default search action
10th NCA 2011: Cambridge, MA, USA
- Proceedings of The Tenth IEEE International Symposium on Networking Computing and Applications, NCA 2011, August 25-27, 2011, Cambridge, Massachusetts, USA. IEEE Computer Society 2011, ISBN 978-1-4577-1052-0
- Manuel Fogué, Piedad Garrido, Francisco J. Martinez, Juan-Carlos Cano, Carlos Miguel Tavares Calafate, Pietro Manzoni:
PAWDS: A Roadmap Profile-Driven Adaptive System for Alert Dissemination in VANETs. 1-8 - Ricardo Padilha, Fernando Pedone:
Belisarius: BFT Storage with Confidentiality. 9-16 - Alberto Mozo, José Luis López-Presa, Antonio Fernández Anta:
B-Neck: A Distributed and Quiescent Max-Min Fair Algorithm. 17-24 - Fabien de Montgolfier, Mauricio Soto, Laurent Viennot:
Treewidth and Hyperbolicity of the Internet. 25-32 - Amirhossein Malekpour, Antonio Carzaniga, Giovanni Toffetti Carughi, Fernando Pedone:
Probabilistic FIFO Ordering in Publish/Subscribe Networks. 33-40 - Damià Castellà Martínez, Francesc Giné, Francesc Solsona, Josep L. Lérida:
A Resilient Architecture Oriented to P2P Computing. 41-50 - Gilles Bizot, Dimiter Avresky, Fabien Chaix, Nacer-Eddine Zergainoh, Michael Nicolaidis:
Self-Recovering Parallel Applications in Multi-core Systems. 51-58 - Ermyas Abebe, Caspar Ryan:
A Hybrid Granularity Graph for Improving Adaptive Application Partitioning Efficacy in Mobile Computing Environments. 59-66 - Fan Zhou, Goce Trajcevski, Besim Avci:
Tracking Coverage throughout Epochs with Bounded Uncertainty. 67-74 - Chryssis Georgiou, Nicolas C. Nicolaou, Alexander Russell, Alexander A. Shvartsman:
Towards Feasible Implementations of Low-Latency Multi-writer Atomic Registers. 75-82 - Aldelir Fernando Luiz, Lau Cheuk Lung, Miguel Correia:
Byzantine Fault-Tolerant Transaction Processing for Replicated Databases. 83-90 - Jianqiang Luo, Lihao Xu:
SCAN: An Efficient Decoding Algorithm for RAID-6 Codes. 91-98 - M. Zubair Rafique, Muhammad Abulaish:
xMiner: Nip the Zero Day Exploits in the Bud. 99-106 - M. Manzur Murshed, Anindya Iqbal, Tishna Sabrina, Kh Mahmudul Alam:
A Subset Coding Based k-Anonymization Technique to Trade-Off Location Privacy and Data Integrity in Participatory Sensing Systems. 107-114 - Slim Rekhis, Baha Bennour, Noureddine Boudriga:
Validation of Security Solutions for Communication Networks: A Policy-Based Approach. 115-122 - Fangfei Zhou, Manish Goel, Peter Desnoyers, Ravi Sundaram:
Scheduler Vulnerabilities and Coordinated Attacks in Cloud Computing. 123-130 - Jiang Wu, Nancy D. Griffeth, Calvin C. Newport, Nancy A. Lynch:
Engineering the Virtual Node Layer for Reactive MANET Routing. 131-138 - Jesus Friginal, David de Andrés, Juan-Carlos Ruiz-Garcia, Pedro J. Gil:
Using Performance, Energy Consumption, and Resilience Experimental Measures to Evaluate Routing Protocols for Ad Hoc Networks. 139-146 - Lakshmi Ganesh, Hakim Weatherspoon, Ken Birman:
Beyond Power Proportionality: Designing Power-Lean Cloud Storage. 147-154 - Vasinee Siripoonya, Kasidit Chanchio:
Thread-Based Live Checkpointing of Virtual Machines. 155-162 - Javier Alonso, Lluís Belanche, Dimiter R. Avresky:
Predicting Software Anomalies Using Machine Learning Techniques. 163-170 - João Paulo Magalhães, Luís Moura Silva:
Adaptive Profiling for Root-Cause Analysis of Performance Anomalies in Web-Based Applications. 171-178 - Nicolás Poggi, David Carrera, Ricard Gavaldà, Eduard Ayguadé:
Non-intrusive Estimation of QoS Degradation Impact on E-Commerce User Satisfaction. 179-186 - Tiago Flor Bento, Priscila Solís Barreto:
Evaluating the Impact of Management Traffic and Self-Similarity on Wireless Network Performance. 187-194 - René Gabner, Hans-Peter Schwefel, Karin Anna Hummel, Günter Haring:
Optimal Model-Based Policies for Component Migration of Mobile Cloud Services. 195-202 - Paulo Floriano, Alfredo Goldman, Luciana Arantes:
Formalization of the Necessary and Sufficient Connectivity Conditions to the Distributed Mutual Exclusion Problem in Dynamic Networks. 203-210 - Rashidul Hasan, M. Manzur Murshed:
A Novel Multichannel Cognitive Radio Network with Throughput Analysis at Saturation Load. 211-218 - Francisco Triviño, Francisco José Alfaro, José L. Sánchez, José Flich:
