default search action
16th NCA 2017: Cambridge, MA, USA
- Aris Gkoulalas-Divanis, Miguel P. Correia, Dimiter R. Avresky:
16th IEEE International Symposium on Network Computing and Applications, NCA 2017, Cambridge, MA, USA, October 30 - November 1, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-1465-5 - Josh Shaul:
Keynote - Internet imbalance: Have we given the attackers an edge?
Session 1: Security and Privacy
- Salvatore Signorello, Samuel Marchal, Jérôme François, Olivier Festor, Radu State:
Advanced interest flooding attacks in named-data networking. 1-10 - Giovanni Apruzzese, Mirco Marchetti, Michele Colajanni, Gabriele Gambigliani Zoccoli, Alessandro Guido:
Identifying malicious hosts involved in periodic communications. 11-18 - Areej Algaith, Ivano Alessandro Elia, Ilir Gashi, Marco Vieira:
Diversity with intrusion detection systems: An empirical study. 19-23 - Abubakar Sadiq Sani, Dong Yuan, Wei Bao, Zhao Yang Dong:
Towards secure energy internet communication scheme: An identity-based key bootstrapping protocol supporting unicast and multicast. 25-29 - Muhammad Umer, Tahir Azim, Zeeshan Pervez:
Reducing communication cost of encrypted data search with compressed bloom filters. 31-34
Session 2: Ad-Hoc and Sensor Networks
- Phi-Le Nguyen, Yusheng Ji, Nguyen Thanh Trung, Thanh-Hung Nguyen:
Constant stretch and load balanced routing protocol for bypassing multiple holes in wireless sensor networks. 35-43 - Lewis Tseng:
Towards reliable broadcast in practical sensor networks. 45-52 - Shima Asaadi, Kiana Alikhademi, Farshad Eshghi, Juan E. Gilbert:
TQOR: Trust-based QoS-oriented routing in cognitive MANETs. 53-60 - Joahannes Costa, Wellington Lobato, Allan Mariano de Souza, Denis do Rosário, Leandro A. Villas, Eduardo Cerqueira:
Centrality-based data dissemination protocol for vehicular ad hoc networks. 61-64 - Ademar Takeo Akabane, Richard W. Pazzi, Edmundo R. M. Madeira, Leandro A. Villas:
Applying egocentric betweenness measure in vehicular ad hoc networks. 65-68 - Chuku Ejike, Demetres Kouvatsos:
Combined sensing, performance and security trade-offs in cognitive radio networks. 69-72
Session 3: Cloud and Edge Computing
- Richard Gil Martinez, Zhongmiao Li, Antónia Lopes, Luís E. T. Rodrigues:
Augure: Proactive reconfiguration of cloud applications using heterogeneous resources. 73-80 - Pernelle Mensah, Samuel Dubus, Wael Kanoun, Christine Morin, Guillaume Piolle, Eric Totel:
Connectivity graph reconstruction for networking cloud infrastructures. 81-89 - Deafallah Alsadie, Zahir Tari, Eidah J. Alzahrani, Albert Y. Zomaya:
LIFE: A predictive approach for VM placement in cloud environments. 91-98 - Deafallah Alsadie, Zahir Tari, Eidah J. Alzahrani, Albert Y. Zomaya:
Energy-efficient tailoring of VM size and tasks in cloud data centers. 99-103 - Gary Roberts, Sixia Chen, Chadi Kari, Vivek K. Pallipuram:
Data migration algorithms in heterogeneous storage systems: A comparative performance evaluation. 105-108 - Mary Hogan, Flavio Esposito:
Stochastic delay forecasts for edge traffic engineering via Bayesian Networks. 109-112 - Evangelos Tasoulas, Hugo Lewi Hammer, Hårek Haugerud, Anis Yazidi, Alfred Bratterud, Boning Feng:
The concept of workload delay as a quality-of-service metric for consolidated cloud environments with deadline requirements. 113-117 - Ricardo Filipe, Rui Pedro Paiva, Filipe Araújo:
Client-side black-box monitoring for web sites. 119-123
Session 4: Fault Tolerance and Reliability
- Pascale Minet, Ines Khoufi, Anis Laouiti:
Increasing reliability of a TSCH network for the industry 4.0. 125-134 - Mohamed Mohamedin, Masoomeh Javidi Kishi, Roberto Palmieri:
Shield: A middleware to tolerate CPU transient faults in multicore architectures. 135-143 - Ziad Kassam, Ali Shoker, Paulo Sérgio Almeida, Carlos Baquero:
Aggregation protocols in light of reliable communication. 145-148 - Shlomi Dolev, Roman Manevich, Amit Rokach:
Programming reflexes (Extended abstract). 149-152 - Klaus-Tycho Foerster:
On the consistent migration of unsplittable flows: Upper and lower complexity bounds. 153-156 - Simone Economo, Emiliano Silvestri, Pierangelo di Sanzo, Alessandro Pellegrini, Francesco Quaglia:
Prompt application-transparent transaction revalidation in software transactional memory. 157-162
Session 5: Big Data Analytics and Machine Learning
- Corentin Hardy, Erwan Le Merrer, Bruno Sericola:
Distributed deep learning on edge-devices: Feasibility via adaptive compression. 163-170 - Rafael Aquino de Carvalho, Alfredo Goldman, Gerson Geraldo H. Cavalheiro:
Is Intel high performance analytics toolkit a good alternative to Apache Spark? 171-178 - Dimiter R. Avresky, Alessandro Pellegrini, Pierangelo di Sanzo:
Machine learning-based management of cloud applications in hybrid clouds: A Hadoop case study. 179-183 - Evangelos Pournaras, Jovan Nikolic:
On-demand self-adaptive data analytics in large-scale decentralized networks. 185-194 - Jundong Chen, He Li, Zeju Wu, Md. Shafaeat Hossain:
Sentiment analysis of the correlation between regular tweets and retweets. 195-199
Session 6: Internet of Things and Cyber-Physical Systems
- Luís Alberto Belém Pacheco, Eduardo Alchieri, Priscila A. Solís Barreto:
Enhancing and evaluating an architecture for privacy in the integration of Internet of Things and cloud computing. 201-208 - Nicolas J. Small, Sven Akkermans, Wouter Joosen, Danny Hughes:
Niflheim: An end-to-end middleware for applications on a multi-tier IoT infrastructure. 209-216 - Mosarrat Jahan, Suranga Seneviratne, Ben Chu, Aruna Seneviratne, Sanjay K. Jha:
Privacy preserving data access scheme for IoT devices. 217-226 - Mikiko Sode Tanaka, Takahiro Katoh, Kazuo Ishida:
Child-observation system with wide area networks of IoT child observation using information terminal bus stops in Nonoichi city. 227-230 - Adila Mebrek, Leïla Merghem-Boulahia, Moez Esseghir:
Efficient green solution for a balanced energy consumption and delay in the IoT-Fog-Cloud computing. 231-234 - Asma Lahbib, Khalifa Toumi, Sameh Elleuch, Anis Laouiti, Steven Martin:
Link reliable and trust aware RPL routing protocol for Internet of Things. 235-240 - Ngoc-Tu Nguyen, Ming C. Leu, Xiaoqing Frank Liu:
Real-time communication for manufacturing cyber-physical systems. 241-244
Session 7: Containers, Scheduling and Resource Allocation
- Eidah J. Alzahrani, Zahir Tari, Young Choon Lee, Deafallah Alsadie, Albert Y. Zomaya:
adCFS: Adaptive completely fair scheduling policy for containerised workflows systems. 245-252 - Damien Carver, Julien Sopena, Sébastien Monnet:
ACDC: Advanced consolidation for dynamic containers. 253-260 - Zhongmiao Li, Peter Van Roy, Paolo Romano:
Enhancing throughput of partially replicated state machines via multi-partition operation scheduling. 261-270 - Yidan Wang, Zahir Tari, M. Reza HoseinyFarahabady, Albert Y. Zomaya:
QoS-aware resource allocation for stream processing engines using priority channels. 271-279 - Young Ki Kim, Mohammad Reza Hoseiny Farahabady, Young Choon Lee, Albert Y. Zomaya:
A resource allocation controller for key-value data stores. 281-284 - Marcelo Cerqueira de Abranches, Priscila Solís, Eduardo Alchieri:
PAS-CA: A cloud computing auto-scalability method for high-demand web systems. 285-288 - Khaled Almi'ani, Young Choon Lee, Bernard Mans:
Resource demand aware scheduling for workflows in clouds. 289-293
Session 8: Networking
- Kutalmis Akpinar, Kien A. Hua:
Deduplication overlay network. 295-303 - Stefan Hommes, Petko Valtchev, Khalil Blaiech, Salaheddine Hamadi, Omar Cherkaoui, Radu State:
Optimising packet forwarding in multi-tenant networks using rule compilation. 305-313 - Yves Mocquard, Bruno Sericola, Emmanuelle Anceaume:
Probabilistic analysis of counting protocols in large-scale asynchronous and anonymous systems. 315-322 - Bassirou Ngom, Mesaac Makpangou:
Summary prefix tree: An over DHT indexing data structure for efficient superset search. 323-327 - Diego Fernández, Hugo Lorenzo, Francisco Javier Nóvoa, Fidel Cacheda, Victor Carneiro:
Tools for managing network traffic flows: A comparative analysis. 329-333 - Roberto Rigolin Ferreira Lopes, Antti Viidanoja, Maximilien Lhotellier, Michal Mazurkiewicz, Giampaolo Melis, Anne Diefenbach, Tobias Ginzler, Norman Jansen:
Trade-off analysis of a service-oriented and hierarchical queuing mechanism. 335-338 - Yelena Rykalova, Lev B. Levitin:
Virtual cut-through routing in toroidal interconnection networks. 339-342
Session 9: Endpoint and Mobile Device Security
- Muhammad Ikram, Mohamed Ali Kâafar:
A first look at mobile Ad-Blocking apps. 343-350 - Sileshi Demesie Yalew, Gerald Q. Maguire Jr., Seif Haridi, Miguel Correia:
Hail to the Thief: Protecting data from mobile ransomware with ransomsafedroid. 351-358 - Sami S. Albouq, Erik M. Fredericks:
Securing communication between service providers and road side units in a connected vehicle infrastructure. 359-363 - Pasha Shahegh, Tommy Dietz, Michel Cukier, Areej Algaith, Attila Brozik, Ilir Gashi:
AVAMAT: AntiVirus and malware analysis tool. 365-368 - Shlomi Dolev, Mohammad Ghanayim, Alexander Binun, Sergey Frenkel, Yeali S. Sun:
Relationship of Jaccard and edit distance in malware clustering and online identification (Extended abstract). 369-373 - Zainab Abaid, Mohamed Ali Kâafar, Sanjay Jha:
Quantifying the impact of adversarial evasion attacks on machine learning based android malware classifiers. 375-384
Session 10: Blockchain and Distributed Ledgers
- Maxim Amelchenko, Shlomi Dolev:
Blockchain abbreviation: Implemented by message passing and shared memory (Extended abstract). 385-391 - Ali Shoker:
Sustainable blockchain through proof of exercise. 393-401 - Nesrine Kaaniche, Maryline Laurent:
A blockchain-based data usage auditing architecture with enhanced privacy and availability. 403-407 - Remo Manuel Frey, Pascal Buhler, Alexander Gerdes, Thomas Hardjono, Klaus Ludwig Fuchs, Alexander Ilic:
The effect of a blockchain-supported, privacy-preserving system on disclosure of personal data. 409-413
Session 11: Software-Defined Networking and Network Function Virtualization
- Yefim Dinitz, Shlomi Dolev, Daniel Khankin:
Dependence graph and master switch for seamless dependent routes replacement in SDN (extended abstract). 415-421 - Sergei Frenkel, Daniel Khankin, Alona Kutsyy:
Predicting and choosing alternatives of route updates per QoS VNF in SDN. 423-428 - Sara Farahmandian, Doan B. Hoang:
SDS2: A novel software-defined security service for protecting cloud computing infrastructure. 429-436 - Raj Mani Shukla, Shamik Sengupta:
A novel software-defined network based approach for charging station allocation to plugged-in electric vehicles. 437-441 - Iulisloi Zacarias, Janaina Schwarzrock, Luciano Paschoal Gaspary, Anderson Kohl, Ricardo Queiroz de Araujo Fernandes, Jorgito M. Stocchero, Edison Pignaton de Freitas:
Employing SDN to control video streaming applications in military mobile networks. 443-446 - Mohammad Abu-Lebdeh, Diala Naboulsi, Roch H. Glitho, Constant Wette Tchouati:
NFV orchestrator placement for geo-distributed systems. 447-451 - Fabien Charmet, Richard Waldinger, Gregory Blanc, Christophe Kiennert, Khalifa Toumi:
Preserving confidentiality during the migration of virtual SDN topologies: A formal approach. 453-457
Session 12: 5G Networks
- Durgesh Singh, Sasthi C. Ghosh:
A distributed algorithm for D2D communication in 5G using stochastic model. 459-466 - Hussein Al Dorai, Luay Alirkhis, Riyadh Ali Al-Essawi:
5G accessibility optimization in high interference environments. 467-471 - Shankar K. Ghosh, Sasthi C. Ghosh:
A predictive handoff mechanism for 5G ultra dense networks. 473-477 - Sultan Alotaibi, Robert Akl:
Radio resource management in LTE femtocell networks. 479-483 - Maxweel S. Carmo, Sandino Jardim, Augusto Neto, Rui L. Aguiar, Daniel Corujo:
Towards fog-based slice-defined WLAN infrastructures to cope with future 5G use cases. 485-489
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.