


default search action
30th ICDCS 2010: Genova, Italy
- 2010 International Conference on Distributed Computing Systems, ICDCS 2010, Genova, Italy, June 21-25, 2010. IEEE Computer Society 2010, ISBN 978-0-7695-4059-7

Data Center and Internet Networking
- Dhananjay Sampath, Suchit Agarwal, J. J. Garcia-Luna-Aceves:

'Ethernet on AIR': Scalable Routing in very Large Ethernet-Based Networks. 1-9 - Peng Wei, Shan Chu, Xin Wang, Yu Zhou:

Deployment of a Reinforcement Backbone Network with Constraints of Connection and Resources. 10-19 - Fengyuan Ren, Wanchun Jiang:

Phase Plane Analysis of Congestion Control in Data Center Ethernet Networks. 20-29
Location Sensing and RFIDs
- Jizhi Wang, Yinjie Chen, Xinwen Fu

, Jie Wang, Wei Yu
, Nan Zhang:
3DLoc: Three Dimensional Wireless Localization Toolkit. 30-39 - Wei Li, Deng Li, Shuhui Yang, Zhiwei Xu, Wei Zhao

:
Design and Analysis of a New GPS Algorithm. 40-51 - Chen Qian, Yunhuai Liu, Hoilun Ngan, Lionel M. Ni:

ASAP: Scalable Identification and Counting for Contactless RFID Systems. 52-61
Data Centers, Clouds, and Grids
- Gueyoung Jung, Matti A. Hiltunen, Kaustubh R. Joshi, Richard D. Schlichting, Calton Pu:

Mistral: Dynamically Managing Power, Performance, and Adaptation Cost in Cloud Infrastructures. 62-73 - Konstantinos Tsakalozos, Mema Roussopoulos, Vangelis Floros, Alex Delis:

Nefeli: Hint-Based Execution of Workloads in Clouds. 74-85 - Amos Brocco, Apostolos Malatras, Ye Huang, Béat Hirsbrunner:

ARiA: A Protocol for Dynamic Fully Distributed Grid Meta-scheduling. 86-95
Network Coverage
- Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Nageswara S. V. Rao

, Jiming Chen:
Stochastic Steepest-Descent Optimization of Multiple-Objective Mobile Sensor Coverage. 96-105 - Dezun Dong, Yunhao Liu, Kebin Liu, Xiangke Liao:

Distributed Coverage in Wireless Ad Hoc and Sensor Networks by Topological Graph Approaches. 106-115 - Dian Zhang, Yunhuai Liu, Lionel M. Ni:

Link-Centric Probabilistic Coverage Model for Transceiver-Free Object Detection in Wireless Networks. 116-125
Data Streaming and Querying
- Vincenzo Gulisano

, Ricardo Jiménez-Peris, Marta Patiño-Martínez
, Patrick Valduriez:
StreamCloud: A Large Scale Data Streaming System. 126-137 - Zhe Zhang, Yu Gu, Fan Ye, Hao Yang, Minkyong Kim, Hui Lei, Zhen Liu:

A Hybrid Approach to High Availability in Stream Processing Systems. 138-148 - Xiaofeng Ding, Hai Jin:

Efficient and Progressive Algorithms for Distributed Skyline Queries over Uncertain Data. 149-158
Cyber-Physical Systems
- Wenbo He

, Xue Liu, Long Zheng, Hao Yang:
Reliability Calculus: A Theoretical Framework to Analyze Communication Reliability. 159-168 - Karthik Lakshmanan, Dionisio de Niz, Ragunathan Rajkumar, Gabriel A. Moreno:

Resource Allocation in Distributed Mixed-Criticality Cyber-Physical Systems. 169-178 - Linghe Kong

, Dawei Jiang, Min-You Wu:
Optimizing the Spatio-temporal Distribution of Cyber-Physical Systems for Environment Abstraction. 179-188
IP Networks
- Zheng Cai, Florin Dinu, Jie Zheng, Alan L. Cox, T. S. Eugene Ng:

CONTRACT: Incorporating Coordination into the IP Network Control Plane. 189-198 - Jörg Liebeherr, Yashar Ghiassi-Farrokhfal, Almut Burchard:

Does Link Scheduling Matter on Long Paths?. 199-208 - Piotr Srebrny, Thomas Plagemann, Vera Goebel, Andreas Mauthe

:
CacheCast: Eliminating Redundant Link Traffic for Single Source Multiple Destination Transfers. 209-220 - Rachit Agarwal, Virajith Jalaparti, Matthew Caesar

, Brighten Godfrey:
Guaranteeing BGP Stability with a Few Extra Paths. 221-230
System Security
- Karthick Jayaraman, Wenliang Du, Balamurugan Rajagopalan, Steve J. Chapin:

ESCUDO: A Fine-Grained Protection Model for Web Browsers. 231-240 - Ting-Fang Yen, Michael K. Reiter:

Are Your Hosts Trading or Plotting? Telling P2P File-Sharing and Bots Apart. 241-252 - Cong Wang

, Ning Cao, Jin Li, Kui Ren
, Wenjing Lou:
Secure Ranked Keyword Search over Encrypted Cloud Data. 253-262 - Maxwell Young, Aniket Kate, Ian Goldberg, Martin Karsten:

Practical Robust Communication in DHTs Tolerating a Byzantine Adversary. 263-272
Data Management
- Jin Ren, Qing Yang:

A New Buffer Cache Design Exploiting Both Temporal and Content Localities. 273-282 - Philip Werner Frey, Romulo Goncalves, Martin L. Kersten, Jens Teubner:

A Spinning Join That Does Not Get Dizzy. 283-292 - Yinliang Yue, Lei Tian, Hong Jiang, Fang Wang, Dan Feng, Quan Zhang, Pan Zeng:

RoLo: A Rotated Logging Storage Architecture for Enterprise Data Centers. 293-304 - Brian Cho, Indranil Gupta:

New Algorithms for Planning Bulk Transfer via Internet and Shipping Networks. 305-314
Network Security
- Jong Chun Park, Jedidiah R. Crandall

:
Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of HTML Responses in China. 315-326 - Soo Bum Lee, Virgil D. Gligor:

FLoc : Dependable Link Access for Legitimate Traffic in Flooding Attacks. 327-338 - Ranjan Pal, Leana Golubchik:

Analyzing Self-Defense Investments in Internet Security under Cyber-Insurance Coverage. 339-347 - V. S. Anil Kumar, Rajmohan Rajaraman, Zhifeng Sun, Ravi Sundaram:

Existence Theorems and Approximation Algorithms for Generalized Network Security Games. 348-357
Sensor Networks
- Xing Xu, Ji Luo, Qian Zhang

:
Design of Non-orthogonal Multi-channel Sensor Networks. 358-367 - Shuguang Xiong, Jianzhong Li:

An Efficient Algorithm for Cut Vertex Detection in Wireless Sensor Networks. 368-377 - Hong Luo, Jinge Wang, Yan Sun, Huadong Ma, Xiang-Yang Li:

Adaptive Sampling and Diversity Reception in Multi-hop Wireless Audio Sensor Networks. 378-387 - Rui Chu, Lin Gu, Yunhao Liu, Mo Li

, Xicheng Lu:
Versatile Stack Management for Multitasking Sensor Networks. 388-397
Fault-Tolerance
- Jingshu Chen

, Sandeep S. Kulkarni:
Complexity Analysis of Weak Multitolerance. 398-407 - Marin Bertier, Anne-Marie Kermarrec

, Guang Tan:
Message-Efficient Byzantine Fault-Tolerant Broadcast in a Multi-hop Wireless Sensor Network. 408-417 - Sven Köhler, Volker Turau:

Fault-Containing Self-Stabilization in Asynchronous Systems with Constant Fault-Gap. 418-427 - Qi Dong, Donggang Liu:

Adaptive Jamming-Resistant Broadcast Systems with Partial Channel Sharing. 428-437
Routing
- Bin Tong, Zi Li, Guiling Wang

, Wensheng Zhang:
How Wireless Power Charging Technology Affects Sensor Network Deployment and Routing. 438-447 - Ling Ding, Xiaofeng Gao, Weili Wu, Wonjun Lee, Xu Zhu, Ding-Zhu Du:

Distributed Construction of Connected Dominating Sets with Minimum Routing Cost in Wireless Networks. 448-457 - Tianji Li, Douglas J. Leith

, Lili Qiu:
Opportunistic Routing for Interactive Traffic in Wireless Networks. 458-467
Social Networks
- Zhimin Yang, Boying Zhang, Jiangpeng Dai, Adam C. Champion, Dong Xuan, Du Li:

E-SmallTalker: A Distributed Mobile System for Social Networking in Physical Proximity. 468-477 - Mo Li

, Xiaoye Jiang, Leonidas J. Guibas:
Fingerprinting Mobile User Positions in Sensor Networks. 478-487 - Alessandro Mei

, Julinda Stefa
:
Give2Get: Forwarding in Social Mobile Wireless Networks of Selfish Individuals. 488-497
Resource Allocation
- Amir Danak, Shie Mannor

:
Resource Allocation with Supply Adjustment in Distributed Computing Systems. 498-506 - XiaoHua Xu, Shaojie Tang, XuFei Mao, Xiang-Yang Li:

Distributed Gateway Placement for Cost Minimization in Wireless Mesh Networks. 507-515 - Fabien Gaud, Sylvain Geneves, Renaud Lachaize, Baptiste Lepers, Fabien Mottet, Gilles Muller, Vivien Quéma:

Efficient Workstealing for Multicore Event-Driven Systems. 516-525
Network Coding
- Xiangmao Chang, Jin Wang, Jianping Wang

, Victor C. S. Lee
, Kejie Lu, Yixian Yang:
On Achieving Maximum Secure Throughput Using Network Coding against Wiretap Attack. 526-535 - Mary-Luc Champel, Kévin Huguenin

, Anne-Marie Kermarrec
, Nicolas Le Scouarnec:
LT Network Codes. 536-546 - Ming Zhang, Tao Li, Shigang Chen, Bo Li:

Using Analog Network Coding to Improve the RFID Reading Throughput. 547-556
Vehicular Networks
- Jaehoon Jeong, Shuo Guo, Yu Gu, Tian He, David H. C. Du:

TSF: Trajectory-Based Statistical Forwarding for Infrastructure-to-Vehicle Data Delivery in Vehicular Networks. 557-566 - Nianbo Liu, Ming Liu, Jiannong Cao

, Guihai Chen
, Wei Lou
:
When Transportation Meets Communication: V2P over VANETs. 567-576 - Taylor T. Johnson

, Sayan Mitra
, Karthik Manamcheri:
Safe and Stabilizing Distributed Cellular Flows. 577-586
P2P
- Shao Liu, Minghua Chen

, Sudipta Sengupta, Mung Chiang, Jin Li, Philip A. Chou:
P2P Streaming Capacity under Node Degree Bound. 587-598 - Krzysztof Rzadca, Anwitaman Datta

, Sonja Buchegger:
Replica Placement in P2P Storage: Complexity and Game Theoretic Analyses. 599-609
Publish-Subscribe
- Zhengye Liu, Prithula Dhungel, Di Wu, Chao Zhang, Keith W. Ross:

Understanding and Improving Ratio Incentives in Private Communities. 610-621 - Chen Chen, Hans-Arno Jacobsen, Roman Vitenberg:

Divide and Conquer Algorithms for Publish/Subscribe Overlay Design. 622-633 - Yaxiong Zhao, Jie Wu:

B-SUB: A Practical Bloom-Filter-Based Publish-Subscribe System for Human Networks. 634-643 - Melih Onus, Andréa W. Richa:

Parameterized Maximum and Average Degree Approximation in Topic-Based Publish-Subscribe Overlay Network Design. 644-652 - Alex King Yeung Cheung, Hans-Arno Jacobsen:

Publisher Placement Algorithms in Content-Based Publish/Subscribe. 653-664
Network Measurement and Profiling
- Chengchen Hu, Bin Liu, Hongbo Zhao, Kai Chen

, Yan Chen, Chunming Wu, Yu Cheng
:
DISCO: Memory Efficient and Accurate Flow Statistics for Network Measurement. 665-674 - Qiang Zheng, Guohong Cao:

Minimizing Probing Cost and Achieving Identifiability in Network Link Monitoring. 675-684 - Esam Sharafuddin, Yu Jin, Nan Jiang, Zhi-Li Zhang:

Sifting through Network Data to Cull Activity Patterns with HEAPs. 685-696 - Jan Sacha, Jeff Napper, Corina Stratan, Guillaume Pierre:

Adam2: Reliable Distribution Estimation in Decentralised Environments. 697-707
Algorithm
- Bilel Derbel, El-Ghazali Talbi:

Distributed Node Coloring in the SINR Model. 708-717 - Toshimitsu Masuzawa, Sébastien Tixeuil:

Stabilizing Locally Maximizable Tasks in Unidirectional Networks Is Hard. 718-727 - Gianluca De Marco

, Dariusz R. Kowalski:
Towards Power-Sensitive Communication on a Multiple-Access Channel. 728-735 - Hrishikesh B. Acharya, Mohamed G. Gouda:

Projection and Division: Linear-Space Verification of Firewalls. 736-743
Wireless Networks
- Hongyu Zhou, Su Xia, Miao Jin, Hongyi Wu:

Localized Algorithm for Precise Boundary Detection in 3D Wireless Networks. 744-753 - Xianlong Jiao, Wei Lou

, Junchao Ma
, Jiannong Cao
, Xiaodong Wang, Xingming Zhou:
Duty-Cycle-Aware Minimum Latency Broadcast Scheduling in Multi-hop Wireless Networks. 754-763 - Ece Gelal

, Konstantinos Pelechrinis, Ioannis Broustis, Srikanth V. Krishnamurthy, Saif K. Mohammed, Ananthanarayanan Chockalingam, Sneha Kumar Kasera:
On the Impact of MIMO Diversity on Higher Layer Performance. 764-773 - Hongkun Li, Yu Cheng

, Chi Zhou, Peng-Jun Wan:
Multi-dimensional Conflict Graph Based Computing for Optimal Capacity in MR-MC Wireless Networks. 774-783
System Troubleshooting
- Yangfan Zhou, Xinyu Chen, Michael R. Lyu, Jiangchuan Liu:

Sentomist: Unveiling Transient Sensor Network Bugs via Symptom Mining. 784-794 - Jiaqi Tan, Soila Kavulya, Rajeev Gandhi, Priya Narasimhan:

Visual, Log-Based Causal Tracing for Performance Debugging of MapReduce Systems. 795-806 - Yang Liu, Linfeng Zhang, Yong Guan:

Sketch-Based Streaming PCA Algorithm for Network-Wide Traffic Anomaly Detection. 807-816 - Amir R. Khakpour, Alex X. Liu:

Quantifying and Querying Network Reachability. 817-826
Resource-Efficiency
- Yingshu Li

, Longjiang Guo, Sushil K. Prasad
:
An Energy-Efficient Distributed Algorithm for Minimum-Latency Aggregation Scheduling in Wireless Sensor Networks. 827-836 - Yu Gu, Tian He:

Bounding Communication Delay in Energy Harvesting Sensor Networks. 837-847 - Wentao Huang, Xinbing Wang, Qian Zhang

:
Capacity Scaling in Mobile Wireless Ad Hoc Network with Infrastructure Support. 848-857 - Devu Manikantan Shila, Yu Cheng

, Tricha Anjali, Peng-Jun Wan:
Extracting More Capacity from Multi-channel Multi-radio Wireless Networks by Exploiting Power. 858-867

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














