


default search action
32nd ICDCS 2012: Macau, China
- 2012 IEEE 32nd International Conference on Distributed Computing Systems, Macau, China, June 18-21, 2012. IEEE Computer Society 2012, ISBN 978-1-4577-0295-2

- Rahul Singh

, Prashant J. Shenoy
, K. K. Ramakrishnan
, Rahul Kelkar, Harrick M. Vin:
eTransform: Transforming Enterprise Data Centers by Automated Consolidation. 1-11 - Xitao Wen, Kai Chen, Yan Chen, Yongqiang Liu, Yong Xia, Chengchen Hu:

VirtualKnotter: Online Virtual Machine Shuffling for Congestion Resolving in Virtualized Datacenter. 12-21 - Shaolei Ren

, Yuxiong He, Fei Xu:
Provably-Efficient Job Scheduling for Energy and Fairness in Geographically Distributed Data Centers. 22-31 - Xin Wu, Xiaowei Yang:

DARD: Distributed Adaptive Routing for Datacenter Networks. 32-41 - Wenping Liu, Hongbo Jiang, Xiang Bai, Guang Tan, Chonggang Wang, Wenyu Liu

, Kechao Cai:
Skeleton Extraction from Incomplete Boundaries in Sensor Networks Based on Distance Transform. 42-51 - Wenping Liu, Hongbo Jiang, Chonggang Wang, Chang Liu, Yang Yang, Wenyu Liu

, Bo Li:
Connectivity-based and Boundary-Free Skeleton Extraction in Sensor Networks. 52-61 - Ze Li, Haiying Shen:

A Kautz-based Real-Time and Energy-Efficient Wireless Sensor and Actuator Network. 62-71 - Desheng Zhang, Tian He, Fan Ye, Raghu K. Ganti, Hui Lei:

EQS: Neighbor Discovery and Rendezvous Maintenance with Extended Quorum System for Mobile Sensing Applications. 72-81 - Ahsan Arefin, Zixia Huang, Klara Nahrstedt, Pooja Agarwal:

4D TeleCast: Towards Large Scale Multi-site and Multi-view Dissemination of 3DTI Contents. 82-91 - Xinyu Yang, Jie Lin, Paul Moulema, Wei Yu

, Xinwen Fu
, Wei Zhao
:
A Novel En-route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Networked Systems. 92-101 - Jim Dowling, Amir Hossein Payberah

:
Shuffling with a Croupier: Nat-Aware Peer-Sampling. 102-111 - Michael Gray, Peter Peterson, Peter L. Reiher:

Scaling Down Off-the-Shelf Data Compression: Backwards-Compatible Fine-Grain Mixing. 112-121 - Siyuan Liu, Lei Kang, Lei Chen

, Lionel M. Ni:
Distributed Incomplete Pattern Matching via a Novel Weighted Bloom Filter. 122-131 - Wei Gao, Guohong Cao, Mudhakar Srivatsa, Arun Iyengar:

Distributed Maintenance of Cache Freshness in Opportunistic Mobile Networks. 132-141 - Binh Han, Ling Liu, Edward Omiecinski:

NEAT: Road Network Aware Trajectory Clustering. 142-151 - Zhu Ren, Peng Cheng, Jiming Chen, David K. Y. Yau, Youxian Sun:

Dynamic Activation Policies for Event Capture with Rechargeable Sensors. 152-162 - Debraj De, Wen-Zhan Song

, Mingsen Xu, Chengliang Wang, Diane J. Cook, Xiaoming Huo:
FindingHuMo: Real-Time Tracking of Motion Trajectories from Anonymous Binary Sensing in Smart Environments. 163-172 - Chi-Yao Hong, Matthew Caesar

, Nick G. Duffield
, Jia Wang:
Tiresias: Online Anomaly Detection for Hierarchical Operational Network Data. 173-182 - Alexandre Maurer, Sébastien Tixeuil:

Limiting Byzantine Influence in Multihop Asynchronous Networks. 183-192 - Hein Meling, Keith Marzullo, Alessandro Mei

:
When You Don't Trust Clients: Byzantine Proposer Fast Paxos. 193-202 - Rahim Delaviz, Nazareno Andrade, Johan A. Pouwelse

, Dick H. J. Epema:
SybilRes: A Sybil-resilient Flow-Based Decentralized Reputation Mechanism. 203-213 - Lingjun Li, Xinxin Zhao, Guoliang Xue, Gabriel Silva:

Privacy Preserving Group Ranking. 214-223 - Linke Guo, Chi Zhang, Jinyuan Sun, Yuguang Fang

