and with good application-level quality, over WCNs. \WCNs links are normally symmetric (unlike standard ADSL access), and a WCN topology is local and normally flat (contrary to the global Internet), so that the P2P overlay used for video distribution can be adapted to the underlaying network characteristics. We exploit this observation to derive overlay building strategies that make use of cross-layer information to reduce the impact of the P2P streaming on the WCN while maintaining good application performance. We experiment with a real application in real WCN nodes, both in the Community-Lab provided by the CONFINE EU Project and within an emulation framework based on Mininet, where we can build larger topologies and interact more efficiently with the mesh underlay, which is unfortunately not accessible in Community-Lab. The results show that, with the overlay building strategies proposed, the P2P streaming applications can reduce the load on the WCN to about one half, also equalizing the load on links. At the same time the delivery rate and delay of video chunks are practically unaffected.},
  author = {Luca Baldesi  and  Leonardo Maccari  and  Renato Lo Cigno},
  doi = {http://dx.doi.org/10.1016/j.comnet.2015.09.024},
  journal = {COMPUTER NETWORKS},
  keyword = {Wireless Community Networks; P2P live streaming; Video streaming; Topology optimization; Cross-layer design; Performance evaluation},
  link = {http://www.sciencedirect.com/science/article/pii/S1389128615003448},
  pages = {389--403},
  title = {Improving P2P streaming in Wireless Community Networks},
  volume = {93, Part 2},
  year = {2015}
}
@conference{11572_126553,
  abstract = {Automated car following, or platooning, is a promising Inter-Vehicle Communication (IVC) application which has the potential of reducing traffic jams, improving safety, and decreasing fuel consumption by forming groups of vehicles which autonomously follow a common leader. The application works by sharing vehicles' data through high frequency periodic beaconing which, due to channel congestion, might not work in highly dense scenarios. To address this issue, in this paper we propose a dynamic approach called Jerk Beaconing which exploits vehicle dynamics to share data only when needed. The results, compared to a commonly assumed 10Hz beaconing, show huge benefits in term of network resource saving. Moreover, our approach outperforms static beaconing in terms of safety as well, as it is able to keep inter-vehicle distance closer to the desired gap even in highly demanding scenarios.},
  address = {Piscattaway, NJ, USA},
  author = {Michele  Segata  and  Falko  Dressler  and  Renato  Lo Cigno},
  booktitle = {7th IEEE Vehicular Networking Conference (VNC 2015)},
  link = {http://www.ieee-vnc.org/},
  pages = {1--8},
  publisher = {IEEE},
  title = {Jerk Beaconing: A Dynamic Approach to Platooning},
  year = {2015}
}
@article{11572_126555,
  abstract = {IAS aim to assist road users in avoiding collisions at intersections, either by warning the driver or by triggering automated actions. Such a system can be realized based on passive scanning only (e.g., using LiDAR) or supported by active IVC. The main reason to use IVC is its ability to provide situation awareness even when a possible crash candidate is not yet in visual range. The IVC research community has identified beaconing, i.e., one-hop broadcast, as the primary communication primitive for vehicular safety applications. Recently, adaptive beaconing approaches have been studied and different congestion control mechanisms have been proposed to cope with the diverse demands of vehicular networks. In this paper, we show that current state-of-the-art congestion control mechanisms are not able to support IAS adequately. Specifically, current approaches fail due to their inherent fairness postulation, i.e., they lack fine grained prioritization. We propose a solution that extends congestion control mechanisms by allowing temporary exceptions for vehicles in dangerous situations, that is, situation-based rate adaptation. We show the applicability for two state-of-the-art congestion control mechanisms, namely TRC and DynB, in two different vehicular environments, rural and downtown.},
  author = {Stefan  Joerer  and  Bastian  Bloessl  and  Michele  Segata  and  Christoph  Sommer  and  Renato  Lo Cigno  and  Abbas  Jamalipour  and  Falko  Dressler},
  doi = {10.1109/TMC.2015.2474370},
  journal = {IEEE TRANSACTIONS ON MOBILE COMPUTING},
  keyword = {Congestion Control; Inter-Vehicle Communication; Intersection Assistance System; Vehicular Ad Hoc Network;  Acceleration; Computer aided manufacturing; Safety; Vehicle crash testing},
  link = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7229341},
  pages = {1--12},
  title = {Enabling Situation Awareness at Intersections for IVC Congestion Control Mechanisms},
  volume = {PP (pre-print on-line)},
  year = {2015}
}
@inbook{11572_12779,
  address = {BERLIN},
  author = {R  FRACCHIA  and  M GARETTO  and  R  LO CIGNO},
  booktitle = {Quality of Service in Multiservice IP Networks},
  pages = {392--392},
  publisher = {Springer},
  title = {A Queueing Network Model of Short-Lived TCP Flows with Mixed Wired and Wireless Access Links},
  volume = {LNCS2601},
  year = {2003}
}
@inbook{11572_12780,
  address = {BERLIN},
  author = {M MELLIA  and  A CARPANI  and  R  LO CIGNO},
  booktitle = {Quality of Service in Multiservice IP Networks},
  publisher = {Springer},
  title = {TStat: TCP STatistic and Analisys Tool},
  volume = {LNCS2601},
  year = {2003}
}
@inbook{11572_12781,
  address = {BERLIN},
  author = {M BAGNUS  and  R  LO CIGNO},
  booktitle = {Quality of Service in Multiservice IP Networks},
  publisher = {Springer},
  title = {TCP-SACK Analysis and Improvement through OMQN Models},
  volume = {LNCS2601},
  year = {2003}
}
@conference{11572_144853,
  abstract = {Peer-to-peer video streaming is a valuable technique to reduce the overhead produced by centralized and unicast-based video streaming. Key to the efficiency of a peer-topeer approach is the optimization of the logical distribution topology (the overlay with respect to the underlying network, the underlay). This work studies peer-to-peer streaming in wireless mesh networks for which the underlay is known. We propose an optimized, cross-layer approach to build the peer-to-peer distribution overlay minimizing the impact on the underlay. We design an optimal strategy, which is proven to be NP-complete, and thus not solvable with a distributed, light weight protocol. The optimal strategy is relaxed exploiting the knowledge of the betweenness centrality of the underlay nodes, obtaining two easily implementable solutions applicable to any link-state routing protocol. Simulation and emulation results (experimenting with real applications on a network emulated with the Mininet framework) support the theoretical findings, showing that the relaxed implementations are reasonably close to the optimal solution, and provide vast gains compared to the traditional overlay topology based on Erdös-Rényi models that a peer-to-peer application would build.},
  address = {Vienna},
  author = {Baldesi  Luca  and  Maccari  Leonardo  and  Lo Cigno  Renato},
  booktitle = {15th International IFIP TC6 Networking Conference},
  pages = {350--358},
  publisher = {IFIP},
  title = {Optimized Cooperative Streaming in Wireless Mesh Networks},
  year = {2016}
}
@conference{11572_148129,
  abstract = {The control of a platoon using IEEE 802.11p is an active research challenge in the field of vehicular networking and cooperative automated vehicles. IEEE 802.11p is a promising technology for direct vehicle to vehicle communication, but there are concerns about its usage for the control of platoons as it suffers packet losses due to congestion in highly dense scenarios. On the other hand, Visible Light Communication (VLC) recently gained attention as a short range technology for vehicular applications. VLC could be used to support or backup IEEE 802.11p, increasing reliability and scalability, and hence the safety of platooning systems. In this paper, we perform a large-scale simulation campaign using VLC integrated with IEEE 802.11p for platooning. We particularly demonstrate the benefits, but also the limitations, of such heterogeneous networking.},
  address = {IEEE Operations Center, 445 Hoes Lane, Piscataway, NJ 08854, USA},
  author = {Segata  Michele  and  Lo Cigno  Renato  and  Tsai  H  M  M  and  Dressler  Falko},
  booktitle = {12th Annual IFIP/IEEE Conference on Wireless On-demand Network Systems and Services (WONS)},
  conference_website = {http...},
  link = {http://2016.wons-conference.org/},
  pages = {1--4},
  publisher = {IFIP/IEEE},
  publisher_website = {http...},
  slides = {ffff},
  title = {On platooning control using IEEE 802.11p in conjunction with visible light communications},
  year = {2016}
}
@conference{11572_148189,
  abstract = {Fast and efficient recovery from node failure, with minimal disruption of routes and the consequent traffic loss is of the utmost importance for any routing protocol. Link-state protocols, albeit preferred to distance vector ones because of faster convergence, still suffer from a trade-off between control message overhead and performance. This work formalizes the routes' disruption following a node failure as an optimization problem depending on the nodes' centrality in the topology, constrained to a constant signaling overhead. Next, it shows that the solution can be found using Lagrange Multipliers. The solution complexity is low enough to be computed on-line on the network routers, thus obtaining the optimal setting of control message timers that minimize the traffic loss following a node failure. The gain obtained is quantified in power-law synthetic topologies, and it is also tested on real network topologies extending the OLSR protocol to use the modified timers, showing that the inevitable approximations introduced in the analysis do not hamper the very good results achievable through this novel approach. The technique can be applied to any link state protocol, including OSPF, and improves route convergence not only upon failures but on every topology modification.},
  address = {IEEE Operations Center, 445 Hoes Lane, Piscataway, NJ 08854, USA},
  author = {Maccari  Leonardo  and  Lo Cigno  Renato},
  booktitle = {35th Annual IEEE International Conference on Computer Communications (INFOCOM)},
  doi = {10.1109/INFOCOM.2016.7524407},
  link = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7524407},
  pages = {1--9},
  publisher = {IEEE},
  title = {Pop-routing: Centrality-based tuning of control messages for faster route convergence},
  year = {2016}
}
@conference{11572_156279,
  address = {New York, NY, USA},
  author = {Kirchner  Davide  and  Ferdous  Raihana  and  Lo Cigno  Renato  and  Maccari  Leonardo  and  Gallo  Massimo  and  Perino  Diego  and  Saino  Lorenzo},
  booktitle = {Proceedings of the 3rd ACM Conference on Information-Centric Networking},
  doi = {10.1145/2984356.2984363},
  pages = {31--39},
  publisher = {ACM},
  title = {Augustus: a CCN router for programmable networks},
  year = {2016}
}
@conference{11572_156737,
  address = {New York, NY, USA},
  author = {Segata  Michele  and  Goss  Davide  and  Lo Cigno  Renato},
  booktitle = {Proceedings of the 1st MobiHoc International Workshop on Internet of Vehicles and Vehicles of Internet (IoV-VoI 2016)},
  doi = {10.1145/2938681.2938686},
  keyword = {Clustering; EDCA bursting, IEEE 802.11; Inter-vehicle communication; Software; Computer Science Applications1707 Computer Vision and Pattern Recognition; Computer Networks and Communications},
  pages = {13--18},
  publisher = {Association for Computing Machinery, Inc},
  title = {Distributed EDCA bursting: Improving cluster-based communication in IVC},
  year = {2016}
}
@article{11572_156740,
  author = {Segata  Michele  and  Bloessl  Bastian  and  Joerer  Stefan  and  Sommer  Christoph  and  Gerla  Mario  and  Lo Cigno  Renato  and  Dressler  Falko},
  doi = {10.1109/TVT.2015.2489459},
  journal = {IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY},
  keyword = {Automated highways; Cooperative systems; Networks; Vehicles; Electrical and Electronic Engineering; Aerospace Engineering; Automotive Engineering; Computer Networks and Communications; Applied Mathematics},
  pages = {5411--5423},
  title = {Toward communication strategies for platooning: Simulative and experimental evaluation},
  volume = {64},
  year = {2015}
}
@misc{11572_16284,
  abstract = {Boston-Natick, MA, USA},
  author = {GERLA M  and  R  LO CIGNO  and  WENG W},
  booktitle = {8-th International Conference on ComputerCommunications and Networks -- ICCCN'99},
  title = {BA-TCP: A Bandwidth Aware TCP for Satellite Networks},
  year = {1999}
}
@misc{11572_16285,
  abstract = {Vancouver, Canada},
  author = {CASETTI C  and  R  LO CIGNO  and  MELLIA M},
  booktitle = {IEEE International Communication Conference (ICC'99)},
  title = {QoS-Aware Routing Schemes Based on Hierarchical Load-Balancing for Integrated Services Packet Networks},
  year = {1999}
}
@misc{11572_16286,
  abstract = {Yokohama, Japan},
  author = {AJMONE MARSAN M  and  DE CAROLIS G  and  LEONARDI E  and  R  LO CIGNO  and  MEO M},
  booktitle = {11th ITC Specialists Seminar "Multimedia and Nomadic Communications"},
  title = {An Approximate Model for the Computation of Blocking Probabilities in Cellular Networks with Repeated Calls},
  year = {1998}
}
@misc{11572_16287,
  abstract = {Florence, Italy},
  author = {CHIASSERINI C F  and  R  LO CIGNO  and  SCARRONE E},
  booktitle = {IEEE 1998 International Conference on Universal Personal Communications (ICUPC'98)},
  title = {Handovers in Wireless ATM: An In-Band Signaling Solution},
  year = {1998}
}
@conference{11572_16288,
  abstract = {Philadelphia, PA, USA},
  author = {BLANCHINI F  and  R  LO CIGNO  and  TEMPO R},
  booktitle = {American Control Conference 1998},
  title = {Control of ATM Networks: Fragility and Robustness Issues},
  year = {1998}
}
@conference{11572_16289,
  abstract = {Colmar, France},
  author = {CORNAGLIA B  and  SANTANIELLO R  and  NERI F  and  LEONARDI E  and  R  LO CIGNO  and  MEO M  and  SARACINO D},
  booktitle = {IEEE International Conference on ATM (ICATM'98)},
  title = {LMDS Systems: A Possible Solution for Wireless ATM Access Networks},
