@inproceedings{papapanagiotou_callaway_devetsikiotis_2012, title={Chunk and object level deduplication for web optimization: A hybrid approach}, DOI={10.1109/icc.2012.6363843}, abstractNote={Proxy caches or Redundancy Elimination (RE) systems have been used to remove redundant bytes in WAN links. However, they come with some inherited deficiencies. Proxy caches provide less savings than RE systems, and RE systems have limitations related to speed, memory and storage overhead. In this paper we advocate the use of a hybrid approach, in which each type of cache acts as a module in a system with shared memory and storage space. A static scheduler precedes the cache modules and determines what types of traffic should be forwarded to which module. We also propose several optimizations for each of the modules, such that the storage and memory overhead are minimized. We evaluate the proposed system by performing a trace driven emulation. Our results indicate that a hybrid system is able to provide better savings than a proxy cache, or a standalone RE system. The hybrid system requires less memory, less disk space and provides a speed-up ratio equal to three compared to an RE system.}, booktitle={2012 ieee international conference on communications (icc)}, author={Papapanagiotou, I. and Callaway, R. D. and Devetsikiotis, M.}, year={2012} } @article{papapanagiotou_granelli_kliazovich_devetsikiotis_2011, title={A metamodeling approach for cross-layer optimization: A framework and application to Voice over WiFi}, volume={19}, ISSN={["1878-1462"]}, DOI={10.1016/j.simpat.2011.06.005}, abstractNote={Cross-layer design has been proposed to optimize the performance of networks by exploiting the interrelations among parameters and procedures at different levels of the protocol stack. This paper introduces a quantitative framework for the study of cross-layer interactions, which enables design engineers to analyze and quantify interlayer dependencies and to identify the optimal operating point of the system, by using network economic theory principles. The framework is then used for performance optimization of a single-cell Voice over WiFi (VoWiFi) system. Insights gained from the considered scenario enable us to define a novel cross-layer Call Admission Control (CAC) scheme. The multistage CAC takes into account Quality of Service (QoS) criteria, which provide satisfaction to the end user, as well as revenue criteria that maximize the possible profit of the WiFi provider.}, number={9}, journal={SIMULATION MODELLING PRACTICE AND THEORY}, author={Papapanagiotou, Ioannis and Granelli, Fabrizio and Kliazovich, Dzmitry and Devetsikiotis, Michael}, year={2011}, month={Oct}, pages={2117–2129} } @article{gossett_papapanagiotou_devetsikiotis_2010, title={An apparatus for P2P classification in Netflow traces}, ISSN={["2166-0069"]}, DOI={10.1109/glocomw.2010.5700160}, abstractNote={Application classification from Netflow traces is a challenging process due to the lack of payload information. It is even becoming more challenging when the applications running in the network tend to hide under well known ports, encrypt packets and are distributed. In this paper, we propose an in-the-box apparatus for Netflow classification of Bit Torrent applications. The apparatus includes several device optimizations and requires low processing power. It was developed by reverse engineering the Bit Torrent protocol and by identifying connection patterns. The accuracy of the algorithm reaches high values specifically for Bit Torrent peers that use the DHT protocol.}, journal={2010 IEEE GLOBECOM WORKSHOPS}, author={Gossett, Andrew M. and Papapanagiotou, Ioannis and Devetsikiotis, Michael}, year={2010}, pages={1361–1366} }