:
PAAS: A Privacy-Preserving Attribute-Based Authentication System for eHealth Networks. 224-233 - Abhishek Singh, Guido Urdaneta, Maarten van Steen

, Roman Vitenberg:
Robust Overlays for Privacy-Preserving Data Dissemination over a Social Graph. 234-244 - Zhipeng Cai, Shouling Ji, Jing He, Anu G. Bourgeois:

Optimal Distributed Data Collection for Asynchronous Cognitive Radio Networks. 245-254 - Xu Chen, Jianwei Huang:

Game Theoretic Analysis of Distributed Spectrum Sharing with Database. 255-264 - Franck Le, Mudhakar Srivatsa, Arun Iyengar:

Byte Caching in Wireless Networks. 265-274 - Sergio Arévalo

, Antonio Fernández Anta
, Damien Imbs, Ernesto Jiménez
, Michel Raynal:
Failure Detectors in Homonymous Distributed Systems (with an Application to Consensus). 275-284 - Yongmin Tan, Hiep Nguyen, Zhiming Shen, Xiaohui Gu, Chitra Venkatramani, Deepak Rajan:

PREPARE: Predictive Performance Anomaly Prevention for Virtualized Cloud Systems. 285-294 - Qiang Zheng, Guohong Cao, Tom La Porta, Ananthram Swami:

Optimal Recovery from Large-Scale Failures in IP Networks. 295-304 - Enhua Tan, Lei Guo, Songqing Chen, Xiaodong Zhang, Yihong Eric Zhao:

Spammer Behavior Analysis and Detection in User Generated Content on Social Networks. 305-314 - Jeffrey Seibert, Sheila Becker, Cristina Nita-Rotaru, Radu State:

Securing Virtual Coordinates by Enforcing Physical Laws. 315-324 - Qiyan Wang, Nikita Borisov

:
Octopus: A Secure and Anonymous DHT Lookup. 325-334 - Kaiwen Zhang, Vinod Muthusamy, Hans-Arno Jacobsen:

Total Order in Content-Based Publish/Subscribe Systems. 335-344 - Reza Sherafat Kazemzadeh, Hans-Arno Jacobsen:

Publiy+: A Peer-Assisted Publish/Subscribe Service for Timely Dissemination of Bulk Content. 345-354 - Jiachen Chen, Mayutan Arumaithurai

, Xiaoming Fu
, K. K. Ramakrishnan
:
G-COPSS: A Content Centric Communication Infrastructure for Gaming Applications. 355-365 - Yong Cui, Xin Wang, Hongyi Wang, Guangjin Pan, Yining Wang:

FMTCP: A Fountain Code-Based Multipath Transmission Control Protocol. 366-375 - Shan Chu, Xin Wang, Minming Li

:
Enforcing High-Performance Operation of Multi-hop Wireless Networks with MIMO Relays. 376-385 - Junliang Liu, Zheng Yang, Ivan Stojmenovic:

Receiver Consensus: On-time Warning Delivery for Vehicular Ad-hoc Networks. 386-395 - Shen Li, Hieu Khac Le, Nam Pham, Jin Heo, Tarek F. Abdelzaher:

Joint Optimization of Computing and Cooling Energy: Analytic Model and a Machine Room Case Study. 396-405 - Liting Hu, Kyung Dong Ryu, Dilma Da Silva, Karsten Schwan:

v-Bundle: Flexible Group Resource Offerings in Clouds. 406-415 - Jianguo Yao, Xue Liu, Wenbo He

, Ashikur Rahman
:
Dynamic Control of Electricity Cost with Power Demand Smoothing and Peak Shaving for Distributed Internet Data Centers. 416-424 - Wei Wang

, Baochun Li, Ben Liang
:
Towards Optimal Capacity Segmentation with Hybrid Cloud Pricing. 425-434 - Ken C. K. Lee, Kanchan Bankar, Baihua Zheng

, Chi-Yin Chow
, Honggang Wang
:
Dash: A Novel Search Engine for Database-Generated Dynamic Web Pages. 435-444 - Weixiong Rao, Lei Chen

, Pan Hui, Sasu Tarkoma
:
MOVE: A Large Scale Keyword-Based Content Filtering and Dissemination System. 445-454 - Sebastiano Peluso, Pedro Ruivo, Paolo Romano

, Francesco Quaglia, Luís E. T. Rodrigues:
When Scalability Meets Consistency: Genuine Multiversion Update-Serializable Partial Data Replication. 455-465 - Ahmed Eldawy