  year = {1998}
}
@misc{11572_16290,
  abstract = {Stuttgart, Germany},
  author = {AJMONE MARSAN M  and  BEGAIN K  and  R  LO CIGNO  and  MUNAFO' M},
  booktitle = {Fourth International Conference on Broadband Communications '98},
  title = {Stop & Go ABR: A Simple Algorithm for the Implementation of Best Effort Services in ATM LANs},
  year = {1998}
}
@conference{11572_16291,
  abstract = {Cannes, France},
  author = {AJMONE MARSAN M  and  BALDI M  and  BIANCO A  and  R  LO CIGNO  and  MUNAFO' M},
  booktitle = {ICCC'97, International Conference for Computer Communications},
  title = {On the Performance of Transport Protocols Over ATM Networks},
  year = {1997}
}
@misc{11572_16292,
  abstract = {Arlington, Virginia, USA},
  author = {AJMONE MARSAN M  and  BIANCO A  and  CASETTI C  and  CHIASSERINI C F  and  FRANCINI A  and  R  LO CIGNO  and  MELLIA M  and  MUNAFO' M},
  booktitle = {SCSC'97, Summer Computer Simulation Conference},
  title = {An Integrated Software Environment for the Simulation of ATM Networks},
  year = {1997}
}
@misc{11572_16293,
  abstract = {Lisboa, Portugal},
  author = {AJMONE MARSAN M  and  CHIASSERINI C F  and  FUMAGALLI A  and  R  LO CIGNO  and  MUNAFO' M},
  booktitle = {IEEE ATM'97 Workshop},
  title = {Buffer Requirements for Loss-Free Handovers in Wireless ATM Networks},
  year = {1997}
}
@misc{11572_16294,
  abstract = {Nashville, TN, USA},
  author = {AJMONE MARSAN M  and  BEGAIN K  and  R  LO CIGNO  and  MUNAFO' M},
  booktitle = {5th International Conference on Telecommunication Systems Modelling and Analysis},
  title = {Performance of TCP File Transfers over the Explicit Rate ABR ATM Service Category},
  year = {1997}
}
@misc{11572_16295,
  abstract = {Ilkley, West Yorkshire, U.K.},
  author = {CASETTI C  and  R  LO CIGNO  and  MELLIA M  and  MUNAFO' M  and  ZSOKA Z},
  booktitle = {Eighth IFIP Workshop on Performance Modelling and Evaluation of ATM & IP Networks},
  title = {QoS Routing Strategies when Link State Information is Out-of-Date},
  year = {2000}
}
@misc{11572_16298,
  abstract = {S.Francisco, CA, USA},
  author = {M GARETTO  and  M AJMONE MARSAN  and  R  LO CIGNO  and  M MEO},
  booktitle = {IEEE GLOBECOM 2003},
  title = {On the Convergence of Fixed Point approximations to Study Congested Networks Loaded by TCP Traffic},
  year = {2003}
}
@misc{11572_16353,
  abstract = {Turin, Italy},
  author = {G MARDENTE  and  C CASETTI  and  R  LO CIGNO  and  M MELLIA  and  M MUNAFO},
  booktitle = {IEEE High Performance Switching and Routing (HPSR 2003)},
  title = {On-line Routing Optimization for MPLS-based IP Networks},
  year = {2003}
}
@misc{11572_16357,
  abstract = {Ilkley, West Yorkshire, U.K.},
  author = {C KIRALY  and  M GARETTO  and  R  LO CIGNO  and  M MEO  and  M AJMONE MARSAN},
  booktitle = {1st IFIP Int.Conf. on Perf. Mod. and Eval. of  Heterogeneous Networks (HetNet03)},
  title = {Computation of the Completion Time Distribution of Short-Lived TCP Connections},
  year = {2003}
}
@misc{11572_16363,
  address = {[S.l.]},
  author = {M  Brunato  and  R  Lo Cigno  and  D  Severina},
  booktitle = {Proceedings of the Fifth Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2006)},
  link = {http://www.medhoc.diit.unict.it/2006/TP.pdf},
  pages = {352--360},
  publisher = {[S.n.]},
  title = {Managing Wireless HotSpots: the Uni-Fy Approach},
  year = {2006}
}
@misc{11572_16380,
  address = {Berlin},
  author = {L  Abeni  and  C  Kiraly  and  R  Lo Cigno},
  booktitle = {NETWORKING 2009: 8th International IFIP-TC 6 Networking Conference [...]: Proceedings},
  pages = {117--130},
  publisher = {Springer-Verlag},
  title = {On the Optimal Scheduling of Streaming Applications in Unstructured Meshes},
  year = {2009}
}
@misc{11572_16381,
  address = {Piscataway, NJ},
  author = {L  Abeni  and  C Kiraly  and  R  Lo Cigno},
  booktitle = {2009 IEEE 14th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks: CAMAD},
  doi = {10.1109/CAMAD.2009.5161473},
  pages = {1--6},
  publisher = {IEEE},
  title = {SSSim: a Simple and Scalable Simulator for P2P Streaming Systems},
  year = {2009}
}
@misc{11572_16425,
  address = {New York, NY, USA},
  author = {R  Lo Cigno  and  A  Russo  D  Carra},
  booktitle = {`Second International Conference on Communications and Electronics, ICCE 2008},
  doi = {10.1109/CCE.2008.4578935},
  link = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4578935},
  pages = {67--73},
  publisher = {IEEE},
  title = {On Some Fundamental Properties of P2P Push/Pull Protocols},
  year = {2008}
}
@misc{11572_16429,
  address = {New York, NY, USA},
  author = {R  Lo Cigno  and  T  Pecorella  and  M  Sereno  and  L   Veltri},
  booktitle = {6-th International Workshop on Hot Topics in P2P systems (Hot-P2P 2009)},
  doi = {10.1109/IPDPS.2009.5160958},
  link = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5160958},
  pages = {1--8},
  publisher = {IEEE},
  title = {Peer-to-Peer Beyond File Sharing: Where are P2P Systems Going?},
  year = {2009}
}
@misc{11572_17248,
  abstract = {San Francesco, CA, USA},
  author = {WENG W  and  GERLA M  and  R  LO CIGNO},
  booktitle = {IEEE Globecom 2000},
  title = {Bandwidth feedback control of TCP and real time sources in the Internet},
  year = {2000}
}
@conference{11572_17249,
  abstract = {New Orleans, Louisiana, USA},
  author = {AJMONE MARSAN M  and  DE CAROLIS G  and  LEONARDI E  and  R  LO CIGNO  and  MEO M},
  booktitle = {IEEE ICC 2000},
  title = {Approximate Markovian Models of Cellular Mobile Telephone Networks with Customer Retrials},
  year = {2000}
}
@misc{11572_18134,
  address = {PHOENIX, AZ, USA},
  author = {V T  Nguyen  and  R  Lo Cigno  and  Y  Ofek},
  booktitle = {IEEE INFOCOM 2008},
  doi = {10.1109/INFOCOM.2008.243},
  keyword = {fractional lambda switching; maximum scheduling delay; optical fibre network; pipeline packet forwarding; sub-lambda switching; time blocking probability analysis; time-driven switching network; optical fibre networks; optical switches; probability; scheduling},
  link = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4509838&tag=1},
  pages = {1804--1812},
  publisher = {IEEE},
  title = {Time Blocking Analysis in Time-driven Switching Networks},
  year = {2008}
}
@misc{11572_18702,
  address = {Berlin},
  author = {R  Battiti  and  M  Conti  and  R  Lo Cigno},
  publisher = {Springer},
  title = {Wireless On-Demand Network Systems: First IFIP TC6 Working Conference, WONS 2004, Madonna di Campiglio, Italy, January 21-23, 2004: Proceedings},
  volume = {2928},
  year = {2005}
}
@misc{11572_18740,
  address = {Amsterdam},
  author = {N  Abu-Ghazaleh  and  E  Alba  and  C -F  Chiasserini  and  R  Lo Cigno},
  link = {http://www.sciencedirect.com/science?_ob=QuickLinksURL&_method=createIntLink&_type=pubHome&_pubType=J&_key=%23toc%236234%232008%23999479998%23674293%23FLA%23&_acct=C000053963&_version=1&_userid=1613343&md5=1483910f9432b4fab36616fbaa14b6ac},
  pages = {1--213},
  publisher = {Elsevier},
  title = {'Performance of Wireless Networks'},
  volume = {52, Issue 1 (1)},
  year = {2008}
}
@conference{11572_20560,
  author = {Lo Cigno R.},
  booktitle = {Workshop on Performance Modelling and Evaluation of ATM & IP proceeding},
  title = {QoS Routing Strategies when Link State Information is Out-of-Date},
  year = {2000}
}
@misc{11572_23128,
  address = {Berlin},
  author = {R  Battiti  and  M  Conti  and  R  Lo Cigno},
  publisher = {Springer},
  title = {Wireless On-Demand Network Systems: First IFIP TC6 Working Conference, WONS 2004, Madonna di Campiglio, Italy, January 21-23, 2004: Proceedings},
  volume = {2928},
  year = {2004}
}
@article{11572_24579,
  author = {E  Bahya  and  R  Lo Cigno  and  S  Rasmussen},
  journal = {ESA JOURNAL},
  pages = {145--160},
  title = {Validation Tests of TOPSIM IV},
  volume = {249},
  year = {1993}
}
@inbook{11572_28546,
  address = {USA},
  author = {C  Kiraly  and  S  Teofili  and  G  Bianchi  and  R  Lo Cigno  and  M  Nardelli  and  E  Delzeri},
  booktitle = {The Future of Identity in the Information Society},
  doi = {10.1007/978-0-387-79026-8_22},
  pages = {311--324},
  publisher = {Springer},
  title = {Traffic Flow Confidentiality in IPsec:Protocol and Implementation},
  year = {2008}
}
@conference{11572_35839,
  address = {Berlin / Heidelberg},
  author = {M  Mellia  and  A  Carpani  and  R  Lo Cigno},
  booktitle = {Quality of Service in Multiservice IP Networks},
  pages = {145--157},
  publisher = {Springer},
  title = {TStat: TCP statistic and analisys tool},
  year = {2003}
}
@conference{11572_40255,
  address = {New York, NY},
  author = {E  Salvadori  and  R  Lo Cigno  and  Z  Zsoka},
  booktitle = {Towards the broadband-for-all era: 2005 Conference on Optical Network Design and Modelling, [ONDM 2005]},
  doi = {10.1109/ONDM.2005.1427000},
  link = {http://www.elet.polimi.it/conferences/ondm2005/},
  pages = {185--196},
  publisher = {IEEE},
  title = {Dynamic Grooming in IP over WDM Networks: A Study with Realistic Traffic based on GANCLES Simulation Package},
  year = {2005}
}
@article{11572_44996,
  author = {G  Albertengo  and  F  Borgonovo  and  P  Civera  and  L  Fratta  and  R  Lo Cigno  and  G  Panizzardi  and  G  Piccinini  and  M  Zamboni},
  journal = {EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS},
  pages = {233--240},
  title = {Deflection Network: Principles, Implementation, Services},
  volume = {3},
  year = {1992}
}
@conference{11572_45379,
  author = {M  Mellia  and  A  Carpani  and  R  Lo Cigno},
  booktitle = {Planet-IP & Nebula Joint Workshop},
  link = {http://www.telematica.polito.it/planet-ip/index.html},
  title = {Measuring IP and TCP behavior on a Edge Node},
  year = {2002}
}
@conference{11572_45736,
  address = {Londra},
  author = {C  Kiraly  and  M  Garetto  and  R  Lo Cigno  and  M  Meo  and  M  Ajmone Marsan},
  booktitle = {Performance modelling and evaluation of heterogeneous networks (HetNet 2003)},
  pages = {1--17},
  publisher = {University of Bradford},
  title = {Computation of the completion time distribution of short-Lived TCP connections},
  year = {2003}
}
@inbook{11572_46971,
  address = {USA},
  author = {M  Gerla  and  W  Weng  and  R  Lo Cigno},
  booktitle = {Local and Metropolitan Area Networks, 1999. Selected Papers. 10th IEEE Workshop on},
  pages = {11--17},
  publisher = {IEEE},
  title = {Enforcing fairness with explicit network feedback in the Internet},
  year = {2001}
}
@article{11572_47871,
  author = {R  Lo Cigno  and  D  Carra  and  E  W  Biersack  and  P  Rodriguez  and  P  Felber},
  journal = {COMPUTER NETWORKS},
  pages = {901--917},
  title = {Overlay Architectures for File Distribution: Fundamental Performance Analysis for Homogeneous and Heterogeneous Cases},
  volume = {51},
  year = {2007}
}
@conference{11572_48195,
  address = {Berlin/heidelberg},
  author = {M  Bagnus  and  R  Lo Cigno},
  booktitle = {Lecture Notes in Computer Science},
  pages = {405--418},
  publisher = {Springer},
  title = {TCP-SACK analysis and imprevement through OMQN models},
  year = {2003}
}
@inbook{11572_48459,
  address = {Nowell, MA, USA},
  author = {Lo Cigno R.},
  booktitle = {Performance Modelling and Applications of ATM Networks},
  pages = {309--331},
  publisher = {Kluwer},
  title = {Wireless ATM: An Introduction and Performance Issues},
  year = {2000}
}
@conference{11572_48483,
  address = {Berlin/Heidelberg},
  author = {R  Fracchia  and  M  Garetto  and  R  Lo Cigno},
  booktitle = {Lecture Notes in Computer Science},
  doi = {10.1007/3-540-36480-3_28},
  pages = {392--404},
  publisher = {Springer},
  title = {A queueing network model of short-lived TCP flows with mixed wired and wireless access links},
  year = {2003}
}
@conference{11572_49594,
  address = {Piscataway, NJ},
  author = {M  Garetto  and  M  Ajmone Marsan  and  M  Meo  and  R  Lo Cigno},
  booktitle = {GLOBECOM ’03: IEEE Global Telecommunications Conference},
  doi = {10.1109/GLOCOM.2003.1258813},
  pages = {3133--3137},
  publisher = {IEEE},
  title = {On the use of fixed point approximations to study reliable protocols over congested links},
  year = {2004}
}
@article{11572_50293,
  author = {M  Ajmone Marsan  and  A  Bianco  and  C  Casetti  and  C  Chiasserini  and  A  Francini  and  R  Lo Cigno  and  M  Munafo`},
  journal = {COMPUTER NETWORKS},
  pages = {2165--2185},
  title = {An Integrated Simulation Environment for the Analysis of ATM Networks at Multiple Time Scales},
  volume = {29},
  year = {1998}
}
@conference{11572_52171,
  address = {Torino},
  author = {C  Casetti  and  G  Mardente  and  M  Mellia  and  M  Munafo`  and  R  Lo Cigno},
  booktitle = {proceeding of HPSR'03},
  pages = {215--220},
  publisher = {IEEE},
  title = {On-line routing optimization for MPLS-based IP networks},
  year = {2003}
}
@article{11572_58051,
  author = {M  Ajmone Marsan  and  R  Lo Cigno  and  M  Meo  and  E  De Sousza E Silva},
  journal = {TELECOMMUNICATION SYSTEMS},
  pages = {341--368},
  title = {A Markovian model for TCP over ATM},
  volume = {12},
  year = {1999}
}
@article{11572_60659,
  author = {M  Ajmone Marsan  and  A  Bianco  and  T  Do  and  L  Jereb  and  R  Lo Cigno  and  M  Mufanò},
  journal = {PERFORMANCE EVALUATION},
  pages = {137--159},
  title = {ATM Simulation with CLASS},
  volume = {24},
  year = {1995}
}
@article{11572_62489,
  author = {VIET-THANG NGUYEN  and  R  LO CIGNO  and  Y  OFEK},
  doi = {10.1109/TCOMM.2008.060707},
  journal = {IEEE TRANSACTIONS ON COMMUNICATIONS},
  pages = {957--967},
  title = {Tunable Laser-based Design and Analysis for Fractional Lambda Switches},
  volume = {56},
  year = {2008}
}
@conference{11572_63724,
  author = {P  Larcheri  and  R  Lo Cigno},
  booktitle = {IEEE WONS 2006},
  link = {http://citi.insa-lyon.fr/wons2006/},
  title = {Scheduling in 802.11e: Open-Loop or Closed-Loop?},
  year = {2006}
}
@article{11572_65838,
  abstract = {Special Issue on Performance Modelling and Evaluation of ATM Networks},
  author = {C  Casetti  and  R  Lo Cigno  and  M  Mellia},
  doi = {10.1016/S1389-1286(00)00104-3},
  journal = {COMPUTER NETWORKS},
  pages = {169--180},
  title = {Load-Balancing Solutions for Static Routing Schemes in ATM Networks},
  volume = {34},
  year = {2000}
}
@conference{11572_67214,
  abstract = {Multicast operations across wireless networks have received much attention, involving network architectures that range from ad-hoc networks to structured multi-hop meshes layouts.
