default search action
9th NCA 2010: Cambridge, MA, USA
- Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, NCA 2010, July 15-17, 2010, Cambridge, Massachusetts, USA. IEEE Computer Society 2010, ISBN 978-1-4244-7628-2
Long Papers
Best Student Paper
- Benoît Garbinato, Adrian Holzer, François Vessaz:
Six-Shot Multicast: A Location-Aware Strategy for Efficient Message Routing in MANETs. 1-9
Performance Optimization
- Xin He, Jorgen Peddersen, Sri Parameswaran:
Improved Architectures for Range Encoding in Packet Classification System. 10-19 - Roberto Palmieri, Francesco Quaglia, Paolo Romano:
AGGRO: Boosting STM Replication via Aggressively Optimistic Transaction Processing. 20-27 - Derek Doran, Lester Lipsky, Steve Thompson:
Cost-Based Optimization of Buffer Size in M/G/1/N Systems under Different Service-Time Distributions. 28-35
Fault and Failure Mangement
- Zhexi Pan, Yuanyuan Yang, Dawei Gong:
Distributed Clustering Algorithms for Lossy Wireless Sensor Networks. 36-43 - Timo Lindhorst, Georg Lukas, Edgar Nett:
Modeling Fast Link Failure Detection for Dependable Wireless Mesh Networks. 44-51 - Fabien Chaix, Dimiter Avresky, Nacer-Eddine Zergainoh, Michael Nicolaidis:
Fault-Tolerant Deadlock-Free Adaptive Routing for Any Set of Link and Node Failures in Multi-cores Systems. 52-59
Cloud and Web Services
- João Paulo Magalhães, Luís Moura Silva:
Detection of Performance Anomalies in Web-Based Applications. 60-67 - Antonio Celesti, Massimo Villari, Antonio Puliafito:
Ecosystem of Cloud Naming Systems: An Approach for the Management and Integration of Independent Cloud Name Spaces. 68-75 - Vatche Ishakian, Raymond Sweha, Jorge Londoño, Azer Bestavros:
Colocation as a Service: Strategic and Operational Services for Cloud Colocation. 76-83 - Dhiah Al-Shammary, Ibrahim Khalil:
SOAP Web Services Compression Using Variable and Fixed Length Coding. 84-91
Security
- Edmond Holohan, Michael Schukat:
Authentication Using Virtual Certificate Authorities: A New Security Paradigm for Wireless Sensor Networks. 92-99 - Joseph A. Cooley, Roger I. Khazan, Benjamin W. Fuller, Galen E. Pickard:
GROK: A Practical System for Securing Group Communications. 100-107 - Katerina Goseva-Popstojanova, Risto Pantev, Ana Dimitrijevikj, Brandon Miller:
Quantification of Attackers Activities on Servers Running Web 2.0 Applications. 108-116
Performance Modelling and Assessment
- Charlie Wiseman, Jyoti Parwatikar, Ken Wong, John D. DeHart, Jonathan S. Turner:
Design of an Extensible Network Testbed. 117-124 - Imad Antonios, Reetu Dhar, Feng Zhang, Lester Lipsky:
A Performance Model of Gossip-Based Update Propagation. 125-131 - Francisco J. Martinez, Manuel Fogué, Manuel Coll, Juan-Carlos Cano, Carlos Miguel Tavares Calafate, Pietro Manzoni:
Assessing the Impact of a Realistic Radio Propagation Model on VANET Scenarios Using Real Maps. 132-139
Algorithms
- Moumen Hamouma, Achour Mostéfaoui:
Time-Free Authenticated Byzantine Consensus. 140-146 - Wai Gen Yee, Linh Thai Nguyen, Ophir Frieder:
Improving Conjunctive Query Routing in Unstructured P2P Networks. 147-154
Short Papers
Best Paper
- Benjamin W. Fuller, Roger I. Khazan, Joseph A. Cooley, Galen E. Pickard, Daniil M. Utin:
ASE: Authenticated Statement Exchange. 155-161
Cloud Computing and Web Services
- Gemma Reig, Javier Alonso, Jordi Guitart:
Prediction of Job Resource Requirements for Deadline Schedulers to Manage High-Level SLAs on the Cloud. 162-167 - Amir H. Basirat, Anang Hudaya Muhamad Amin, Asad I. Khan:
Under the Cloud: A Novel Content Addressable Data Framework for Cloud Parallelization to Create and Virtualize New Breeds of Cloud Applications. 168-173 - Bruno Tardiole Kuehne, Júlio Cezar Estrella, Maycon L. M. Peixoto, Thiago Caproni Tavares, Regina Helena Carlucci Santana, Marcos José Santana:
Dynamic Web Service Composition Middleware: A New Approach for QoS Guarantees. 174-177 - Malith Jayasinghe, Zahir Tari, Panlop Zeephongsekul:
Multi-level Multi-server Task Assignment with Work-Conserving Migration. 178-181
Security
- Andrew Gronosky, Michael Atighetchi, Partha P. Pal:
Understanding the Vulnerabilities of a SOA Platform - A Case Study. 182-187 - Brijesh Kumar, Constantine Katsinis:
A Network Based Approach to Malware Detection in Large IT Infrastructures. 188-191 - Paolo Gasti, Alessio Merlo, Giuseppe Ciaccio, Giovanni Chiola:
On the Integrity of Network Coding-Based Anonymous P2P File Sharing Networks. 192-197 - Baber Aslam, Lei Wu, Cliff Changchun Zou:
PwdIP-Hash: A Lightweight Solution to Phishing and Pharming Attacks. 198-203
Wireless Sensor Networks and Mobile Ad Hoc Networks
- Nathalie Dessart, Hacène Fouchal, Philippe Hunel, Nicolas Vidot:
Anomaly Detection with Wireless Sensor Networks. 204-209 - Naimah Yaakob, Ibrahim Khalil, Jiankun Hu:
Performance Analysis of Optimal Packet Size for Congestion Control in Wireless Sensor Networks. 210-213 - Song Guo, Thomas D. C. Little:
QoS-enabled Video Streaming in Wireless Sensor Networks. 214-217 - Shanika Karunasekera, Champake Mendis, Alex Skvortsov, Ajith Gunatilaka:
A Decentralized Dynamic Sensor Activation Protocol for Chemical Sensor Networks. 218-223
Fault Tolerance
- Luciana Arantes, Pierre Sens, Gaël Thomas, Denis Conan, Léon Lim:
Partition Participant Detector with Dynamic Paths in Mobile Networks. 224-228 - Jesper Grønbæk, Hans-Peter Schwefel, Andrea Ceccarelli, Andrea Bondavalli:
Improving Robustness of Network Fault Diagnosis to Uncertainty in Observations. 229-232 - Balazs Gerofi, Yutaka Ishikawa:
A Multi-core Approach to Providing Fault Tolerance for Non-deterministic Services. 233-238
Applications
- Fábio D. Beirão, João V. P. Gomes, Pedro R. M. Inácio, Manuela Pereira, Mário M. Freire:
NetOdyssey - A New Tool for Real-Time Analysis of Network Traffic. 239-242 - Panagiotis Georgopoulos, Ben McCarthy, Christopher Edwards:
Location Awareness Rescue System: Support for Mountain Rescue Teams. 243-246
Overlay Networks and Routing
- Ubaid Abbasi, Toufik Ahmed:
K-overlay: A Kautz Tree Structure for Video on Demand System. 247-252 - Mahathir Almashor, Ibrahim Khalil, Geoff Leach:
Dynamic Game-Play Arbitrators with 3D Voronoi Diagrams. 253-256 - Marcos L. P. Bueno, Gina M. B. Oliveira:
Pareto-Based Optimization of Multicast Flows with QoS and Traffic Engineering Requirements. 257-260 - Rujiroj Tiengtavat, Wei-Ming Lin:
Advanced Hashing with Hybrid Key Duplication for IP Address Lookup. 261-264 - Taehoon Kim, Sungwoo Tak:
Evaluation of a Hardware-Software Codesign Technique of Network Protocol Stacks. 265-268
TNC Workshop
- Jana Neumann, Nils Hoeller, Christoph Reinke, Volker Linnemann:
Redundancy Infrastructure for Service-Oriented Wireless Sensor Networks. 269-274 - Izabela Moise, Michel Hurfin, Linda Zeghache, Nadjib Badache:
Remote Reliable Services to Support Transactional Mobile Agents. 275-279 - Daniel Silvestre, Teresa Maria Vazão:
A Geographic Unicast Routing Algorithm Using no Location Service. 280-285
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.