


default search action
8th NCA 2009: Cambridge, MA, USA
- Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, NCA 2009, July 9-11, 2009, Cambridge, Massachusetts, USA. IEEE Computer Society 2009, ISBN 978-0-7695-3698-9

Invited Keynote
- Jennifer M. Schopf

:
Sustainability and the Office of CyberInfrastructure. 1-3
Best Papers
- Ilir Gashi

, Vladimir Stankovic
, Corrado Leita, Olivier Thonnard:
An Experimental Study of Diversity with Off-the-Shelf AntiVirus Engines. 4-11 - Jiang Wu, Nancy D. Griffeth, Nancy A. Lynch, Calvin C. Newport, Ralph E. Droms:

Simulating Fixed Virtual Nodes for Adapting Wireline Protocols to MANET. 12-19
Peer-to-Peer Networks
- Mouna Allani, Benoît Garbinato

, Amirhossein Malekpour, Fernando Pedone
:
QuoCast: A Resource-Aware Algorithm for Reliable Peer-to-Peer Multicast. 20-27 - Flavio Esposito, Ibrahim Matta

, Pietro Michiardi, Nobuyuki Mitsutake, Damiano Carra:
Seed Scheduling for Peer-to-Peer Networks. 28-35 - Denvil Smith, Nian-Feng Tzeng:

Proximity-Aware Distributed Mutual Exclusion for Effective Peer-to-Peer Replica Management. 36-43 - Amirhossein Malekpour, Fernando Pedone

, Mouna Allani, Benoît Garbinato
:
Streamline: An Architecture for Overlay Multicast. 44-51 - Gert Pfeifer, Ryan C. Spring, Christof Fetzer:

Towards Improved Overlay Simulation Using Realistic Topologies. 52-59
Processor Sharing, Job Allocation, and Resource Selection
- Steve Thompson, Lester Lipsky, Sarah Tasneem, Feng Zhang:

Analysis of Round-Robin Implementations of Processor Sharing, Including Overhead. 60-65 - Satish Penmatsa, Anthony T. Chronopoulos

:
Comparison of Price-Based Static and Dynamic Job Allocation Schemes for Grid Computing Systems. 66-73 - Joseph S. Gomes:

A Rule Based Co-operative Approach for Cell Selection in High Speed Cellular Networks. 74-81
Distributed Dependable Storage
- Michael Siegenthaler, Ken Birman

:
Sharing Private Information Across Distributed Databases. 82-89 - Adam Manzanares, Xiaojun Ruan, Shu Yin, Mais Nijim, Wei Luo, Xiao Qin

:
Energy-Aware Prefetching for Parallel Disk Systems: Algorithms, Models, and Evaluation. 90-97
Biologically Inspired and Cognitive Approaches to Mission Survivability (BIOCOMS) Workshop
- Michael Atighetchi, Partha P. Pal

:
From Auto-adaptive to Survivable and Self-Regenerative Systems. 98-101 - Richard Ford, William H. Allen

, Katherine Hoffman, Attila Ondi, Marco M. Carvalho
:
Generic Danger Detection for Mission Continuity. 102-107 - Sharon Simmons, Dennis Edwards:

Survivability through Run-Time Software Evolution. 108-113
Trustworthy Network Computing (TNC) Workshop
- Yih Huang, Anup K. Ghosh:

Automating Intrusion Response via Virtualization for Realizing Uninterruptible Web Services. 114-117 - Marco Arguedas, Carlos Perez, Marco M. Carvalho

, Adrian Granados, Kelli Hoback, Wayne Kraus:
Investigating the Use of Topology Adaptation for Robust Multi-path Transport: A Preliminary Study. 118-121 - Chung-wei Lee:

Wireless Transmission Energy Analysis for Interference-Aware and Confidentiality-Enhanced Multipath Routing. 122-125
Adaptive Cloud and Grid Computing (AGC) Workshop and Short Papers (Cloud Computing)
- Giuseppe Minutoli, Antonio Puliafito

:
GliteVM: How Science and Business May Benefit from Virtualization. 126-129 - Takahiro Miyamoto, Michiaki Hayashi, Hideaki Tanaka:

Customizing Network Functions for High Performance Cloud Computing. 130-133 - Vincenzo D. Cunsolo, Salvatore Distefano

, Antonio Puliafito, Marco Scarpa:
Volunteer Computing and Desktop Cloud: The Cloud@Home Paradigm. 134-139
Network Security
- Carlos Aguilar Melchor, Boussad Ait Salem, Philippe Gaborit:

A Collusion-Resistant Distributed Scalar Product Protocol with Application to Privacy-Preserving Computation of Trust. 140-147 - Soontaree Tanaraksiritavorn, Shivakant Mishra:

A Privacy Preserving Intrusion Tolerant Voting Architecture. 148-155 - Basil AsSadhan

, José M. F. Moura, David E. Lapsley, Christine E. Jones, W. Timothy Strayer:
Detecting Botnets Using Command and Control Traffic. 156-162 - Jesus Molina, Michel Cukier:

Evaluating Files to Audit for Detecting Intrusions in FileSystem Data. 163-170
Sensor Networks and Mobile Ad-Hoc Networks (MANETs)
- Goce Trajcevski, Nikolay Valtchanov, Oliviu Ghica, Peter Scheuermann:

A Case for Meta-Triggers in Wireless Sensor Networks. 171-178 - Bayrem Triki

, Slim Rekhis
, Noureddine Boudriga:
Digital Investigation of Wormhole Attacks in Wireless Sensor Networks. 179-186 - Xiaokang Xiong, Duncan S. Wong, Xiaotie Deng

:
TinyPairing: Computing Tate Pairing on Sensor Nodes with Higher Speed and Less Memory. 187-194
Virtualization and Quality of Service
- Michael Le, Andrew Gallagher, Yuval Tamir, Yoshio Turner:

Maintaining Network QoS Across NIC Device Driver Failures Using Virtualization. 195-202 - Younggyun Koh, Calton Pu, Yasushi Shinjo, Hideki Eiraku, Go Saito, Daiyuu Nobori:

Improving Virtualized Windows Network Performance by Delegating Network Processing. 203-210 - Iñigo Goiri, Ferran Julià, Jorge Ejarque

, Marc de Palol, Rosa M. Badia
, Jordi Guitart
, Jordi Torres
:
Introducing Virtual Execution Environments for Application Lifecycle Management and SLA-Driven Resource Distribution within Service Providers. 211-218 - Achilles Colombo Prudêncio, Roberto Willrich, Michel Diaz, Saïd Tazi:

Quality of Service Specifications: A Semantic Approach. 219-226
Wireless and Mobile Ad-hoc Networks (MANETs)
- Elmano Ramalho Cavalcanti, Marco Aurélio Spohn

:
Estimating the Impact of Mobility Models' Parameters on Mobility Metrics in MANETs. 227-233 - Ilknur Aydin, Chien-Chung Shen:

Performance Evaluation of Concurrent Multipath Transfer Using SCTP Multihoming in Multihop Wireless Networks. 234-241 - Fan Wu, Emmanuel Agu, Clifford Lindsay, Chung-Han Chen:

Unequal Error Protection (UEP) for Wavelet-Based Wireless 3D Mesh Transmission. 242-249 - Filippo Gandino

, Renato Ferrero
, Bartolomeo Montrucchio
, Maurizio Rebaudengo
:
Introducing Probability in RFID Reader-to-Reader Anti-collision. 250-257
Security
- Hakem Beitollahi, Geert Deconinck

:
Empirical Study of Tolerating Denial-of-Service Attacks with the Fosel Architecture. 258-261 - Peidong Zhu, Xiangjiang Hu, Huayang Cao, Xiaoqiang Wang:

TTM Based Security Enhancement for Inter-domain Routing Protocol. 262-265 - Michael Atighetchi, Partha P. Pal

:
Attribute-Based Prevention of Phishing Attacks. 266-269 - Michael D. Kelly, Sean J. Geoghegan:

FIRST. 270-273
Peer-to-Peer and Data Transfer
- Min Yang, Yuanyuan Yang

:
Adaptive Network Coding for Heterogeneous Peer-to-Peer Streaming Systems. 274-277 - Ghassan Karame, Mario Cagalj, Srdjan Capkun:

Small Coalitions: Lightweight Collaboration for Efficient P2P Downloads. 278-283 - Sharrukh Zaman, Daniel Grosu

:
A Distributed Algorithm for Web Content Replication. 284-287 - Yongmao Ren

, Haina Tang, Jun Li, Hualin Qian:
A Novel Congestion Control Algorithm for High Performance Bulk Data Transfer. 288-291
Wireless Networks
- Yong Hwan Kim, Sung Soo Kim, Kwang Seon Ahn:

A Rapid Tag Identification Method with Two Slots in RFID Systems. 292-295 - Neila Krichene, Noureddine Boudriga:

Serving Handing Over Stations within the Mobile IEEE 802.16 Mesh Mode Context. 296-299 - Riccardo Manfrin, Andrea Zanella

, Michele Zorzi:
Functional and Performance Analysis of CalRadio 1 Platform. 300-305 - Yu Zhou, Mira Yun, Timothy Kim, Amrinder Arora, Hyeong-Ah Choi:

RL-Based Queue Management for QoS Support in Multi-channel Multi-radio Mesh Networks. 306-309
Architectures and Protocols
- Nuno M. Garcia

, Przemyslaw Lenkiewicz, Mário M. Freire
, Paulo P. Monteiro
:
A New Architecture for Optical Burst Switching Networks Based on Cooperative Control. 310-313 - Fumio Nakanjima, Hitoshi Oi

:
Optimizations of Large Receive Offload in Xen. 314-318 - Wilfried Steiner, Günther Bauer, Brendan Hall, Michael Paulitsch, Srivatsan Varadarajan:

TTEthernet Dataflow Concept. 319-322 - Sung-Hyun Nam, Hyunwoo Hwang, Ju-Hyun Kim, Kyung-Geun Lee:

Fast Macro Handover in Hierarchical Mobile IPv6. 323-326 - Zheng Wang, Xiaodong Lee, Jian Jin, Baoping Yan:

Efficient Filtering Algorithm for Repeated Queries in DNS Log. 327-330

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














