default search action
8th NCA 2009: Cambridge, MA, USA
- Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, NCA 2009, July 9-11, 2009, Cambridge, Massachusetts, USA. IEEE Computer Society 2009, ISBN 978-0-7695-3698-9
Invited Keynote
- Jennifer M. Schopf:
Sustainability and the Office of CyberInfrastructure. 1-3
Best Papers
- Ilir Gashi, Vladimir Stankovic, Corrado Leita, Olivier Thonnard:
An Experimental Study of Diversity with Off-the-Shelf AntiVirus Engines. 4-11 - Jiang Wu, Nancy D. Griffeth, Nancy A. Lynch, Calvin C. Newport, Ralph E. Droms:
Simulating Fixed Virtual Nodes for Adapting Wireline Protocols to MANET. 12-19
Peer-to-Peer Networks
- Mouna Allani, Benoît Garbinato, Amirhossein Malekpour, Fernando Pedone:
QuoCast: A Resource-Aware Algorithm for Reliable Peer-to-Peer Multicast. 20-27 - Flavio Esposito, Ibrahim Matta, Pietro Michiardi, Nobuyuki Mitsutake, Damiano Carra:
Seed Scheduling for Peer-to-Peer Networks. 28-35 - Denvil Smith, Nian-Feng Tzeng:
Proximity-Aware Distributed Mutual Exclusion for Effective Peer-to-Peer Replica Management. 36-43 - Amirhossein Malekpour, Fernando Pedone, Mouna Allani, Benoît Garbinato:
Streamline: An Architecture for Overlay Multicast. 44-51 - Gert Pfeifer, Ryan C. Spring, Christof Fetzer:
Towards Improved Overlay Simulation Using Realistic Topologies. 52-59
Processor Sharing, Job Allocation, and Resource Selection
- Steve Thompson, Lester Lipsky, Sarah Tasneem, Feng Zhang:
Analysis of Round-Robin Implementations of Processor Sharing, Including Overhead. 60-65 - Satish Penmatsa, Anthony T. Chronopoulos:
Comparison of Price-Based Static and Dynamic Job Allocation Schemes for Grid Computing Systems. 66-73 - Joseph S. Gomes:
A Rule Based Co-operative Approach for Cell Selection in High Speed Cellular Networks. 74-81
Distributed Dependable Storage
- Michael Siegenthaler, Ken Birman:
Sharing Private Information Across Distributed Databases. 82-89 - Adam Manzanares, Xiaojun Ruan, Shu Yin, Mais Nijim, Wei Luo, Xiao Qin:
Energy-Aware Prefetching for Parallel Disk Systems: Algorithms, Models, and Evaluation. 90-97
Biologically Inspired and Cognitive Approaches to Mission Survivability (BIOCOMS) Workshop
- Michael Atighetchi, Partha P. Pal:
From Auto-adaptive to Survivable and Self-Regenerative Systems. 98-101 - Richard Ford, William H. Allen, Katherine Hoffman, Attila Ondi, Marco M. Carvalho:
Generic Danger Detection for Mission Continuity. 102-107 - Sharon Simmons, Dennis Edwards:
Survivability through Run-Time Software Evolution. 108-113
Trustworthy Network Computing (TNC) Workshop
- Yih Huang, Anup K. Ghosh:
Automating Intrusion Response via Virtualization for Realizing Uninterruptible Web Services. 114-117 - Marco Arguedas, Carlos Perez, Marco M. Carvalho, Adrian Granados, Kelli Hoback, Wayne Kraus:
Investigating the Use of Topology Adaptation for Robust Multi-path Transport: A Preliminary Study. 118-121 - Chung-wei Lee:
Wireless Transmission Energy Analysis for Interference-Aware and Confidentiality-Enhanced Multipath Routing. 122-125
Adaptive Cloud and Grid Computing (AGC) Workshop and Short Papers (Cloud Computing)
- Giuseppe Minutoli, Antonio Puliafito:
GliteVM: How Science and Business May Benefit from Virtualization. 126-129 - Takahiro Miyamoto, Michiaki Hayashi, Hideaki Tanaka:
Customizing Network Functions for High Performance Cloud Computing. 130-133 - Vincenzo D. Cunsolo, Salvatore Distefano, Antonio Puliafito, Marco Scarpa:
Volunteer Computing and Desktop Cloud: The Cloud@Home Paradigm. 134-139
Network Security
- Carlos Aguilar Melchor, Boussad Ait Salem, Philippe Gaborit:
A Collusion-Resistant Distributed Scalar Product Protocol with Application to Privacy-Preserving Computation of Trust. 140-147 - Soontaree Tanaraksiritavorn, Shivakant Mishra:
A Privacy Preserving Intrusion Tolerant Voting Architecture. 148-155 - Basil AsSadhan, José M. F. Moura, David E. Lapsley, Christine E. Jones, W. Timothy Strayer:
Detecting Botnets Using Command and Control Traffic. 156-162 - Jesus Molina, Michel Cukier:
Evaluating Files to Audit for Detecting Intrusions in FileSystem Data. 163-170
Sensor Networks and Mobile Ad-Hoc Networks (MANETs)
- Goce Trajcevski, Nikolay Valtchanov, Oliviu Ghica, Peter Scheuermann:
A Case for Meta-Triggers in Wireless Sensor Networks. 171-178 - Bayrem Triki, Slim Rekhis, Noureddine Boudriga:
Digital Investigation of Wormhole Attacks in Wireless Sensor Networks. 179-186 - Xiaokang Xiong, Duncan S. Wong, Xiaotie Deng:
TinyPairing: Computing Tate Pairing on Sensor Nodes with Higher Speed and Less Memory. 187-194
Virtualization and Quality of Service
- Michael Le, Andrew Gallagher, Yuval Tamir, Yoshio Turner:
Maintaining Network QoS Across NIC Device Driver Failures Using Virtualization. 195-202 - Younggyun Koh, Calton Pu, Yasushi Shinjo, Hideki Eiraku, Go Saito, Daiyuu Nobori:
Improving Virtualized Windows Network Performance by Delegating Network Processing. 203-210 - Iñigo Goiri, Ferran Julià, Jorge Ejarque, Marc de Palol, Rosa M. Badia, Jordi Guitart, Jordi Torres:
Introducing Virtual Execution Environments for Application Lifecycle Management and SLA-Driven Resource Distribution within Service Providers. 211-218 - Achilles Colombo Prudêncio, Roberto Willrich, Michel Diaz, Saïd Tazi:
Quality of Service Specifications: A Semantic Approach. 219-226
Wireless and Mobile Ad-hoc Networks (MANETs)
- Elmano Ramalho Cavalcanti, Marco Aurélio Spohn:
Estimating the Impact of Mobility Models' Parameters on Mobility Metrics in MANETs. 227-233 - Ilknur Aydin, Chien-Chung Shen:
Performance Evaluation of Concurrent Multipath Transfer Using SCTP Multihoming in Multihop Wireless Networks. 234-241 - Fan Wu, Emmanuel Agu, Clifford Lindsay, Chung-Han Chen:
Unequal Error Protection (UEP) for Wavelet-Based Wireless 3D Mesh Transmission. 242-249 - Filippo Gandino, Renato Ferrero, Bartolomeo Montrucchio, Maurizio Rebaudengo:
Introducing Probability in RFID Reader-to-Reader Anti-collision. 250-257
Security
- Hakem Beitollahi, Geert Deconinck:
Empirical Study of Tolerating Denial-of-Service Attacks with the Fosel Architecture. 258-261 - Peidong Zhu, Xiangjiang Hu, Huayang Cao, Xiaoqiang Wang:
TTM Based Security Enhancement for Inter-domain Routing Protocol. 262-265 - Michael Atighetchi, Partha P. Pal:
Attribute-Based Prevention of Phishing Attacks. 266-269 - Michael D. Kelly, Sean J. Geoghegan:
FIRST. 270-273
Peer-to-Peer and Data Transfer
- Min Yang, Yuanyuan Yang:
Adaptive Network Coding for Heterogeneous Peer-to-Peer Streaming Systems. 274-277 - Ghassan Karame, Mario Cagalj, Srdjan Capkun:
Small Coalitions: Lightweight Collaboration for Efficient P2P Downloads. 278-283 - Sharrukh Zaman, Daniel Grosu:
A Distributed Algorithm for Web Content Replication. 284-287 - Yongmao Ren, Haina Tang, Jun Li, Hualin Qian:
A Novel Congestion Control Algorithm for High Performance Bulk Data Transfer. 288-291
Wireless Networks
- Yong Hwan Kim, Sung Soo Kim, Kwang Seon Ahn:
A Rapid Tag Identification Method with Two Slots in RFID Systems. 292-295 - Neila Krichene, Noureddine Boudriga:
Serving Handing Over Stations within the Mobile IEEE 802.16 Mesh Mode Context. 296-299 - Riccardo Manfrin, Andrea Zanella, Michele Zorzi:
Functional and Performance Analysis of CalRadio 1 Platform. 300-305 - Yu Zhou, Mira Yun, Timothy Kim, Amrinder Arora, Hyeong-Ah Choi:
RL-Based Queue Management for QoS Support in Multi-channel Multi-radio Mesh Networks. 306-309
Architectures and Protocols
- Nuno M. Garcia, Przemyslaw Lenkiewicz, Mário M. Freire, Paulo P. Monteiro:
A New Architecture for Optical Burst Switching Networks Based on Cooperative Control. 310-313 - Fumio Nakanjima, Hitoshi Oi:
Optimizations of Large Receive Offload in Xen. 314-318 - Wilfried Steiner, Günther Bauer, Brendan Hall, Michael Paulitsch, Srivatsan Varadarajan:
TTEthernet Dataflow Concept. 319-322 - Sung-Hyun Nam, Hyunwoo Hwang, Ju-Hyun Kim, Kyung-Geun Lee:
Fast Macro Handover in Hierarchical Mobile IPv6. 323-326 - Zheng Wang, Xiaodong Lee, Jian Jin, Baoping Yan:
Efficient Filtering Algorithm for Repeated Queries in DNS Log. 327-330
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.