<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Enrico Bocchi</style></author><author><style face="normal" font="default" size="100%">Idilio Drago</style></author><author><style face="normal" font="default" size="100%">Marco Mellia</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Personal Cloud Storage: Usage, Performance and Impact of Terminals </style></title><secondary-title><style face="normal" font="default" size="100%">4th IEEE International Conference on Cloud Networking (IEEE CloudNet 2015)</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cloud storage</style></keyword><keyword><style  face="normal" font="default" size="100%">Monitoring</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">10/2015</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://www.ieee-cloudnet.org/program.html</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">IEEE</style></publisher><pub-location><style face="normal" font="default" size="100%">Niagara Falls, Canada</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Personal cloud storage services such as Dropbox and OneDrive are popular among Internet users. They help in sharing content and backing up data by relying on the cloud to store files. The rise of mobile terminals and the presence of new providers question whether the usage of cloud storage is evolving. This knowledge is essential to understand the workload these services need to handle, their performance, and implications. In this paper we present a comprehensive characterization of personal cloud storage services. Relying on traces collected for one month in an operational network, we show that users of each service present distinct behaviors. Dropbox is now threatened by competitors, with OneDrive and Google Drive reaching large market shares. However, the popularity of the latter services seems to be driven by their integration into Windows and Android. Indeed, around 50% of their users do not produce any workload. Considering performance, providers show distinct trade-offs, with bottlenecks that hardly allow users to fully exploit their access line bandwidth. Finally, usage of cloud services is now ordinary among mobile users, thanks to the automatic backup of pictures and media files.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Dimitri Papadimitriou</style></author><author><style face="normal" font="default" size="100%">Bernard Fortz</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Robust cooperative monitoring problem</style></title><secondary-title><style face="normal" font="default" size="100%">Reliable Networks Design and Modeling (RNDM), 2015 7th International Workshop on</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">box+ellipsoidal perturbation set</style></keyword><keyword><style  face="normal" font="default" size="100%">box+polyhedral perturbation set</style></keyword><keyword><style  face="normal" font="default" size="100%">cooperative communication</style></keyword><keyword><style  face="normal" font="default" size="100%">integer programming</style></keyword><keyword><style  face="normal" font="default" size="100%">linear programming</style></keyword><keyword><style  face="normal" font="default" size="100%">MILP</style></keyword><keyword><style  face="normal" font="default" size="100%">Minimization</style></keyword><keyword><style  face="normal" font="default" size="100%">mixed-integer linear program</style></keyword><keyword><style  face="normal" font="default" size="100%">Monitoring</style></keyword><keyword><style  face="normal" font="default" size="100%">Optimization</style></keyword><keyword><style  face="normal" font="default" size="100%">passive monitoring point configuration</style></keyword><keyword><style  face="normal" font="default" size="100%">passive monitoring point placement</style></keyword><keyword><style  face="normal" font="default" size="100%">robust cooperative monitoring problem</style></keyword><keyword><style  face="normal" font="default" size="100%">Robustness</style></keyword><keyword><style  face="normal" font="default" size="100%">Routing</style></keyword><keyword><style  face="normal" font="default" size="100%">telecommunication traffic</style></keyword><keyword><style  face="normal" font="default" size="100%">time-varying traffic flow monitoring</style></keyword><keyword><style  face="normal" font="default" size="100%">Topology</style></keyword><keyword><style  face="normal" font="default" size="100%">Uncertainty</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">10/2015</style></date></pub-dates></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Papadimitriou, D.</style></author><author><style face="normal" font="default" size="100%">Fortz, B.</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Robust cooperative monitoring problem</style></title><secondary-title><style face="normal" font="default" size="100%">Reliable Networks Design and Modeling (RNDM), 2015 7th International Workshop on</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">box+ellipsoidal perturbation set</style></keyword><keyword><style  face="normal" font="default" size="100%">box+polyhedral perturbation set</style></keyword><keyword><style  face="normal" font="default" size="100%">cooperative communication</style></keyword><keyword><style  face="normal" font="default" size="100%">integer programming</style></keyword><keyword><style  face="normal" font="default" size="100%">linear programming</style></keyword><keyword><style  face="normal" font="default" size="100%">MILP</style></keyword><keyword><style  face="normal" font="default" size="100%">Minimization</style></keyword><keyword><style  face="normal" font="default" size="100%">mixed-integer linear program</style></keyword><keyword><style  face="normal" font="default" size="100%">Monitoring</style></keyword><keyword><style  face="normal" font="default" size="100%">Optimization</style></keyword><keyword><style  face="normal" font="default" size="100%">passive monitoring point configuration</style></keyword><keyword><style  face="normal" font="default" size="100%">passive monitoring point placement</style></keyword><keyword><style  face="normal" font="default" size="100%">robust cooperative monitoring problem</style></keyword><keyword><style  face="normal" font="default" size="100%">Robustness</style></keyword><keyword><style  face="normal" font="default" size="100%">Routing</style></keyword><keyword><style  face="normal" font="default" size="100%">telecommunication traffic</style></keyword><keyword><style  face="normal" font="default" size="100%">time-varying traffic flow monitoring</style></keyword><keyword><style  face="normal" font="default" size="100%">Topology</style></keyword><keyword><style  face="normal" font="default" size="100%">Uncertainty</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Oct</style></date></pub-dates></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Alessandro Finamore</style></author><author><style face="normal" font="default" size="100%">Vinicius Gehlen</style></author><author><style face="normal" font="default" size="100%">Marco Mellia</style></author><author><style face="normal" font="default" size="100%">Maurizio M Munafo'</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The need for an intelligent measurement plane: The example of time-variant CDN policies</style></title><secondary-title><style face="normal" font="default" size="100%">Telecommunications Network Strategy and Planning Symposium (NETWORKS), 2012 XVth International </style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Facebook</style></keyword><keyword><style  face="normal" font="default" size="100%">Google</style></keyword><keyword><style  face="normal" font="default" size="100%">Monitoring</style></keyword><keyword><style  face="normal" font="default" size="100%">Organizations</style></keyword><keyword><style  face="normal" font="default" size="100%">Servers</style></keyword><keyword><style  face="normal" font="default" size="100%">Streaming media</style></keyword><keyword><style  face="normal" font="default" size="100%">Throughput</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">10/2012</style></date></pub-dates></dates><pages><style face="normal" font="default" size="100%">1 - 6 </style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In this paper we characterize how web-based services are delivered by large organizations in today's Internet. Taking advantage oftwo week-long data sets separated in time by 10 months and reporting the web activity of more than 10,000 ADSL residential customers, we identify the services offered by large organizations like Google, Akamai and Amazon. We then compare theevolution of both policies used to serve requests, and the infrastructure they use to match the users' demand. Results depict anovercrowded scenario in constant evolution. Big-players are more and more responsible for the majority of the volume and a plethora of other organizations offering similar or more specific services through different CDNs and traffic policies. Unfortunately, no standard tools and methodologies are available to capture and expose the hidden properties of this in constant evolution picture. A deeper understanding of such dynamics is however fundamental to improve the performance of current and future Internet. To this extend, we claim the need for a Internet-wide, standard, flexible and intelligent measurement plane to be added tothe current Internet infrastructure.</style></abstract></record></records></xml>