Zum Hauptinhalt springen

Showing 51–68 of 68 results for author: Tyson, G

.
  1. Trollslayer: Crowdsourcing and Characterization of Abusive Birds in Twitter

    Authors: Alvaro Garcia-Recuero, Aneta Morawin, Gareth Tyson

    Abstract: As of today, abuse is a pressing issue to participants and administrators of Online Social Networks (OSN). Abuse in Twitter can spawn from arguments generated for influencing outcomes of a political election, the use of bots to automatically spread misinformation, and generally speaking, activities that deny, disrupt, degrade or deceive other participants and, or the network. Given the difficulty… ▽ More

    Submitted 14 December, 2018; originally announced December 2018.

    Comments: SNAMS 2018

  2. arXiv:1810.10963  [pdf, other

    cs.NI

    Shaping the Internet: 10 Years of IXP Growth

    Authors: Timm Böttger, Gianni Antichi, Eder L. Fernandes, Roberto di Lallo, Marc Bruyere, Steve Uhlig, Gareth Tyson, Ignacio Castro

    Abstract: Over the past decade, IXPs have been playing a key role in enabling interdomain connectivity. Their traffic volumes have grown dramatically and their physical presence has spread throughout the world. While the relevance of IXPs is undeniable, their long-term contribution to the shaping of the current Internet is not fully understood yet. In this paper, we look into the impact on Internet routes… ▽ More

    Submitted 8 July, 2019; v1 submitted 25 October, 2018; originally announced October 2018.

  3. arXiv:1804.03116  [pdf, other

    cs.CY cs.SI

    On Analyzing Self-Driving Networks: A Systems Thinking Approach

    Authors: Touseef Yaqoob, Muhammad Usama, Junaid Qadir, Gareth Tyson

    Abstract: The networking field has recently started to incorporate artificial intelligence (AI), machine learning (ML), big data analytics combined with advances in networking (such as software-defined networks, network functions virtualization, and programmable data planes) in a bid to construct highly optimized self-driving and self-organizing networks. It is worth remembering that the modern Internet tha… ▽ More

    Submitted 9 April, 2018; originally announced April 2018.

  4. arXiv:1804.02679  [pdf, other

    cs.CY

    Movie Pirates of the Caribbean: Exploring Illegal Streaming Cyberlockers

    Authors: Damilola Ibosiola, Benjamin Steer, Alvaro Garcia-Recuero, Gianluca Stringhini, Steve Uhlig, Gareth Tyson

    Abstract: Online video piracy (OVP) is a contentious topic, with strong proponents on both sides of the argument. Recently, a number of illegal websites, called streaming cyberlockers, have begun to dominate OVP. These websites specialise in distributing pirated content, underpinned by third party indexing services offering easy-to-access directories of content. This paper performs the first exploration of… ▽ More

    Submitted 8 April, 2018; originally announced April 2018.

    Comments: 10 pages, 9 figures, Video streaming, Cyberlockers, Piracy

  5. arXiv:1804.01473  [pdf, other

    cs.SI

    WhatsApp, Doc? A First Look at WhatsApp Public Group Data

    Authors: Kiran Garimella, Gareth Tyson

    Abstract: In this dataset paper we describe our work on the collection and analysis of public WhatsApp group data. Our primary goal is to explore the feasibility of collecting and using WhatsApp data for social science research. We therefore present a generalisable data collection methodology, and a publicly available dataset for use by other researchers. To provide context, we perform statistical explorati… ▽ More

    Submitted 9 July, 2018; v1 submitted 4 April, 2018; originally announced April 2018.

    Comments: Accepted as a dataset paper at the 12th International AAAI Conference on Web and Social Media (ICWSM 2018). Please cite the ICWSM version

  6. Facebook (A)Live? Are live social broadcasts really broadcasts?

    Authors: Aravindh Raman, Gareth Tyson, Nishanth Sastry

    Abstract: The era of live-broadcast is back but with two major changes. First, unlike traditional TV broadcasts, content is now streamed over the Internet enabling it to reach a wider audience. Second, due to various user-generated content platforms it has become possible for anyone to get involved, streaming their own content to the world. This emerging trend of going live usually happens via social platfo… ▽ More

    Submitted 7 March, 2018; originally announced March 2018.

