


default search action
ICDCN 2016: Singapore
- Proceedings of the 17th International Conference on Distributed Computing and Networking, Singapore, January 4-7, 2016. ACM 2016, ISBN 978-1-4503-4032-8

Wireless and mobile networks
- Bogdan S. Chlebus, Shailesh Vaya:

Distributed communication in bare-bones wireless networks. 1:1-1:10 - Peter Hegarty, Anders Martinsson, Dmitry Zhelezov:

When can multi-agent rendezvous be executed in time linear in the diameter of a plane configuration? 2:1-2:8 - Md. Majharul Islam Rajib, Asis Nasipuri:

A predictive retransmission scheme for cooperative routing in intermittently connected sensor networks. 3:1-3:10 - Ying Li, Radim Bartos:

Connectedness-aware copy-adaptive routing protocol in intermittently connected networks. 4:1-4:4
Byzantine and fault-tolerant algorithms
- Achour Mostéfaoui, Hamouma Moumen

, Michel Raynal:
Modular randomized byzantine k-set agreement in asynchronous message-passing systems. 5:1-5:10 - Silvia Bonomi

, Antonella Del Pozzo, Maria Potop-Butucaru:
Tight self-stabilizing mobile byzantine-tolerant atomic register. 6:1-6:10 - Manfred Schwarz, Kyrill Winkler

, Ulrich Schmid:
Fast consensus under eventually stabilizing message adversaries. 7:1-7:10 - Christian Fernández-Campusano

, Mikel Larrea
, Roberto Cortiñas
, Michel Raynal:
A communication-efficient leader election algorithm in partially synchronous systems prone to crash-recovery and omission failures. 8:1-8:4
Infrastructure networking
- Ertem Esiner, Anwitaman Datta

:
Layered security for storage at the edge: on decentralized multi-factor access control. 9:1-9:10 - Hugo Meyer

, José Carlos Sancho, Milica Mrdakovic, Shuping Peng, Dimitra Simeonidou, Wang Miao, Nicola Calabretta:
Scaling architecture-on-demand based optical networks. 10:1-10:10 - Walid Benchaita, Samir Ghamri-Doudane, Sébastien Tixeuil:

Stability and optimization of DNS-based request redirection in CDNs. 11:1-11:10 - Md. Rakibul Haque, Mahmuda Naznin

, Rifat Shahriyar:
Distributed low overhead ID in a wireless sensor network. 12:1-12:4
Internet and web applications
- Christian Decker

, Jochen Seidel, Roger Wattenhofer:
Bitcoin meets strong consistency. 13:1-13:10 - Binanda Sengupta

, Samiran Bag, Sushmita Ruj, Kouichi Sakurai:
Retricoin: Bitcoin based on compact proofs of retrievability. 14:1-14:10 - Paritosh Garg, Kishore Kothapalli:

STIC-D: algorithmic techniques for efficient parallel pagerank computation on real-world graphs. 15:1-15:10 - Anshu S. Anand

, R. K. Shyamasundar, Sathya Peri:
Opacity proof for CaPR+ algorithm. 16:1-16:4
Distributed systems and applications
- Faizal Riaz-ud-Din, Robin Doss

, Wanlei Zhou
:
String matching query verification on cloud-hosted databases. 17:1-17:10 - Cesare Cugnasco, Yolanda Becerra

, Jordi Torres, Eduard Ayguadé:
D8-tree: a de-normalized approach for multidimensional data analysis on key-value databases. 18:1-18:10 - Mohammad Roohitavaf, Sandeep S. Kulkarni:

Stabilization and fault-tolerance in presence of unchangeable environment actions. 19:1-19:10 - Swetha P. T. Srinivasan, Umesh Bellur

, Ramamurthy Badrinath:
Debunking the myth that tight packing is energy conserving. 20:1-20:4
Best paper session
- Klaus-Tycho Förster

, Thomas Luedi, Jochen Seidel, Roger Wattenhofer:
Local checkability, no strings attached. 21:1-21:10 - Yuan He, Krishnan Gopalakrishnan, Eli Gafni:

Group mutual exclusion in linear time and space. 22:1-22:10 - Armando Castañeda, Danny Dolev, Amitabh Trehan

