default search action
28th ICDCS 2008: Beijing, China
- 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 17-20 June 2008, Beijing, China. IEEE Computer Society 2008, ISBN 978-0-7695-3172-4
Keynote Address I
- Richard M. Karp:
Computer Science as a Lens on the Sciences. 1-2
Wireless and Sensor Security
- Kai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chang Du:
Real-Time Detection of Clone Attacks in Wireless Sensor Networks. 3-10 - Haodong Wang, Bo Sheng, Chiu C. Tan, Qun Li:
Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control. 11-18 - Sriram Lakshmanan, Cheng-Lin Tsao, Raghupathy Sivakumar, Karthikeyan Sundaresan:
Securing Wireless Data Networks against Eavesdropping using Smart Antennas. 19-27 - Wenjun Gu, Zhimin Yang, Can Que, Dong Xuan, Weijia Jia:
On Security Vulnerabilities of Null Data Frames in IEEE 802.11 Based WLANs. 28-35
P2P Computing
- Mei Li, Wang-Chien Lee:
Identifying Frequent Items in P2P Systems. 36-44 - Zhenyun Zhuang, Sandeep Kakumanu, Yeonsik Jeong, Raghupathy Sivakumar, Aravind Velayutham:
On the Impact of Mobile Hosts in Peer-to-Peer Data Networks. 45-52 - Chao Liang, Yang Guo, Yong Liu:
Is Random Scheduling Sufficient in P2P Video Streaming? 53-60 - Di Niu, Baochun Li:
Circumventing Server Bottlenecks: Indirect Large-Scale P2P Data Collection. 61-68
Security I
- Radu Sion:
Strong WORM. 69-76 - Linfeng Zhang, Yong Guan:
Detecting Click Fraud in Pay-Per-Click Streams of Online Advertising Networks. 77-84 - Pushkar Patankar, Gunwoo Nam, George Kesidis, Chita R. Das:
Exploring Anti-Spam Models in Large Scale VoIP Systems. 85-92 - Muthusrinivasan Muthuprasanna, Govindarasu Manimaran:
Distributed Divide-and-Conquer Techniques for Effective DDoS Attack Defenses. 93-102
Sensor Networks
- Guoliang Xing, Jianping Wang, Ke Shen, Qingfeng Huang, Xiaohua Jia, Hing-Cheung So:
Mobility-Assisted Spatiotemporal Detection in Wireless Sensor Networks. 103-110 - Jingbin Zhang, Gang Zhou, Sang Hyuk Son, John A. Stankovic, Kamin Whitehouse:
Performance Analysis of Group Based Detection for Sparse Sensor Networks. 111-122 - Kang-Won Lee, Vasileios Pappas, Asser N. Tantawi:
Enabling Accurate Node Control in Randomized Duty Cycling Networks. 123-132 - Yingqi Xu, Wang-Chien Lee, Gail Mitchell:
CME: A Contour Mapping Engine in Wireless Sensor Networks. 133-140
Structured P2P
- Yuzhe Tang, Shuigeng Zhou:
LHT: A Low-Maintenance Indexing Scheme over DHTs. 141-151 - Yiming Zhang, Ling Liu, Dongsheng Li, Xicheng Lu:
Distributed Line Graphs: A Universal Framework for Building DHTs Based on Arbitrary Constant-Degree Graphs. 152-159 - Lijiang Chen, Bin Cui, Hua Lu, Linhao Xu, Quanqing Xu:
iSky: Efficient and Progressive Skyline Computing in a Structured P2P Network. 160-167 - Min Yang, Yuanyuan Yang:
Peer-to-Peer File Sharing Based on Network Coding. 168-175
Structured P2P
- P. Kumar Manna, Sanjay Ranka, Shigang Chen:
Analysis of Maximum Executable Length for Detecting Text-Based Malware. 176-183 - Hao Yuan, Mikhail J. Atallah:
Efficient Distributed Third-Party Data Authentication for Tree Hierarchies. 184-193 - José Carlos Brustoloni, David Kyle:
Updates and Asynchronous Communication in Trusted Computing Systems. 194-205 - My T. Thai, Ying Xuan, Incheol Shin, Taieb Znati:
On Detection of Malicious Users Using Group Testing Techniques. 206-213
Wireless Networks
- Gurashish Singh Brar, Douglas M. Blough, Paolo Santi:
The SCREAM Approach for Efficient Distributed Scheduling with Physical Interference in Wireless Mesh Networks. 214-224 - Liang Zhang, Shigang Chen, Ying Jian:
Achieving Global End-to-End Maxmin in Multihop Wireless Networks. 225-232 - Zheng Zeng, Sammy Yu, Wook Shin, Jennifer C. Hou:
PAS: A Wireless-Enabled, Cell-Phone-Incorporated Personal Assistant System for Independent and Assisted Living. 233-242 - Xinyu Zhang, Baochun Li:
Optimized Multipath Network Coding in Lossy Wireless Networks. 243-250
Fault Tolerant Design
- Xuejun Yang, Panfeng Wang, Hongyi Fu, Yunfei Du, Zhiyuan Wang, Jia Jia:
Compiler-Assisted Application-Level Checkpointing for MPI Programs. 251-259 - Sajeeva L. Pallemulle, Haraldur D. Thorvaldsson, Kenneth J. Goldman:
Byzantine Fault-Tolerant Web Services for n-Tier and Service Oriented Architectures. 260-268 - Yunan Cao, Zili Shao, Meng Wang, Chun Jason Xue, Youdong Chen, Hongxing Wei, Tianmiao Wang:
A Formal Specification and Verification Framework for Designing and Verifying Reliable and Dependable Software for Computerized Numerical Control (CNC) Systems. 269-276 - Michio Honda, Jin Nakazawa, Yoshifumi Nishida, Masahiro Kozuka, Hideyuki Tokuda:
A Connectivity-Driven Retransmission Scheme Based On Transport Layer Readdressing. 277-285
Privacy
- Kui Ren, Wenjing Lou:
A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks. 286-294 - Chiu C. Tan, Bo Sheng, Qun Li:
How to Monitor for Missing RFID tags. 295-302 - Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Controlled Information Sharing in Collaborative Distributed Query Processing. 303-310 - Yinian Qi, Mikhail J. Atallah:
Efficient Privacy-Preserving k-Nearest Neighbor Search. 311-319
Keynote Address II
- Hequan Wu:
Prospect and Challenges for Network Development. 320
Ad Hoc Networks
- Hagit Attiya, Alex Kogan, Jennifer L. Welch:
Efficient and Robust Local Mutual Exclusion in Mobile Ad Hoc Networks. 321-328 - Peng-Jun Wan, Lixin Wang, F. Frances Yao, Chih-Wei Yi:
On the Longest RNG Edge of Wireless Ad Hoc Networks. 329-336 - Peng-Jun Wan, Lixin Wang, F. Frances Yao:
Two-Phased Approximation Algorithms for Minimum CDS in Wireless Ad Hoc Networks. 337-344 - Qing Ye, Liang Cheng:
DTP: Double-Pairwise Time Protocol for Disruption Tolerant Networks. 345-352
Network Management
- Xiaomeng Huang, Fengyuan Ren, Guangwen Yang, Yongwei Wu, W. Zhen, Chuang Lin:
End-to-End Congestion Control for High Speed Networks Based on Population Ecology Models. 353-360 - Cristian Lumezanu, Neil Spring:
Measurement Manipulation and Space Selection in Network Coordinates. 361-368 - Xiaomei Liu, Li Xiao:
Inbound Traffic Load Balancing in BGP Multi-homed Stub Networks. 369-376 - Ao-Jan Su, David R. Choffnes, Fabián E. Bustamante, Aleksandar Kuzmanovic:
Relative Network Positioning via CDN Redirections. 377-386
Data Distribution
- Zhao Zhang, Weili Wu, Shashi Shekhar:
Optimal Placements in Ring Network for Data Replicas in Distributed Database with MajorityVoting Protocol. 387-394 - Mei Li, Ping Xia, Wang-Chien Lee:
Wavenet: A Wavelet-Based Approach to Monitor Changes on Data Distribution in Networks. 395-402 - Yu Hua, Yifeng Zhu, Hong Jiang, Dan Feng, Lei Tian:
Scalable and Adaptive Metadata Management in Ultra Large-Scale File Systems. 403-410 - Reza Curtmola, Osama Khan, Randal C. Burns, Giuseppe Ateniese:
MR-PDP: Multiple-Replica Provable Data Possession. 411-420
Connectivity and Localization in WSNs
- Yunhuai Liu, Qian Zhang, Lionel M. Ni:
Opportunity-Based Topology Control in Wireless Sensor Networks. 421-428 - Guang Tan, Stephen A. Jarvis, Anne-Marie Kermarrec:
Connectivity-Guaranteed and Obstacle-Adaptive Deployment Schemes for Mobile Sensor Networks. 429-437 - Ziguo Zhong, Dan Wang, Tian He:
Sensor Node Localization Using Uncontrolled Events. 438-445 - Zheng Yang, Yunhao Liu:
Quality of Trilateration: Confidence Based Iterative Localization. 446-453
Routing Protocol
- Dong Xiang, Yi Pan, Qi Wang, Zhen Chen:
Deadlock-Free Fully Adaptive Routing in 2-Dimensional Tori Based on New Virtual Network Partitioning Scheme. 454-461 - Jilin Le, John C. S. Lui, Dah-Ming Chiu:
DCAR: Distributed Coding-Aware Routing in Wireless Networks. 462-469 - Jie Wu, Mingming Lu, Feng Li:
Utility-Based Opportunistic Routing in Multi-Hop Wireless Networks. 470-477 - Chi Zhang, Pan Li, Yuguang Fang, Pramod P. Khargonekar:
Decentralized Routing in Nonhomogeneous Poisson Networks. 478-485
Replication
- Ali Saman Tosun:
Multi-Site Retrieval of Declustered Data. 486-493 - Yun Wang, Jie Wu:
A Nonblocking Approach for Reaching an Agreement on Request Total Orders. 494-501 - Jean Paul Bahsoun, Robert Basmadjian, Rachid Guerraoui:
An Arbitrary Tree-Structured Replica Control Protocol. 502-511 - Ming Zhong, Kai Shen, Joel I. Seiferas:
Correlation-Aware Object Placement for Multi-Object Operations. 512-521
Data and Information Management in WSNs
- Hong Lu, Andrew Jiang, Steve Liu:
Locality Sensitive Information Brokerage in Distributed Sensor Networks. 522-529 - Dan Wang, Jianliang Xu, Jiangchuan Liu, Feng Wang:
Mobile Filtering for Error-Bounded Data Collection in Sensor Networks. 530-537 - Yingshu Li, Chunyu Ai, Wiwek P. Deshmukh, Yiwei Wu:
Data Estimation in Sensor Networks Using Physical and Statistical Methodologies. 538-545 - Liqiang Pan, Jizhou Luo, Jianzhong Li:
Probing Queries in Wireless Sensor Networks. 546-553
Network Processor
- Yue Zhang, Bin Liu, Lei Shi, Jingnan Yao, Laxmi N. Bhuyan:
Quantum-Adaptive Scheduling for Multi-Core Network Processors. 554-561 - Vijay A. Balasubramaniyan, Arup Acharya, Mustaque Ahamad, Mudhakar Srivatsa, Italo Dacosta, Charles P. Wright:
SERvartuka: Dynamic Distribution of State to Improve SIP Server Scalability. 562-572 - Bo Xu, Yaxuan Qi, Fei He, Zongwei Zhou, Yibo Xue, Jun Li:
Fast Path Session Creation on Network Processors. 573-580 - Yuanfang Zhang, Christopher D. Gill, Chenyang Lu:
Reconfigurable Real-Time Middleware for Distributed Cyber-Physical Systems with Aperiodic Events. 581-588
Reliable Storage
- Gang Peng, Tzi-cker Chiueh:
Availability and Fairness Support for Storage QoS Guarantee. 589-596 - Weijun Xiao, Qing Yang:
Can We Really Recover Data if Storage Subsystem Fails? 597-604 - Yingping Lu, David Hung-Chang Du, Chuanyi Liu, Xianbo Zhang:
QoS Scheduling for Networked Storage System. 605-612 - Samer Al-Kiswany, Matei Ripeanu, Sudharshan S. Vazhkudai, Abdullah Gharaibeh:
stdchk: A Checkpoint Storage System for Desktop Grid Computing. 613-624
Keynote Address III
- Taieb Znati:
Challenges and Future Research Directions in Large-Scale Complex Systems. 625-626
Query Processing and Multi-Site Collaboration
- Guoli Li, Shuang Hou, Hans-Arno Jacobsen:
Routing of XML and XPath Queries in Data Dissemination Networks. 627-638 - Yi Zhuang, Qing Li, Lei Chen:
Multi-query Optimization for Distributed Similarity Query Processing. 639-646 - Wanmin Wu, Zhenyu Yang, Indranil Gupta, Klara Nahrstedt:
Towards Multi-Site Collaboration in 3D Tele-Immersive Environments. 647-654
Theory
- Vijay Anand Reddy, Prateek Mittal, Indranil Gupta:
Fair K Mutual Exclusion Algorithm for Peer to Peer Systems. 655-662 - François Bonnet, Michel Raynal:
Conditions for Set Agreement with an Application to Synchronous Systems. 663-672 - Kai Xing, Wei Cheng, E. K. Park, Shmuel Rotenstreich:
Distributed Connected Dominating Set Construction in Geometric k-Disk Graphs. 673-680 - Stéphane Devismes, Sébastien Tixeuil, Masafumi Yamashita:
Weak vs. Self vs. Probabilistic Stabilization. 681-688
Web Design
- Zhi Guan, Zhen Cao, Xuan Zhao, Ruichuan Chen, Zhong Chen, Xianghao Nan:
WebIBC: Identity Based Cryptography for Client Side Security in Web Applications. 689-696 - Vishal S. Batra, Wen-Syan Li, Sumit Negi:
J2EE Architecture for Database Cluster-Based High Volume E-Commerce Web Applications. 697-704 - Jia Rao, Cheng-Zhong Xu:
Online Measurement of the Capacity of Multi-Tier Websites Using Hardware Performance Counters. 705-712 - Chang Xu, Shing-Chi Cheung, Wing Kwong Chan, Chunyang Ye:
Heuristics-Based Strategies for Resolving Context Inconsistencies in Pervasive Computing Applications. 713-721
Caching and Prefetching
- Gala Yadgar, Michael Factor, Kai Li, Assaf Schuster:
MC2: Multiple Clients on a Multilevel Cache. 722-730 - Jing Zhao, Ping Zhang, Guohong Cao:
On Cooperative Caching in Wireless P2P Networks. 731-739 - Zhe Zhang, Kyuhyung Lee, Xiaosong Ma, Yuanyuan Zhou:
PFC: Transparent Optimization of Existing Prefetching Strategies for Multi-Level Storage Systems. 740-751
Resource Management
- Cristian Lumezanu, Sumeer Bhola, Mark Astley:
Online Optimization for Latency Assignment in Distributed Real-Time Systems. 752-759 - Michael Cardosa, Abhishek Chandra:
Resource Bundles: Using Aggregation for Statistical Wide-Area Resource Discovery and Allocation. 760-768 - Anooshiravan Saboori, Guofei Jiang, Haifeng Chen:
Autotuning Configurations in Distributed Systems for Performance Improvements Using Evolutionary Strategies. 769-776 - Jinoh Kim, Abhishek Chandra, Jon B. Weissman:
Accessibility-Based Resource Selection in Loosely-Coupled Distributed Systems. 777-784
Energy-Aware Design
- Shan-Hung Wu, Ming-Syan Chen, Chung-Min Chen:
Fully Adaptive Power Saving Protocols for Ad Hoc Networks Using the Hyper Quorum System. 785-792 - Dong Li, Yanmin Zhu, Li Cui, Lionel M. Ni:
Hotness-Aware Sensor Networks. 793-800 - Cigdem Sengul, Mehedi Bakht, Albert F. Harris III, Tarek F. Abdelzaher, Robin Kravets:
Improving Energy Conservation Using Bulk Transmission over High-Power Radios in Sensor Networks. 801-808 - Jiayu Gong, Xiliang Zhong, Cheng-Zhong Xu:
Energy and Timing Constrained System Reward Maximization on Wireless Networks. 809-816
Multimedia Streaming Systems
- Mark Kai Ho Yeung, Yu-Kwong Kwok:
Game Theoretic Peer Selection for Resilient Peer-to-Peer Media Streaming Systems. 817-824 - Xiaohui Gu, Spiros Papadimitriou, Philip S. Yu, Shu-Ping Chang:
Toward Predictive Failure Management for Distributed Stream Processing Systems. 825-832 - Mea Wang, Hassan Shojania, Baochun Li:
Crystal: An Emulation Framework for Practical Peer-to-Peer Multimedia Streaming Systems. 833-840 - Boaz Patt-Shamir, Dror Rawitz:
Video Distribution Under Multiple Constraints. 841-848
Resource Allocation and Discovery
- Praveen Jayachandran, Tarek F. Abdelzaher:
Bandwidth Allocation for Elastic Real-Time Flows in Multihop Wireless Networks Based on Network Utility Maximization. 849-857 - Haiying Shen, Ze Li, Ting Li, Yingwu Zhu:
PIRD: P2P-Based Intelligent Resource Discovery in Internet-Based Distributed Systems. 858-865 - Minghua Xu, Cheng-Zhong Xu:
Frequency Domain Filter Design and Analysis of Request Scheduling in Internet Servers. 866-873 - Ananth Rao, Ion Stoica:
Adaptive Distributed Time-Slot Based Scheduling for Fairness in Multi-Hop Wireless Networks. 874-882
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.