The use for this purpose of the standard Protocol Independent Multicast (PIM) protocol suite has been dismissed as non practical, or non feasible, noting that its straightforward application across wireless networks does not function properly. In this work, we analyze the reasons why PIM standard based implementations improperly interact when employed across wireless networks.
We propose simple fixes that do not require modifications of the standard, but entail only minor modifications of the underlying implementation.
We evaluate the Dense Mode version of PIM through its implementation in a network that is modeled by using the ns-3 simulation program.
We present performance results that confirm the effective operation of the protocol, as well as identify the involved overhead levels, in mesh networks that employ fixed mesh routers and both fixed and mobile end-user/clients.},
  address = {San Diego, CA, USA},
  author = {A  Russo  and  R  Lo Cigno  and  I  Rubin},
  booktitle = {International Conference on Computing, Networking and Communications (ICNC 2013)},
  doi = {10.1109/ICCNC.2013.6504156},
  keyword = {ad hoc networks; multicast protocols; PIM standard-based implementations; dense mode version; fixed end-user client; mobile end-user client; multicast operations; ns-3 simulation program; overhead levels; standard PIM protocol; standard protocol independent multicast protocol; structured multihop mesh layout; wireless networks; Routing protocols},
  link = {http://www.conf-icnc.org/2013/},
  pages = {610--615},
  publisher = {IEEE},
  title = {Protocol Independent Multicast: From Wired to Wireless Networks},
  year = {2013}
}
@conference{11572_67215,
  abstract = {Multicast video streaming is experiencing a signifi- cant growth in wireless networks thanks to the resources provided by 4G/LTE and WiFi services. However, wireless communications are affected by attenuation, shadowing, fading, and unpredictable interference, that make multicast services extremely difficult (no ARQ). Nodes close to the streaming source (e.g., a node or an AP), however, always experience better signal quality than those farther away, so that some nodes can be expected to receive most of the stream, while others will not. In this paper we present PULLCAST, a cooperative protocol for multicast systems, where nodes receive video chunks via multicast from a streaming point, and cooperate at the application level, by building a local, lightweight, P2P overlay that support unicast recovery of chunks not correctly received via multicast. PULLCAST send 1-hop hello messages to build a local neighborhood where chunks can be retrieved sending unicast messages to “pull” a chunk form a neighbor that has it. We show that our solution improves the system performances both in scenarios where the mesh is highly structured, so that recovery of chunks is limited to the equivalent of an 802.11 BSS and in more complex scenarios where the mesh nodes offer connectivity to clients in a seamless network using a single radio channel.},
  address = {Banff, AB, CA},
  author = {A  Russo  and  R  Lo Cigno},
  booktitle = {2013 10th Annual Conference on Wireless On-demand Network Systems and Services (WONS)},
  doi = {10.1109/WONS.2013.6578322},
  keyword = {cooperative communication; multicast protocols; overlay networks; peer-to-peer computing; radio receivers; video streaming; wireless channels; wireless mesh networks; 1-hop hello message; 4G-LTE service; IEEE 802.11 BSS; P2P overlay; PULLCAST; WiFi service; attenuation; cooperative protocol; fading; peer-assisted video streaming multicasting; seamless network; sending unicast message retrieval; shadowing; single radio channel; unicast recovery; unpredictable interference; video chunk receiver; wireless communication; wireless mesh network; IEEE 802.11 Standards; Protocols; Signal to noise ratio; Streaming media; Unicast; Routing protocols; Wireless networks},
  link = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6578322},
  pages = {60--67},
  publisher = {IEEE},
  title = {PullCast: Peer-assisted Video Multicasting for Wireless Mesh Networks},
  year = {2013}
}
@conference{11572_67216,
  abstract = {We study the effect of radio signal shadowing dynamics, caused by vehicles and by buildings, on the performance of beaconing protocols in Inter-Vehicular Communication (IVC). Recent research indicates that beaconing, i.e., one hop message broadcast, shows excellent characteristics and can outperform other communication approaches for both safety and efficiency applications, which require low latency and wide area information dissemination, respectively. We show how shadowing dynamics of moving obstacles hurt IVC, reducing the performance of beaconing protocols. At the same time, shadowing also limits the risk of overloading the wireless channel. To the best of our knowledge, this is the first study identifying the problems and resulting possibilities of such dynamic radio shadowing. We demonstrate how these challenges and opportunities can be taken into account and outline a novel approach to dynamic beaconing. It provides low-latency communication (i.e., very short beaconing intervals), while ensuring not to overload the wireless channel. The presented simulation results substantiate our theoretical considerations.},
  address = {Turin, Italy},
  author = {C  Sommer  and  S  Joerer  and  M  Segata  and  Ozan K   Tonguz  and  R  Lo Cigno  and  F   Dressler},
  booktitle = {32nd IEEE Conference on Computer Communications (INFOCOM 2013)},
  doi = {10.1109/INFCOM.2013.6566745},
  link = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6556116},
  pages = {110--114},
  publisher = {IEEE},
  title = {How Shadowing Hurts Vehicular Communications and How Dynamic Beaconing Can Help},
  year = {2013}
}
@article{11572_67217,
  abstract = {In traditional networks special efforts are put to secure the perimeter with firewalls: particular routers that analyze and filter the traffic to separate zones with different levels of trust. In wireless multi-hop networks the perimeter is a concept extremely hard to identify, thus, it is much more effective to enforce control on the nodes that will route more traffic. But traffic filtering and traffic analysis are costly activities for the limited resources of mesh nodes, so a trade-off must be reached limiting the number of nodes that enforce them. This work shows how, using the OLSR protocol, the centrality of groups of nodes with reference to traffic can be estimated with high accuracy independently of the network topology or size. We also show how this approach greatly limits the impact of an attack to the network using a number of firewalls that is only a fraction of the available nodes.},
  author = {L  Maccari  and  R  Lo Cigno},
  doi = {10.1016/j.jcss.2013.06.018},
  journal = {JOURNAL OF COMPUTER AND SYSTEM SCIENCES},
  link = {http://www.sciencedirect.com/science/article/pii/S002200001300127X},
  pages = {670--685},
  title = {Betweenness estimation in OLSR-based multi-hop networks for distributed filtering},
  volume = {80},
  year = {2014}
}
@article{11572_67218,
  abstract = {Firewalls are network devices dedicated to analyzing and filtering the traffic in order to separate network segments with different levels of trust. Generally, they are placed on the network perimeter and are used to separate the intranet from the Internet. Firewalls are used to forbid some protocols, to shape the bandwidth resources, and to perform deep packet inspection in order to spot malicious or unauthorized contents passing through the network. In a wireless multihop network, the concept of perimeter is hard to identify and the firewall function must be implemented on every node together with routing. But when the network size grows, the rule-set used to configure the firewall may grow accordingly and introduce latencies and instabilities for the low-power mesh nodes. We propose a novel concept of firewall in which every node filters the traffic only with a portion of the whole rule-set in order to reduce its computational burden. Even if at each hop we commit some errors, we show that the filtering efficiency measured for the whole network can achieve the desired precision, with a positive effect on the available network resources. This approach is different from the protection of a space behind a wall: we use the term waterwall to indicate a distributed and homogeneous filtering function spread among all the nodes in the network.},
  author = {Leonardo Maccari  and  Renato Lo  Cigno},
  doi = {10.1186/1687-1499-2013-225},
  journal = {EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING},
  link = {http://jwcn.eurasipjournals.com/content/2013/1/225},
  pages = {1--12},
  title = {Waterwall: a cooperative, distributed firewall for wireless mesh networks},
  volume = {2013},
  year = {2013}
}
@conference{11572_67219,
  address = {Cambridge, MA, US},
  author = {M   Arumaithurai  and  J  Seedorf  and  M  Dusi  and  E  Monticelli  and  R  Lo Cigno},
  booktitle = {12th IEEE International Symposium on Network Computing and Applications (NCA 2013)},
  doi = {10.1109/NCA.2013.26},
  keyword = {client-server systems; quality of experience; scheduling; QoE-driven scheduling; application-dependent QoE threshold; client session; delay-sensitive applications; dynamically-changing bandwidth requirements; dynamically-changing delay requirements; dynamically-changing inner applications; hybrid scheduling scheme; persistent thin-client traffic flow prioritization; preferential thin-client flow treatment; quality-of-experience; remote data-centers; statistical mechanisms; thin-client connections; thin-client deployments; thin-client protocols; traffic encryption; virtual PC; Bandwidth; Middleboxes; Protocols; Prototypes; Servers; Streaming media; CLoud Service Acceleration; Thin Client Acceleration},
  link = {http://www.ieee-nca.org/},
  pages = {203--210},
  publisher = {IEEE},
  title = {Quality-of-Experience Driven Acceleration of Thin Client Connections},
  year = {2013}
}
@article{11572_67220,
  abstract = {Automated platooning is one of the most challenging fields in the domain of ITS. Conceptually, platooning means creating clusters of vehicles which closely follow each other autonomously without action of the driver, neither for accelerating, nor for braking.

This leads to several important benefits from substantially improved road throughput to increased safety. The control of such platoons depends on two components: First, radar is typically to be used to control the distance between the vehicles, and secondly, IVC helps managing the entire platoon allowing cars to join or to leave the group whenever necessary. Platooning systems have been mostly investigated in controlled environments such as dedicated highways with centralized management. However, platooning-enabled cars will be deployed gradually and might have to travel on highways together with other non-automated vehicles. We developed a combined traffic and network simulator for studying strategies and protocols needed for managing platoons in such mixed scenarios. We show the models needed and present first results using a simple IVC-based platoon management as a proof of concept.},
  author = {M  Segata  and  F  Dressler  and  R  Lo Cigno  and  M  Gerla},
  doi = {10.1145/2436196.2436218},
  journal = {MOBILE COMPUTING AND COMMUNICATIONS REVIEW},
  link = {http://dl.acm.org/citation.cfm?id=2436218},
  pages = {46--49},
  title = {A Simulation Tool for Automated Platooning in Mixed Highway Scenarios},
  volume = {16},
  year = {2012}
}
@article{11572_67221,
  abstract = {Safety applications are among the key drivers in VANET research, and their true performance can be assessed only if the application and the communication network are jointly considered. This work presents a simulation study of an emergency braking application accomplished by embedding mobility, cars’ dynamic, and drivers’ behavior models into a detailed networking simulator (ns-3). The overall system allows capturing the interactions of the communications with the car’s automated braking mechanism and the driver’s behavior. At the same time yields very detailed information on the communication level. Besides the integrated tool, the paper presents a novel and simple message aggregation mechanism to empower message re-propagation while controlling the network congestion during the peak load due to the emergency braking. Next it discusses the effectiveness of such applications as a function of the market penetration rate, showing that even cars that are not equipped with communication devices benefit from the smoother and earlier reaction of the cars that can communicate. Fading phenomena and sensitivity to the radio transmitted power are analyzed, while fine grained dynamics of cars’ collisions as taking into account different masses and different elastic coefficients are introduced to evaluate the severity of impacts.},
  author = {Michele Segata  and  Renato Lo Cigno},
  doi = {10.1109/TVT.2013.2277802},
  journal = {IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY},
  keyword = {Acceleration; Accidents; Protocols; Safety; Vehicle dynamics; Vehicles; Vehicular ad hoc networks; VANET; automated braking system; emergency braking control; ns-3 simulation; rebroadcast schemes; vehicular networks},
  link = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6576926},
  pages = {4150--4161},
  title = {Automatic Emergency Braking: Realistic Analysis of Car Dynamics and Network Performance},
  volume = {62},
  year = {2013}
}
@conference{11572_67222,
  abstract = {Simulations play a fundamental role for the eval- uation of vehicular network communication strategies and ap- plications’ effectiveness. Therefore, the vehicular networking community is continuously seeking more realistic channel and reception models to provide more reliable results, yet maintaining scalability in terms of computational effort. We investigate the effects of vehicle shadowing on IEEE 802.11p based communica- tion. In particular, we perform a set of real world measurements on a freeway and study the impact of different obstructing vehicles on the received signal power distribution. Different vehicle types not only affect the average received power, but also its distribution, suggesting that the attenuation characteristics of the simulation model need to be tailored to the type of vehicle that is obstructs the communication path. Based on these observations, we propose a novel way to compose shadowing and fading models to reproduce the observed effects.},
  address = {Boston, MA, USA},
  author = {M  Segata  and  B  Bloessl  and  S  Joerer  and  C  Sommer  and  R  Lo Cigno  and  F  Dressler},
  booktitle = {5th IEEE Vehicular Networking Conference (VNC 2013)},
  doi = {10.1109/VNC.2013.6737623},
  link = {http://www.ieee-vnc.org/},
  pages = {242--245},
  publisher = {IEEE},
  title = {Vehicle Shadowing Distribution Depends on Vehicle Type: Results of an Experimental Study},
  year = {2013}
}
@article{11572_69265,
  abstract = {This paper proposes a new methodology to model the distribution of finite size content  to a group of users connected through an overlay network.