    Comments: Published at The Web Conference 2018 (WWW 2018). Please cite the WWW version

  7. arXiv:1705.06530  [pdf, other

    cs.SI

    Fake it till you make it: Fishing for Catfishes

    Authors: Walid Magdy, Yehia Elkhatib, Gareth Tyson, Sagar Joglekar, Nishanth Sastry

    Abstract: Many adult content websites incorporate social networking features. Although these are popular, they raise significant challenges, including the potential for users to "catfish", i.e., to create fake profiles to deceive other users. This paper takes an initial step towards automated catfish detection. We explore the characteristics of the different age and gender groups, identifying a number of di… ▽ More

    Submitted 29 June, 2017; v1 submitted 18 May, 2017; originally announced May 2017.

    Comments: Paper to appear in IEEE/ACM ASONAM 2017

  8. arXiv:1704.01508  [pdf, other

    cs.SI

    An in-depth characterisation of Bots and Humans on Twitter

    Authors: Zafar Gilani, Reza Farahbakhsh, Gareth Tyson, Liang Wang, Jon Crowcroft

    Abstract: Recent research has shown a substantial active presence of bots in online social networks (OSNs). In this paper we utilise our past work on studying bots (Stweeler) to comparatively analyse the usage and impact of bots and humans on Twitter, one of the largest OSNs in the world. We collect a large-scale Twitter dataset and define various metrics based on tweet metadata. We divide and filter the da… ▽ More

    Submitted 5 April, 2017; originally announced April 2017.

    Comments: This is a technical report of 18 pages including references

  9. arXiv:1607.01952  [pdf, ps, other

    cs.SI

    A First Look at User Activity on Tinder

    Authors: Gareth Tyson, Vasile C. Perta, Hamed Haddadi, Michael C. Seto

    Abstract: Mobile dating apps have become a popular means to meet potential partners. Although several exist, one recent addition stands out amongst all others. Tinder presents its users with pictures of people geographically nearby, whom they can either like or dislike based on first impressions. If two users like each other, they are allowed to initiate a conversation via the chat feature. In this paper we… ▽ More

    Submitted 7 July, 2016; originally announced July 2016.

  10. arXiv:1606.05519  [pdf, other

    cs.NI

    Open Connect Everywhere: A Glimpse at the Internet Ecosystem through the Lens of the Netflix CDN

    Authors: Timm Böttger, Felix Cuadrado, Gareth Tyson, Ignacio Castro, Steve Uhlig

    Abstract: The importance of IXPs to interconnect different networks and exchange traffic locally has been well studied over the last few years. However, far less is known about the role IXPs play as a platform to enable large-scale content delivery and to reach a world-wide customer base. In this paper, we study the infrastructure deployment of a content hypergiant, Netflix, and show that the combined world… ▽ More

    Submitted 12 January, 2018; v1 submitted 17 June, 2016; originally announced June 2016.

    Journal ref: Böttger, T., Cuadrado, F., Tyson, G., Castro, I., Uhlig, S.. (2018). "Open Connect Everywhere: A Glimpse at the Internet Ecosystem Through the Lens of the Netflix CDN". In ACM SIGCOMM Computer Communications Review (CCR), 48(1)

  11. arXiv:1605.09471  [pdf, other

    cs.NI

    Staggercast: Demand-Side Management for ISPs

    Authors: Gareth Tyson, Nishanth Sastry, Richard Mortier, Nick Feamster

    Abstract: The continuing expansion of Internet media consumption has increased traffic volumes, and hence congestion, on access links. In response, both mobile and wireline ISPs must either increase capacity or perform traffic engineering over existing resources. Unfortunately, provisioning timescales are long, the process is costly, and single-homing means operators cannot balance across the last mile. Ins… ▽ More

    Submitted 30 May, 2016; originally announced May 2016.

  12. arXiv:1604.05925  [pdf, other

    cs.NI

    Charting an Intent Driven Network

    Authors: Yehia Elkhatib, Gareth Tyson, Geoff Coulson

    Abstract: The current strong divide between applications and the network control plane is desirable for many reasons; but a downside is that the network is kept in the dark regarding the ultimate purposes and intentions of applications and, as a result, is unable to optimize for these. An alternative approach, explored in this paper, is for applications to declare to the network their abstract intents and a… ▽ More

    Submitted 20 April, 2016; originally announced April 2016.

