


default search action
5th NCA 2006: Cambridge, MA, USA
- Fifth IEEE International Symposium on Network Computing and Applications, NCA 2006, 24-26 July 2006, Cambridge, Massachusetts, USA. IEEE Computer Society 2006, ISBN 0-7695-2640-3

Keynote Speech Abstracts
- Mike Afergan:

Experience with some Principles for Building an Internet-Scale Reliable System. 3 - Alan Ganek:

Challenges in Managing Complexity: Autonomic Computing. 4 - Leslie Lamport:

The +CAL Algorithm Language. 5 - Ravishankar K. Iyer:

Application-Aware Reliability and Security: The Trusted ILLIAC Approach. 6
Networking Protocols
- Jiazheng Zhou, Xuan-Yi Lin, Yeh-Ching Chung:

A Tree-Turn Model for Irregular Networks. 11-18 - Seth E. Webster, Richard Lippmann, Marc A. Zissman:

Experience Using Active and Passive Mapping for Network Situational Awareness. 19-26 - Bo Yan, Hamid Gharavi:

Multi-Path Multi-Channel Routing Protocol. 27-31 - Jay A. Patel, Indranil Gupta, Noshir S. Contractor:

JetStream: Achieving Predictable Gossip Dissemination by Leveraging Social Network Principles. 32-39 - Florent Claerhout, Ajoy Kumar Datta, Maria Gradinariu, Michel Hurfin:

Self* Architecture for Trajectory Tracking in Wireless Sensor Networks. 40-47 - Gene Cooperman, Viet Ha Nguyen, Igor Malioutov:

Parallelization of Geant4 Using TOP-C and Marshalgen. 48-55 - Luís Moura Silva, Henrique Madeira

, João Gabriel Silva
:
Software Aging and Rejuvenation in a SOAP-based Server. 56-65 - Paul Royal, Mitch Halpin, Ada Gavrilovska, Karsten Schwan:

Utilizing Network Processors in Distributed Enterprise Environments. 66-76
Peer-to-Peer and Publish Subscribe Systems
- Zhenhui Shen, Srikanta Tirthapura

:
Faster Event Forwarding in a Content-Based Publish-Subscribe System through Lookup ReuseEvent. 77-84 - Wai Gen Yee, Linh Thai Nguyen, Ophir Frieder:

Improved Result Ranking in P2P File-Sharing Systems by Probing for Metadata. 85-92 - Fivos Constantinou, Panayiotis Mavrommatis:

Identifying Known and Unknown Peer-to-Peer Traffic. 93-102
Real-Time Scheduling
- Frederic Thouin, Mark Coates, Dominic Goodwill:

Video-on-Demand Equipment Allocation. 103-110 - Zhenghao Zhang, Lin Liu, Yuanyuan Yang

:
Slotted Optical Burst Switching (SOBS) Networks. 111-117 - Raúl Martínez, Francisco José Alfaro

, José L. Sánchez
:
Implementing the Advanced Switching Minimum Bandwidth Egress Link Scheduler. 118-125 - Michael Treaster, William Conner, Indranil Gupta, Klara Nahrstedt:

ContagAlert: Using Contagion Theory for Adaptive, Distributed Alert Propagation. 126-136
Security and Trust
- Stephen Frechette, Dimiter R. Avresky:

A Proxy Network Topology and Reconfiguration Algorithm for Resistance to DoS Attacks. 137-144 - Leonardo B. Oliveira, Hao Chi Wong, Marshall W. Bern, Ricardo Dahab

, Antonio Alfredo Ferreira Loureiro:
SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks. 145-154
Middleware
- Paolo Romano

, Francesco Quaglia:
Providing e-Transaction Guarantees in Asynchronous Systems with Inaccurate Failure Detection. 155-162 - Carlos Aguilar Melchor, Yves Deswarte:

From DC-Nets to pMIXes: Multiple Variants for Anonymous Communications. 163-172
Distributed Storage
- James S. Plank

, Lihao Xu:
Optimizing Cauchy Reed-Solomon Codes for Fault-Tolerant Network Storage Applications. 173-180 - Benjamin Atkin, Kenneth P. Birman

:
Network-Aware Adaptation Techniques for Mobile File Systems. 181-188 - Fabius Klemm, Jean-Yves Le Boudec, Karl Aberer:

Congestion Control for Distributed Hash Tables. 189-195 - Peter Sobe, Kathrin Peter:

Comparison of Redundancy Schemes for Distributed Storage Systems. 196-203 - Lásaro J. Camargos, Fernando Pedone

, Rodrigo Schmidt:
A Primary-Backup Protocol for In-Memory Database Replication. 204-211 - Nobutatsu Nakamura, Ken-ichiro Fujiyama, Eiji Kawai, Hideki Sunahara:

A Flexible Replication Mechanism with Extended Database Connection Layers. 212-222
Short Papers
- Bin Wu, Ajay D. Kshemkalyani

:
Analysis Models for Blind Search in Unstructured Overlays. 223-226 - Wei Shen, Qing-An Zeng:

A Novel Decision Strategy of Vertical Handoff in Overlay Wireless Networks. 227-230 - Axel Treßel, Jörg Keller:

A System for Secure IP Telephone Conferences. 231-234 - Mauro Andreolini

, Sara Casolari, Michele Colajanni
:
A Distributed Architecture for Gracefully Degradable Web-Based Services. 235-238 - Alejandro Martínez, Francisco José Alfaro

, José L. Sánchez
, José Duato
:
Full QoS Support with 2 VCs for Single-chip Switches. 239-242 - Hou-Cheng Tzeng, Ching-Te Chiu:

A Flexible Cross Connect LCAS for Bandwidth Maximization in 2.5G EoS. 243-246 - Jie Hu, Raymond Klefstad:

Decentralized Load Balancing on Unstructured Peer-2-Peer Computing Grids. 247-250 - Junchang Ma, Zhimin Gu:

Finding Shared Fragments in Large Collections of Web Pages for Fragment-Based Web Caching. 251-254 - Yongjun Li, Wandong Cai, Wei Wang, Guangli Tian:

Lossy Node Identification in Wireless Sensor Network. 255-258 - Huifang Cheng, Zhimin Gu:

IntranetWeb: a Peer-to-Peer Based Scalable Web Caching System. 259-262 - Li-jia Chen, Jing Wu, Puliu Yan, Jian-guo Zhou, Hao Jiang:

A Novel Probability Evaluation Method for Selective Forwarding Routing in Wireless Sensor Network. 263-268
Adaptive Grid Computing Workshop
- Bo Lang, Ian T. Foster, Frank Siebenlist, Rachana Ananthakrishnan, Timothy Freeman:

A Multipolicy Authorization Framework for Grid Security. 269-272 - Wilson Lozano, Wilson Rivera

:
An Adaptive Quality of Service Based Scheduling Algorithm for Wide Area Large Scale Problems. 273-276 - Weibin Pei, Zhongliang Chen, Chunhao Feng, Zhi Wang:

Design and Implementation of a Plain Grid Monitoring and Information Service. 277-284
Trustworthy Network Computing Workshop
- Partha P. Pal

, Franklin Webber, Michael Atighetchi, Nate Combs:
Trust Assessment from Observed Behavior: Toward and Essential Service for Trusted Network Computing. 285-292 - Harry Gros-Desormeaux, Hacène Fouchal

, Philippe Hunel:
An Improved Test Derivation Technique. 293-300

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