NoC Reconfiguration for CMP Virtualization. 219-222 - André F. Esteves, Pedro R. M. Inácio, Manuela Pereira, Mário M. Freire:
On-line Detection of Encrypted Traffic Generated by Mesh-Based Peer-to-Peer Live Streaming Applications: The Case of GoalBit. 223-228 - Shabnam Ataee, Benoît Garbinato, Mouna Allani, Fernando Pedone:
ScaleStream - An Adaptive Replication Algorithm for Scalable Multimedia Streaming. 229-234 - Mahathir Almashor, Ibrahim Khalil:
Timely Arbitrator Selection in P2P Virtual Environments with 3D Voronoi Diagrams. 235-240 - Sebastian Holzapfel, Matthäus Wander, Arno Wacker, Torben Weis:
SYNI - TCP Hole Punching Based on SYN Injection. 241-246 - Carlos Augusto S. Cunha, Luís Moura Silva:
Application of a Self-Healing Video-Streaming Architecture to RTSP Servers. 247-250 - Juan C. Granda, Pelayo Nuño, Daniel F. García, Francisco J. Suárez:
Towards Resilient Synchronous e-Training Platforms. 251-256 - Ermyas Abebe, Caspar Ryan:
Improving Adaptive Offloading Using Distributed Abstract Class Graphs in Mobile Environments. 257-264 - Adrian Holzer, François Vessaz, Samuel Pierre, Benoît Garbinato:
PLAN-B: Proximity-Based Lightweight Adaptive Network Broadcasting. 265-270 - Nuno Carvalho, Paolo Romano, Luís E. T. Rodrigues:
A Generic Framework for Replicated Software Transactional Memories. 271-274 - Evgenia Christoforou, Antonio Fernández Anta, Chryssis Georgiou, Miguel A. Mosteiro:
Algorithmic Mechanisms for Internet Supercomputing under Unreliable Communication. 275-280 - Diogo Reis, Hugo M. Miranda:
A Framework for Transparent Active Replication in Remote Method Invocation. 281-284 - Abdullah Mohammed Almuhaideb, Phu Dung Le, Bala Srinivasan:
Two-Party Mobile Authentication Protocols for Wireless Roaming Networks. 285-288 - Shusmita Anwar Sharna, Mohammad R. Amin, M. Manzur Murshed:
An Enhanced-MDP Based Vertical Handoff Algorithm for QoS Support over Heterogeneous Wireless Networks. 289-293 - Johann Márquez-Barja, Carlos Miguel Tavares Calafate, Juan-Carlos Cano, Pietro Manzoni:
Performance Trade-Offs of a IEEE 802.21-Based Vertical Handover Decision Algorithm under Different Network Conditions. 294-297 - Stefan Wieser, László Böszörményi:
Decentralized Topology Aggregation for QoS Estimation in Large Overlay Networks. 298-301 - Mochan Shrestha, Lihao Xu:
Efficient Encoding for Generalized Reed Solomon Codes. 302-305 - Yongmao Ren, Hualin Qian, Yuepeng E., Jun Li, Jingguo Ge:
IPv4+6. 306-309 - Carlos Guerrero, Carlos Juiz, Ramón Puigjaner:
Improving Web Cache Performance via Adaptive Content Fragmentation Design. 310-313 - Vinit Padhye, Anand Tripathi:
Building Autonomically Scalable Services on Wide-Area Shared Computing Platforms. 314-319 - Juan A. Villar, Francisco J. Andujar, José L. Sánchez, Francisco José Alfaro, José Duato:
Evaluation of an Alternative for Increasing Switch Radix. 320-323 - Tzong-An Su, Chen-Feng Chiu:
From a Database Management System to a Policy-Based Network Management System. 324-327 - Mikkel Hagen, Ryan Zarick:
Performance Evaluation of DCB's Priority-Based Flow Control. 328-333 - Ricardo Filipe, João Pedro Barreto:
End-to-End Data Deduplication for the Mobile Web. 334-337 - Carlos Manuel Vaz, Luís Moura Silva, António Dourado:
Detecting User-Visible Failures in Web-Sites by Using End-to-End Fine-Grained Monitoring: An Experimental Study. 338-341 - Anwar Sadat, Gour C. Karmakar:
Optimum Clusters for Reliable and Energy Efficient Wireless Sensor Networks. 342-347 - Kh Mahmudul Alam, Joarder Kamruzzaman, Gour C. Karmakar, M. Manzur Murshed:
Dynamic Event Coverage in Hybrid Wireless Sensor Networks. 348-353 - Shaila Pervin, Joarder Kamruzzaman, Gour C. Karmakar:
Quality Adjustable Query Processing Framework for Wireless Sensor Networks. 354-358 - Makhlouf Hadji, Wajdi Louati, Djamal Zeghlache:
Constrained Pricing for Cloud Resource Allocation. 359-365 - Dhiah Al-Shammary, Ibrahim Khalil, Loay Edwar George:
Clustering SOAP Web Services on Internet Computing Using Fast Fractals. 366-371
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.