Our methodology describes the distribution process as a constrained stochastic graph process (CSGP), where the constraints  dictated by the content distribution protocol and the characteristics of the overlay network define the interaction among nodes. A CSGP is a semi-Markov process whose state is described by the graph itself. CSGPs offer a powerful description technique that can be exploited by Monte Carlo integration methods to compute in a  very efficient way not only the mean but also the full distribution of metrics such as the file download times or number of hops from the source to the receiving nodes.

We model several distribution architectures based on trees and meshes as CSGPs and solve them numerically. We are able to study scenarios with a very large number of nodes and we can precisely quantify the performance differences between the tree- and mesh-based distribution architectures.},
  author = {D  Carra  and  R  Lo Cigno  and  E  W  Biersack},
  doi = {10.1109/TPDS.2007.1114},
  journal = {IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS},
  pages = {247--261},
  title = {Stochastic Graph Processes for Performance Evaluation of Content Delivery Applications in Overlay Networks},
  volume = {vol. 19},
  year = {2008}
}
@article{11572_69664,
  author = {L  Muscariello  and  M  Meo  and  M  Mellia  and  M  Ajmone Marsan  and  R  Lo Cigno},
  journal = {COMPUTER COMMUNICATIONS},
  pages = {1835--1851},
  title = {Markov Models of Internet Traffic and a New Hierarchical MMPP Model},
  volume = {28},
  year = {2005}
}
@article{11572_69670,
  author = {M  Mellia  and  R  Lo Cigno  and  F  Neri},
  journal = {COMPUTER NETWORKS},
  pages = {1--21},
  title = {Measuring IP and TCP behavior on edge nodes with Tstat},
  volume = {47},
  year = {2005}
}
@article{11572_69946,
  abstract = {This paper studies fundamental properties of stream-based content distribution services. We assume the presence of an overlay network (such as those built by P2P systems) with limited degree of connectivity, and we develop a mathematical model that captures the essential features of overlay-based streaming protocols and systems.
The methodology is based on stochastic graph theory, and models the streaming system as a stochastic process, whose characteristics are related to the streaming protocol. The model captures the elementary properties of the streaming system such as the number of active connections, the different play-out delay of nodes, and the probability of not receiving the stream due to node failures/misbehavior. Besides the static properties, the model is able to capture the transient behavior of the distribution graphs, i.e., the evolution of the structure over time, for instance in the initial phase of the distribution process.
Contributions of this paper include a detailed definition of the methodology, its comparison with other analytical approaches and with simulative results, and a discussion of the additional insights enabled by this methodology. Results show that mesh based architectures are able to provide bounds on the receiving delay and maintain rate fluctuations due to system dynamics very low. Additionally, given the tight relationship between the stochastic process and the properties of the distribution protocol, this methodology gives basic guidelines for the design of such protocols and systems.},
  author = {D  Carra  and  R  Lo Cigno  and  E  W  Biersack},
  doi = {10.1109/JSAC.2007.071206},
  journal = {IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS},
  pages = {1667--1677},
  title = {Graph Based Analysis of Mesh Overlay Streaming Systems},
  volume = {25},
  year = {2007}
}
@article{11572_7041,
  author = {E W Biersack  and  D Carra  and  R  Lo Cigno  and  P  Rodriguez  and  P Felber},
  doi = {10.1016/j.comnet.2006.06.011},
  journal = {COMPUTER NETWORKS},
  link = {http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6VRG-4KHBB0H-2&_user=1613343&_coverDate=02%2F21%2F2007&_rdoc=1&_fmt=high&_orig=search&_origin=search&_sort=d&_docanchor=&view=c&_searchStrId=1633213958&_rerunOrigin=google&_acct=C000053963&_version=1&_urlVersion=0&_userid=1613343&md5=5b7d86227988695299f8b2c5e74d1172&searchtype=a},
  pages = {901--917},
  publisher = {Elsevier BV:PO Box 211, 1000 AE Amsterdam Netherlands:011 31 20 4853757, 011 31 20 4853642, 011 31 20 4853641, EMAIL: nlinfo-f@elsevier.nl, INTERNET: http://www.elsevier.nl, Fax: 011 31 20 4853598},
  title = {Overlay Architectures for File Distribution: Fundamental Performance Analysis for Homogeneous and Heterogeneous Cases},
  volume = {51},
  year = {2007}
}
@article{11572_70901,
  author = {M  Ajmone Marsan  and  A  Bianco  and  R  Lo Cigno  and  M  Munafo`  and  M  Baldi},
  journal = {SIMULATION},
  pages = {219--230},
  title = {Performance of transport protocols over ATM networks},
  volume = {78},
  year = {2002}
}
@article{11572_70945,
  author = {E  Salvadori  and  R  Lo Cigno  and  Z  Zsoka},
  journal = {OPTICAL SWITCHING AND NETWORKING},
  pages = {118--133},
  title = {Dynamic grooming in IP over optical networks based on the overlay architecture},
  volume = {3},
  year = {2006}
}
@article{11572_70977,
  author = {F  Blanchini  and  R  Lo Cigno  and  R  Tempo},
  journal = {IEEE-ACM TRANSACTIONS ON NETWORKING},
  pages = {644--652},
  title = {Robust Rate Control for Integrated Services Packet Networks},
  volume = {10},
  year = {2002}
}
@article{11572_71267,
  author = {M  Ajmone Marsan  and  G  De Carolis  and  E  Leonardi  and  R  Lo Cigno  and  M  Meo},
  journal = {IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS},
  pages = {332--346},
  title = {Efficient Estimation of Call Blocking Probabilities in Cellular Mobile Telephony Networks with Customer Retrials},
  volume = {19},
  year = {2001}
}
@article{11572_71840,
  abstract = {Śpecial Issue on Mobility and Location: A European Perspective,́ No. 5},
  author = {M  Ajmone Marsan  and  C  Chiasserini  and  A  Fumagalli  and  R  Lo Cigno  and  M  Munafo`},
  journal = {IEEE WIRELESS COMMUNICATIONS},
  pages = {16--24},
  title = {Local and Global Handovers for Mobility Management in Wireless ATM Networks},
  volume = {4},
  year = {1997}
}
@article{11572_72331,
  author = {C  Kiraly  and  M  Garetto  and  M  Meo  and  M  Ajmone Marsan  and  R  Lo Cigno},
  journal = {PERFORMANCE EVALUATION},
  pages = {179--197},
  title = {Analytical Computation of Completion Time Distributions of Short-Lived TCP Connections},
  volume = {59},
  year = {2005}
}
@article{11572_73071,
  author = {R  Lo Cigno  and  G  Procissi  and  M  Gerla},
  journal = {CLUSTER COMPUTING},
  pages = {35--45},
  title = {Sender-Side TCP Modifications: Performance Analysis and Design Guidelines},
  volume = {8},
  year = {2005}
}
@article{11572_73151,
  author = {M  Ajmone Marsan  and  C  Chiasserini  and  A  Fumagalli  and  R  Lo Cigno  and  M  Munafo`},
  journal = {WIRELESS NETWORKS},
  pages = {28--36},
  title = {Local and Global Handover Based on In-BandSignaling in Wireless ATM Networks},
  volume = {2},
  year = {1998}
}
@article{11572_73225,
  author = {R  Battiti  and  R  Lo Cigno  and  F  Orava  and  B  Pehrson  and  M  Sabel},
  journal = {JOURNAL ON SPECIAL TOPICS IN MOBILE NETWORKS AND APPLICATIONS},
  pages = {275--287},
  title = {Wireless LANs: from WarChalking to Open Access Networks},
  volume = {10},
  year = {2005}
}
@article{11572_73290,
  author = {M  Ajmone Marsan  and  G  De Carolis  and  E  Leonardi  and  R  Lo Cigno  and  M  Meo},
  journal = {TELECOMMUNICATION SYSTEMS},
  pages = {53--62},
  title = {An approximate model for the computation of blocking probabilities in cellular networks with repeated calls},
  volume = {15},
  year = {2000}
}
@article{11572_73416,
  abstract = {This paper presents a new analytical model for the estimation of the performance of TCP connections. The model is based on the description of the behavior of TCP in terms of a closed queueing network. The model is very accurate, deriving directly from the finite state machine description of the protocol. The as- sessment of the accuracy of the analytical model is based on com- parisons against detailed simulation experiments developed with the ns-2 package. The protocol model interacts with an IP network model that can take into account meshed topologies with several bottlenecks.
Numerical results indicate that the proposed closed queueing network model provides accurate performance estimates in all situations. A novel and interesting property of the model is the possibility of deriving ensemble distributions of relevant parameters, such as, for instance, the transmission window size or the timeout probability, which provide useful insight into the protocol behavior and properties.},
  author = {M  Garetto  and  R  Lo Cigno  and  M  Meo  and  M  Ajmone Marsan},
  doi = {10.1109/TNET.2004.826297},
  journal = {IEEE-ACM TRANSACTIONS ON NETWORKING},
  pages = {300--313},
  title = {Closed Queuing Network Models of Interacting Long-Lived TCP Flows},
  volume = {12},
  year = {2004}
}
@conference{11572_73664,
  address = {Berlin / Heidelberg},
  author = {M  Garetto  and  R  Lo Cigno  and  M  Ajmone Marsan  and  M  Meo},
  booktitle = {Evolutionary Trends of the Internet},
  pages = {536--555},
  publisher = {Springer},
  title = {On the Use of Queueing Network Models to Predict the Performance of TCP Connections},
  volume = {2170},
  year = {2001}
}
@conference{11572_73688,
  address = {Piskaway, NJ},
  author = {C  Casetti  and  R  Lo Cigno  and  M  Mellia  and  M  Munafo`  and  Z  Zsoka},
  booktitle = {2001 IEEE Workshop on High Performance Switching and Routing (HPSR 2001)},
  pages = {1895--1897},
  publisher = {IEEE press},
  title = {Routing Algorithms Evaluation for Elastic Traffic},
  year = {2001}
}
@article{11572_73800,
  author = {M  Gerla  and  R  Lo Cigno  and  S  Mascolo  and  W  Weng},
  journal = {EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS},
  pages = {549--562},
  title = {Generalized Window Advertising for TCP Congestion Control},
  volume = {10},
  year = {2002}
}
@article{11572_73804,
  author = {C  F  Chiasserini  and  R  Lo Cigno},
  journal = {IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS},
  pages = {87--100},
  title = {Handovers in Wireless ATM Networks: In-Band Signaling Protocols and Performance Analysis},
  volume = {1},
  year = {2002}
}
@article{11572_73868,
  author = {M  Ajmone Marsan  and  C  F  Chiasserini  and  A  Fumagalli  and  R  Lo Cigno  and  M  Munafò},
  journal = {WIRELESS NETWORKS},
  pages = {425--436},
  title = {Local and Global Handover Based on In-Band Signaling in Wireless ATM Networks},
  volume = {2},
  year = {2001}
}
@article{11572_74043,
  author = {M  Garetto  and  R  Lo Cigno  and  M  Meo  and  M  Ajmone Marsan},
  journal = {COMPUTER NETWORKS},
  pages = {153--176},
  title = {Modeling short-lived TCP connections with open multiclass queueing networks},
  volume = {44},
  year = {2004}
}
@article{11572_74196,
  author = {C  Casetti  and  R  Lo Cigno  and  M  Mellia  and  M  Munafo`  and  Z  Zsoka},
  journal = {COMPUTER NETWORKS},
  pages = {475--487},
  title = {A New Class of QoS routing strategies based on network graph reduction},
  volume = {41},
  year = {2003}
}
@article{11572_74766,
  author = {R  Lo Cigno  and  M  Gerla},
  journal = {PERFORMANCE EVALUATION},
  pages = {289--306},
  title = {Modeling Window Based Congestion Control Protocols with Many Flows},
  volume = {36},
  year = {1999}
}
@article{11572_74874,
  author = {R  Battiti  and  R  Lo Cigno  and  F  Orava  and  B  Pehrson},
  journal = {JOURNAL ON SPECIAL TOPICS IN MOBILE NETWORKS AND APPLICATIONS},
  pages = {275--287},
  title = {Global growth of open access networks: from warchalking and connection sharing to sustainable business},
  volume = {10},
  year = {2005}
}
@conference{11572_74952,
  address = {Amsterdam},
  author = {R  Lo Cigno  and  G  Procissi  and  M  Gerla},
  booktitle = {Cluster Computing},
  pages = {600--611},
  publisher = {Springer Netherlands},
  title = {Sender-side TCP modifications: an analytical study},
  volume = {2345},
  year = {2002}
}
@conference{11572_74976,
  address = {USA},
  author = {Z  Zsoka  and  R  Lo Cigno  and  B  Farkas},
  booktitle = {Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems},
  pages = {554--560},
  publisher = {SPECTS 2008},
  title = {Augmented Grooming in Networks with Elastic Traffic},
  year = {2008}
}
@conference{11572_74992,
  abstract = {This paper addresses the problem of evaluating routing algorithms via simulation in packet-switched networks when elastic traffic is involved. It highlights some deficiencies of classical approaches that fail to capture both the complex interactions of connections traversing multiple bottlenecks and common user behaviors. The paper describes an approach devised to overcome these limitations which is particularly suited for the evaluation of routing algorithms in presence of best-effort traffic. The simulation results presented offer a deeper insight into well-known routing algorithms. Through this analysis it is clear that quantitative and also qualitative behaviors of dynamic routing algorithms based on traffic measurements may be fairly different depending on the nature of the traffic loading the network, as well as depending on its interactions with the network parameters and behavior.},
  address = {Piskaway, NJ},
  author = {C  Casetti  and  R  Lo Cigno  and  M  Mellia  and  M  Munafò  and  Z  Zsoka},
  booktitle = {Proc. of IEEE Global Telecommunications Conference, 2001 - GLOBECOM '01},
  doi = {10.1109/GLOCOM.2001.965901},
  link = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=965901},
  pages = {1882--1885},
  publisher = {IEEE press},
  title = {A Realistic Model to Evaluate Routing Algorithms in the Internet},
  year = {2001}
}
@conference{11572_75022,
  address = {Piscataway, NY, USA},
  author = {F  Soldo  and  R  Lo Cigno  and  M  Gerla},
  booktitle = {Wireless on Demand Network Systems and Services},
  link = {http://ieeexplore.ieee.org/search/searchresult.jsp?queryText=%28gerla+%3Cin%3E+au%29+%3Cand%3E+%284457464+%3Cin%3E+punumber%29&coll2=ieeecnfs&coll3=ieecnfs&history=yes&reqloc=others&scope=au&imageField2.x=1&imageField2.y=3},
  pages = {125--132},
  publisher = {IEEE},
  title = {Cooperative Synchronous Broadcasting in Infrastructure-to-Vehicles Networks},
  year = {2008}
}
@conference{11572_75117,
  address = {Piscataway, NJ},
  author = {G  Costanzi  and  R  Lo Cigno  and  A  Ghittino  and  S  Annese},
  booktitle = {IEEE/IFIP WONS 2008: The Fifth Annual Conference on Wireless On demand Network Systems and Services},
  pages = {500--505},
  publisher = {IEEE},
  title = {Route Stabilization in Infrastructured Wireless Mesh Networks: an OLSRD Based Solution},
