Wisconsin Alumni Research Foundation

Technology

Location-Aware Communication System for Mobile Devices

The proliferation of LEDs for ambient lighting is driving smart lighting technologies. Visible light communication (VLC) is an emerging technology that uses LEDs as transmitters and light sensors (e.g...
Learn More
Xinyu Zhang, Suman Banerjee, Jialiang Zhang, Chi Zhang | P160080US01

Technology

Middlebox Scaling for the Cloud

As data is shuffled around in computer networks, important components called middleboxes (also called network functions or NFs) examine and modify network traffic to meet security requirements, perfor...
Learn More
Srinivasa Akella, Aaron Gember-Jacobson, Chaithan Prakash, Raajay Viswanathan | P150073US01

Technology

Managing Virtual Memory to Reduce Latency

To execute a computer program, a processor can access memory to read or write data. The accessed data may be identified by a unique physical address. Modern systems are able to hide the physical addre...
Learn More
Mark Hill, Michael Swift, Arkaprava Basu | P130081US01

Technology

LEAP - Improved Data Lookup for High-Speed Routers

Networks allow data exchange between linked computers. Data messages are divided into packets, which are able to navigate complex and changing networks. A router, or switch, reads packet addresses and...
Learn More
Karthikeyan Sankaralingam, Eric Harris, Samuel Wasmundt | P120239US01

Technology

Method for Efficient On-Demand Data Streaming

Many different types of media can be obtained from websites (i.e., online), including music, television shows and distance education programs. When delivered over the Internet, these types of media ar...
Learn More
Mary Vernon, Derek Eager, John Zahorjan | P00018US

Technology

Semantically-Aware Network Intrusion Signature Generator

Network intrusion detection systems (NIDS) can help protect computer networks from worms, viruses and other malicious software. Today’s NIDS rely on a set of simple signatures to identify malici...
Learn More
Paul Barford, Somesh Jha, Vinod Yegneswaran, Jonathon Giffin | P05038US

Technology

Scalable Monitor of Malicious Network Traffic

UW-Madison researchers previously described a system of analyzing malicious network traffic to automatically generate signatures that may be used by a network intrusion detection system (NIDS) to prot...
Learn More
Paul Barford, Vinod Yegneswaran, David Plonka | P05182US

WARF