![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
26th ICDCS 2006: Lisboa, Portugal
- 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 4-7 July 2006, Lisboa, Portugal. IEEE Computer Society 2006, ISBN 0-7695-2540-7
Introduction
- Message from the General Chair.
- Program Co-chair's Message.
- Program and Organizing Committee.
- Full Program Committee.
- External Reviewers.
Session 1A: Middleware
- Michael Menth, Robert Henjes:
Analysis of the Message Waiting Time for the FioranoMQ JMS Server. 1 - Francisco Perez-Sorrosal, Marta Patiño-Martínez
, Ricardo Jiménez-Peris, Jaksa Vuckovic:
Highly Available Long Running Transactions and Activities for J2EE Applications. 2 - Jin Nakazawa, Hideyuki Tokuda, W. Keith Edwards, Umakishore Ramachandran:
A Bridging Framework for Universal Interoperability in Pervasive Systems. 3
Session 1B: Network Optimization
- Long Le, Kevin Jeffay, F. Donelson Smith:
A Loss and Queuing-Delay Controller for Router Buffer Management. 4 - Jiangzhuo Chen, Ravi Sundaram, Madhav V. Marathe, Rajmohan Rajaraman:
The Confluent Capacity of the Internet: Congestion vs. Dilation. 5 - Sumantra R. Kundu, Bodhisatwa Chakravarty, Kalyan Basu, Sajal K. Das
:
FastFlow: A Framework for Accurate Characterization of Network Traffic. 6
Session 1C: Autonomic Computing
- Dimitrios E. Pendarakis, Jeremy Silber, Laura Wynter:
Autonomic Management of Stream Processing Applications via Adaptive Bandwidth Control. 7 - Sandip Agarwala, Karsten Schwan:
SysProf: Online Distributed Behavior Diagnosis through Fine-grain System Monitoring. 8 - Nagarajan Kandasamy, Sherif Abdelwahed
, Mohit Khandekar:
A Hierarchical Optimization Framework for Autonomic Performance Management of Distributed Computing Systems. 9
Session 2A: Security
- Michael T. Goodrich, Michael Sirivianos
, John Solis, Gene Tsudik, Ersin Uzun:
Loud and Clear: Human-Verifiable Authentication Based on Audio. 10 - Yougang Song, Ying Xu, Brett D. Fleisch:
Design and Performance Evaluation of a Proxy-based Java Rewriting Security System. 11 - Thomas J. E. Schwarz, Ethan L. Miller:
Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage. 12
Session 2B: Peer-to-Peer I
- Kai Wei, Alan J. Smith, Yih-Farn Robin Chen, Binh Vo:
WhoPay: A Scalable and Anonymous Payment System for Peer-to-Peer Environments. 13 - Ivan Osipkov, Peng Wang, Nicholas Hopper:
Robust Accounting in Decentralized P2P Storage Systems. 14 - Haiying Shen, Cheng-Zhong Xu
:
Elastic Routing Table with Provable Performance for Congestion Control in DHT Networks. 15
Session 2C: Fault-Tolerance
- Gadi Taubenfeld:
Computing in the Presence of Timing Failures. 16 - Domenico Cotroneo, Salvatore Orlando, Stefano Russo
:
Failure classification and analysis of the Java Virtual Machine. 17 - Selma Ikiz, Vijay K. Garg:
Efficient Incremental Optimal Chain Partition of Distributed Program Traces. 18
Session 3A: Distributed Processing I
- Kunal Agrawal, Yuxiong He, Charles E. Leiserson:
An Empirical Evaluation ofWork Stealing with Parallelism Feedback. 19 - Qi Zhang, Ningfang Mi, Alma Riska, Evgenia Smirni:
Load Unbalancing to Improve Performance under Autocorrelated Traffic. 20 - Jianhong Zhou, Ashfaq A. Khokhar:
ParRescue: Scalable Parallel Algorithm and Implementation for Biclustering over Large Distributed Datasets. 21
Session 3B: Publish-Subscribe
- Emmanuelle Anceaume, Maria Gradinariu, Ajoy Kumar Datta, Gwendal Simon
, Antonino Virgillito:
A Semantic Overlay for Self- Peer-to-Peer Publish/Subscribe. 22 - Ioannis Aekaterinidis, Peter Triantafillou:
PastryStrings: A Comprehensive Content-Based Publish/Subscribe DHT Network. 23 - Cristian Lumezanu, Sumeer Bhola, Mark Astley:
Utility Optimization for Event-Driven Distributed Infrastructures. 24
Session 3C: Web and Collaborative Systems
- Yixin Diao, Joseph L. Hellerstein, Sujay S. Parekh, Hidayatullah Shaikh, Maheswaran Surendra:
Controlling Quality of Service in Multi-Tier Web Applications. 25 - Vasile Gaburici, Peter J. Keleher, Bobby Bhattacharjee:
File System Support for Collaboration in theWide Area. 26 - Giorgio Zanin, Alessandro Mei, Luigi V. Mancini
:
A Secure and Efficient Large Scale Distributed System for Data Sharing. 27
Session 4A: Distributed Processing II
- Antonio Plaza
, Javier Plaza
, David Valencia:
Distributed Computing for Efficient Hyperspectral Imaging Using Fully Heterogeneous Networks of Workstations. 28 - Gennaro Cordasco
, Grzegorz Malewicz, Arnold L. Rosenberg:
On Scheduling Expansive and Reductive Dags for Internet-Based Computing. 29 - Jason D. Sonnek, Mukesh Nathan, Abhishek Chandra, Jon B. Weissman:
Reputation-Based Scheduling on Unreliable Distributed Infrastructures. 30
Session 4B: Storage
- Akshat Verma, Ashok Anand:
On Store Placement for Response Time Minimization in Parallel Disks. 31 - Qing Yang, Weijun Xiao, Jin Ren:
PRINS: Optimizing Performance of Reliable Internet Storages. 32 - Kristal T. Pollack, Sandeep Uttamchandani:
Genesis: A Scalable Self-Evolving Performance Management Framework for Storage Systems. 33
Session 4C: Byzantine Fault-Tolerance
- Barbara Liskov, Rodrigo Rodrigues
:
Tolerating Byzantine Faulty Clients in a Quorum System. 34 - Alysson Neves Bessani
, Joni da Silva Fraga, Miguel Correia
, Lau Cheuk Lung:
Sharing Memory between Byzantine Processes using Policy-Enforced Tuple Spaces. 35 - Vadim Drabkin, Roy Friedman, Alon Kama:
Practical Byzantine Group Communication. 36
Session 5A: Countering Attacks
- Fanglu Guo, Jiawu Chen, Tzi-cker Chiueh:
Spoof Detection for Preventing DoS Attacks against DNS Servers. 37 - Xuxian Jiang, AAron Walters, Dongyan Xu, Eugene H. Spafford
, Florian P. Buchholz, Yi-Min Wang:
Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach. 38 - Yan Gao, Zhichun Li, Yan Chen:
A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks. 39
Session 5B: Consistency and Cache Management
- Xin Chen, Haining Wang, Shansi Ren:
DNScup: Strong Cache Consistency Protocol for DNS. 40 - Ming Zhao, Renato J. O. Figueiredo
:
Application-Tailored Cache Consistency for Wide-Area File Systems. 41 - Song Jiang, Fabrizio Petrini, Xiaoning Ding
, Xiaodong Zhang:
A Locality-Aware Cooperative Cache Management Protocol to Improve Network File System Performance. 42
Session 5C: Content Delivery
- Lakshmish Ramaswamy, Ling Liu, Jianjun Zhang:
Efficient Formation of Edge Cache Groups for Dynamic Content Delivery. 43 - Chee Yong Chan, Yuan Ni:
Content-based Dissemination of Fragmented XML Data. 44 - Mayur Deshpande, Bo Xing, Iosif Lazaridis, Bijit Hore, Nalini Venkatasubramanian, Sharad Mehrotra:
CREW: A Gossip-based Flash-Dissemination System. 45
Session 6A: Routing in MANETs
- Mingqiang Xue, Inn Inn Er, Winston Khoon Guan Seah
:
Analysis of Clustering and Routing Overhead for Clustered Mobile Ad Hoc Networks. 46 - Sameh Gobriel, Daniel Mossé, Rami G. Melhem:
Mitigating the FloodingWaves Problem in Energy-Efficient Routing for MANETs. 47 - Sabyasachi Roy, Dimitrios Koutsonikolas, Saumitra M. Das, Y. Charlie Hu:
High-Throughput Multicast Routing Metrics in Wireless Mesh Networks. 48 - Shibo Wu, K. Selçuk Candan:
GMP: Distributed Geographic Multicast Routing in Wireless Sensor Networks. 49
Session 6B: Sensor Networks
- Shashidhar Gandham, Ying Zhang, Qingfeng Huang:
