default search action
3rd NCA 2004: Cambridge, MA, USA
- 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), 30 August - 1 September 2004, Cambridge, MA, USA. IEEE Computer Society 2004, ISBN 0-7695-2242-4
NCA 2004 Long Papers
Session 1: Overlay Networks
- Roie Melamed, Idit Keidar:
Araneola: A Scalable Reliable Multicast System for Dynamic Environments. 5-14 - Li-Wei H. Lehman, Steven Lerman:
PCoord: Network Position Estimation Using Peer-to-Peer Measurements. 15-24 - Shlomi Dolev, Ronen I. Kat:
HyperTree for Self-Stabilizing Peer-to-Peer Systems. 25-32
Session 2: Keynote Speaker
- Yves Deswarte, David Powell:
Intrusion Tolerance for Internet Applications. 35-36
Session 3: Overlap Networks
- Filipe Araújo, Luís E. T. Rodrigues:
GeoPeer: A Location-Aware Peer-to-Peer System. 39-46 - Jianming Lv, Xueqi Cheng:
WonGoo: A Pure Peer-to-Peer Full Text Information Retrieval System Based On Semantic Overlay Networks. 47-54
Session 4: Keynote Speaker
- Mark E. Segal:
Exploring the Network/Software Boundary: A Telecommunications Perspective. 57-
Session 5: Web Protocols
- Bin Wu, Ajay D. Kshemkalyani:
Objective-Greedy Algorithms for Long-Term Web Prefetching. 61-68 - Paolo Romano, Francesco Quaglia, Bruno Ciciani:
A Protocol for Improved User Perceived QoS in Web Transactional Applications. 69-76 - Giancarlo Ruffo, Rossano Schifanella, Matteo Sereno, Roberto Politi:
WALTy: A User Behavior Tailored Tool for Evaluating Web Application Performance. 77-86
Session 6: Grid Computing
- Rebecca L. Collins, James S. Plank:
Downloading Replicated, Wide-Area Files - A Framework and Empirical Evaluation. 89-96 - Vishal Iyengar, Sameer Tilak, Michael J. Lewis, Nael B. Abu-Ghazaleh:
Non-Uniform Information Dissemination for Dynamic Grid Resource Discovery. 97-106
Session 7: Keynote Speaker
- André Schiper:
Group Communication: Where Are We Today and Future Challenges. 109-117
Session 8: Protocols and Verification
- Joshua A. Tauber, Nancy A. Lynch, Michael J. Tsai:
Compiling IOA without Global Synchronization. 121-130 - Arnas Kupsys, Stefan Pleisch, André Schiper, Matthias Wiesmann:
Towards JMS Compliant Group Communication - A Semantic Mapping. 131-140 - Vicent Cholvi, Antonio Fernández, Ernesto Jiménez, Michel Raynal:
A Methodological Construction of an Efficient Sequential Consistency Protocol. 141-148
Session 9: Keynote Speaker
- Alan G. Ganek, Cristiane P. Hilkner, John W. Sweitzer, Brent A. Miller, Joseph L. Hellerstein:
The Response to IT Complexity: Autonomic Computing. 151-157
Session 10: Network Security
- Min Qin, Kai Hwang:
Frequent Episode Rules for Internet Anomaly Detection. 161-168 - Patroklos G. Argyroudis, Raja Verma, Hitesh Tewari, Donal O'Mahony:
Performance Analysis of Cryptographic Protocols on Handheld Devices. 169-174
Session 11: System Area Networks/InfiniBand
- Victoria Ungureanu, Benjamin Melamed, Michael N. Katehakis:
The LC Assignment Policy for Cluster-Based Servers. 177-184 - Christian Osendorfer, Jie Tao, Carsten Trinitis, Martin Mairandres:
ViSMI: Software Distributed Shared Memory for InfiniBand Clusters. 185-191 - Ming Zhu, Yang Wang, Meng Ding, Constantine Katsinis:
Dynamic Key Messaging for Cluster Computing. 192-199
Session 12: Keynote Speaker
- Michael Krause:
Are Processors Free? Impact on RDMA and Protocol Off-Load Technologies. 203-
Session 13: Network Processors and Switching Architectures
- Jürgen Foag:
Speculative Network Processor for Quality-of-Service-Aware Protocol Processing. 207-214 - Satyen Sukhtankar, Diana Hecht, Warren Rosen:
A Novel Switch Architecture for High-Performance Computing and Signal Processing Networks. 215-222 - Saad Mneimneh:
An Iterative Switching Algorithm With (Possibly) One Iteration. 223-231
Session 14: Performance Modeling and Analysis
- Imad Antonios, Lester Lipsky:
On the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic. 235-242 - Christos Bouras, Kostas Stamos:
An Adaptive Admission Control Algorithm for Bandwidth Brokers. 243-250
