Network Computing and Applications 2009 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


8th NCA 2009: Cambridge, MA, USA

jump to

- > Home > Conferences and Workshops > NCA
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, NCA 2009, July 9-11, 2009, Cambridge, Massachusetts, USA. IEEE Computer Society 2009, ISBN 978-0-7695-3698-9
Invited Keynote

Jennifer M. Schopf
:
Sustainability and the Office of CyberInfrastructure. 1-3
Best Papers

Ilir Gashi
, Vladimir Stankovic
, Corrado Leita, Olivier Thonnard:
An Experimental Study of Diversity with Off-the-Shelf AntiVirus Engines. 4-11
Jiang Wu, Nancy D. Griffeth, Nancy A. Lynch, Calvin C. Newport, Ralph E. Droms:
Simulating Fixed Virtual Nodes for Adapting Wireline Protocols to MANET. 12-19
Peer-to-Peer Networks

Mouna Allani, Benoît Garbinato
, Amirhossein Malekpour, Fernando Pedone
:
QuoCast: A Resource-Aware Algorithm for Reliable Peer-to-Peer Multicast. 20-27
Flavio Esposito, Ibrahim Matta
, Pietro Michiardi, Nobuyuki Mitsutake, Damiano Carra:
Seed Scheduling for Peer-to-Peer Networks. 28-35
Denvil Smith, Nian-Feng Tzeng:
Proximity-Aware Distributed Mutual Exclusion for Effective Peer-to-Peer Replica Management. 36-43
Amirhossein Malekpour, Fernando Pedone
, Mouna Allani, Benoît Garbinato
:
Streamline: An Architecture for Overlay Multicast. 44-51
Gert Pfeifer, Ryan C. Spring, Christof Fetzer:
Towards Improved Overlay Simulation Using Realistic Topologies. 52-59
Processor Sharing, Job Allocation, and Resource Selection

Steve Thompson, Lester Lipsky, Sarah Tasneem, Feng Zhang:
Analysis of Round-Robin Implementations of Processor Sharing, Including Overhead. 60-65
Satish Penmatsa, Anthony T. Chronopoulos
:
Comparison of Price-Based Static and Dynamic Job Allocation Schemes for Grid Computing Systems. 66-73
Joseph S. Gomes:
A Rule Based Co-operative Approach for Cell Selection in High Speed Cellular Networks. 74-81
Distributed Dependable Storage

Michael Siegenthaler, Ken Birman
:
Sharing Private Information Across Distributed Databases. 82-89
Adam Manzanares, Xiaojun Ruan, Shu Yin, Mais Nijim, Wei Luo, Xiao Qin
:
Energy-Aware Prefetching for Parallel Disk Systems: Algorithms, Models, and Evaluation. 90-97
Biologically Inspired and Cognitive Approaches to Mission Survivability (BIOCOMS) Workshop

Michael Atighetchi, Partha P. Pal
:
From Auto-adaptive to Survivable and Self-Regenerative Systems. 98-101
Richard Ford, William H. Allen
, Katherine Hoffman, Attila Ondi, Marco M. Carvalho
:
Generic Danger Detection for Mission Continuity. 102-107
Sharon Simmons, Dennis Edwards:
Survivability through Run-Time Software Evolution. 108-113
Trustworthy Network Computing (TNC) Workshop

Yih Huang, Anup K. Ghosh:
Automating Intrusion Response via Virtualization for Realizing Uninterruptible Web Services. 114-117
Marco Arguedas, Carlos Perez, Marco M. Carvalho
, Adrian Granados, Kelli Hoback, Wayne Kraus:
Investigating the Use of Topology Adaptation for Robust Multi-path Transport: A Preliminary Study. 118-121
Chung-wei Lee:
Wireless Transmission Energy Analysis for Interference-Aware and Confidentiality-Enhanced Multipath Routing. 122-125
Adaptive Cloud and Grid Computing (AGC) Workshop and Short Papers (Cloud Computing)

Giuseppe Minutoli, Antonio Puliafito
:
GliteVM: How Science and Business May Benefit from Virtualization. 126-129
Takahiro Miyamoto, Michiaki Hayashi, Hideaki Tanaka:
Customizing Network Functions for High Performance Cloud Computing. 130-133
Vincenzo D. Cunsolo, Salvatore Distefano
, Antonio Puliafito, Marco Scarpa:
Volunteer Computing and Desktop Cloud: The Cloud@Home Paradigm. 134-139
Network Security