  13. Does the Internet deserve everybody?

    Authors: Yehia Elkhatib, Gareth Tyson, Arjuna Sathiaseelan

    Abstract: There has been a long standing tradition amongst developed nations of influencing, both directly and indirectly, the activities of developing economies. Behind this is one of a range of aims: building/improving living standards, bettering the social status of recipient communities, etc. In some cases, this has resulted in prosperous relations, yet often this has been seen as the exploitation of a… ▽ More

    Submitted 23 November, 2015; originally announced November 2015.

    Journal ref: Proceedings of the 2015 ACM SIGCOMM Workshop on Ethics in Networked Systems Research

  14. arXiv:1412.0041  [pdf, other

    cs.NI cs.DC cs.GT cs.PF

    FairCache: Introducing Fairness to ICN Caching - Technical Report

    Authors: Liang Wang, Gareth Tyson, Jussi Kangasharju, Jon Crowcroft

    Abstract: Information-centric networking extensively uses universal in-network caching. However, developing an efficient and fair collaborative caching algorithm for selfish caches is still an open question. In addition, the communication overhead induced by collaboration is especially poorly understood in a general network setting such as realistic ISP and Autonomous System networks. In this paper, we addr… ▽ More

    Submitted 2 May, 2017; v1 submitted 28 November, 2014; originally announced December 2014.

    Comments: 17 pages

  15. RiPKI: The Tragic Story of RPKI Deployment in the Web Ecosystem

    Authors: Matthias Wählisch, Robert Schmidt, Thomas C. Schmidt, Olaf Maennel, Steve Uhlig, Gareth Tyson

    Abstract: Web content delivery is one of the most important services on the Internet. Access to websites is typically secured via TLS. However, this security model does not account for prefix hijacking on the network layer, which may lead to traffic blackholing or transparent interception. Thus, to achieve comprehensive security and service availability, additional protective mechanisms are necessary such a… ▽ More

    Submitted 2 November, 2015; v1 submitted 2 August, 2014; originally announced August 2014.

    Comments: Previous arXiv version of this paper has been published under the title "When BGP Security Meets Content Deployment: Measuring and Analysing RPKI-Protection of Websites", Proc. of Fourteenth ACM Workshop on Hot Topics in Networks (HotNets), New York:ACM, 2015

    ACM Class: C.2.2, C.2.5

  16. arXiv:1401.6508  [pdf, other

    cs.NI

    The Effect of Network and Infrastructural Variables on SPDY's Performance

    Authors: Yehia Elkhatib, Gareth Tyson, Michael Welzl

    Abstract: HTTP is a successful Internet technology on top of which a lot of the web resides. However, limitations with its current specification, i.e. HTTP/1.1, have encouraged some to look for the next generation of HTTP. In SPDY, Google has come up with such a proposal that has growing community acceptance, especially after being adopted by the IETF HTTPbis-WG as the basis for HTTP/2.0. SPDY has the poten… ▽ More

    Submitted 25 January, 2014; originally announced January 2014.

    Report number: SCC-2013-01

  17. arXiv:0912.0625  [pdf, other

    cs.NI

    Unraveling BitTorrent's File Unavailability: Measurements, Analysis and Solution Exploration

    Authors: Sebastian Kaune, Ruben Cuevas Rumin, Gareth Tyson, Andreas Mauthe, Carmen Guerrero, Ralf Steinmetz

    Abstract: BitTorrent suffers from one fundamental problem: the long-term availability of content. This occurs on a massive-scale with 38% of torrents becoming unavailable within the first month. In this paper we explore this problem by performing two large-scale measurement studies including 46K torrents and 29M users. The studies go significantly beyond any previous work by combining per-node, per-torren… ▽ More

    Submitted 3 December, 2009; originally announced December 2009.

  18. Archer: A Community Distributed Computing Infrastructure for Computer Architecture Research and Education

    Authors: Renato Figueiredo, P. Oscar Boykin, Jose A. B. Fortes, Tao Li, Jie-Kwon Peir, David Wolinsky, Lizy John, David Kaeli, David Lilja, Sally McKee, Gokhan Memik, Alain Roy, Gary Tyson

    Abstract: This paper introduces Archer, a community-based computing resource for computer architecture research and education. The Archer infrastructure integrates virtualization and batch scheduling middleware to deliver high-throughput computing resources aggregated from resources distributed across wide-area networks and owned by different participating entities in a seamless manner. The paper discusse… ▽ More

    Submitted 10 July, 2008; originally announced July 2008.

    Comments: 11 pages, 2 figures. Describes the Archer project, http://archer-project.org

    ACM Class: C.0; I.6.3; C.2.4