  year = {2008}
}
@conference{11572_75139,
  address = {Boston},
  author = {C  Kiraly  and  S  Teofili  and  G  Bianchi  and  R  Lo Cigno  and  M  Nardelli  and  E  Delzeri},
  booktitle = {The Future of Identity in the Information Society},
  link = {http://www.springerlink.com/content/q652715xq3421r21/},
  pages = {311--324},
  publisher = {Springer},
  title = {Traffic Flow Confidentiality in IPsec : Protocol and Implementation},
  volume = {262},
  year = {2008}
}
@conference{11572_75150,
  author = {R  Battiti  and  M  Brunato  and  R  Lo Cigno  and  A  Villani  and  R  Flor  and  G  Lazzari},
  booktitle = {Personal Wireless Communications 2003},
  pages = {163--168},
  title = {WILMA: an open lab for 802.11 hotspots},
  volume = {2775},
  year = {2003}
}
@conference{11572_75164,
  address = {Amsterdam},
  author = {C  Casetti  and  R  Lo Cigno  and  M  Mellia  and  M  Munafo`  and  Z  Zsoka},
  booktitle = {Computer Networks: The International Journal of Computer and Telecommunications Networking},
  pages = {475--487},
  publisher = {Elsevier North-Holland, Inc.},
  title = {A New Class of QoS Routing Strategies Based on Network Graph Reduction},
  volume = {Volume 41 ,  Issue 4  (March 2003)},
  year = {2003}
}
@conference{11572_75186,
  address = {Dublin, Ireland},
  author = {R  Lo Cigno  and  L  Palopoli  and  A  Colombo},
  booktitle = {Proc. of 32nd Annual IEEE Conference on Local Computer Networks (LCN  2007)},
  doi = {10.1109/LCN.2007.33},
  link = {http://www.ieeelcn.org/},
  pages = {455--462},
  publisher = {IEEE Computer Society},
  title = {Analysis of Different Scheduling Strategies in 802.11e Networks with Multi-Class Traffic},
  year = {2007}
}
@conference{11572_75204,
  address = {Piscataway},
  author = {L  Palopoli  and  R  Lo Cigno  and  A  Colombo},
  booktitle = {Proc.of 46th IEEE conference on decision and control},
  doi = {10.1109/CDC.2007.4434437},
  link = {http://iss.bu.edu/dac/dac/cdc/},
  pages = {4427--4432},
  publisher = {IEEE Control and Automation Society},
  title = {Control and Optimisation of HCCA 802.11e Access Scheduling},
  year = {2007}
}
@conference{11572_75223,
  address = {Piskaway},
  author = {M  Mellia  and  A  Carpani  and  R  Lo Cigno},
  booktitle = {Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE},
  pages = {2533--2537},
  publisher = {IEEE},
  title = {Measuring IP and TCP behavior on a Edge Node},
  year = {2002}
}
@conference{11572_75231,
  address = {Amsterdam},
  author = {M  Garetto  and  R  Lo Cigno  and  M  Meo  and  E  Alessio  and  M  Ajmone Marsan},
  booktitle = {Computer Networks: The International Journal of Computer and Telecommunications Networking},
  pages = {153--176},
  publisher = {Elsevier North-Holland, Inc.},
  title = {Modeling Short-Lived TCP Connections with Open Multiclass Queueing Networks},
  year = {2002}
}
@conference{11572_75314,
  abstract = {This paper presents a new analytical model for the estimation of the performance of TCP connections. The model is based on the description of the behavior of TCP-Tahoe in terms of a closed queueing network, whose solution can be obtained with very low cost, even when the number of TCP connections that interact over the underlying IP network is huge. The protocol model can be very accurate, deriving directly from the finite state machine description of the protocol. The assessment of the accuracy of the analytical model is based on comparisons against detailed simulation experiments developed with the ns-2 package. Numerical results indicate that the proposed closed queueing network model provides extremely accurate performance estimates, not only for average values, but even for distributions, in the case of the classical single-bottleneck configuration, as well as in more complex networking setups.},
  address = {Piskaway, NJ},
  author = {M  Garetto  and  R  Lo Cigno  and  M  Meo  and  M  Ajmone Marsan},
  booktitle = {In Proc. INFOCOM 2001 - 20-th IEEE Joint Conference of the Computer and Communications Societies},
  doi = {10.1109/INFCOM.2001.916668},
  link = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=916668&contentType=Conference+Publications},
  pages = {1706--1715},
  publisher = {IEEE Press},
  title = {A Detailed and Accurate Closed Queueing Network Model of Many Interacting TCP Flows},
  volume = {20},
  year = {2001}
}
@conference{11572_75328,
  address = {San Antonio (TX)},
  author = {M  Garetto  and  R  Lo Cigno  and  M  Meo  and  E  Alessio  and  M  Ajmone Marsan},
  booktitle = {proceeding of Globecom 2001},
  pages = {1788--1793},
  publisher = {IEEE Press},
  title = {Analytical Estimation of Completion Times of Mixed NewReno and Tahoe TCP Connections over Single and Multiple Bottleneck Networks},
  year = {2001}
}
@conference{11572_77497,
  address = {Berlin},
  author = {D  Carra  and  R  Lo Cigno  and  E  W  Biersack},
  booktitle = {IFIP Networking 2007},
  doi = {10.1007/978-3-540-72606-7_51},
  link = {http://networking2007.uncc.edu/},
  pages = {594--605},
  publisher = {Springer},
  title = {Graph Based Modeling of P2P Streaming Systems},
  volume = {4479},
  year = {2007}
}
@conference{11572_77974,
  address = {New York},
  author = {D  Carra  and  R  Lo Cigno  and  E  W  Biersack},
  booktitle = {IEEE Globecom 2006},
  link = {http://www.ieee-globecom.org/},
  pages = {2221--2225},
  publisher = {IEEE},
  title = {Content Delivery in Overlay Networks: a Stochastic Graph Processes Perspective},
  year = {2006}
}
@conference{11572_78036,
  address = {New York, N.Y.},
  author = {D  Carra  and  R  Lo Cigno  and  E  W  Biersack},
  booktitle = {GLOBECOM 2006: EXPO; 2006 Global Telecommunications Conference; 27 November - 1 December 2006, San Francisco, California, USA [Elektronische Ressource]},
  link = {http://www.ieee-globecom.org/},
  pages = {2256--2260},
  publisher = {IEEE},
  title = {Fast Stochastic Analysis of P2P File Distribution Architectures},
  year = {2006}
}
@conference{11572_78063,
  address = {New York, N.Y.},
  author = {V  T  Nguyen  and  R  Lo Cigno  and  Y  Ofek},
  booktitle = {Proceeding of the 25th Conference on Computer Communications, IEEE Infocom 2006},
  pages = {1--10},
  publisher = {IEEE},
  title = {Design and Analysis of Tunable Laser based Fractional Lambda Switching (FLS)},
  year = {2006}
}
@conference{11572_78114,
  abstract = {LNCS series, Springer},
  address = {Germania},
  author = {P  Laface  and  D  Carra  and  R  Lo Cigno},
  booktitle = {Quality of Service in Multiservice IP Networks: Third International Workshop, QoS-IP 2005, Catania, Italy, February 2-4, 2004, Catania, Italy, February 2-4, 2004. Proceedings},
  pages = {286--292},
  publisher = {Springer-Verlag GmbH},
  title = {A Performance Model for Multimedia Services Provisioning on Network Interfaces},
  year = {2005}
}
@conference{11572_78160,
  address = {Los Alamitos (CA)},
  author = {D  Carra  and  R  Lo Cigno},
  booktitle = {proceedings of WCW, 2005},
  pages = {112--117},
  publisher = {IEEE Computer Society},
  title = {Stochastic Analysis of Chain Based File Distribution Architectures with Heterogeneous Peers},
  year = {2005}
}
@conference{11572_78216,
  address = {Piscataway, NJ},
  author = {L  Muscariello  and  M  Mellia  and  M  Meo  and  M  Ajmone Marsan  and  R  Lo Cigno},
  booktitle = {2004 IEEE International Conference on Communications},
  pages = {2143--2147},
  publisher = {IEEE},
  title = {An MMPP-based Hierarchical Model of Internet Traffic},
  year = {2004}
}
@conference{11572_78290,
  address = {Los Alamitos (CA)},
  author = {V  T  Nguyen  and  M  Baldi  and  R  Lo Cigno  and  Y  Ofek},
  booktitle = {The 14th IEEE Workshop on Local and Metropolitan Area Networks, LANMAN 2005.},
  link = {http://www.ieee-lanman.org},
  pages = {10--15},
  publisher = {IEEE computer society},
  title = {Wavelength Swapping using Tunable Lasers for Fractional Lambda Switching},
  year = {2005}
}
@conference{11572_78350,
  abstract = {Dallas, TX, USA},
  address = {Piscataway, NJ},
  author = {R  Lo Cigno  and  E  Salvadori  and  Z  Zsoka},
  booktitle = {Globecom' 04: IEEE Global Telecommunications Conference},
  doi = {10.1109/GLOCOM.2004.1378336},
  pages = {1963--1967},
  publisher = {IEEE},
  title = {Elastic Traffic Effects on WDM Dynamic Grooming Algorithms},
  year = {2004}
}
@conference{11572_79168,
  address = {New York, N.Y.},
  author = {L  Abeni  and  C  Kiraly  and  R  Lo Cigno},
  booktitle = {3rd IEEE International Conference on Internet Multimedia Services Architecture and Applications},
  doi = {10.1109/IMSAA.2009.5439486},
  pages = {1--6},
  publisher = {IEEE},
  title = {Scheduling P2P Multimedia Streams: Can We Achieve Performance and Robustness?},
  year = {2010}
}
@conference{11572_79707,
  address = {USA},
  author = {C  Kiraly  and  R  Lo Cigno},
  booktitle = {IEEE International Conference on Communications (ICC '09)},
  doi = {10.1109/ICC.2009.5199102},
  pages = {2235--2239},
  publisher = {IEEE International Conference on Communications},
  title = {IPsec-Based Anonymous Networking: A Working Implementation},
  year = {2009}
}
@conference{11572_84518,
  address = {USA},
  author = {M  Ajelli  and  R  Lo Cigno  and  A  Montresor},
  booktitle = {Proceedings of the International Communications Conference (ICC'10)},
  pages = {1--5},
  publisher = {IEEE},
  title = {Modeling Botnets and Epidemic Malware},
  year = {2010}
}
@article{11572_84584,
  author = {G  Gheorghe  and  R  Lo Cigno  and  A  Montresor},
  doi = {10.1007/s12083.010.0070.6},
  journal = {PEER-TO-PEER NETWORKING AND APPLICATIONS},
  pages = {75--91},
  title = {Security and Privacy Issues in P2P Streaming Systems: A Survey},
  volume = {vol. 4},
  year = {2011}
}
@conference{11572_85130,
  abstract = {P2P TV distribution is going commercial, and the video quality delivered to users becomes of the utmost importance. However, the impact of P2P distribution on the video quality is not completely understood yet, especially in live streaming situations. This work addresses the impact of P2P distribution when the delay of the playout is limited, as it must be in any true live TV service. A methodology for the evaluation (using standard objective video quality metrics) is proposed, showing that different ways of grouping frames in chunks for the distribution can lead to very different quality when the system is overloaded.},
  address = {Piscataway, NJ},
  author = {C  Kiraly  and  L  Abeni  and  R  Lo Cigno},
  booktitle = {2010 IEEE International Conference on Communications},
  keyword = {QoE; Scheduling},
  pages = {1--5},
  publisher = {IEEE},
  title = {Effects of P2P Streaming on Video Quality},
  year = {2010}
}
@conference{11572_85131,
  address = {Piscataway, NJ},
  author = {L  Abeni  and  C  Kiraly  and  R  Lo  Cigno},
  booktitle = {2010 IEEE International Conference on Communications},
  doi = {10.1109/ICC.2010.5502542},
  pages = {1--5},
  publisher = {IEEE},
  title = {Robust Scheduling of Video Streams in Network-Aware P2P Applications},
  year = {2010}
}
@conference{11572_85321,
  address = {New York, NY},
  author = {L  Abeni  and  C  Kiraly  and  A  Russo  and  M  Biazzini  and  R  Lo  Cigno},
  booktitle = {Proceedings of the 2010 ACM workshop on Advanced video streaming techniques for peer-to-peer networks and social networking},
  doi = {10.1145/1877891.1877902},
  link = {http://portal.acm.org/citation.cfm?id=1877902},
  pages = {43--48},
  publisher = {ACM},
  title = {Design and Implementation of a Generic Library for P2P Streaming},
  year = {2010}
}
@conference{11572_85914,
  address = {New York, NY, USA},
  author = {D  Carra  and  R  Lo Cigno  and  E W  Biersack},
  booktitle = {IEEE Infocom 2005 Student Workshop},
  link = {http://www.ieee-infocom.org/2005/},
  pages = {1--2},
  publisher = {IEEE},
  title = {Introducing Heterogeneity in the Performance Analysis of P2P Networks for File Distribution},
  year = {2005}
}
@article{11572_85918,
  author = {C  Kiraly  and  M  Garetto  and  M  Meo  and  M  Ajmone Marsan  and  R  Lo Cigno},
  doi = {10.1016/j.peva.2004.07.002},
  journal = {PERFORMANCE EVALUATION},
  link = {http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V13-4D98N2W-1&_user=1613343&_coverDate=02%2F01%2F2005&_rdoc=1&_fmt=high&_orig=search&_origin=search&_sort=d&_docanchor=&view=c&_acct=C000053963&_version=1&_urlVersion=0&_userid=1613343&md5=a88965c50e9f39f7b59a05c4419752f4&searchtype=a},
  pages = {179--197},
  title = {Analytical Computation of Completion Time Distributions of Short-Lived TCP Connections},
  volume = {Vol.59},
  year = {2005}
}
@conference{11572_85930,
  address = {Piscataway, NJ},
  author = {C  Kiraly  and  R  Lo Cigno  and  L  Abeni},
  booktitle = {2010 IEEE Global Telecommunications Conference: GLOBECOM 2010},
  pages = {1--5},
  publisher = {IEEE},
  title = {Deadline-based Differentiation in P2P Streaming},
  year = {2010}
}
@conference{11572_85943,
  address = {Piscataway, NJ},
  author = {L  Abeni  and  A  Bakay  and  M  Biazzini  and  R  Birke  and  E  Leonardi  and  R  Lo Cigno  and  C  Kiraly  and  M  Mellia  and  S  Niccolini  and  J  Seedorf  and  T  Szemethy  and  G  Tropea},
  booktitle = {2010 IEEE International Conference on  Peer-to-Peer Computing: (P2P)},
  doi = {10.1109/P2P.2010.5569983},
  keyword = {ALTO like service; GRAPES; Internet; P2P TV system; buffer map; chunk ID set; chunk trading; generic library; generic resource aware P2P environment for streaming; network load; topology management; topology optimization},
  link = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5569983&tag=1},
  pages = {1--2},
  publisher = {IEEE},
  title = {Network Friendly P2P-TV: The Napa-Wine Approach},
  year = {2010}
}
@article{11572_88922,
  author = {Welponer M. and  Abeni L. and  Marchetto G. and  Lo Cigno R.},
  doi = {10.1002/spe.1134},
  journal = {SOFTWARE-PRACTICE & EXPERIENCE},
  title = {Measuring and reducing the impact of the operating system kernel on end-to-end latencies in synchronous packet switched networks},
  volume = {2011},
  year = {2011}
}
@article{11572_89765,
  abstract = {Peer to Peer streaming (P2P-TV) applications have recently emerged as cheap and efficient solutions to provide real time streaming services over the Internet. For the sake of simplicity, typical P2P-TV systems are designed and optimized following a pure layered approach, thus ignoring the effect of design choices on the underlying transport network. This simple approach, however, may constitute a threat for the network providers, due to the congestion that P2P-TV traffic can potentially generate. In this article, we present and discuss the architecture of an innovative, network cooperative P2PTV application that is being designed and developed within the STREP Project NAPA WINE. Our application is explicitly targeted to favor cooperation between the application and the transport network layer.},
