A database for publications published by researchers and students at SimulaMet.
Research area
Publication type
- All (990)
- Journal articles (282)
- Books (9)
- Edited books (3)
- Proceedings, refereed (309) Remove Proceedings, refereed <span class="counter">(309)</span> filter
- Book chapters (13)
- Talks, keynote (21)
- PhD theses (9)
- Proceedings, non-refereed (19)
- Posters (15)
- Technical reports (14)
- Manuals (1)
- Talks, invited (182)
- Talks, contributed (30)
- Public outreach (62)
- Miscellaneous (21)
Proceedings, refereed
[PDF] from arxiv.org A study on the characteristics of douyin short videos and implications for edge caching
In ACM TURC 2019. ACM, 2019.Status: Published
[PDF] from arxiv.org A study on the characteristics of douyin short videos and implications for edge caching
Douyin, internationally known as TikTok, has become one of the most successful short-video platforms. To maintain its popularity, Douyin has to provide better Quality of Experience (QoE) to its growing user base. Understanding the characteristics of Douyin videos is thus critical to its service improvement and system design. In this paper, we present an initial study on the fundamental characteristics of Douyin videos based on a dataset of over 260 thousand short videos collected across three months. The characteristics of Douyin videos are found to be significantly different from traditional online videos, ranging from video bitrate, size, to popularity. In particular, the distributions of the bitrate and size of videos follow Weibull distribution. We further observe that the most popular Douyin videos follow Zifp's law on video popularity, but rest of the videos do not. We also investigate the correlation between popularity metrics used for Douyin videos. It is found that the correlation between the number of views and the number of likes are strong, while other correlations are relatively low. Finally, by using a case study, we demonstrate that the above findings can provide important guidance on designing an efficient edge caching system.
Afilliation | Communication Systems |
Project(s) | The Center for Resilient Networks and Applications, Simula Metropolitan Center for Digital Engineering |
Publication Type | Proceedings, refereed |
Year of Publication | 2019 |
Conference Name | ACM TURC 2019 |
Publisher | ACM |
Proceedings, refereed
A 4G/5G Packet Core as VNF with Open Source MANO and OpenAirInterface
In Proceedings of the 28th IEEE International Conference on Software, Telecommunications and Computer Networks (SoftCOM). Hvar, Dalmacija/Croatia: IEEE, 2020.Status: Published
A 4G/5G Packet Core as VNF with Open Source MANO and OpenAirInterface
5G, the fifth generation of mobile broadband networks, is going to make a large range of new applications possible. However, further research is necessary, and the basic step, i.e. setting up a 4G/5G testbed infrastructure, is a complicated and error-prone task. In this abstract and poster, we introduce our open source SimulaMet EPC Virtual Network Function (VNF), as an easy way to set up a 4G/5G testbed based on Open Source MANO and OpenAirInterface. We would like to showcase how a researcher can use our VNF as part of his own research testbed setup. Therefore, the focus is particularly on the user interface details and features of the SimulaMet EPC VNF.
Afilliation | Communication Systems |
Project(s) | The Center for Resilient Networks and Applications, 5G-VINNI: 5G Verticals INNovation Infrastructure , NorNet |
Publication Type | Proceedings, refereed |
Year of Publication | 2020 |
Conference Name | Proceedings of the 28th IEEE International Conference on Software, Telecommunications and Computer Networks (SoftCOM) |
Date Published | 09/2020 |
Publisher | IEEE |
Place Published | Hvar, Dalmacija/Croatia |
Keywords | Evolved Packet Core (EPC), Network Function Virtualisation (NFV), Open Source MANO (OSM), OpenAirInterface, Testbed, Virtual Network Function (VNF) |
A first look at the African's ccTLDs technical environment
In International Conference on e-Infrastructure and e-Services for Developing Countries. Springer, 2020.Status: Published
A first look at the African's ccTLDs technical environment
Leveraging multiple datasets, we evaluate the current status of African ccTLDs technical environment with regard to best practices. Compared to the top 10 ccTLDs, African ccTLDs appear to have enough IPs to maintain service availability while handling authoritative DNS queries. With regard to the early stage of IPv6 deployment in the AFRINIC region, it is interesting to note that 94% of African ccTLDs support IPv6. This is due to the huge adoption of out of region or offshore DNS anycast provider. The majority (84%) of African anycast traffic is handled by non-profit foundations and/or organisations using resources from other RIRs such as RIPE-NCC and ARIN. Furthermore, less than 30% (16) of African ccTLD have signed their zone. From this group, the majority is using the recommended algorithm RSASHA256 (Algorithm 8) as suggested by BCP 14. Strangely some African ccTLDs lack basic DNS configuration such as missing PTR records, lame delegation, EDNS compliance and consistent serial numbers. These misconfigurations can be easily fixed with consistent monitoring or the use of modern automated registry software which comes with internal checks. Overall, African ccTLDs are characterised by the usage of out of region resources.
