Overlay architectures. Distributed hashing. Naming. Next generation network design.
Peer to peer networking. Mobile and ad-hoc networking. Troubleshooting. Implications for energy efficiency.
Malware detection. Secure routing. Testbeds for security applications. Operating systems security. Intrusion detection/prevention. Availability. Authentication. Botnets and worms.
Experimental testbeds. Distributed logging. Declarative networking.
OS for sensor networks. Monitoring OS behavior for malware detection. Performance analysis. Programming languages for systems. Power aware computing.
Price of anarchy. Game theory.
Traffic characterization and modeling.
Send requests for updates to researchupdates@eecs, or Login to make changes yourself.