


default search action
7th NCA 2008: Cambridge, MA, USA
- Proceedings of The Seventh IEEE International Symposium on Networking Computing and Applications, NCA 2008, July 10-12, 2008, Cambridge, Massachusetts, USA. IEEE Computer Society 2008, ISBN 978-0-7695-3192-2

Best Paper Session
- Paolo Romano

, Diego Rughetti, Francesco Quaglia, Bruno Ciciani:
APART: Low Cost Active Replication for Multi-tier Data Acquisition Systems. 1-8 - Krzysztof Ostrowski, Ken Birman

, Danny Dolev:
Quicksilver Scalable Multicast (QSM). 9-18
Network Security
- Hakem Beitollahi, Geert Deconinck

:
FOSeL: Filtering by Helping an Overlay Security Layer to Mitigate DoS Attacks. 19-28 - Mohammed S. Gadelrab

, Anas Abou El Kalam
, Yves Deswarte
:
Execution Patterns in Automatic Malware and Human-Centric Attacks. 29-36 - Giuliana Santos Veronese, Miguel Correia

, Lau Cheuk Lung, Paulo Veríssimo
:
Finite Memory: A Vulnerability of Intrusion-Tolerant Systems. 37-44
Peer-to-Peer Systems and Publish/Subscribe Systems
- Denvil Smith, Nian-Feng Tzeng, Milad M. Ghantous:

FaSReD: Fast and Scalable Resource Discovery in Support of Multiple Resource Range Requirements for Computational Grids. 45-51 - Hojjat Jafarpour, Sharad Mehrotra, Nalini Venkatasubramanian:

A Fast and Robust Content-based Publish/Subscribe Architecture. 52-59
Quality of Service (QoS) Issues and Availability
- Priscila Solís Barreto, Paulo Henrique Portela de Carvalho:

Network Planning Optimization for Multimedia Networks. 60-67 - Julio Cesar Royer, Roberto Willrich, Michel Diaz:

User Profile-Based Authorization Policies for Network QoS Services. 68-75 - Lásaro J. Camargos, Rodrigo Malta Schmidt, Fernando Pedone

:
Multicoordinated Agreement Protocols for Higher Availabilty. 76-84
Distributed Dependable Storage
- James S. Plank

:
A New Minimum Density RAID-6 Code with a Word Size of Eight. 85-92 - Gang Wang, Xiaoguang Liu, Sheng Lin, Guangjun Xie, Jing Liu:

Generalizing RDP Codes Using the Combinatorial Method. 93-100 - Peter Sobe, Kathrin Peter:

Flexible Parameterization of XOR based Codes for Distributed Storage. 101-110
Sensor Networks and Mobile Ad-Hoc Networks (MANETs)
- Song Guo, Chunxia Fan, Thomas D. C. Little

:
Supporting Concurrent Task Deployment Wireless Sensor Networks. 111-118 - Denis Conan

, Pierre Sens
, Luciana Arantes
, Mathieu Bouillaguet:
Failure, Disconnection and Partition Detection in Mobile Environment. 119-127 - Maria Fazio

, Maurizio Paone, Dario Bruneo
, Antonio Puliafito:
Cross-Layer Architecture for Differentiated Services in Ad Hoc Networks. 128-135 - Wang Ke, Thomas D. C. Little

:
Dynamic Routing Selection for Wireless Sensor Networks. 136-143
Applications in Networked Systems
- Luís Moura Silva:

Comparing Error Detection Techniques for Web Applications: An Experimental Study. 144-151 - Stephan Pöhlsen, Frank Franz, Kai Kück

, Jörg-Uwe Meyer, Christian Werner:
Fair-Queued Ethernet for Medical Applications. 152-159 - Claudia Canali

, José Daniel García
, Riccardo Lancellotti
:
Impact of Social Networking Services on the Performance and Scalability of Web Server Infrastructures. 160-167
Routing Mechanisms and Network Processors
- Christine Maindorfer, Thomas Ottmann:

Is the Popular R*-tree Suited for Packet Classification? 168-176 - Min Yang, Yuanyuan Yang

:
A Linear Inter-Session Network Coding Scheme for Multicast. 177-184 - Fong Pong, Nian-Feng Tzeng:

Application-Layer Packet Processing through Ethereal Memory. 185-194
Protocol Verification and Validation
- Marina Gelastou, Chryssis Georgiou

, Anna Philippou:
On the Application of Formal Methods for Specifying and Verifying Distributed Protocols. 195-204 - Christoph Heller, Josef Schalk, Stefan Schneele, Reinhard Reichel:

Approaching the Limits of FlexRay. 205-210 - Chryssis Georgiou

, Peter M. Musial, Alexander A. Shvartsman
, Elaine L. Sonderegger:
An Abstract Channel Specification and an Algorithm Implementing It Using Java Sockets. 211-219
Short Papers 1
- Osamah S. Badarneh, Michel Kadoch

, Ahmed K. Elhakeem:
Multilayered Video Multiple Trees Multicast Algorithms for Heterogeneous Wireless Ad Hoc Networks. 220-223 - Sung Soo Kim, Yong Hwan Kim, Seong Joon Lee, Kwang Seon Ahn:

An Improved Anti Collision Algorithm using Parity Bit in RFID System. 224-227 - Svilen Ivanov, Edgar Nett, André Herms, Daniel Mahrenholz, Stefan Schemmer:

Feedback-controlled WLAN: Achieving Channel-Availability in Mesh Networks. 228-231 - Rongyu He, Chaowen Chang, Guolei Zhao, Zheng Qin, Xi Qin:

Police Security Communication over Public Cellular Network Infrastructure. 232-235
Short Papers 2
- Marcus Brenner, Armin Zimmermann

:
Analysis of Delay Time Distributions in Multistage Interconnection Networks Considering Multicast Traffic. 236-239 - Carla Diacui Medeiros Berkenbrock, Celso Massaki Hirata

:
Supporting Cache Coherence in Mobile Cooperative Systems. 240-243 - Brad Whitehead, Chung-Horng Lung, Amogelang Tapela, Gopinath Sivarajah:

Experiments of Large File Caching and Comparisons of Caching Algorithms. 244-248 - Micah Galizia, Hanan Lutfiyya:

Improving Efficiency and Performance of Distributed File-Systems. 249-252
Short Papers 3
- Francesc D. Muñoz-Escoí

, Rubén de Juan-Marín, José Enrique Armendáriz-Iñigo
, José Ramón González de Mendívil
:
Persistent Logical Synchrony. 253-258 - Ravi Madipadaga, Sabishaw Bhaskaran, Saikat Mukherjee:

EPH: An Efficient and Robust Group Membership Topology for Distributed Systems. 259-262 - Luís E. T. Rodrigues, Nuno Carvalho, Emili Miedes:

Supporting Linearizable Semantics in Replicated Databases. 263-266 - Chadi Kari, Alexander Russell

, Narasimha K. Shashidhar:
Randomized Work-Competitive Scheduling for Cooperative Computing on k-partite Task Graphs. 267-270 - Hong Li, Lorne Mason, Michael G. Rabbat:

Learning Minimum Delay Paths in Service Overlay Networks. 271-274
Short Papers 4
- Derek Doran, Swapna S. Gokhale:

Discovering New Trends in Web Robot Traffic Through Functional Classification. 275-278 - Yutaka Sugawara, Takeshi Yoshino, Hiroshi Tezuka, Mary Inaba, Kei Hiraki:

Effect of Parallel TCP Stream Equalizer on Real Long Fat-pipe Network. 279-282 - Fenghui Zhang, Anxiao Jiang, Jianer Chen:

Sorting Based Data Centric Storage. 283-286 - Xiaobing Zheng, Lei Guo

, Xingwei Wang, Yu Zhang, Xuekui Wang:
A New Recovery Escalation Algorithm with Load Balancing and Backup Resources Sharing in Path Protected WDM Optical Networks. 287-290
Adaptive Grid Computing Workshop
- Demetrios Zeinalipour-Yazti

, Kyriakos Neocleous, Chryssis Georgiou
, Marios D. Dikaiakos:
Identifying Failures in Grids through Monitoring and Ranking. 291-298 - André Luckow, Bettina Schnor:

Adaptive Checkpoint Replication for Supporting the Fault Tolerance of Applications in the Grid. 299-306 - Angela C. Sodan:

Autonomic Share Allocation and Bounded Prediction of Response Times in Parallel Job Scheduling for Grids. 307-314
Trustworthy Network Computing Workshop
- Antonio Fernández Anta, Chryssis Georgiou

, Miguel A. Mosteiro:
Designing Mechanisms for Reliable Internet-based Computing. 315-324 - Tran Hoang Hai

, Eui-nam Huh:
Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-hops Neighbor Knowledge. 325-331 - Amar A. Rasheed, Rabi N. Mahapatra:

Secure Data Collection Scheme in Wireless Sensor Network with Mobile Sink. 332-340

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