  author = {Birke  R  and  Leonardi  E  and  Mellia  M  and  Bakay  A  and  Szemethy  T  and  Kiraly  C  and  Lo Cigno  R  and  Mathieu  F  and  Muscariello  L  and  Niccolini  S  and  Seedorf  J  and  Tropea  G},
  doi = {10.1109/MCOM.2011.5784001},
  journal = {IEEE COMMUNICATIONS MAGAZINE},
  keyword = {Internet; P2P-TV traffic; STREP project NAPA-WINE; congestion; network aware P2P-TV application architecture; network providers; peer to peer streaming applications; pure layered approach; real time streaming services; IP networks; IPTV; peer-to-peer computing; telecommunication traffic; video streaming},
  link = {http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5784001&tag=1},
  pages = {154--163},
  title = {Architecture of a network-aware P2P-TV application: the NAPA-WINE approach},
  volume = {49},
  year = {2011}
}
@article{11572_89767,
  abstract = {Grid applications move large amounts of data between distributed resources, and the efficiency of a Grid depends on their timely delivery within given bounds (deadlines). In most cases, the data volume and deadline are known in advance, allowing for both network planning and connection admission control (CAC). We formally define the problem and, based on this formalization, describe the operation of a feasible procedure for network reservations of deadline-constrained bulk data transfer requests. The procedure guarantees a minimum bandwidth to meet the deadlines and allows for opportunistic utilization of residual network capacity. We propose a novel analytical model based on the solution of an M/M(nc)/1/k(s)−RPS queue. The analytical model is validated against ns−2 simulations taking into account network level details (IP and TCP protocols), showing remarkably good coherence even under heavy loads. The model is orders of magnitude faster than simulation, which enables its application to plan the capacity of Grid networks, and to enforce CAC under the hypothesis of a dominating bottleneck on the transfer route.},
  author = {Munir K. and  Lo Cigno R. and  Vicat-Blanc P. P. and  Welzl M.},
  doi = {10.1002/cpe.1742},
  journal = {CONCURRENCY AND COMPUTATION},
  keyword = {Grid; modeling; bulk data transfer; TCP; admission control; processor sharing},
  link = {http://dx.doi.org/10.1002/cpe.1742},
  pages = {407--422},
  title = {Planning data transfers in grids: a multi-service queueing approach},
  volume = {2011},
  year = {2011}
}
@conference{11572_89768,
  abstract = {The paper presents the issues on the role of wireless access networks to support the kind of information exchange and interactions involved in the evolving social networks. The author discusses several requirements that the wireless access networks and social networking needs to address such as the communication infrastructure, distributed and informal trusts, environment interactions, body interactions, and context awareness.},
  address = {Piscataway, NJ},
  author = {Lo Cigno R.},
  booktitle = {IEEE Wireless On-demand Network Systems and Services (WONS 2011)},
  doi = {10.1109/WONS.2011.5720198},
  keyword = {body interactions; communication infrastructure; context awareness; distributed trust; environment interaction; informal trust; information exchange; social networks; wireless access network; computer network security; computer networks; radiocommunication; social networking (online); ubiquitous computing},
  link = {http://ieeexplore.ieee.org/search/freesrchabstract.jsp?tp=&arnumber=5720198},
  pages = {42--43},
  publisher = {IEEE},
  title = {Untethered Local Communications: From Wireless Access to Social Glue},
  volume = {2011},
  year = {2011}
}
@conference{11572_89769,
  abstract = {Existing deployments of wireless sensor networks (WSNs) are often conceived as stand-alone monitoring tools. In this paper, we report instead on a deployment where the WSN is a key component of a closed-loop control system for adaptive lighting in operational road tunnels. WSN nodes along the tunnel walls report light readings to a control station, which closes the loop by setting the intensity of lamps to match a legislated curve. The ability to match dynamically the lighting levels to the actual environmental conditions improves the tunnel safety and reduces its power consumption. The use of WSNs in a closed-loop system, combined with the real-world, harsh setting of operational road tunnels, induces tighter requirements on the quality and timeliness of sensed data, as well as on the reliability and lifetime of the network. In this work, we test to what extent mainstream WSN technology meets these challenges, using a dedicated design that however relies on well-established techniques. The paper describes the hw/sw architecture we devised by focusing on the WSN component, and analyzes its performance through experiments in a real, operational tunnel.},
  address = {Piscattaway, NY},
  author = {Ceriotti M. and  Corrà M. and  D'Orazio L. and  Doriguzzi R. and  Facchin D. and  Guna S. and  Jesi G. P. and  Lo Cigno R. and  Mottola L. and  Murphy A. L. and  Pescalli M. and  Picco G. P. and  Pregnolato D. and  Torghele C.},
  booktitle = {Information Processing in Sensor Networks (IPSN), 2011 10th International Conference on},
  keyword = {WSN deployment; adaptive lighting; closed loop control system; control station; lamp intensity; network lifetime; network reliability; power consumption reduction; road tunnel; stand-alone monitoring tool; tunnel safety; wireless sensor networks; adaptive control; closed loop systems; lamps; lighting control; power consumption; road safety; sensor placement; software architecture; telecommunication network reliability; tunnels},
  link = {http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5779037&tag=1},
  pages = {187--198},
  publisher = {ACM/IEEE},
  title = {Is there light at the ends of the tunnel? Wireless sensor networks for adaptive lighting in road tunnels},
  year = {2011}
}
@conference{11572_89770,
  abstract = {IEEE 802.11 defines several physical layer data rates to provide more robust communication by falling back to a lower rate in the presence of high noise levels. The choice of the current rate can be automatized; e.g., Auto-Rate Fallback (ARF) is a well-known mechanism in which the sender adapts its transmission rate in response to link noise using up/down thresholds. ARF has been criticized for not being able to distinguish MAC collisions from channel noise. It has however been shown that, in the absence of noise and in the face of collisions, ARF does not play a significant role for TCP’s downlink performance. The interactions of ARF, DCF and uplink TCP have not yet been deeply investigated. In this paper, we demonstrate our findings on the impact of rate fallback caused by collisions in ARF on the uplink performance of various TCP variants using simulations.},
  address = {Berlin, DE},
  author = {Khademi N. and  Welzl M. and  Lo Cigno R.},
  booktitle = {NETWORKING 2011},
  doi = {10.1007/978-3-642-20798-3_28},
  link = {http://www.springerlink.com/content/x244103400270852/},
  pages = {368--378},
  publisher = {Springer Berlin / Heidelberg},
  title = {On the Uplink Performance of TCP in Multi-rate 802.11 WLANs},
  volume = {6641},
  year = {2011}
}
@conference{11572_89771,
  abstract = {Safety applications are among the key drivers in VANET research. Their study is complex as it encompasses different disciplines, from wireless networking to car dynamics, to drivers' behavior, not to mention the economic and legal aspects. This work presents a simulative study of emergency braking applications tackled by embedding a mobility, cars' dynamic, and driver's behavior model into a detailed networking simulator (ns-3). The results, derived both at the network and at the application level, capture correctly the interactions of the communications and protocols with the car's adaptive cruise control system and the driver's behavior for cars that are not equipped with communication devices. The paper presents in detail the improvements we contribute in simulation techniques and model completeness. It introduces a novel and easy message aggregation technique to empower message re-propagation while controlling the network load during the peak due to the emergency braking. Finally it discusses the effectiveness of such applications as a function of the market penetration rate, showing that even cars that are not equipped with communication devices benefit from the smoother and earlier reaction of those cars that can communicate and whose adaptive cruise control implements a correct deceleration strategy.},
  address = {New York, NY, USA},
  author = {Segata M. and  Lo Cigno R.},
  booktitle = {Proceedings of the Eighth ACM international workshop on Vehicular inter-networking},
  doi = {10.1145/2030698.2030700},
  keyword = {VANET; collaborative adaptive cruise control; emergency braking control; ns-3 simulation; rebroadcast schemes; vehicular networks},
  link = {http://doi.acm.org/10.1145/2030698.2030700},
  pages = {1--10},
  publisher = {ACM},
  title = {Emergency braking: a study of network and application performance},
  year = {2011}
}
@conference{11572_89772,
  abstract = {P2P video streaming is receiving enormous attention, and when video is involved, the efficient use of the network becomes a very important issue, specially if live applications are addressed. In this work we study properties of Push/Pull protocols for the exchange of video chunks in non-structured systems. Push/Pull protocols are a broad class of chunk exchange mechanisms where peers alternate phases where they actively send chunks to other peers, with phases where they seek for missing chunks from other peers. We focus on the properties of the protocol, trying to gain insight on the distributed exchange mechanism itself. Then, we explore how performances can be improved if peers, in selecting the peers to exchange information with, also consider network level parameters, namely the round trip delay.},
  address = {Piscattaway, NY},
  author = {A  Russo  and  R  Lo Cigno},
  booktitle = {IEEE International Conference on Communications (ICC 2010)},
  doi = {10.1109/ICC.2010.5502543},
  link = {http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5502543},
  pages = {1--5},
  publisher = {IEEE},
  title = {Delay-Aware Push/Pull Protocols for Live Video Streaming in P2P Systems},
  year = {2010}
}
@article{11572_91892,
  abstract = {P2P systems are used to provide distributed storage, file sharing, video streaming, distributed gaming, and other applications based on the collaboration of participating peers and on the observation that sharing resources used sporadically leads to huge savings. The operation of a P2P system, as well as its sheer survival, however, is open to many kinds of attacks, which are tough to fight due to both the decentralized nature of P2P applications, and the lack, in some of them, of a central authority, or of a well-defined structure, or both. Particularly, as P2P systems require the active collaboration of the participants beyond their selfish interest, many systems include methods designed to lure the most resourceful users into broader participation, to provide an overall better service. The methods devised to attract the contribution of users are unfortunately vulnerable to a particular class of attacks: collusion. Collusion is broadly defined as any malicious coordinated behavior of a group of users aimed at gaining undeserved benefits, or at damaging (some) well behaved users. In this paper, we survey the literature on P2P systems security with specific attention to collusion, to find out how they resist to such attacks and what solutions can be used, e.g., game theory, to further counter this problem and give P2P systems the possibility of developing into full fledged services of the future Internet.},
  author = {Ciccarelli G. and  Lo Cigno R.},
  doi = {10.1016/j.comnet.2011.06.028},
  journal = {COMPUTER NETWORKS},
  keyword = {Collusion; Game theory; Peer-to-peer networks; Security},
  link = {http://www.sciencedirect.com/science/article/pii/S1389128611002581},
  pages = {3517--3532},
  title = {Collusion in Peer-to-Peer Systems},
  volume = {55},
  year = {2011}
}
@conference{11572_91978,
  abstract = {Pervasive computing and communications are (slowly) enabling local ad-hoc services. Preserving privacy in a pervasive environment is one of the key challenges ahead: How can users define their ``communication boundaries''? how can the network avoid wasting resources and eventually collapse under the burden of undesired traffic that will be discarded at the receiver machine? In this paper we propose the adoption of distributed filtering techniques implementing a network-wide firewall whose goal is defining precisely, and under the user control, the boundaries in space, time, information content, and logical addressing of a user communication scope. Initial results based on an implementation integrated with OLSR are presented.},
  address = {Piscataway, NJ},
  author = {L   Maccari  and  R  Lo Cigno},
  booktitle = {Wireless On-demand Network Systems and Services (WONS), 2012 9th Annual Conference on},
  doi = {10.1109/WONS.2012.6152229},
  keyword = {OLSR; communication boundaries; distributed filtering techniques; distributed firewall approach; pervasive computing; ad hoc networks; mobile communication; ubiquitous computing},
  link = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6152229&tag=1},
  pages = {23--26},
  publisher = {IEEE},
  title = {Privacy in the pervasive era: A distributed firewall approach},
  year = {2012}
}
@conference{11572_91979,
  abstract = {The goal of this work is to highlight and explain the limitations of traditional physical channel models used in network simulators for wireless LANs, with particular reference to VANETs, where these limitations may jeopardize the validity of results, specially for safety applications. The fundamental tradeoff is between simulation time and realism. Indeed, a simulator should provide realistic results as fast as possible, even if several nodes (i.e., hundreds) are considered. Our final goal, beyond this initial contribution, is the development of a stochastic channel model which improves reliability of simulations while increasing computational complexity only marginally. The design of our model is based on the representation of the packet decoding procedure as a Markov Decision (Stochastic) Process (MDP), thus avoiding the computational complexity of the simulation of the entire transmission - propagation - decoding chain bit-by-bit, which can surely provide enough accuracy, but at the price of unacceptable computational (and model) complexity. The paper identifies the key phenomena such as preamble detection, central-frequency misalignment, channel captures, vehicles relative speed, that represent the `state' of the MDP modeling the transmission chain, and propose an MDP structure to exploit it. The focus is on 802.11p and OFDM-based PHY layers, but the model is extensible to other transmission techniques easily. The design is tailored for implementation in ns-3, albeit the modeling principle is general and suitable for every event-driven simulator.},