Afilliation | Communication Systems |
Project(s) | The Center for Resilient Networks and Applications, GAIA |
Publication Type | Proceedings, refereed |
Year of Publication | 2020 |
Conference Name | International Conference on e-Infrastructure and e-Services for Developing Countries |
Publisher | Springer |
Keywords | African ccTLDs, authoritative, dns, Measurements |
A first look at the misuse and abuse of the IPv4 Transfer Market
In International Conference on Passive and Active Network Measurement (PAM). Springer, 2020.Status: Published
A first look at the misuse and abuse of the IPv4 Transfer Market
The depletion of the unallocated IPv4 addresses and the slowpace of IPv6 deployment have given rise to the IPv4 transfer market, the trading of allocated IPv4 prefixes between organizations. Despite the policies established by RIRs to regulate the IPv4 transfer market, IPv4 transfers pose an opportunity for malicious networks, such as spammers and bulletproof ASes, to bypass reputational penalties by obtaining“clean” IPv4 address space or by offloading blacklisted addresses. Addi-tionally, IP transfers create a window of uncertainty about the legitimateownership of prefixes, which leads to inconsistencies in WHOIS recordsand routing advertisements. In this paper we provide the first detailed study of how transferred IPv4 prefixes are misused in the wild, by synthesizing an array of longitudinal IP blacklists, honeypot data, and AS reputation lists. Our findings yield evidence that transferred IPv4 addressblocks are used by malicious networks to address botnets and fraudulentsites in much higher rates compared to non-transferred addresses, while the timing of the attacks indicate efforts to evade filtering mechanisms.
Afilliation | Communication Systems |
Project(s) | Antikraak, The Center for Resilient Networks and Applications, GAIA |
Publication Type | Proceedings, refereed |
Year of Publication | 2020 |
Conference Name | International Conference on Passive and Active Network Measurement (PAM) |
Pagination | 88-103 |
Publisher | Springer |
Keywords | BGP, Blacklists., IPv4 transfers, Routing |
DOI | 10.1007/978-3-030-44081-7_6 |
A Latency Compensation Technique Based on Game Characteristics to Mitigate the Influence of Delay on Cloud Gaming Quality of Experience
In ACM Multimedia Systems Conference 2020 (MMSys 2020). New York, NY, USA: ACM, 2020.Status: Published
A Latency Compensation Technique Based on Game Characteristics to Mitigate the Influence of Delay on Cloud Gaming Quality of Experience
Cloud Gaming (CG) is an immersive multimedia service that promises many benefits. In CG, the games are rendered in a cloud server, and the resulted scenes are streamed as a video sequence to the client. Using CG users are not forced to update their gaming hardware frequently, and available games can be played on any operating system or suitable device. However, cloud gaming requires a reliable and low-latency network, which makes it a very challenging service. Transmission latency strongly affects the playability of a cloud game and consequently reduces the users' Quality of Experience (QoE). In this paper, we propose a latency compensation technique using game adaptation that mitigates the influence of delay on QoE. This technique uses five game characteristics for the adaptation. These characteristics, in addition to an Aim-assistance technique, were implemented in four games for evaluation. A subjective study using 194 participants was conducted using a crowdsourcing approach. The results showed that the majority of the proposed adaptation techniques lead to significant improvements in the cloud gaming QoE.
Afilliation | Machine Learning |
Project(s) | Department of Holistic Systems |
Publication Type | Proceedings, refereed |
Year of Publication | 2020 |
Conference Name | ACM Multimedia Systems Conference 2020 (MMSys 2020) |
Pagination | 15-25 |
Publisher | ACM |
Place Published | New York, NY, USA |
URL | https://dl.acm.org/doi/abs/10.1145/3339825.3391855 |
DOI | 10.1145/3339825.3391855 |
Proceedings, refereed
A Comparative Study of Interactive Environments for Investigative Interview of A Virtual Child Avatar
In IEEE international symposium on multimedia (ISM). IEEE, 2022.Status: Published
A Comparative Study of Interactive Environments for Investigative Interview of A Virtual Child Avatar
Afilliation | Machine Learning |
Project(s) | Department of Holistic Systems |
Publication Type | Proceedings, refereed |
Year of Publication | 2022 |
Conference Name | IEEE international symposium on multimedia (ISM) |
Pagination | 194-201 |
Publisher | IEEE |
DOI | 10.1109/ISM55400.2022.00043 |
Proceedings, refereed
A Deep Learning-Based Tool for Automatic Brain Extraction from Functional Magnetic Resonance Images of Rodents
In Proceedings of SAI Intelligent Systems Conference. Springer, 2021.Status: Published
A Deep Learning-Based Tool for Automatic Brain Extraction from Functional Magnetic Resonance Images of Rodents
Afilliation | Machine Learning |
Project(s) | Department of Holistic Systems |
Publication Type | Proceedings, refereed |
Year of Publication | 2021 |
Conference Name | Proceedings of SAI Intelligent Systems Conference |
Pagination | 549–558 |
Publisher | Springer |
A Demo of Workload Offloading in Mobile Edge Computing Using the Reliable Server Pooling Framework
In Proceedings of the 46th IEEE Conference on Local Computer Networks (LCN). Edmonton, Alberta, Canada: IEEE Computer Society, 2021.Status: Published
A Demo of Workload Offloading in Mobile Edge Computing Using the Reliable Server Pooling Framework
Mobile Edge Computing (MEC) places cloud resources nearby the user, to provide support for latency-sensitive applications. Offloading workload from resource-constrained mobile devices (such as smartphones) into the cloud ecosystem is becoming increasingly popular. In this demonstration, we show how to deploy a mobile network (with OpenAirInterface and Open Source MANO), as well as to adapt the Reliable Server Pooling (RSerPool) framework to efficiently manage MEC as well as multi-cloud resources to run an interactive demo application.