, Rohit Khandekar, Kun-Lung Wu:
Clustering Streaming Graphs. 466-475 - Ajoy Kumar Datta, Lawrence L. Larmore, Stéphane Devismes

, Karel Heurtefeux
, Yvan Rivierre:
Competitive Self-Stabilizing k-Clustering. 476-485 - Hyun Chul Chung, Saira Viqar, Jennifer L. Welch:

Neighbor Knowledge of Mobile Nodes in a Road Network. 486-495 - Aly Farahat, Ali Ebnenasir:

Local Reasoning for Global Convergence of Parameterized Rings. 496-505 - Shantanu Das

, Paola Flocchini, Giuseppe Prencipe
, Nicola Santoro
, Masafumi Yamashita:
The Power of Lights: Synchronizing Asynchronous Robots Using Visible Bits. 506-515 - Hui Jin, Xi Yang, Xian-He Sun, Ioan Raicu:

ADAPT: Availability-Aware MapReduce Data Placement for Non-dedicated Distributed Computing. 516-525 - Qi Zhang, Quanyan Zhu, Mohamed Faten Zhani

, Raouf Boutaba:
Dynamic Service Placement in Geographically Distributed Clouds. 526-535 - Kan Yang

, Xiaohua Jia
:
Attributed-Based Access Control for Multi-authority Systems in Cloud Storage. 536-545 - Yunus Basagalar, Vassilios Lekakis, Pete Keleher:

Growing Secure Distributed Systems from a Spore. 546-555 - Yibo Wu

, Xinbing Wang:
Achieving Full View Coverage with Randomly-Deployed Heterogeneous Camera Sensors. 556-565 - Feng Li, Jun Luo

, Shi-Qing Xin, Wenping Wang, Ying He
:
LAACAD: Load Balancing k-Area Coverage through Autonomous Deployment in Wireless Sensor Networks. 566-575 - Xiaonan Guo, Dian Zhang, Lionel M. Ni:

Localizing Multiple Objects in an RF-based Dynamic Environment. 576-585 - Young-Woo Kwon

, Eli Tilevich
:
Energy-Efficient and Fault-Tolerant Distributed Mobile Execution. 586-595 - Yuanrui Zhang, Jun Liu, Mahmut T. Kandemir:

Software-Directed Data Access Scheduling for Reducing Disk Energy Consumption. 596-605 - Sungju Huh, Jonghun Yoo, Myungsun Kim, Seongsoo Hong:

Providing Fair Share Scheduling on Multicore Cloud Servers via Virtual Runtime-based Task Migration Algorithm. 606-614 - James Elliott, Kishor Kharbas, David Fiala, Frank Mueller, Kurt B. Ferreira, Christian Engelmann

:
Combining Partial Redundancy and Checkpointing for HPC. 615-626 - Jesús Carretero

, Florin Isaila, Anne-Marie Kermarrec
, François Taïani
, Juan Manuel Tirado:
Geology: Modular Georecommendation in Gossip-Based Social Networks. 637-646 - Xiaohui Liang

, Xu Li, Rongxing Lu, Xiaodong Lin, Xuemin (Sherman) Shen
:
SEER: A Secure and Efficient Service Review System for Service-Oriented Mobile Social Networks. 647-656 - Pei-Chun Cheng, Jong Han Park, Keyur Patel, Shane Amante, Lixia Zhang:

Explaining BGP Slow Table Transfers. 657-666 - Ying Zhang, Makan Pourzandi:

Studying Impacts of Prefix Interception Attack by Exploring BGP AS-PATH Prepending. 667-677 - Tong Yang, Ruian Duan, Jianyuan Lu, Shenjiang Zhang, Huichen Dai, Bin Liu:

CLUE: Achieving Fast Update over Compressed Table for Parallel Lookup with Reduced Dynamic Redundancy. 678-687 - Yi Wang, Keqiang He, Huichen Dai, Wei Meng, Junchen Jiang, Bin Liu, Yan Chen:

Scalable Name Lookup in NDN Using Effective Name Component Encoding. 688-697 - Tam Vu, Akash Baid, Yanyong Zhang, Thu D. Nguyen, Junichiro Fukuyama, Richard P. Martin, Dipankar Raychaudhuri:

DMap: A Shared Hosting Scheme for Dynamic Identifier to Locator Mappings in the Global Internet. 698-707 - Xingyu Ma, Chengchen Hu, Kai Chen, Che Zhang, Hongtao Zhang, Kai Zheng, Yan Chen, Xianda Sun:

Error Tolerant Address Configuration for Data Center Networks with Malfunctioning Devices. 708-717

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