Distributed Minimal Time Convergecast Scheduling in Wireless Sensor Networks. 50 - Joel W. Branch, Boleslaw K. Szymanski
, Chris Giannella, Ran Wolff, Hillol Kargupta:
In-Network Outlier Detection in Wireless Sensor Networks. 51 - Landon P. Cox, Miguel Castro, Antony I. T. Rowstron:
POS: A Practical Order Statistics Service forWireless Sensor Networks. 52 - Patrick E. Lanigan, Rajeev Gandhi, Priya Narasimhan:
Sluice: Secure Dissemination of Code Updates in Sensor Networks. 53
Session 6C: Networks
- Ying Zhu, Baochun Li:
Overlay Multicast with Inferred Link Capacity Correlations. 54 - Seong-ryong Kang, Amit Bhati, Dmitri Loguinov, Xiliang Liu:
On Estimating Tight-Link Bandwidth Characteristics over Multi-Hop Paths. 55 - Sam C. M. Lee, Joe W. J. Jiang, John C. S. Lui, Dah-Ming Chiu:
Interplay of ISPs: Distributed Resource Allocation and Revenue Maximization. 56 - Stefan Dobrev, Paola Flocchini, Nicola Santoro:
Cycling Through a Dangerous Network: A Simple Efficient Strategy for Black Hole Search. 57
Session 7A: Secure Communication
- Sachin Agarwal, Moshe Laifenfeld, Ari Trachtenberg, Murat Alanyali:
Fast data access over asymmetric channels using fair and secure bandwidth sharing. 58 - Ginger Perng, Michael K. Reiter, Chenxi Wang:
M2: Multicasting Mixes for Efficient and Anonymous Communication. 59 - Yuanyuan Zhao, Daniel C. Sturman:
Dynamic Access Control in a Content-based Publish/Subscribe System with Delivery Guarantees. 60
Session 7B: Wireless Networks
- Ray K. Lam, John C. S. Lui, Dah-Ming Chiu:
On the Access Pricing Issues of Wireless Mesh Networks. 61 - Richard T. B. Ma
, Vishal Misra, Dan Rubenstein:
Modeling and Analysis of Generalized Slotted-Aloha MAC Protocols in Cooperative, Competitive and Adversarial Environments. 62 - Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. Krishnamurthy
, Chinya V. Ravishankar
, Dharmaiah Manjunath:
Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks. 63
Session 7C: Peer-to-Peer II
- Dongsheng Li, Xicheng Lu, Baosheng Wang, Jinshu Su
, Jiannong Cao
, Keith C. C. Chan
, Hong Va Leong:
Delay-Bounded Range Queries in DHT-based Peer-to-Peer Systems. 64 - Ouri Wolfson
, Bo Xu, Huabei Yin, Hu Cao:
Search-and-Discover in Mobile P2P Network Databases. 65 - Ruchir Bindal, Pei Cao, William Chan, Jan Medved, George Suwala, Tony Bates, Amy Zhang:
Improving Traffic Locality in BitTorrent via Biased Neighbor Selection. 66
Session 8A: Reliable and Secure Sensor Networks
- Dan Wang
, Qian Zhang
, Jiangchuan Liu:
Self-Protection for Wireless Sensor Networks. 67 - Fabian Kuhn, Thomas Moscibroda, Roger Wattenhofer:
Fault-Tolerant Clustering in Ad Hoc and Sensor Networks. 68 - Hongbo Jiang, Shudong Jin:
Scalable and Robust Aggregation Techniques for Extracting Statistical Information in Sensor Networks. 69
Session 8B: Streaming
- Shansi Ren, Lei Guo, Xiaodong Zhang:
ASAP: an AS-Aware Peer-Relay Protocol for High Quality VoIP. 70 - Lisa Amini, Navendu Jain, Anshul Sehgal, Jeremy Silber, Olivier Verscheure:
Adaptive Control of Extreme-scale Stream Processing Systems. 71 - Zoë Abrams, Jie Liu:
Greedy is Good: On Service Tree Placement for In-Network Stream Processing. 72
Session 8C: Network Characterization
- Rongmei Zhang, Y. Charlie Hu, Xiaojun Lin, Sonia Fahmy
:
A Hierarchical Approach to Internet Distance Prediction. 73 - Jonathan Ledlie, Peter R. Pietzuch
, Margo I. Seltzer:
Stable and Accurate Network Coordinates. 74 - Ittai Abraham, Cyril Gavoille, Andrew V. Goldberg, Dahlia Malkhi:
Routing in Networks with Low Doubling Dimension. 75
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.