  address = {USA},
  author = {Segata M. and  Lo Cigno R.A.},
  booktitle = {Wireless On-demand Network Systems and Services (WONS), 2012 9th Annual Conference on},
  doi = {10.1109/WONS.2012.6152246},
  keyword = {IEEE802.11 PHY-MAC simulation; MDP modeling; Markov decision process; NS-3 simulation; OFDM-based PHY layers; VANET; Computational Complexity; Event-driven simulator; Network simulators; Packet decoding procedure; Physical channel models; Preamble detection; Stochastic channel model; Transmission propagation decoding chain; Wireless LAN; Vehicular ad hoc networks},
  link = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6152246&tag=1},
  pages = {99--106},
  publisher = {IEEE},
  title = {Simulation of 802.11 PHY/MAC: The quest for accuracy and efficiency},
  year = {2012}
}
@conference{11572_94573,
  abstract = {Cloud computing is a popular way to address the scalability and efficiency issues of data centers. While the level of development of cloud technologies is already high-enough to easily beat old static cluster configurations, there is still a lot of room for improvement. One of these areas is in the way resource management tools predict the CPU and tasks performance. Normally, resource managers assume that the tasks do not affect each other, and assign resources under this assumption. With a simple experiment this paper shows that this assumption is grossly wrong, leading to overestimation of task performance that can approach 50%. Next, the paper presents a behavioral model that efficiently addresses these issues. Preliminary results obtained for three different hardware platforms demonstrate the benefits of our model in performance prediction.},
  address = {USA},
  author = {A   Kandalintsev  and  R  Lo Cigno},
  booktitle = {4th International Congress on Ultramodern Telecommunications and Control Systems},
  doi = {10.1109/ICUMT.2012.6459701},
  link = {http://www.icumt.org/2012/},
  pages = {40--48},
  publisher = {IEEE},
  title = {A Behavioral First Order CPU Performance Model for Clouds’ Management},
  year = {2012}
}
@conference{11572_94939,
  abstract = {P2P approaches are being adopted in more and more applications, exploiting the intrinsic scaling properties of P2P systems. Streaming multicasting applications in particular seems to benefit most from the P2P approach. In this context, systems have been divided between those that push information from parent to child and those that pull it from child to parent. In this work we explore the generalization to push/pull protocols, where each peer can dynamically push or pull, playing alternately on short time frames, the role of parent or child.},
  address = {New York},
  author = {A  Russo  and  R  Lo Cigno},
  booktitle = {IEEE INFOCOM Workshops 2009},
  doi = {10.1109/INFCOMW.2009.5072181},
  publisher = {ACM/IEEE},
  title = {Push/Pull Protocols for Streaming in P2P Systems},
  year = {2009}
}
@conference{11572_94995,
  abstract = {The Session Initiation Protocol (SIP) is at the root of many sessions-based applications such as VoIP and media streaming that are used by a growing number of users and organizations. The increase of the availability and use of such applications calls for careful attention to the possibility of trans- ferring malformed, incorrect, or malicious SIP messages as they can cause problems ranging from relatively innocuous disturbances to full blown attacks and frauds. To this end, SIP messages are analyzed to be classified as âœgoodâ or âœbadâ depending on whether this structure and content are deemed acceptable or not. This paper presents a classifier of SIP messages based on a two stage filter. The first stage uses a straightforward lexical analyzer to detect and remove all messages that are lexically incorrect with reference to the grammar that is defined by the protocol standard.
The second stage uses a machine learning approach based on a Support Vector Machine (SVM) to analyze the structure of the remaining syntactically correct messages in order to detect semantic anomalies which are deemed a strong indication of a possibly malicious message. The SVM âœlearnsâ the structure of the âœgoodâ and âœbadâ SIP messages through an initial training phase and the SVM thus configured correctly classifies messages produced by a synthetic generator and also âœrealâ
SIP messages that have been collected from the communication network at our institution. The preliminary results of such classification look very promising and are presented in the final section of this paper.},
  address = {New York,  NY},
  author = {Ferdous  R  and  Lo Cigno  R  and  Zorat  A},
  booktitle = {Proc. of the IEEE Global Telecommunications Conference},
  doi = {10.1109/GLOCOM.2012.6503527},
  link = {http://www.ieee-globecom.org},
  pages = {2714--2719},
  publisher = {IEEE Comunications Society},
  title = {Classification of SIP Messages by a Syntax Filter and SVMs},
  year = {2012}
}
@conference{11572_94996,
  abstract = {Voice and multimedia communications are rapidly migrating from traditional networks to TCP/IP networks (Internet), where services are provisioned by SIP (Session Initiation Protocol). In this paper we propose an on-line filter that examines the stream of incoming SIP messages and classifies them as good or bad. The classification is carried out in two stages: first a lexical analysis is performed to weed out those messages that do belong to the language generated by the grammar defined by the SIP standard. After this first stage, a second filtering occurs which identifies messages that somehow differ - in structure or contents - from messages that were previously classified as good. While the first filter stage is straightforward, as the classification is crisp (either a messages belongs to the language or it does not), the second stage requires a more delicate handling, as it not a sharp decision whether a message is semantically meaningful or not. The approach we followed for this is based on using past experience on previously classified messages, i.e. a “learn-by-examples” which led to a classifier based on Support- Vector-Machines (SVM) to perform the required analysis of each incoming SIP message. The paper describes the overall architecture of the two-stage filter and then explores several points of the configuration-space for the SVM to determine a good configuration setting that will perform well when used to classify a large sample of SIP messages obtained from real traffic collected on a VoIP installation at our institution. Finally, the performance of the classification on additional messages collected from the same source is presented.},
  address = {USA},
  author = {R  Ferdous  and  R  Lo Cigno  and  A  Zorat},
  booktitle = {Proc. of the IEEE 11th International Conference on Machine Learning and Applications},
  doi = {10.1109/ICMLA.2012.109},
  link = {http://www.icmla-conference.org/icmla12},
  pages = {592--597},
  publisher = {IEEE},
  title = {On the use of SVMs to Detect Anomalies in a Stream of SIP Messages},
  year = {2012}
}
@conference{11572_94999,
  abstract = {Is it possible to estimate some ‘safety’ metric to assess the effectiveness of Intelligent Transportation Systems? In particular, we are interested in using Inter-Vehicle Com- munication (IVC) beaconing for increasing drivers’ safety at intersections. In the last couple of years, the vehicular networking community reported in several studies that simple network metrics are not sufficient to evaluate safety enhancing protocols and applications. We present a classification scheme that allows the quantification of such improvements by determining how many potential crashes happen or can be avoided by a specific IVC approach. Using a modified road traffic simulator that allowed selected vehicles to disregard traffic rules, we investigated the impact of safety messaging between cars approaching an intersection. We show that in suburban environments simple beaconing is not as effective as anticipated. Yet, simple one-hop- relaying, e.g., by vehicles parked close to an intersection, can improve drivers’ safety substantially. Since the key purpose of IVC is safety, the paper closes the loop in the evaluation of the effectiveness of vehicular networks as defined today.},
  address = {USA},
  author = {S  Joerer  and  M  Segata  and  B  Bloessl  and  R  Lo Cigno  and  C  Sommer  and  F   Dressler},
  booktitle = {4th IEEE Vehicular Networking Conference (VNC 2012)},
  doi = {10.1109/VNC.2012.6407441},
  link = {http://www.ieee-vnc.org},
  pages = {25--32},
  publisher = {IEEE},
  title = {To Crash or Not to Crash: Estimating its Likelihood and Potentials of Beacon-based IVC Systems},
  year = {2012}
}
@conference{11572_95002,
  abstract = {MPR selection is one of the most important and critical functions
of OLSR. The OLSR standard specifies an algorithm that has good local properties in terms of number of MPR selected but does not use available information in order to reduce the global number of MPR nodes. MPR selection affects many network properties, from the actual logical topology, to the routing efficiency, to the protocol overhead and the broadcast/multicast delivery. This paper proposes and evaluates two simple modifications to the MPR selection strategy, which are oriented to global properties rather than local â˜optimalityâ. The results presented show that even marginal modifications of the heuristic lead to a performance improvement, with, for instance, a reduction of up to 15% in the number of control messages required to maintain the topology, a relevant gain specially when obtained without introducing any overhead in control messages},
  address = {USA},
  author = {L  Maccari  and  R  Lo Cigno},
  booktitle = {Proc. of the IEEE 8th International Conference on Wireless and Mobile Computing},
  doi = {10.1109/WiMOB.2012.6379101},
  link = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6379101},
  pages = {373--380},
  publisher = {IEEE},
  title = {How to Reduce and Stabilize MPR sets in OLSR networks},
  year = {2012}
}
@conference{11572_95004,
  abstract = {Research in Wireless Mesh Networking has been very active in the past years, with the birth of several new ideas and the protocols that implement them. Most common implemen- tations rely on Layer-3 addressing and routing; however 802.11s and other successful protocols suggest that Mesh Networking on Layer-2 address space is more efficient, does not mingle with the global IP routing, and provides easier ways to support micro- mobility as well as client management. This paper focuses on the client announcement protocol, i.e., the functionality, somewhat embedded between Layer-2 and Layer-3, that allows routers
in a mesh network to announce the clients they are serving and that in practice makes the entire routing protocol work correctly. In particular, it focuses on B.A.T.M.A.N.-Advanced, analyses the shortcomings of the simple implementation of this functionality present until v.2011.2.0 and defines the new protocol and algorithms that we have implemented and are part of the distribution starting from v.2011.3.0. Experiments in controlled scenarios show how performance increases 	dramatically even in scenarios designed specifically to stress the 	new protocol. The new mechanism and improved performance make it possible to design new features for B.A.T.M.A.N.-Advanced, most notably
the support for fast and seamless handover, which is currently under testing},
  address = {USA},
  author = {A  Quartulli  and  R  Lo Cigno},
  booktitle = {IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications},
  doi = {10.1109/WiMOB.2012.6379146},
  link = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6379146},
  pages = {667--674},
  publisher = {IEEE},
  title = {Improving Mesh-Agnostic Client Announcement in B.A.T.M.A.N.-Advanced},
  year = {2012}
}
@conference{11572_95010,
  address = {New York, NY, USA},
  author = {M  Segata  and  F  Dressler  and  R  Lo Cigno  and  M  Gerla},
  booktitle = {Proceedings of the 18th International Conference on Mobile Computing and Networking},
  doi = {10.1145/2348543.2348591},
  pages = {389--392},
  publisher = {ACM},
  title = {A simulation tool for automated platooning in mixed highway scenarios},
  year = {2012}
}
@conference{11572_95130,
  abstract = {P2P-TV systems performance are driven by the overlay topology that peers form. Several proposals have been made in the past to optimize it, yet little experimental studies have corroborated results. The aim of this work is to provide a comprehensive experimental comparison of different strategies for the construction and maintenance of the overlay topology in P2P-TV systems. To this goal, we have implemented different fully-distributed strategies in a P2P-TV application, called Peer- Streamer, that we use to run extensive experimental campaigns in a completely controlled set-up which involves thousands of peers, spanning very different networking scenarios. Results show that the topological properties of the overlay have a deep impact on both user quality of experience and network load. Strategies based solely on random peer selection are greatly outperformed by smart, yet simple strategies that can be implemented with negligible overhead. Even with different and complex scenarios, the neighborhood filtering strategy we devised as most perform- ing guarantees to deliver almost all chunks to all peers with a play-out delay as low as only 6s even with system loads close to 1.0. Results are confirmed by running experiments on PlanetLab. PeerStreamer is open-source to make results reproducible and allow further research by the community.},
  address = {USA},
  author = {S  Traverso  and  L  Abeni  and  R  Birke  and  C  Kiraly  and  E  Leonardi  and  R  Lo Cigno  and  M  Mellia},
  booktitle = {Proc. of 12-th IEEE International Conference on Peer-to-Peer Computing (P2P'12)},
  doi = {10.1109/P2P.2012.6335794},
  link = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6335794},
  pages = {13--24},
  publisher = {IEEE},