Session 15: Mobile Ad-Hoc and Sensors Networks
- Antonio Corradi, Rebecca Montanari, Daniela Tibaldi:
Context-Based Access Control Management in Ubiquitous Environments. 253-260 - Zhengming Shen, Johnson P. Thomas:
Location-Triggered Routing Protocol in Mobile Ad Hoc Networks. 261-268 - Yong Xun, Mieczyslaw M. Kokar, Kenneth Baclawski:
Using a Task-Specific QoS for Controlling Sensing Requests and Scheduling. 269-276
NCA 2004 Short Papers
Session 1: Protocols and Programming for Distributed Systems
- Richard Ekwall, Sergio Mena, Stefan Pleisch, André Schiper:
Towards Flexible Finite-State-Machine-Based Protocol Composition. 281-286 - Ken Mano, Yoshinobu Kawabe:
The Nepi Network Programming System: A Programming Environment for Distributed Systems. 287-292 - Galen S. Swint, Calton Pu, Younggyun Koh, Ling Liu, Wenchang Yan, Charles Consel, Koichi Moriyama, Jonathan Walpole:
Infopipes: The ISL/ISG Implementation Evaluation. 293-296 - Giancarlo Fortino, Carlo Mastroianni, Wilma Russo:
A Multi-Policy, Cooperative Playback Control Protocol. 297-302 - Gabriela Jacques-Silva, Roberto Jung Drebes, Júlio Gerchman, Taisy Silva Weber:
FIONA: A Fault Injector for Dependability Evaluation of Java-Based Network Applications. 303-308
Session 2: System Area Networks
- Vlad Olaru, Walter F. Tichy:
Request Distribution-Aware Caching in Cluster-Based Web Servers. 311-316 - Eiji Kawai, Youki Kadobayashi, Suguru Yamaguchi:
A Fast Polling I/O Implementation with Real-time Signals. 317-322 - Ying Qian, Ahmad Afsahi, Reza Zamani:
Myrinet Networks: A Performance Study. 323-328 - Tariq Omari, Seyed H. Hosseini, K. Vairavan:
Traveling Token for Dynamic Load Balancing. 329-332 - Abdelilah Maach, Gregor von Bochmann, Hussein T. Mouftah:
Shared Protection for Time Slotted Optical Networks. 333-336
Session 3: Routing and Security in MANET
- Dario Bottazzi, Antonio Corradi, Rebecca Montanari:
Context-Awareness for Impromptu Collaboration in MANETs. 339-342 - Afrand Agah, Sajal K. Das, Kalyan Basu, Mehran Asadi:
Intrusion Detection in Sensor Networks: A Non-Cooperative Game Approach. 343-346
NCA 2004 Workshop Papers
Adaptive Grid Computing Workshop
- Stefan Birrer, Fabián E. Bustamante:
Resilient Peer-to-Peer Multicast from the Ground Up. 351-355 - Philip J. Sokolowski, Daniel Grosu:
Performance of the NAS Parallel Benchmarks on Grid Enabled Clusters. 356-361 - Syed Naqvi, Michel Riguidel:
VIPSEC: Virtualized and Pluggable Security Services Infrastructure for Adaptive Grid Computing. 362-365 - SungJin Choi, MaengSoon Baik, Chong-Sun Hwang, Joon-Min Gil, Heon-Chang Yu:
Volunteer Availability based Fault Tolerant Scheduling Mechanism in Desktop Grid Computing Environment. 366-371 - Bei Di Chen, Muthucumaru Maheswaran:
A Fair Synchronization Protocol with Cheat Proofing for Decentralized Online Multiplayer Games. 372-375 - Muthucumaru Maheswaran, Balasubramaneyam Maniymaran, Shah Asaduzzaman, Arindam Mitra:
Towards a Quality of Service Aware Public Computing Utility. 376-379
Trustworthy Network Computing Workshop
- Dan Williams, Emin Gün Sirer:
Optimal Parameter Selection for Efficient Memory Integrity Verification Using Merkle Hash Trees. 383-388 - Julian B. Grizzard, Sven Krasser, Henry L. Owen, Gregory J. Conti, Eric R. Dodson:
Towards an Approach for Automatically Repairing Compromised Network Systems. 389-392 - Anthony T. Chronopoulos, F. Balbi, D. Veljkovic, N. Kolani:
Implementation of Distributed Key Generation Algorithms using Secure Sockets. 393-398 - Dimitris Kamenopoulos, Iosif A. Osman, Panayotis Tsanakas:
Distance Measurement in Volunteer Computing Networks: A Completely Decentralized Approach. 399-404 - Muhammad J. Bohio, Ali Miri:
Self-Healing in Group Key Distribution Using Subset Difference Method. 405-408 - Gustavo A. Santana Torrellas:
A Framework for Multi-Agent System Engineering using Ontology Domain Modelling for Security Architecture Risk Assessment in E-Commerce Security Services. 409-412
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.