default search action
Tilman Wolf
Person information
- affiliation: University of Massachusetts, Amherst MA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [c120]Puming Fang, Tilman Wolf:
Value Trees: Multi-Hop and Asynchronous Economic Transactions in Distributed Systems. ICCCN 2023: 1-10 - [c119]Puming Fang, Tilman Wolf:
Implementing Virtual Network Functions in Named Data Networking and Web 3.0. ICNC 2023: 117-123 - 2022
- [j41]Zhaodong Kang, Jin Xu, Wenqi Wang, Jie Jiang, Shiqi Jiang, Tong Yang, Bin Cui, Tilman Wolf:
Coloring Embedder: Towards Multi-Set Membership Queries in Web Cache Sharing. IEEE Trans. Knowl. Data Eng. 34(12): 5664-5680 (2022) - 2021
- [c118]Puming Fang, Tilman Wolf:
Enabling Virtual Network Functions in Named Data Networking. INFOCOM Workshops 2021: 1-6 - 2020
- [c117]Hao Cai, Tilman Wolf:
Implementation of Network Source Authentication and Path Validation Using Orthogonal Sequences. ICCCN 2020: 1-7 - [c116]Abhishek Dwaraki, Shachi Kumary, Tilman Wolf:
Automated Event Identification from System Logs Using Natural Language Processing. ICNC 2020: 209-215 - [c115]Bohan Zhao, Rui Li, Jin Zhao, Tilman Wolf:
Efficient and Consistent TCAM Updates. INFOCOM 2020: 1241-1250
2010 – 2019
- 2019
- [j40]Bohan Zhao, Jin Zhao, Xin Wang, Tilman Wolf:
RuleTailor: Optimizing Flow Table Updates in OpenFlow Switches With Rule Transformations. IEEE Trans. Netw. Serv. Manag. 16(4): 1581-1594 (2019) - [c114]Tilman Wolf, Anna Nagurney, James Griffioen, Kenneth L. Calvert:
Enhancing Interdomain Transport via Economic Software-Defined Exchange Points. ICNC 2019: 473-479 - [c113]Arman Pouraghily, Tilman Wolf:
A Lightweight Payment Verification Protocol for Blockchain Transactions on IoT Devices. ICNC 2019: 617-623 - [c112]Abhishek Dwaraki, Richard G. Freedman, Shlomo Zilberstein, Tilman Wolf:
Using Natural Language Constructs and Concepts to Aid Network Management. ICNC 2019: 802-808 - [c111]Kenneth L. Calvert, James Griffioen, Anna Nagurney, Tilman Wolf:
A Vision for a Spot Market for Interdomain Connectivity. ICDCS 2019: 1860-1867 - [c110]Arman Pouraghily, Tilman Wolf:
Securing IoT Protocol Implementations Through Hardware Monitoring. MASS 2019: 467-475 - 2018
- [j39]Ilya Baldin, Tilman Wolf:
The Future of CISE Distributed Research Infrastructure. Comput. Commun. Rev. 48(2): 46-51 (2018) - [j38]Jiawei Li, Hongbin Luo, Shan Zhang, Shui Yu, Tilman Wolf:
Traffic Engineering in Information-Centric Networking: Opportunities, Solutions and Challenges. IEEE Commun. Mag. 56(11): 124-130 (2018) - [c109]Kun Qiu, Yuanyang Zhu, Jing Yuan, Jin Zhao, Xin Wang, Tilman Wolf:
ParaPLL: Fast Parallel Shortest-path Distance Query on Large-scale Weighted Graphs. ICPP 2018: 2:1-2:10 - [c108]Hao Cai, Tilman Wolf:
Self-Adapting Quorum-Based Neighbor Discovery in Wireless Sensor Networks. INFOCOM 2018: 324-332 - [c107]Arman Pouraghily, Md. Nazmul Islam, Sandip Kundu, Tilman Wolf:
Poster Abstract: Privacy in Blockchain-Enabled IoT Devices. IoTDI 2018: 292-293 - [c106]George Provelengios, Arman Pouraghily, Russell Tessier, Tilman Wolf:
A Hardware Monitor to Protect Linux System Calls. ISVLSI 2018: 551-556 - [i1]Jay Aikat, Ilya Baldin, Mark Berman, Joe Breen, Richard R. Brooks, Prasad Calyam, Jeffrey S. Chase, Wallace Chase, Russ Clark, Chip Elliott, Jim Griffioen, Dijiang Huang, Julio Ibarra, Tom Lehman, Inder Monga, Abraham Matta, Christos Papadopoulos, Mike Reiter, Dipankar Raychaudhuri, Glenn Ricart, Robert Ricci, Paul Ruth, Ivan Seskar, Jerry Sobieski, Kobus van der Merwe, Kuang-Ching Wang, Tilman Wolf, Michael Zink:
The Future of CISE Distributed Research Infrastructure. CoRR abs/1803.09886 (2018) - 2017
- [c105]Arman Pouraghily, Tilman Wolf, Russell Tessier:
Hardware support for embedded operating system security. ASAP 2017: 61-66 - [c104]Thiago Teixeira, Andres Marentes, Tilman Wolf:
Economic incentives in virtualized access networks. ICC 2017: 1-7 - 2016
- [j37]Andres Marentes, Tilman Wolf, Anna Nagurney, Yezid Donoso:
Towards Pricing Mechanisms for Delay Tolerant Services. Int. J. Comput. Commun. Control 11(1): 77-89 (2016) - [j36]Kekai Hu, Harikrishnan Kumarapillai Chandrikakutty, Zachary Goodman, Russell Tessier, Tilman Wolf:
Dynamic Hardware Monitors for Network Processor Protection. IEEE Trans. Computers 65(3): 860-872 (2016) - [j35]Xinming Chen, Brandon Jones, Michela Becchi, Tilman Wolf:
Picking Pesky Parameters: Optimizing Regular Expression Matching in Practice. IEEE Trans. Parallel Distributed Syst. 27(5): 1430-1442 (2016) - [c103]Jingrui Li, Tilman Wolf:
A One-Way Proof-of-Work Protocol to Protect Controllers in Software-Defined Networks. ANCS 2016: 123-124 - [c102]Hao Cai, Tilman Wolf:
Source Authentication and Path Validation in Networks Using Orthogonal Sequences. ICCCN 2016: 1-10 - [c101]James Griffioen, Tilman Wolf, Kenneth L. Calvert:
A Coin-Operated Software-Defined Exchange. ICCCN 2016: 1-8 - [c100]Tilman Wolf, Jingrui Li:
Denial-of-Service Prevention for Software-Defined Network Controllers. ICCCN 2016: 1-10 - [c99]Qiongwen Xu, Xu Zhang, Jin Zhao, Xin Wang, Tilman Wolf:
Fast shortest-path queries on large-scale graphs. ICNP 2016: 1-10 - [c98]Tilman Wolf, Anna Nagurney:
A Layered Protocol Architecture for Scalable Innovation and Identification of Network Economic Synergies in the Internet of Things. IoTDI 2016: 141-151 - [c97]Abhishek Dwaraki, Tilman Wolf:
Adaptive Service-Chain Routing for Virtual Network Functions in Software-Defined Networks. HotMiddlebox@SIGCOMM 2016: 32-37 - 2015
- [j34]Shashank Shanbhag, Arun Reddy Kandoor, Cong Wang, Ramgopal Mettu, Tilman Wolf:
VHub: Single-stage virtual network mapping through hub location. Comput. Networks 77: 169-180 (2015) - [j33]Tilman Wolf, Harikrishnan Kumarapillai Chandrikakutty, Kekai Hu, Deepak Unnikrishnan, Russell Tessier:
Securing Network Processors with High-Performance Hardware Monitors. IEEE Trans. Dependable Secur. Comput. 12(6): 652-664 (2015) - [c96]Abhishek Dwaraki, Srini Seetharaman, Sriram Natarajan, Tilman Wolf:
State Abstraction and Management in Software-Defined Networks. ANCS 2015: 189-190 - [c95]Tedy Thomas, Arman Pouraghily, Kekai Hu, Russell Tessier, Tilman Wolf:
Multi-task support for security-enabled embedded processors. ASAP 2015: 136-143 - [c94]Andres Marentes, Thiago Teixeira, Tilman Wolf:
Exploring economic dynamics in an Internet with service choices. ICC 2015: 5272-5277 - [c93]Xinming Chen, Tilman Wolf, Jim Griffioen, Onur Ascigil, Rudra Dutta, George N. Rouskas, Shireesh Bhat, Ilya Baldin, Kenneth L. Calvert:
Design of a protocol to enable economic transactions for network services. ICC 2015: 5354-5359 - [c92]Xinming Chen, Hao Cai, Tilman Wolf:
Multi-criteria Routing in Networks with Path Choices. ICNP 2015: 334-344 - [c91]Hao Cai, Tilman Wolf:
Source authentication and path validation with orthogonal network capabilities. INFOCOM Workshops 2015: 111-112 - [c90]Renlong Tu, Xin Wang, Jin Zhao, Yue Yang, Lei Shi, Tilman Wolf:
Design of a load-balancing middlebox based on SDN for data centers. INFOCOM Workshops 2015: 480-485 - [c89]Hao Cai, Tilman Wolf:
On 2-way neighbor discovery in wireless networks with directional antennas. INFOCOM 2015: 702-710 - [c88]Pengcheng Wang, Xue Yu, Shuai Chen, Padmaja Duggisetty, Shuo Guo, Tilman Wolf:
Cryptopaper: digital information security for physical documents. SAC 2015: 2157-2164 - [c87]Abhishek Dwaraki, Srini Seetharaman, Sriram Natarajan, Tilman Wolf:
GitFlow: flow revision management for software-defined networks. SOSR 2015: 6:1-6:6 - 2014
- [j32]Tilman Wolf, James Griffioen, Kenneth L. Calvert, Rudra Dutta, George N. Rouskas, Ilya Baldin, Anna Nagurney:
ChoiceNet: toward an economy plane for the internet. Comput. Commun. Rev. 44(3): 58-65 (2014) - [j31]Anna Nagurney, Tilman Wolf:
A Cournot-Nash-Bertrand game theory model of a service-oriented Internet with price and quality competition among network transport providers. Comput. Manag. Sci. 11(4): 475-502 (2014) - [j30]Nauman Javed, Eric Lyons, Michael Zink, Tilman Wolf:
Adaptive wireless mesh networks: Surviving weather without sensing it. Comput. Commun. 54: 120-130 (2014) - [c86]Kekai Hu, Tilman Wolf, Thiago Teixeira, Russell Tessier:
System-Level Security for Network Processors with Hardware Monitors. DAC 2014: 211:1-211:6 - [c85]Peng Wu, Tilman Wolf:
Stack protection in packet processing systems. ICNC 2014: 53-57 - [c84]Karthikeswar Ivaturi, Tilman Wolf:
Mapping of delay-sensitive virtual networks. ICNC 2014: 341-347 - [c83]Hao Cai, Xinming Chen, Tilman Wolf:
OrthCredential: A New Network Capability Design for High-Performance Access Control. ICNP 2014: 233-244 - [c82]Sriram Natarajan, Tilman Wolf:
Network-level privacy for hosted cloud services. NOF 2014: 1-8 - 2013
- [j29]Y. Sinan Hanay, Abhishek Dwaraki, Kekai Hu, Tilman Wolf:
High-performance implementation of in-network traffic pacing for small-buffer networks. Comput. Commun. 36(13): 1450-1459 (2013) - [j28]Tilman Wolf, Sriram Natarajan, Kamlesh T. Vasudevan:
High-Performance Capabilities for 1-Hop Containment of Network Attacks. IEEE/ACM Trans. Netw. 21(6): 1931-1946 (2013) - [c81]Hao Cai, Tilman Wolf:
Design of credentials for high-speed access control in service-oriented networks. ANCS 2013: 119-120 - [c80]Xinming Chen, Brandon Jones, Michela Becchi, Tilman Wolf:
Picking pesky parameters: Optimizing regular expression matching in practice. ANCS 2013: 203-213 - [c79]Kekai Hu, Harikrishnan Chandrikakutty, Russell Tessier, Tilman Wolf:
Scalable hardware monitors to protect network processors from data plane attacks. CNS 2013: 314-322 - [c78]Harikrishnan Chandrikakutty, Deepak Unnikrishnan, Russell Tessier, Tilman Wolf:
High-performance hardware monitors to protect network processors from data plane attacks. DAC 2013: 80:1-80:6 - [c77]Xinming Chen, Danai Chasaki, Tilman Wolf:
External monitoring of highly parallel network processors. HPSR 2013: 197-204 - [c76]Abhishek Dwaraki, Tilman Wolf:
Service Instantiation in an Internet with Choices. ICCCN 2013: 1-7 - [c75]Nauman Javed, Eric Lyons, Michael Zink, Tilman Wolf:
Adaptive Wireless Mesh Networks: Surviving Weather without Sensing It. ICCCN 2013: 1-7 - [c74]Nauman Javed, Tilman Wolf:
Multiple object tracking in sensor networks using distributed clique finding. ICNC 2013: 1139-1145 - [c73]Tilman Wolf, Michael Zink, Anna Nagurney:
The Cyber-Physical Marketplace: A Framework for Large-Scale Horizontal Integration in Distributed Cyber-Physical Systems. ICDCS Workshops 2013: 296-302 - [c72]Tilman Wolf, Lixia Zhang, Zhi-Li Zhang:
Message from the technical program chairs. ICNP 2013: 1 - [c71]George N. Rouskas, Ilia Baldine, Kenneth L. Calvert, Rudra Dutta, Jim Griffioen, Anna Nagurney, Tilman Wolf:
ChoiceNet: Network innovation through choice. ONDM 2013: 1-6 - 2012
- [j27]Danai Chasaki, Tilman Wolf:
Attacks and Defenses in the Data Plane of Networks. IEEE Trans. Dependable Secur. Comput. 9(6): 798-810 (2012) - [j26]Qiang Wu, Tilman Wolf:
Runtime Task Allocation in Multicore Packet Processing Systems. IEEE Trans. Parallel Distributed Syst. 23(10): 1934-1943 (2012) - [c70]Xinming Chen, Tilman Wolf:
Extensible hierarchical simulation of network systems. ANCS 2012: 141-142 - [c69]Xinming Chen, Abhishek Dwaraki, Hao Cai, Tilman Wolf:
Specification and composition of network services in future internet architectures. StudentWorkshop@CoNEXT 2012: 45-46 - [c68]Vikram Desai, Sriram Natarajan, Tilman Wolf:
Packet forwarding misbehavior detection in next-generation networks. ICC 2012: 846-851 - [c67]Y. Sinan Hanay, Wei Li, Russell Tessier, Tilman Wolf:
Saving energy and improving TCP throughput with rate adaptation in Ethernet. ICC 2012: 1249-1254 - [c66]Cong Wang, Shashank Shanbhag, Tilman Wolf:
Virtual network mapping with traffic matrices. ICC 2012: 2717-2722 - [c65]Jin Zhu, Tilman Wolf:
VNMBench: A Benchmark for Virtual Network Mapping Algorithms. ICCCN 2012: 1-8 - [c64]Sriram Natarajan, Tilman Wolf:
Security issues in network virtualization for the future Internet. ICNC 2012: 537-543 - [c63]Sriram Natarajan, Xin Huang, Tilman Wolf:
Efficient conflict detection in flow-based virtualized networks. ICNC 2012: 690-696 - [c62]Nauman Javed, Tilman Wolf:
Automated Sensor Verification Using Outlier Detection in the Internet of Things. ICDCS Workshops 2012: 291-296 - [c61]Tilman Wolf, James Griffioen, Kenneth L. Calvert, Rudra Dutta, George N. Rouskas, Ilia Baldine, Anna Nagurney:
Choice as a principle in network architecture. SIGCOMM 2012: 105-106 - [e2]Tilman Wolf, Andrew W. Moore, Viktor K. Prasanna:
Symposium on Architecture for Networking and Communications Systems, ANCS '12, Austin, TX, USA - October 29 - 30, 2012. ACM 2012, ISBN 978-1-4503-1685-9 [contents] - 2011
- [j25]Lars Eggert, Tilman Wolf:
Special Issue on Architectures and Protocols for the Future Internet. Comput. Networks 55(4): 891-892 (2011) - [j24]Tilman Wolf, Russell Tessier, Gayatri Prabhu:
Securing the data path of next-generation router systems. Comput. Commun. 34(4): 598-606 (2011) - [j23]Yan Cai, Tilman Wolf, Weibo Gong:
Delaying Transmissions in Data Communication Networks to Improve Transport-Layer Performance. IEEE J. Sel. Areas Commun. 29(5): 916-927 (2011) - [j22]Shashank Shanbhag, Tilman Wolf:
Automated composition of data-path functionality in the future internet. IEEE Netw. 25(6): 8-14 (2011) - [c60]Danai Chasaki, Qiang Wu, Tilman Wolf:
Inferring Packet Processing Behavior Using Input/Output Monitors. ANCS 2011: 91-92 - [c59]Sriram Natarajan, Tilman Wolf:
Encrypted Packet Forwarding in Virtualized Networks. ANCS 2011: 213-214 - [c58]Cong Wang, Tilman Wolf:
Virtual Network Mapping with Traffic Matrices. ANCS 2011: 225-226 - [c57]Y. Sinan Hanay, Abhishek Dwaraki, Tilman Wolf:
High-performance implementation of in-network traffic pacing. HPSR 2011: 9-15 - [c56]Yan Cai, Y. Sinan Hanay, Tilman Wolf:
A Study of the Impact of Network Traffic Pacing from Network and End-User Perspectives. ICCCN 2011: 1-6 - [c55]Danai Chasaki, Qiang Wu, Tilman Wolf:
Attacks on Network Infrastructure. ICCCN 2011: 1-8 - 2010
- [j21]Tilman Wolf:
In-network services for customization in next-generation networks. IEEE Netw. 24(4): 6-12 (2010) - [j20]Shufu Mao, Tilman Wolf:
Hardware Support for Secure Processing in Embedded Systems. IEEE Trans. Computers 59(6): 847-854 (2010) - [j19]Tilman Wolf:
Assessing Student Learning in a Virtual Laboratory Environment. IEEE Trans. Educ. 53(2): 216-222 (2010) - [c54]Qiang Wu, Shashank Shanbhag, Tilman Wolf:
Fair multithreading on packet processors for scalable network virtualization. ANCS 2010: 1 - [c53]Danai Chasaki, Tilman Wolf:
Design of a secure packet processor. ANCS 2010: 3 - [c52]Danai Chasaki, Tilman Wolf:
Fast regular expression matching in hardware using NFA-BDD combination. ANCS 2010: 12 - [c51]Qiang Wu, Dilip Joy Mampilly, Tilman Wolf:
Distributed runtime load-balancing for software routers on homogeneous many-core processors. PRESTO@CoNEXT 2010: 1:1-1:6 - [c50]Qiang Wu, Danai Chasaki, Tilman Wolf:
Implementation of a simplified network processor. HPSR 2010: 7-13 - [c49]Tilman Wolf, Soumya Mahadevan:
Convergence of Communication and Processing in Next-Generation Networks. ICC 2010: 1-6 - [c48]Qiang Wu, Tilman Wolf:
Data Path Management in Mesh-Based Programmable Routers. ICC 2010: 1-6 - [c47]Xin Huang, Shashank Shanbhag, Tilman Wolf:
Automated Service Composition and Routing in Networks with Data-Path Services. ICCCN 2010: 1-8 - [c46]Shashank Shanbhag, Yu Gu, Tilman Wolf:
A Taxonomy and Comparative Evaluation of Algorithms for Parallel Anomaly Detection. ICCCN 2010: 1-8 - [c45]Yan Cai, Bo Jiang, Tilman Wolf, Weibo Gong:
A Practical On-line Pacing Scheme at Edges of Small Buffer Networks. INFOCOM 2010: 1424-1432 - [c44]Shashank Shanbhag, Tilman Wolf:
Enforcement of Data-Plane Policies in Next-Generation Networks. POLICY 2010: 137-140
2000 – 2009
- 2009
- [j18]Sameer Ladiwala, Ramaswamy Ramaswamy, Tilman Wolf:
Transparent TCP acceleration. Comput. Commun. 32(4): 691-702 (2009) - [j17]Ramaswamy Ramaswamy, Ning Weng, Tilman Wolf:
Analysis of network processing workloads. J. Syst. Archit. 55(10-12): 421-433 (2009) - [j16]Shashank Shanbhag, Tilman Wolf:
Accurate anomaly detection through parallelism. IEEE Netw. 23(1): 22-28 (2009) - [j15]Ning Weng, Tilman Wolf:
Analytic modeling of network processors for parallel workload mapping. ACM Trans. Embed. Comput. Syst. 8(3): 18:1-18:29 (2009) - [c43]Qiang Wu, Danai Chasaki, Tilman Wolf:
Simplifying data path processing in next-generation routers. ANCS 2009: 11-19 - [c42]Xin Huang, Shashank Shanbhag, Tilman Wolf:
Interfacing to a virtualized network infrastructure through network service abstractions. ANCS 2009: 169-170 - [c41]Yan Cai, Yong Liu, Weibo Gong, Tilman Wolf:
Impact of arrival burstiness on queue length: An infinitesimal perturbation analysis. CDC 2009: 7068-7073 - [c40]Shashank Shanbhag, Tilman Wolf:
AnomBench: A Benchmark for Volume-Based Internet Anomaly Detection. GLOBECOM 2009: 1-6 - [c39]Yan Cai, Y. Sinan Hanay, Tilman Wolf:
Practical Packet Pacing in Small-Buffer Networks. ICC 2009: 1-6 - [c38]Xin Huang, Sivakumar Ganapathy, Tilman Wolf:
Evaluating Algorithms for Composable Service Placement in Computer Networks. ICC 2009: 1-6 - [c37]Qiang Wu, Tilman Wolf:
Support for Dynamic Adaptation in Next Generation Packet Processing Systems. ICC 2009: 1-6 - [c36]Shashank Shanbhag, Xin Huang, Santosh Proddatoori, Tilman Wolf:
Automated Service Composition in Next-Generation Networks. ICDCS Workshops 2009: 245-250 - [c35]Tilman Wolf, Russell Tessier:
Design of a Secure Router System for Next-Generation Networks. NSS 2009: 52-59 - [c34]Qiang Wu, Tilman Wolf:
Design of a network service processing platform for data path customization. PRESTO 2009: 31-36 - [e1]Lars Eggert, Tilman Wolf:
Proceedings of the 2009 workshop on Re-architecting the internet, ReArch@CoNEXT 2009, Rome, Italy, December 1, 2009. ACM 2009, ISBN 978-1-60558-749-3 [contents] - 2008
- [j14]Tilman Wolf, Sri Parameswaran:
Guest editorial for special issue on embedded system security. Des. Autom. Embed. Syst. 12(3): 171-172 (2008) - [j13]Sri Parameswaran, Tilman Wolf:
Embedded systems security - an overview. Des. Autom. Embed. Syst. 12(3): 173-183 (2008) - [j12]Xin Huang, Tilman Wolf:
Evaluating Dynamic Task Mapping in Network Processor Runtime Systems. IEEE Trans. Parallel Distributed Syst. 19(8): 1086-1098 (2008) - [j11]Guy Gogniat, Tilman Wolf, Wayne P. Burleson, Jean-Philippe Diguet, Lilian Bossuet, Romain Vaslin:
Reconfigurable Hardware for High-Security/ High-Performance Embedded Systems: The SAFES Perspective. IEEE Trans. Very Large Scale Integr. Syst. 16(2): 144-155 (2008) - [c33]