Search Results - "DellAmico, Matteo"
-
1
PSBS: Practical Size-Based Scheduling
Published in IEEE transactions on computers (01-07-2016)“…Size-based schedulers have very desirable performance properties: optimal or near-optimal response time can be coupled with strong fairness. Despite this,…”
Get full text
Journal Article -
2
HFSP: Bringing Size-Based Scheduling To Hadoop
Published in IEEE transactions on cloud computing (01-01-2017)“…Size-based scheduling with aging has been recognized as an effective approach to guarantee fairness and near-optimal system response times. We present HFSP, a…”
Get full text
Journal Article -
3
Unsupervised Detection and Clustering of Malicious TLS Flows
Published in Security and communication networks (12-01-2023)“…Malware abuses TLS to encrypt its malicious traffic, preventing examination by content signatures and deep packet inspection. Network detection of malicious…”
Get full text
Journal Article -
4
Adaptive redundancy management for durable P2P backup
Published in Computer networks (Amsterdam, Netherlands : 1999) (04-06-2015)“…We design and analyze the performance of a redundancy management mechanism for peer-to-peer backup applications. Armed with the realization that a backup…”
Get full text
Journal Article -
5
MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations
Published in IACR transactions on cryptographic hardware and embedded systems (29-11-2022)“…Key rank estimation provides a measure of the effort that the attacker has to spend bruteforcing the key of a cryptographic algorithm, after having gained some…”
Get full text
Journal Article -
6
OS-Assisted Task Preemption for Hadoop
Published in 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW) (01-06-2014)“…This work introduces a new task preemption primitive for Hadoop, that allows tasks to be suspended and resumed exploiting existing memory management mechanisms…”
Get full text
Conference Proceeding -
7
The Supermarket Model With Known and Predicted Service Times
Published in IEEE transactions on parallel and distributed systems (01-11-2022)“…The supermarket model refers to a system with a large number of queues, where new customers choose <inline-formula><tex-math notation="LaTeX">d</tex-math>…”
Get full text
Journal Article -
8
Password Strength: An Empirical Analysis
Published in 2010 Proceedings IEEE INFOCOM (01-03-2010)“…It is a well known fact that user-chosen passwords are somewhat predictable: by using tools such as dictionaries or probabilistic models, attackers and…”
Get full text
Conference Proceeding -
9
Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships
Published in 2021 IEEE Symposium on Security and Privacy (SP) (01-05-2021)“…Web pages have been steadily increasing in complexity over time, including code snippets from several distinct origins and organizations. While this may be a…”
Get full text
Conference Proceeding -
10
On User Availability Prediction and Network Applications
Published in IEEE/ACM transactions on networking (01-08-2015)“…User connectivity patterns in network applications are known to be heterogeneous and to follow periodic (daily and weekly) patterns. In many cases, the…”
Get full text
Journal Article -
11
Neighbourhood maps: decentralized ranking in small-world P2P networks
Published in Concurrency and computation (25-04-2008)“…Reputation in P2P networks is an important tool to encourage cooperation among peers. It is based on ranking of peers according to their past behaviour. In…”
Get full text
Journal Article -
12
Revisiting Size-Based Scheduling with Estimated Job Sizes
Published in 2014 IEEE 22nd International Symposium on Modelling, Analysis & Simulation of Computer and Telecommunication Systems (01-09-2014)“…We study size-based schedulers, and focus on the impact of inaccurate job size information on response time and fairness. Our intent is to revisit previous…”
Get full text
Conference Proceeding -
13
FISHDBC: Flexible, Incremental, Scalable, Hierarchical Density-Based Clustering for Arbitrary Data and Distance
Published 16-10-2019“…FISHDBC is a flexible, incremental, scalable, and hierarchical density-based clustering algorithm. It is flexible because it empowers users to work on…”
Get full text
Journal Article -
14
Scheduling With Inexact Job Sizes: The Merits of Shortest Processing Time First
Published 10-07-2019“…It is well known that size-based scheduling policies, which take into account job size (i.e., the time it takes to run them), can perform very desirably in…”
Get full text
Journal Article -
15
Scalable and flexible clustering solutions for mobile phone-based population indicators
Published in International journal of data science and analytics (01-12-2017)“…Mobile phones have an unprecedented rate of penetration across the world. Such devices produce a large amount of data that have been used on different domains…”
Get full text
Journal Article -
16
The Supermarket Model with Known and Predicted Service Times
Published 17-02-2022“…The supermarket model refers to a system with a large number of queues, where new customers choose d queues at random and join the one with the fewest…”
Get full text
Journal Article -
17
SBOM Generation Tools in the Python Ecosystem: an In-Detail Analysis
Published 02-09-2024“…Software Bills of Material (SBOMs), which improve transparency by listing the components constituting software, are a key countermeasure to the mounting…”
Get full text
Journal Article -
18
Improving population estimation from mobile calls: A clustering approach
Published in 2016 IEEE Symposium on Computers and Communication (ISCC) (01-06-2016)“…Statistical authorities promote and safeguard the production and publication of official statistics that serve the public good. One of their duties is to…”
Get full text
Conference Proceeding -
19
Unsupervised Detection and Clustering of Malicious TLS Flows
Published 23-12-2022“…Malware abuses TLS to encrypt its malicious traffic, preventing examination by content signatures and deep packet inspection. Network detection of malicious…”
Get full text
Journal Article -
20
Sonic: Fast and Transferable Data Poisoning on Clustering Algorithms
Published 14-08-2024“…Data poisoning attacks on clustering algorithms have received limited attention, with existing methods struggling to scale efficiently as dataset sizes and…”
Get full text
Journal Article