Afilliation | Communication Systems |
Project(s) | SMIL: SimulaMet Interoperability Lab, Simula Metropolitan Center for Digital Engineering, Simula Metropolitan Center for Digital Engineering, MELODIC: Multi-cloud Execution-ware for Large-scale Optimised Data-Intensive Computing, 5G-VINNI: 5G Verticals INNovation Infrastructure , The Center for Resilient Networks and Applications, NorNet |
Publication Type | Proceedings, refereed |
Year of Publication | 2021 |
Conference Name | Proceedings of the 46th IEEE Conference on Local Computer Networks (LCN) |
Date Published | 10/2021 |
Publisher | IEEE Computer Society |
Place Published | Edmonton, Alberta, Canada |
Keywords | Demonstration, Evolved Packet Core (EPC), Mobile Edge Computing (MEC), Multi-Cloud Computing, Network Function Virtualisation (NFV), Reliable Server Pooling (RSerPool) |
URL | https://www.ieeelcn.org/lcn46demos/Demo_4_1570754367.pdf |
Proceedings, refereed
A Distributed Infrastructure to Analyse SIP Attacks in the Internet
In Proceedings of the IFIP Networking Conference (Networking 2014). IFIP, 2014.Status: Published
A Distributed Infrastructure to Analyse SIP Attacks in the Internet
VoIP systems, based on the Session Initiation Protocol\~(SIP), are becoming more and more widespread in the Internet. However, this creates security issues and opens up new opportunities for misuse and fraud. The most widespread threat are multi-stage attacks to commit Toll Fraud. To devise effective countermeasures, it is crucial to know how attacks on these systems are performed in reality. In this paper, we introduce a novel distributed monitoring system with Sensor nodes located in Norway, Germany and China that allow to detect SIP-based attacks from the Internet. Based on experiences from experiments spanning several years, we propose a new setup which allows simple and straightforward addition of new remote observation points. We have deployed this setup in the NorNet testbed and highlight its advantages compared to a previous setup with physically distributed Sensors. We also present results from a 45 day field test with 13 observation points. These results confirm the advantages of a widely distributed monitoring setup and give some new insights into the behavior of the attackers.
Afilliation | Communication Systems, , Communication Systems |
Project(s) | The Center for Resilient Networks and Applications |
Publication Type | Proceedings, refereed |
Year of Publication | 2014 |
Conference Name | Proceedings of the IFIP Networking Conference (Networking 2014) |
Date Published | June |
Publisher | IFIP |
Keywords | Conference |
Proceedings, refereed
A Framework for Less than Best Effort Congestion Control with Soft Deadlines
In 2017 IFIP Networking Conference (IFIP Networking) and Workshops. IEEE, 2017.Status: Published
A Framework for Less than Best Effort Congestion Control with Soft Deadlines
Applications like inter data-centre synchronisation or client-to-cloud backups require a reliable end-to-end data transfer, however, they typically do not have strong capacity or latency constraints, just a loose delivery deadline. Besides, their potential to disrupt more quality-constrained flows should be kept to a minimum. These applications could be well served by a transport protocol providing a less-than-best-effort (LBE) or scavenger service rather than TCP but, neither TCP nor standard LBE methods like LEDBAT consider any notion of deadline or completion time. TCP simply tries to maximise the use of available capacity, while LEDBAT tries to enforce an LBE behaviour regardless of any timeliness requirements.
This paper introduces a framework for adding both LBE behaviour and awareness of “soft” delivery deadlines to any congestion control (CC) algorithm, whether loss-based, delay-based or explicit signaling-based. This effectively allows it to turn an arbitrary CC protocol into a scavenger protocol that dynamically adapts its sending rate to network conditions and remaining time before the deadline, to balance timeliness and transmission aggressiveness. Network utility maximization (NUM) theory provides a solid foundation for the proposal. The effectiveness of the approach is validated by numerical and simulation experiments, with TCP Cubic and Vegas used as examples.
Afilliation | Communication Systems |
Project(s) | NEAT: A New, Evolutive API and Transport-Layer Architecture for the Internet |
Publication Type | Proceedings, refereed |
Year of Publication | 2017 |
Conference Name | 2017 IFIP Networking Conference (IFIP Networking) and Workshops |
Publisher | IEEE |
ISBN Number | 978-3-901882-94-4 |
URL | http://dl.ifip.org/db/conf/networking/networking2017/1570334752.pdf |
DOI | 10.23919/IFIPNetworking.2017.8264853 |