


default search action
31st ICDCS 2011: Minneapolis, Minnesota, USA
- 2011 International Conference on Distributed Computing Systems, ICDCS 2011, Minneapolis, Minnesota, USA, June 20-24, 2011. IEEE Computer Society 2011, ISBN 978-0-7695-4364-2

Data Processing and Management
- Ramya Prabhakar, Sudharshan S. Vazhkudai, Youngjae Kim, Ali Raza Butt

, Min Li, Mahmut T. Kandemir:
Provisioning a Multi-tiered Data Staging Area for Extreme-Scale Machines. 1-12 - Jia Zou, Gong Su, Arun Iyengar, Yu Yuan, Yi Ge:

Design and Analysis of a Distributed Multi-leg Stock Trading System. 13-24 - Rubao Lee, Tian Luo, Yin Huai, Fusheng Wang

, Yongqiang He, Xiaodong Zhang:
YSmart: Yet Another SQL-to-MapReduce Translator. 25-36
Wireless Networking
- Yuanqing Zheng

, Mo Li
, Chen Qian:
PET: Probabilistic Estimating Tree for Large-Scale RFID Estimation. 37-46 - Huanzhong Li, Xue Liu, Wenbo He

, Jian Li, Wenhua Dou:
End-to-End Delay Analysis in Wireless Network Coding: A Network Calculus-Based Approach. 47-56 - Neeraj Mittal, Yanyan Zeng, S. Venkatesan, R. Chandrasekaran:

Randomized Distributed Algorithms for Neighbor Discovery in Multi-hop Multi-channel Heterogeneous Wireless Networks. 57-66
Power Management
- Giacomo Ghidini, Sajal K. Das

:
An Energy-Efficient Markov Chain-Based Randomized Duty Cycling Scheme for Wireless Sensor Networks. 67-76 - Xi Chen, Sunggeun Jin, Daji Qiao:

M-PSM: Mobility-Aware Power Save Mode for IEEE 802.11 WLANs. 77-86 - Zheng Zeng, Yan Gao, P. R. Kumar:

SOFA: A Sleep-Optimal Fair-Attention Scheduler for the Power-Saving Mode of WLANs. 87-98
Peer-to-Peer
- Wenjie Wang, Hyunseok Chang, Adam Goodman, Eric Wucherer, Sugih Jamin:

Meeting the Digital Rights Requirements of Live Broadcast in a Peer-to-Peer Network. 99-108 - Peter Gilbert, Venugopalan Ramasubramanian, Patrick Stuedi, Douglas B. Terry:

Peer-to-Peer Data Replication Meets Delay Tolerant Networking. 109-120 - Sascha Grau, Mathias Fischer, Guenter Schaefer:

On the Dependencies between Source Neighbors in Optimally DoS-stable P2P Streaming Topologies. 121-130
Distributed Systems
- Iñigo Goiri, Kien Le, Jordi Guitart

, Jordi Torres
, Ricardo Bianchini:
Intelligent Placement of Datacenters for Internet Services. 131-142 - Chadi Kari, Yoo-Ah Kim, Alexander Russell

:
Data Migration in Heterogeneous Storage Systems. 143-150 - Wei Gao, Guohong Cao, Arun Iyengar, Mudhakar Srivatsa:

Supporting Cooperative Caching in Disruption Tolerant Networks. 151-161
Communications
- Hanwu Wang, Weijia Jia

, Geyong Min:
Effective Channel Exploitation in IEEE 802.16j Networks for Maritime Communications. 162-171 - Jun Huang

, Shucheng Liu, Guoliang Xing, Hongwei Zhang, Jianping Wang
, Liusheng Huang:
Accuracy-Aware Interference Modeling and Measurement in Wireless Sensor Networks. 172-181 - Xiaoxia Huang, Dianjie Lu, Pan Li

, Yuguang Fang
:
Coolest Path: Spectrum Mobility Aware Routing Metrics in Cognitive Ad Hoc Networks. 182-191
Algorithms
- Felix Halim, Roland H. C. Yap, Yongzheng Wu:

A MapReduce-Based Maximum-Flow Algorithm for Large Small-World Network Graphs. 192-202 - Lu Zhang, Xueyan Tang:

The Client Assignment Problem for Continuous Distributed Interactive Applications. 203-214 - Julien Clément, Carole Delporte-Gallet, Hugues Fauconnier, Mihaela Sighireanu:

Guidelines for the Verification of Population Protocols. 215-224 - Chen Chen, Roman Vitenberg, Hans-Arno Jacobsen:

Scaling Construction of Low Fan-out Overlays for Topic-Based Publish/Subscribe Systems. 225-236
Multimedia
- Dimitrios Koutsonikolas, Y. Charlie Hu, Chih-Chun Wang, Mary L. Comer

, Amr Mohamed
:
Efficient Online WiFi Delivery of Layered-Coding Media Using Inter-layer Network Coding. 237-247 - Ruben Torres, Alessandro Finamore, Jin Ryong Kim, Marco Mellia

, Maurizio M. Munafò, Sanjay G. Rao:
Dissecting Video Server Selection Strategies in the YouTube CDN. 248-257 - Donglin Hu, Shiwen Mao:

Resource Allocation for Medium Grain Scalable Videos over Femtocell Cognitive Radio Networks. 258-267 - Yu Wu, Chuan Wu

, Bo Li, Xuanjia Qiu, Francis C. M. Lau:
CloudMedia: When Cloud on Demand Meets Video on Demand. 268-277
Networkin
- Eric Martin Heien, Derrick Kondo, David P. Anderson:

Correlated Resource Models of Internet End Hosts. 278-287 - Carlee Joe-Wong, Sangtae Ha, Mung Chiang:

Time-Dependent Broadband Pricing: Feasibility and Benefits. 288-298 - Wei-Min Yao, Sonia Fahmy

:
Partitioning Network Testbed Experiments. 299-309 - Peng Yang, Wen Luo, Lisong Xu, Jitender S. Deogun, Ying Lu:

TCP Congestion Avoidance Algorithm Identification. 310-321
Fault Tolerance and Dependability
- Leonardo Fialho

, Dolores Rexachs
, Emilio Luque
:
What is Missing in Current Checkpoint Interval Models? 322-332 - Raimondas Sasnauskas, Oscar Soria Dustmann, Benjamin Lucien Kaminski

, Klaus Wehrle
, Carsten Weise, Stefan Kowalewski:
Scalable Symbolic Execution of Distributed Systems. 333-342 - Louis-Claude Canon, Emmanuel Jeannot, Jon B. Weissman:

A Scheduling and Certification Algorithm for Defeating Collusion in Desktop Grids. 343-352 - Andreas Larsson, Philippas Tsigas

:
A Self-stabilizing (k, r)-clustering Algorithm with Multiple Paths for Wireless Ad-hoc Networks. 353-362
Privacy
- Daniele Quercia, Ilias Leontiadis, Liam McNamara, Cecilia Mascolo

, Jon Crowcroft
:
SpotME If You Can: Randomized Responses for Location Obfuscation on Mobile Phones. 363-372 - Jinyuan Sun, Xiaoyan Zhu, Chi Zhang, Yuguang Fang

:
HCPP: Cryptography Based Secure EHR System for Patient Privacy and Emergency Healthcare. 373-382 - Ming Li, Shucheng Yu

, Ning Cao, Wenjing Lou:
Authorized Private Keyword Search over Encrypted Data in Cloud Computing. 383-392 - Ning Cao, Zhenyu Yang, Cong Wang

, Kui Ren
, Wenjing Lou:
Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing. 393-402
Systems
- Shuo Guo, Kyriakos Karenos, Minkyong Kim, Hui Lei, Johnathan M. Reason:

Delay-Cognizant Reliable Delivery for Publish/Subscribe Overlay Networks. 403-412 - Bo Zhao, Byung-Chul Tak, Guohong Cao:

Reducing the Delay and Power Consumption of Web Browsing on Smartphones in 3G Networks. 413-422 - Jerry Chi-Yuan Chou, Jinoh Kim, Doron Rotem:

Energy-Aware Scheduling in Disk Storage Systems. 423-433 - Yuxiong He, Sameh Elnikety, Hongyang Sun:

Tians Scheduling: Using Partial Processing in Best-Effort Applications. 434-445
Middleware
- Yérom-David Bromberg, Paul Grace

, Laurent Réveillère:
Starlink: Runtime Interoperability between Heterogeneous Middleware Protocols. 446-455 - Valerio Schiavoni

, Etienne Rivière, Pascal Felber
:
WHISPER: Middleware for Confidential Communication in Large-Scale Networks. 456-466 - Sapan Bhatia, Andy C. Bavier, Larry L. Peterson, Soner Sevinc:

sfatables: A Firewall-like Policy Engine for Federated Systems. 467-476
Sensor Networking
- Xiao Wang, Xinbing Wang, Jun Zhao

:
Impact of Mobility and Heterogeneity on Coverage and Energy Consumption in Wireless Sensor Networks. 477-487 - Shaojie Tang, Xiang-Yang Li, Xingfa Shen, Jianhui Zhang, Guojun Dai

, Sajal K. Das
:
Cool: On Coverage with Solar-Powered Sensors. 488-496 - Rui Zhang, Yanchao Zhang:

LR-Seluge: Loss-Resilient and Secure Code Dissemination in Wireless Sensor Networks. 497-506
Wireless Security
- Andréa W. Richa, Christian Scheideler, Stefan Schmid

, Jin Zhang:
Competitive and Fair Medium Access Despite Reactive Jamming. 507-516 - Hongbo Liu

, Zhenhua Liu, Yingying Chen
, Wenyuan Xu:
Localizing Multiple Jamming Attackers in Wireless Networks. 517-528 - Rui Zhang, Yanchao Zhang, Xiaoxia Huang:

JR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks. 529-538
Cloud Computing
- Sudarsun Kannan

, Ada Gavrilovska, Karsten Schwan:
Cloud4Home - Enhancing Data Services with @Home Clouds. 539-548 - Cong Wang

, Kui Ren
, Jia Wang, Karthik Mahendra Raje Urs:
Harnessing the Cloud for Securely Solving Large-Scale Systems of Linear Equations. 549-558 - Upendra Sharma, Prashant J. Shenoy

, Sambit Sahu, Anees Shaikh:
A Cost-Aware Elasticity Provisioning System for the Cloud. 559-570 - PengCheng Xiong

, Zhikui Wang, Simon Malkowski, Qingyang Wang, Deepal Jayasinghe, Calton Pu:
Economical and Robust Provisioning of N-Tier Cloud Workloads: A Multi-level Control Approach. 571-580
Security and Anonymity
- Binbin Chen

, Haifeng Yu:
Secure Aggregation with Malicious Node Revocation in Sensor Networks. 581-592 - Fan Zhang, Wenbo He

, Xue Liu:
Defending Against Traffic Analysis in Wireless Networks through Traffic Reshaping. 593-602 - Chryssis Georgiou

, Seth Gilbert
, Dariusz R. Kowalski:
Confidential Gossip. 603-612 - Yong Wang, Daniel Burgener, Aleksandar Kuzmanovic, Gabriel Maciá-Fernández

:
Understanding the Network and User-Targeting Properties of Web Advertising Networks. 613-622
Performance
- Tao Tang, Xuejun Yang, Yisong Lin:

Cache Miss Analysis for GPU Programs Based on Stack Distance Profile. 623-634 - Biplob K. Debnath, Sudipta Sengupta, Jin Li, David J. Lilja, David Hung-Chang Du:

BloomFlash: Bloom Filter on Flash-Based Storage. 635-644 - Mohammad Maifi Hasan Khan, Jin Heo, Shen Li, Tarek F. Abdelzaher:

Understanding Vicious Cycles in Server Clusters. 645-654 - Sukhyun Song, Peter J. Keleher, Alan Sussman

:
Searching for Bandwidth-Constrained Clusters. 655-664
Fault Tolerance
- Yuriy Brun

, George Edwards, Jae Young Bang, Nenad Medvidovic:
Smart Redundancy for Distributed Computation. 665-676 - Bharath Balasubramanian, Vijay K. Garg:

Fused Data Structures for Handling Multiple Faults in Distributed Systems. 677-688 - André Martin, Thomas Knauth, Stephan Creutz, Diogo Becker de Brum, Stefan Weigert, Christof Fetzer, Andrey Brito:

Low-Overhead Fault Tolerance for High-Throughput Data Processing Systems. 689-699 - Eyal Bin, Ofer Biran, Odellia Boni, Erez Hadad, Elliot K. Kolodner, Yosef Moatti, Dean H. Lorenz

:
Guaranteeing High Availability Goals for Virtual Machine Placement. 700-709
Security
- Sabrina De Capitani di Vimercati

, Sara Foresti
, Stefano Paraboschi
, Gerardo Pelosi
, Pierangela Samarati
:
Efficient and Private Access to Outsourced Data. 710-719 - Kailas Patil

, Xinshu Dong, Xiaolei Li, Zhenkai Liang
, Xuxian Jiang:
Towards Fine-Grained Access Control in JavaScript Contexts. 720-729 - Ashish Kundu, Elisa Bertino:

A New Class of Buffer Overflow Attacks. 730-739 - Wenbo He

, Xue Liu, Mai Ren:
Location Cheating: A Security Challenge to Location-Based Social Network Services. 740-749
Localization and Tracking
- Dengyuan Wu, Xiuzhen Cheng, Dechang Chen, Wei Cheng, Biao Chen, Wei Zhao

:
A Monte Carlo Method for Mobile Target Counting. 750-759 - Bin Xu, Ran Yu, Guodong Sun, Zheng Yang:

Whistle: Synchronization-Free TDOA for Localization. 760-769 - Pengpeng Chen, Ziguo Zhong, Tian He:

Bubble Trace: Mobile Target Tracking under Insufficient Anchor Coverage. 770-779 - Jren-Chit Chin, David K. Y. Yau, Nageswara S. V. Rao

:
Efficient and Robust Localization of Multiple Radiation Sources in Complex Environments. 780-789
Publish / Subscribe Systems
- Yaxiong Zhao, Jie Wu:

Towards Approximate Event Processing in a Large-Scale Content-Based Network. 790-799 - Young Yoon, Vinod Muthusamy, Hans-Arno Jacobsen:

Foundations for Highly Available Content-Based Publish/Subscribe Overlays. 800-811 - Alex King Yeung Cheung, Hans-Arno Jacobsen:

Green Resource Allocation Algorithms for Publish/Subscribe Systems. 812-823 - K. R. Jayaram, Patrick Eugster:

Split and Subsume: Subscription Normalization for Effective Content-Based Messaging. 824-835
Routing
- Ke Xu, Hongying Liu, Jiangchuan Liu, Meng Shen:

One More Weight is Enough: Toward the Optimal Traffic Engineering with OSPF. 836-846 - Yanhua Li, Zhi-Li Zhang, Daniel Boley:

The Routing Continuum from Shortest-Path to All-Path: A Unifying Theory. 847-856 - Chen Qian, Simon S. Lam:

Greedy Distance Vector Routing. 857-868 - Varun Khare, Beichuan Zhang:

Making CDN and ISP Routings Symbiotic. 869-878
Sensor and Ubiquitous Computing Applications
- Hanjiang Luo

, Kaishun Wu
, Zhongwen Guo, Lin Gu, Zhong Yang, Lionel M. Ni:
SID: Ship Intrusion Detection with Wireless Sensor Networks. 879-888 - Zhi Li, Yanmin Zhu, Hongzi Zhu, Minglu Li:

Compressive Sensing Approach to Urban Traffic Sensing. 889-898 - Xiaodong Wang, Xiaorui Wang, Guoliang Xing, Jinzhu Chen, Cheng-Xian Lin

, Yixin Chen:
Towards Optimal Sensor Placement for Hot Server Detection in Data Centers. 899-908 - Jin Teng, Boying Zhang, Xinfeng Li, Xiaole Bai, Dong Xuan:

E-Shadow: Lubricating Social Interaction Using Mobile Phones. 909-918

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














