default search action
ICDCN 2015: Goa, India
- Sajal K. Das, Dilip Krishnaswamy, Santonu Karkar, Amos Korman, Mohan J. Kumar, Marius Portmann, Srikanth Sastry:
Proceedings of the 2015 International Conference on Distributed Computing and Networking, ICDCN 2015, Goa, India, January 4-7, 2015. ACM 2015, ISBN 978-1-4503-2928-6 - Abdulkader Benchi, Pascale Launay, Frédéric Guidec:
Solving Consensus in Opportunistic Networks. 1:1-1:10 - Helen Bakhsh, Ning Zhang, Andy Carpenter:
TADL: A Trust-Aware Dynamic Location-Based Protocol Suite For Discovering Multiple Paths in MANETs. 2:1-2:10 - Fabienne Carrier, Ajoy Kumar Datta, Stéphane Devismes, Lawrence L. Larmore:
Self-Stabilizing ℓ-Exclusion Revisited. 3:1-3:10 - Zhenqi Huang, Sayan Mitra, Nitin H. Vaidya:
Differentially Private Distributed Optimization. 4:1-4:10 - Ashish Choudhury, Arpita Patra:
Optimally Resilient Asynchronous MPC with Linear Communication Complexity. 5:1-5:10 - Atish Das Sarma, Anisur Rahaman Molla, Gopal Pandurangan:
Distributed Computation of Sparse Cuts via Random Walks. 6:1-6:10 - Arijit Paul, Quazi Rahman, Subir Bandyopadhyay, Yash P. Aneja:
A fast approach to solve the Route and Spectrum Allocation problem in OFDM networks. 7:1-7:4 - Aditya Dhoke, Roberto Palmieri, Binoy Ravindran:
On Reducing False Conflicts in Distributed Transactional Data Structures. 8:1-8:10 - Evangelos Kranakis, Danny Krizanc, Fraser MacQuarrie, Sunil M. Shende:
Randomized Rendezvous Algorithms for Agents on a Ring with Different Speeds. 9:1-9:10 - Petr Kuznetsov, Srivatsan Ravi:
On Partial Wait-Freedom in Transactional Memory. 10:1-10:9 - João A. Silva, Tiago M. Vale, Ricardo J. Dias, Hervé Paulino, João Lourenço:
Supporting Multiple Data Replication Models in Distributed Transactional Memory. 11:1-11:10 - Arunita Jaekel, Subir Bandyopadhyay, Saja Al-Mamoori, Sriharsha Varanasi:
Security-Aware Dynamic Lightpath Allocation Scheme for WDM Networks. 12:1-12:4 - Bo Zhang, Binoy Ravindran, Roberto Palmieri:
Reducing Aborts in Distributed Transactional Systems through Dependency Detection. 13:1-13:10 - Arun K. Pujari, S. Mini, Trideba Padhi, Prabhanjan Sahoo:
Polyhedral Approach for Lifetime Maximization of Target Coverage Problem. 14:1-14:8 - Rohit Tripathi, Gautam Barua:
Pricing with Bandwidth Guarantees for Clients with multi-ISP Connections. 15:1-15:10 - Min Shen, Ajay D. Kshemkalyani, Ta Yuan Hsu:
OPCAM: Optimal Algorithms Implementing Causal Memories in Shared Memory Systems. 16:1-16:4 - Darko Petrovic, Thomas Ropars, André Schiper:
On the Performance of Delegation over Cache-Coherent Shared Memory. 17:1-17:10 - Guy Even, Moti Medina, Dana Ron:
Distributed Maximum Matching in Bounded Degree Graphs. 18:1-18:10 - Xavier Vilaça, Luís E. T. Rodrigues:
On the Range of Equilibria Utilities of a Repeated Epidemic Dissemination Game with a Mediator. 19:1-19:10 - Souvik Basu, Suman Bhattacharjee, Siuli Roy, Somprakash Bandyopadhyay:
SAGE-PRoPHET: A Security Aided and Group Encounter based PRoPHET Routing Protocol for Dissemination of Post Disaster Situational Data. 20:1-20:10 - Sandip Chakraborty, Sukumar Nandi:
Controlling Unfairness due to Physical Layer Capture and Channel Bonding in 802.11n+s Wireless Mesh Networks. 21:1-21:10 - Joy Chandra Mukherjee, Arobinda Gupta:
Mobility Aware Event Dissemination in VANET. 22:1-22:9 - Nidhi Tiwari, Santonu Sarkar, Maria Indrawan-Santiago, Umesh Bellur:
Improving Energy Efficiency of IO-Intensive MapReduce Jobs. 23:1-23:4 - Manel Seddiki, Mahfoud Benchaïba:
An adaptive P2P overlay for MANETs. 24:1-24:8 - B. S. Panda, Bijaya K. Bhatta, Deepak Mishra, Swades De:
Boruvka-Incremental Power Greedy Heuristic for Strong Minimum Energy Topology in Wireless Sensor Networks. 25:1-25:8 - David Bonnin, Corentin Travers:
Splitting and Renaming with a Majority of Faulty Processes. 26:1-26:10 - Shanti Chilukuri, Anirudha Sahoo:
Delay-aware TDMA Scheduling for Multi-Hop Wireless Networks. 27:1-27:10 - Subhrabrata Choudhury, Vivek Nair, Jaydeep Howlader, B. Choudhury, Ashis Kumar Mal:
An integrated routing and offset-time adaptation scheme for OBS network. 28:1-28:10 - Manjiri Jog, Maitreya Natu, Sushama Shelke:
Distributed and Predictive-Preventive Defense Against DDoS Attacks. 29:1-29:4 - Nirnay Ghosh, Ishan Chokshi, Mithun Sarkar, Soumya K. Ghosh, Anil Kumar Kaushik, Sajal K. Das:
NetSecuritas: An Integrated Attack Graph-based Security Assessment Tool for Enterprise Networks. 30:1-30:10 - K. Haribabu, Chittaranjan Hota:
Analysis of Floating Index Caching Technique for P2P Overlay Index Propagation. 31:1-31:9 - Suman Sankar Bhunia, Bijoy Das, Nandini Mukherjee:
Multi Criteria Decision Analysis assisted Routing in Wireless Sensor Network using Fuzzy rules. 32:1-32:7 - Poonam Goyal, Sonal Kumari, Dhruv Kumar, Sundar Balasubramaniam, Navneet Goyal, Saiyedul Islam, Jagat Sesh Challa:
Parallelizing OPTICS for Commodity Clusters. 33:1-33:10 - Himanshu Chauhan, Vijay K. Garg:
Necessary and Sufficient Conditions on Partial Orders for Modeling Concurrent Computations. 34:1-34:10 - Thamer Alsulaiman, Andrew Berns, Sukumar Ghosh:
Self-stabilizing Power-law Networks. 35:1-35:4 - V. Sreejith, K. R. Anupama, Lucy J. Gudino, R. Suriyadeepan:
Partition Discovery and Connectivity Restoration in WSN using Mobile Relays. 36:1-36:9 - Arunmoezhi Ramachandran, Neeraj Mittal:
A Fast Lock-Free Internal Binary Search Tree. 37:1-37:10 - Ajoy Kumar Datta, Lawrence L. Larmore, Toshimitsu Masuzawa:
Constant Space Self-Stabilizing Center Finding in Anonymous Tree Networks. 38:1-38:10 - Ram Narayan Yadav, Rajiv Misra, Utkarsh Gupta, Sourabh Bhagat:
Opportunistic Spectrum Access in CR Network in Licensed and Unlicensed Channels. 39:1-39:8 - Marcos K. Aguilera, Joshua B. Leners, Ramakrishna Kotla, Michael Walfish:
Yesquel: Scalable SQL storage for Web applications. 40:1-40:4 - Aditya Akella, Theophilus Benson, Balakrishnan Chandrasekaran, Cheng Huang, Bruce M. Maggs, David A. Maltz:
A Universal Approach to Data Center Network Design. 41:1-41:10
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.