  title = {Experimental comparison of neighborhood filtering strategies in unstructured P2P-TV systems},
  year = {2012}
}
@misc{11572_96661,
  author = {A  Bondi  and  M  Nardelli  and  R  Lo Cigno  and  M  Pescalli  and  G  Pietro Picco  and  N  Vernesoni},
  title = {A system and a process for controlling the light intensity in a tunnel},
  year = {2009}
}
@conference{11572_98030,
  abstract = {Distributing live streaming in Wireless Community Networks (WCNs) is a service with a high added value; however, cloud-based streaming, as commonly used in the Internet, does not fit well the architecture of WCNs, which often have restricted access to the Internet. Modern WCNs, instead, can have a good internal connectivity with high bandwidth. A P2P approach is thus well matched for streaming in WCNs. This paper presents experimental results obtained with PeerStreamer running on top of Community-Lab, a test-bed realized by the CONFINE EU Project for the experimentation of novel protocols in community networks. The experiments highlight relevant differences between a WCN and the Internet, and we propose strategies that can be implemented on all the peers or even only locally on the source to improve the streaming quality. These strategies are based on simple heuristics and can be activated dynamically when the streaming quality degrades below a given threshold.},
  address = {Larnaca, Cyprus},
  author = {L  Baldesi  and  L  Maccari  and  R  Lo Cigno},
  booktitle = {10th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications},
  doi = {10.1109/WiMOB.2014.6962146},
  link = {http://research.ac.upc.edu/CNBuB2014/},
  pages = {33--39},
  publisher = {IEEE},
  title = {Improving P2P Streaming in Community-Lab Through Local Strategies},
  year = {2014}
}
@conference{11572_98031,
  abstract = {A method that automatically learns and predicts the traffic behavior to save energy by adjusting the number of active optical carriers is presented. Simulations prove it provides large savings and ensures low traffic loss probability.},
  address = {San Francisco, CA, US},
  author = {D  Siracusa  and  F  Pederzolli  and  R  Lo Cigno  and  E  Salvadori},
  booktitle = {Optical Fiber Communication Conference and Exposition (OFC)},
  doi = {10.1364/OFC.2014.W4H.1},
  keyword = {Networks, Networks; network optimization},
  link = {http://www.opticsinfobase.org/abstract.cfm?URI=OFC-2014-W4H.1},
  publisher = {Optical Society of America},
  title = {Energy Saving Through Traffic Profiling and Prediction in Self-Optimizing Optical Networks},
  year = {2014}
}
@conference{11572_98032,
  abstract = {Virtualization is a key enabler technology for cloud computing. It allows applications to share computing, memory, storage, and network resources. However, physical resources are not standalone and the server infrastructure is not homogeneous. The CPU cores are commonly connected to the shared memory, caches, and computational units. As a result, the performance of cloud applications can be greatly affected if, while being executed at different computing cores, they compete for the same shared cache or network resource. The performance degradation can be as high as 50%. In this work we present a methodology which predicts the performance problems of cloud applications during their concurrent execution by looking at the hardware performance counters collected during their standalone execution. The proposed methodology fosters design of novel solutions for efficient resource allocation and scheduling.},
  address = {USA},
  author = {A   Kandalintsev  and  Renato Lo Cigno  and  D   Kliazovich  and  P   Bouvry},
  booktitle = {KIISE/IEEE 28th International Conference on Information Networking},
  doi = {10.1109/ICOIN.2014.6799664},
  link = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6799664},
  pages = {52--57},
  publisher = {IEEE},
  title = {Profiling Cloud Applications with Hardware Performance Counters},
  year = {2014}
}
@article{11572_98033,
  abstract = {Peer-to-peer live-streaming (P2P-TV) systems' goal is disseminating real-time video content using peer-to-peer technology. Their performance is driven by the overlay topology, i.e., the virtual topology that peers use to exchange video chunks. Several proposals have been made in the past to optimize it, yet few experimental studies have corroborated results. The aim of this paper is to provide a comprehensive experimental comparison based on PeerStreamer in order to benchmark different strategies for the construction and maintenance of the overlay topology in P2P-TV systems. We present only experimental results in which fully distributed strategies are evaluated in both controlled experiments and the Internet using thousands of peers. Results confirm that the topological properties of the overlay have a deep impact on both user quality of experience and network load. Strategies based solely on random peer selection are greatly outperformed by smart yet simple and actually implementable strategies. The most performing strategy we devise guarantees to deliver almost all chunks to all peers with a playout delay as low as 6 s even when system load approaches 1, and in almost adversarial network scenarios. PeerStreamer is open-source to make results reproducible and allow further research by the community.},
  author = {S   Traverso  and  L   Abeni  and  R   Birke  and  C  Kiraly  and  E  Leonardi  and  R   Lo Cigno  and  M   Mellia},
  doi = {10.1109/TNET.2014.2307157},
  journal = {IEEE-ACM TRANSACTIONS ON NETWORKING},
  keyword = {Bandwidth; Benchmark testing; Measurement; Network topology; Peer-to-peer computing; Streaming media; Topology; Overlay networks},
  link = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6766806},
  pages = {1--14},
  title = {Neighborhood Filtering Strategies for Overlay Construction in P2P-TV Systems: Design and Experimental Comparison},
  volume = {online first},
  year = {2014}
}
@conference{11572_98034,
  abstract = {Driving vehicles in platoons has the potential to improve traffic efficiency, increase safety, reduce fuel consumption, and make driving experience more enjoyable. A lot of effort is being spent in the development of technologies, like radars, enabling automated cruise control following and ensuring emergency braking if the driver does not react in time; but these technologies alone do not empower real platooning. The initial idea of building dedicated infrastructures for platoons, has been set aside favouring the philosophy that foresees scenarios, where automated vehicles share the road with human-driven ones. This arises interesting new questions regarding the interactions between the two categories of vehicles. In this paper we focus on the analysis of interferences caused by non-automated vehicles during a JOIN maneuver. We define the application layer protocol to support the maneuver, together with situations that can prevent successful termination, and describe how they can be detected. The validity of the approach is proven by means of simulations, showing either that the maneuver can successfully be performed, or safely be aborted. Finally, we analyze the impact of the Packet Error Rate (PER) on the failure rate of the maneuver, showing that packet losses mainly affect the maneuver from a coordination point of view, rather than stability of the system, i.e., even at high loss rates, cars never violated a minimum safety distance.},
  address = {USA},
  author = {M  Segata  and  B  Bloessl  and  S  Joerer  and  F  Dressler  and  R  Lo Cigno},
  booktitle = {11th IEEE/IFIP Conference on Wireless On-demand Network Systems and Services (WONS)},
  doi = {10.1109/WONS.2014.6814733},
  link = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6814733},
  pages = {130--137},
  publisher = {IEEE},
  title = {Supporting platooning maneuvers through IVC: An initial protocol analysis for the JOIN maneuver},
  year = {2014}
}
@conference{11572_98036,
  abstract = {Wireless Community Networks (WCNs) are flourishing as a means of providing Internet access, but most of all as an alternative, bottom-up approach to reduce the digital divide and empower the users with control on their network. Video streaming and conferencing are among the most resource hungry and critical networked applications, and their support on WCNs is fundamental, but difficult as Wireless Community Network (WCN) environments are normally less resource-rich than the traditional Internet. This work presents an initial analysis of an experimental activity with Peer Streamer, a P2P video streaming platform, on the Community-Lab, the WCN testbed of the EU FIRE project CONFINE. The results we present shed light on several different aspects, some good, some other less, of video streaming on WCNs. The experiments highlight the feasibility of P2P video streaming, but they also show that the streaming platform must be tailored ad-hoc for the WCN itself to be able to fully adapt and exploit its features and overcome its limitations. On the other hand, the experiments also show that Community-Lab is not yet fully representative of a WCN, and specifically of those that participate in CONFINE.},
  address = {USA},
  author = {L   Baldesi  and  L  Maccari  and  R  Lo  Cigno},
  booktitle = {13th IEEE Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET)},
  doi = {10.1109/MedHocNet.2014.6849101},
  link = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6849101},
  pages = {23--30},
  publisher = {IEEE},
  title = {Live P2P streaming in CommunityLab: Experience and Insights},
  year = {2014}
}
@article{11572_98037,
  abstract = {Wireless Community Networks (WCNs) are created and managed by a local community with the goal of sharing Internet connection and offering local services. This paper analyses the data collected on three large WCNs, ranging from 131 to 226 nodes, and used daily by thousands of people. We first analyse the topologies to get insights in the fundamental properties, next we concentrate on two crucial aspects: (i) the routing layer and (ii) metrics on the centrality of nodes and the network robustness. All the networks use the Optimized Link State Routing (OLSR) protocol extended with the Expected Transmission Count (ETX) metric. We analyse the quality of the routes and two different techniques to select the Multi-Point Relay (MPR) nodes. The centrality and robustness analysis shows that, in spite of being fully decentralized networks, an adversary that can control a small fraction of carefully chosen nodes can intercept up to 90% of the traffic. The collected data-sets are available as Open Data, so that they can be easily accessed by any interested researcher, and new studies on different topics can be performed. In fact, WCN are just an example of large wireless mesh networks, so our methodology can be applied to any other large mesh network, including commercial ISP networks. © 2014 Elsevier B.V. All rights reserved.},
  author = {Leonardo Maccari  and  Renato Lo Cigno},
  doi = {10.1016/j.adhoc.2014.07.016},
  journal = {AD HOC NETWORKS},
  link = {http://www.sciencedirect.com/science/article/pii/S1570870514001474},
  pages = {175--190},
  title = {A week in the life of three large Wireless Community Networks},
  volume = {24},
  year = {2015}
}
@conference{11572_98038,
  abstract = {s a different (from the global Internet and Cellular Networks) model for urban communications and networking conceivable? Can Community Networks, now flourishing in many parts of Europe and the world, be the next 'big thing' in networking, for once considering the needs of people and urban evolution as a key element, and not as a side effect of technology or business? This paper discusses recent evolutions of Community Networks in Urban Areas, blending the technical analysis of their topology and evolution, together with grand challenges ahead and the need for a novel, trans-disciplinary science that can guide the design of the future communication space for smart cities and beyond.},
  address = {USA},
  author = {Renato Lo Cigno  and  Leonardo Maccari},
  booktitle = {ACM International Workshop on Wireless and Mobile Technologies for Smart Cities (WiMobCity '14), part of MobiHoc 2014},
  doi = {10.1145/2633661.2633669},
  link = {http://doi.acm.org/10.1145/2633661.2633669},
  pages = {49--54},
  publisher = {IEEE},
  title = {Urban Wireless Community Networks: Challenges and Solutions for Smart City Communications},
  year = {2014}
}
@conference{11572_98039,
  address = {USA},
  author = {S  Joerer  and  B  Bloessl  and  M  Segata  and  C  Sommer  and  R  Lo Cigno  and  F  Dressler},
  booktitle = {25th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2014)},
  link = {http://www.ieee-pimrc.org/2014/`},
  pages = {1442--1447},
  publisher = {IEEE},
  title = {Fairness Kills Safety: A Comparative Study for Intersection Assistance Applications},
  year = {2014}
}
@article{11572_98041,
  abstract = {Finding viable metrics to assess the effectiveness of Intelligent Transportation Systems (ITS) in terms of ‘safety’ is one of the major challenges in vehicular networking research. We aim to provide a metric, an estimation of the vehicle collision probability at intersections, that can be used for evaluating Inter- Vehicle Communication (IVC) concepts. In the last years, the vehicular networking community reported in several studies that safety enhancing protocols and applications cannot be evaluated based only on networking metrics like delays and packet loss rates. We present an evaluation scheme that addresses this need by quantifying the probability of a future crash, depending on the situation in which a vehicle is receiving a beacon message (e.g., a CAM or a BSM). Thus, our criticality metric also allows for fully distributed situation assessment. We investigate the impact of safety messaging between cars approaching an intersection using a modified road traffic simulator that allows selected vehicles to disregard traffic rules. As direct result we show that simple beaconing is not as effective as anticipated in suburban environments. More profoundly, however, our simulation results reveal more details about the timeliness (regarding the criticality assessment) of beacon messages, and as such, can be used to develop more sophisticated beaconing solutions.},
  author = {S  Joerer  and  M   Segata  and  B   Bloessl  and  R  Lo Cigno  and  C  Sommer  and  F  Dressler},
  doi = {10.1109/TVT.2013.2287343},
  journal = {IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY},
  pages = {1802--1812},
  title = {A Vehicular Networking Perspective on Estimating Vehicle Collision Probability at Intersections},
  volume = {63},
  year = {2014}
}

This file was generated by bibtex2html 1.97.