


default search action
4th NCA 2005: Cambridge, MA, USA
- Fourth IEEE International Symposium on Network Computing and Applications (NCA 2005), 27-29 July 2005, Cambridge, MA, USA. IEEE Computer Society 2005, ISBN 0-7695-2326-9

Cover
- Fourth IEEE International Symposium on Network Computing and Applications - Title Page.

- Fourth IEEE International Symposium on Network Computing and Applications - Copyright.

Introduction
- Message from the NCA 2005 Program Committee.

- NCA 2005 Program Committee.

- NCA 2005 Symposium Referees.

Opening Address
- Tad Elmer:

Opening Address. 1
Invited Talks
- Jean-Claude Laprie:

Resilience for the Scalability of Dependability. 5-6 - Wei Zhao

:
Effectiveness of Traffic Camouflaging over Computer Networks. 7 - Robert W. Taylor:

New Generation Scalable and Dependable Servers. 8 - A. Ghosh:

Challenges in Mobile Networking and Information Assurance. 9
Security and Trust
- William Sears, Zhen Yu, Yong Guan:

An Adaptive Reputation-based Trust Framework for Peer-to-Peer Applications. 13-20 - Arnab Paul, Rajnish Kumar, Umakishore Ramachandran:

LAWN: A Protocol for Remote Authentication overWireless Networks. 21-28 - Carlos Aguilar Melchor, Yves Deswarte:

pMIX: Untraceability for Small Hiding Groups. 29-40
Large Groups and Grids Scheduling
- Dionysios Kostoulas, Dimitrios Psaltoulis, Indranil Gupta, Ken Birman

, Alan J. Demers:
Decentralized Schemes for Size Estimation in Large and Dynamic Groups. 41-48 - Stephen Frechette, Dimiter R. Avresky:

Method for Task Migration in Grid Environments. 49-58
Networking Protocols
- Peng Wang, David L. Mills:

A Probabilistic Approach for Achieving Fair Bandwidth Allocations in CSFQ. 59-66 - Chin-Ling Chen, Jia-Chun Yu:

Supporting Rate-based Control in DiffServ Networks. 67-72 - Joel Sing, Ben Soh:

TCP New Vegas: Improving the Performance of TCP Vegas Over High Latency Links. 73-82
Peer-to-Peer Publish-Subscribe Systems
- Giscard Wepiwé, Plamen L. Simeonov

:
A Concentric Multi-ring Overlay for Highly Reliable P2P Networks. 83-90 - Roberto Baldoni, Leonardo Querzoni

, Antonino Virgillito, Ricardo Jiménez-Peris, Marta Patiño-Martínez
:
Dynamic Quorums for DHT-based P2P Networks. 91-100 - Nuno Carvalho, Filipe Araújo

, Luís E. T. Rodrigues:
Scalable QoS-Based Event Routing in Publish-Subscribe Systems. 101-108 - Marc Schiely, Lars Renfer, Pascal Felber

:
Self-organization in Cooperative Content Distribution Networks. 109-118
Real-Time Scheduling
- Malika Boulkenafed, Barbara Hughes, René Meier, Gregory Biegel, Vinny Cahill:

Providing Hard Real-Time Guarantees in Context-Aware Applications: Challenges and Requirements. 119-127 - Sarah Tasneem, Lester Lipsky, Reda A. Ammar, Howard A. Sholl:

Using Residual Times to Meet Deadlines in M/G/C Queues. 128-138
Middleware for Dependable Computing
- Arnas Kupsys, Richard Ekwall:

Architectural Issues of JMS Compliant Group Communication. 139-148 - Chryssis Georgiou

, Peter M. Musial, Alexander A. Shvartsman
:
Developing a Consistent Domain-Oriented Distributed Object Service. 149-158 - Roger Khazan, Sophia Yuditskaya:

A Wide Area Network Simulation of Single-Round Group Membership Algorithms. 159-170
Network Processors and Scheduling
- Sanjay Kumar, Ada Gavrilovska, Karsten Schwan, Srikanth Sundaragopalan:

C-CORE: Using Communication Cores for High Performance Network Services. 171-178 - Hao Che, Chethan Kumar, Basavaraj Menasinahal:

Fundamental Network Processor Performance Bounds. 179-185 - Florina M. Ciorba

, Theodore Andronikos, Ioannis Drositis, George K. Papakonstantinou, Panayotis Tsanakas:
Reducing the Communication Cost via Chain Pattern Scheduling. 186-196
Multicast Protocols
- Milena Janic, Novi Ineke, Cempaka Wangi, Xiaoming Zhou, Piet Van Mieghem:

Hopcount in Application Layer Multicast Schemes. 197-204 - Mahesh Balakrishnan, Stefan Pleisch, Ken Birman

:
Slingshot: Time-Critical Multicast for Clustered Applications. 205-214
Short Papers
- Ye Zhu, Xinwen Fu

, Riccardo Bettati:
On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks. 215-218 - Michael Atighetchi, Paul Rubel, Partha P. Pal

, Jennifer Chong, Lyle Sudin:
Networking Aspects in the DPASA Survivability Architecture: An Experience Report. 219-222 - Romain Laborde, François Barrère, Abdelmalek Benzekri:

A formal framework (Expression + Analysis) for network security. 223-227 - Tzu-Chi Huang, Ce-Kuen Shieh, Wen-Huang Lai, Yu-Ben Miao:

Smart Tunnel Union for NAT Traversal. 227-231 - Constantine Katsinis:

Block Migration in Broadcast-based Multiprocessor Architectures. 231-234 - Gunnar Gaubatz, Berk Sunar:

Leveraging the Multiprocessing Capabilities of Modern Network Processors for Cryptographic Acceleration. 235-238 - Jiazheng Zhou, Xuan-Yi Lin, Chun-Hsien Wu, Yeh-Ching Chung:

Multicast in Fat-Tree-Based InfiniBand Networks. 239-242 - Daniel C. Bünzli

, Sergio Mena, Uwe Nestmann:
Protocol Composition Frameworks A Header-Driven Model. 243-246 - Kuniyasu Suzaki, Kengo Iijima, Toshiki Yagi, Hideyuki Tan, Kazuhiro Goto:

SFS-KNOPPIX. 247-250 - Onur Demir

, Kanad Ghose:
Improving Transaction Server Performance under Heavy Loads with Differentiated Service and Active Network Interfaces. 251-254 - Chetan Shiva Shankar, Roy H. Campbell:

A Policy-based Management Framework for Pervasive Systems using Axiomatized Rule-Actions. 255-258 - Giorgia Lodi

, Fabio Panzieri, Davide Rossi, Elisa Turrini:
Experimental Evaluation of a QoS-aware Application Server. 259-262 - Danilo Ardagna

, Marco Trubian, Li Zhang:
SLA Based Profit Optimization in Multi-tier Systems. 263-266 - Bhavin Gandhi, Sameer Tilak, Michael J. Lewis, Nael B. Abu-Ghazaleh

:
Controlling the Coverage of Grid Information Dissemination Protocols. 267-270 - Michel Charpentier, Gérard Padiou, Philippe Quéinnec:

Cooperative Mobile Agents to Gather Global Information. 271-274 - Peng-Jun Wan, Chih-Wei Yi

:
Coverage by Randomly Deployed Wireless Sensor Networks. 275-278 - Patrick Th. Eugster, Benoît Garbinato

, Adrian Holzer:
Location-based Publish/Subscribe. 279-282 - Alexandros G. Fragkiadakis

, David J. Parish:
Performance Evaluation of a PC-based Active Router and Analysis of an Active Secure FTP Application. 283-286

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