:
Compact routing messages in self-healing trees. 23:1-23:10 - Sebastian Brandt

, Klaus-Tycho Förster
, Roger Wattenhofer:
Augmenting anycast network flows. 24:1-24:10 - Girisha De Silva, Bin Bin Chen

, Mun Choon Chan:
Collaborative cellular tail energy reduction: feasibility and fairness. 25:1-25:10 - Vishal Girisagar, Tram Truong Huu

, Mohan Gurusamy
:
Mapping workflow resource requests for bandwidth efficiency in data centers. 26:1-26:10 - Gil Einziger, Roy Friedman:

Counting with TinyTable: every bit counts! 27:1-27:10
Miscellaneous
- Jurek Czyzowicz, Stefan Dobrev, Konstantinos Georgiou, Evangelos Kranakis

, Fraser MacQuarrie:
Evacuating two robots from multiple unknown exits in a circle. 28:1-28:8 - Ravi Kishore

, Chiranjeevi Vanarasa, Tushant Jha, Kannan Srinathan:
On perfectly secret message transmission in digraphs tolerating dual failures. 29:1-29:10 - Iosif Salem

, Elad Michael Schiller, Marina Papatriantafilou
, Philippas Tsigas
:
Shared-object system equilibria: delay and throughput analysis. 30:1-30:10 - Anshu Yadav, Varsha Apte:

Dynamic server consolidation algorithms: a profit model for evaluation and an improvement. 31:1-31:4
Applications
- Oliver Jensen, Mohamed G. Gouda, Lili Qiu:

A secure credit card protocol over NFC. 32:1-32:9 - Sonia Soubam

, Dipyaman Banerjee, Vinayak S. Naik
, Dipanjan Chakraborty:
BluePark: tracking parking and un-parking events in indoor garages. 33:1-33:4 - Souvik Basu, Siuli Roy, DasBit Sipra

, Somprakash Bandyopadhyay:
A human mobility based knowledge sharing approach for post disaster need assessment using DTN. 34:1-34:4 - Megha Chaudhary, Aneesh Bansal, Divya Bansal, Bhaskaran Raman, K. K. Ramakrishnan

, Naveen Aggarwal
:
Finding occupancy in buses using crowdsourced data from smartphones. 35:1-35:4 - Caroline Quéva, Damien Couroussé, Henri-Pierre Charles

:
Self-optimisation using runtime code generation for wireless sensor networks. 36:1-36:6 - Debnath Mukherjee, Suman Datta:

Incremental time series algorithms for IoT analytics: an example from autoregression. 37:1-37:6 - Avik Ghose, Arijit Chowdhury, Vivek Chandel, Tanushree Banerjee, Tapas Chakravarty:

An enhanced automated system for evaluating harsh driving using smartphone sensors. 38:1-38:6 - Sayantani Saha, Rounak Das, Suman Datta, Sarmistha Neogy:

A cloud security framework for a data centric WSN application. 39:1-39:6 - Sriyanjana Adhikary, Sankhayan Choudhury, Samiran Chattopadhyay:

A new routing protocol for WBAN to enhance energy consumption and network lifetime. 40:1-40:6 - Raghu K. Ganti, Mudhakar Srivatsa, B. S. Manjunath:

Entity reconciliation in a multi-camera network. 41:1-41:6 - Alice Toniolo

, Alun D. Preece, Will Webberley, Timothy J. Norman
, Paul Sullivan, Timothy Dropps:
Conversational intelligence analysis. 42:1-42:6 - Rui Zhao, Anna Zhou, Kezhi Mao

:
Automatic detection of cyberbullying on social networks based on bullying features. 43:1-43:6 - Bing Tian Dai

, Kasthuri Jayarajah, Ee-Peng Lim
, Archan Misra
, Shriguru Nayak:
A study on Singapore haze. 44:1-44:6 - Philips Kokoh Prasetyo, Palakorn Achananuparp

, Ee-Peng Lim
:
On analyzing geotagged tweets for location-based patterns. 45:1-45:6 - Ghadeer Neama, Rana W. Alaskar, Mohammad A. Alkandari

:
Privacy, security, risk, and trust concerns in e-commerce. 46:1-46:6 - Chafika Benzaid

, Abderrahman Boulgheraif, Fatma Zohra Dahmane, Ameer Al-Nemrat, Khaled Zeraoulia:
Intelligent detection of MAC spoofing attack in 802.11 network. 47:1-47:5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