Carlos Aguilar Melchor, Boussad Ait Salem, Philippe Gaborit:
A Collusion-Resistant Distributed Scalar Product Protocol with Application to Privacy-Preserving Computation of Trust. 140-147
Soontaree Tanaraksiritavorn, Shivakant Mishra:
A Privacy Preserving Intrusion Tolerant Voting Architecture. 148-155
Basil AsSadhan
, José M. F. Moura, David E. Lapsley, Christine E. Jones, W. Timothy Strayer:
Detecting Botnets Using Command and Control Traffic. 156-162
Jesus Molina, Michel Cukier:
Evaluating Files to Audit for Detecting Intrusions in FileSystem Data. 163-170
Sensor Networks and Mobile Ad-Hoc Networks (MANETs)

Goce Trajcevski, Nikolay Valtchanov, Oliviu Ghica, Peter Scheuermann:
A Case for Meta-Triggers in Wireless Sensor Networks. 171-178
Bayrem Triki
, Slim Rekhis
, Noureddine Boudriga:
Digital Investigation of Wormhole Attacks in Wireless Sensor Networks. 179-186
Xiaokang Xiong, Duncan S. Wong, Xiaotie Deng
:
TinyPairing: Computing Tate Pairing on Sensor Nodes with Higher Speed and Less Memory. 187-194
Virtualization and Quality of Service

Michael Le, Andrew Gallagher, Yuval Tamir, Yoshio Turner:
Maintaining Network QoS Across NIC Device Driver Failures Using Virtualization. 195-202
Younggyun Koh, Calton Pu, Yasushi Shinjo, Hideki Eiraku, Go Saito, Daiyuu Nobori:
Improving Virtualized Windows Network Performance by Delegating Network Processing. 203-210
Iñigo Goiri, Ferran Julià, Jorge Ejarque
, Marc de Palol, Rosa M. Badia
, Jordi Guitart
, Jordi Torres
:
Introducing Virtual Execution Environments for Application Lifecycle Management and SLA-Driven Resource Distribution within Service Providers. 211-218
Achilles Colombo Prudêncio, Roberto Willrich, Michel Diaz, Saïd Tazi:
Quality of Service Specifications: A Semantic Approach. 219-226
Wireless and Mobile Ad-hoc Networks (MANETs)
Security

Hakem Beitollahi, Geert Deconinck
:
Empirical Study of Tolerating Denial-of-Service Attacks with the Fosel Architecture. 258-261
Peidong Zhu, Xiangjiang Hu, Huayang Cao, Xiaoqiang Wang:
TTM Based Security Enhancement for Inter-domain Routing Protocol. 262-265
Michael Atighetchi, Partha P. Pal
:
Attribute-Based Prevention of Phishing Attacks. 266-269
Michael D. Kelly, Sean J. Geoghegan:
FIRST. 270-273
Peer-to-Peer and Data Transfer

Min Yang, Yuanyuan Yang
:
Adaptive Network Coding for Heterogeneous Peer-to-Peer Streaming Systems. 274-277
Ghassan Karame, Mario Cagalj, Srdjan Capkun:
Small Coalitions: Lightweight Collaboration for Efficient P2P Downloads. 278-283
Sharrukh Zaman, Daniel Grosu
:
A Distributed Algorithm for Web Content Replication. 284-287
Yongmao Ren
, Haina Tang, Jun Li, Hualin Qian:
A Novel Congestion Control Algorithm for High Performance Bulk Data Transfer. 288-291
Wireless Networks

Yong Hwan Kim, Sung Soo Kim, Kwang Seon Ahn:
A Rapid Tag Identification Method with Two Slots in RFID Systems. 292-295
Neila Krichene, Noureddine Boudriga:
Serving Handing Over Stations within the Mobile IEEE 802.16 Mesh Mode Context. 296-299
Riccardo Manfrin, Andrea Zanella
, Michele Zorzi:
Functional and Performance Analysis of CalRadio 1 Platform. 300-305
Yu Zhou, Mira Yun, Timothy Kim, Amrinder Arora, Hyeong-Ah Choi:
RL-Based Queue Management for QoS Support in Multi-channel Multi-radio Mesh Networks. 306-309
Architectures and Protocols

Nuno M. Garcia
, Przemyslaw Lenkiewicz, Mário M. Freire
, Paulo P. Monteiro
:
A New Architecture for Optical Burst Switching Networks Based on Cooperative Control. 310-313
Fumio Nakanjima, Hitoshi Oi
:
Optimizations of Large Receive Offload in Xen. 314-318
Wilfried Steiner, Günther Bauer, Brendan Hall, Michael Paulitsch, Srivatsan Varadarajan:
TTEthernet Dataflow Concept. 319-322
Sung-Hyun Nam, Hyunwoo Hwang, Ju-Hyun Kim, Kyung-Geun Lee:
Fast Macro Handover in Hierarchical Mobile IPv6. 323-326
Zheng Wang, Xiaodong Lee, Jian Jin, Baoping Yan:
Efficient Filtering Algorithm for Repeated Queries in DNS Log. 327-330

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







