Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Adam D. Bradley is active.

Publication


Featured researches published by Adam D. Bradley.


international world wide web conferences | 1999

Changes in Web Client Access Patterns: Characteristics and Caching Implications

Paul Barford; Azer Bestavros; Adam D. Bradley; Mark Crovella

Understanding the nature of the workloads and system demands created by users of the World Wide Web is crucial to properly designing and provisioning Web services. Previous measurements of Web client workloads have been shown to exhibit a number of characteristic features; however, it is not clear how those features may be changing with time. In this study we compare two measurements of Web client workloads separated in time by three years, both captured from the same computing facility at Boston University. The older dataset, obtained in 1995, is well known in the research literature and has been the basis for a wide variety of studies. The newer dataset was captured in 1998 and is comparable in size to the older dataset. The new dataset has the drawback that the collection of users measured may no longer be representative of general Web users; however, using it has the advantage that many comparisons can be drawn more clearly than would be possible using a new, different source of measurement. Our results fall into two categories. First we compare the statistical and distributional properties of Web requests across the two datasets. This serves to reinforce and deepen our understanding of the characteristic statistical properties of Web client requests. We find that the kinds of distributions that best describe document sizes have not changed between 1995 and 1998, although specific values of the distributional parameters are different. Second, we explore the question of how the observed differences in the properties of Web client requests, particularly the popularity and temporal locality properties, affect the potential for Web file caching in the network. We find that for the computing facility represented by our traces between 1995 and 1998, (1) the benefits of using size‐based caching policies have diminished; and (2) the potential for caching requested files in the network has declined.


international conference on network protocols | 2005

Typed abstraction of complex network compositions

Azer Bestavros; Adam D. Bradley; Assaf J. Kfoury; Ibrahim Matta

The heterogeneity and open nature of network systems make analysis of compositions of components quite challenging, making the design and implementation of robust network services largely inaccessible to the average programmer. We propose the development of a novel type system and practical type spaces which reflect simplified representations of the results and conclusions which can be derived from complex compositional theories in more accessible ways, essentially allowing the system architect or programmer to be exposed only to the inputs and output of compositional analysis without having to be familiar with the ins and outs of its internals. Toward this end, we present the TRAFFIC (typed representation and analysis of flows for interoperability checks) framework, a simple flow-composition and typing language with corresponding type system. We then discuss and demonstrate the expressive power of a type space for TRAFFIC derived from the network calculus, allowing us to reason about and infer such properties as data arrival, transit, and loss rates in large composite network applications


international conference on network protocols | 2003

Systematic verification of safety properties of arbitrary network protocol compositions using CHAIN

Adam D. Bradley; Azer Bestavros; Assaf J. Kfoury

Formal correctness of complex multi-party protocols can be difficult to verify. While models of specific sign constraints, protocols which lend themselves to arbitrarily many compositions of agents -such as the chaining of proxies or the peering of routers- are more difficult to verify because they represent potentially infinite state spaces and may exhibit emergent behaviors which may not materialize under particular fixed compositions. We address this challenge by developing an algebraic approach that enables us to reduce arbitrary compositions of network agents into a behaviorally-equivalent (with respect to some correctness property) compact, conical representation, which is amenable to mechanical verification. Our approach consists of an algebra and a set of property-preserving rewrite rules for the canonical homomorphic abstraction of infinite network protocol composition (CHAIN). Using CHAIN, an expression over our algebra (i.e., a set of configurations of network protocol agents) can be reduced to another behaviorally-equivalent expression (i.e., a smaller set of configurations). Repeated applications of such rewrite rules produce a canonical expression which can be checked mechanically. We demonstrate our approach by characterizing deadlock-prone configurations of HTTP agents, as well as establishing useful properties of an overlay protocol for scheduling MPEG frames, and of a protocol for Web intracache consistency.


international world wide web conferences | 1998

Changes in Web Client Access Patterns

Adam D. Bradley; Azer Bestavros; Mark Crovella; Paul Barford


broadband communications, networks and systems | 2005

SNBENCH: a development and run-time platform for rapid deployment of sensor network applications

Azer Bestavros; Adam D. Bradley; Assaf J. Kfoury; Michael J. Ocean


global communications conference | 2002

Basis token consistency: supporting strong Web cache consistency

Adam D. Bradley; Azer Bestavros


Archive | 2002

BASIS TOKEN CONSISTENCY Extending and Evaluating a Novel Web Consistency Algorithm

Adam D. Bradley; Azer Bestavros


Archive | 2002

Safe Composition of Web Communication Protocols for Extensible Edge Services

Adam D. Bradley; Azer Bestavros; Assaf J. Kfoury


acm special interest group on data communication | 2004

Safe compositional specification of networking systems

Azer Bestavros; Adam D. Bradley; Assaf J. Kfoury; Ibrahim Matta


Archive | 2004

A type-disciplined approach to developing resources and applications for the world-wide web

Adam D. Bradley; Azer Bestavros

Collaboration


Dive into the Adam D. Bradley's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Paul Barford

University of Wisconsin-Madison

View shared research outputs
Researchain Logo
Decentralizing Knowledge