


default search action
ICDCN 2015: Goa, India
- Sajal K. Das, Dilip Krishnaswamy, Santonu Karkar, Amos Korman, Mohan J. Kumar, Marius Portmann, Srikanth Sastry:

Proceedings of the 2015 International Conference on Distributed Computing and Networking, ICDCN 2015, Goa, India, January 4-7, 2015. ACM 2015, ISBN 978-1-4503-2928-6 - Abdulkader Benchi, Pascale Launay, Frédéric Guidec

:
Solving Consensus in Opportunistic Networks. 1:1-1:10 - Helen Bakhsh

, Ning Zhang, Andy Carpenter:
TADL: A Trust-Aware Dynamic Location-Based Protocol Suite For Discovering Multiple Paths in MANETs. 2:1-2:10 - Fabienne Carrier, Ajoy Kumar Datta, Stéphane Devismes

, Lawrence L. Larmore:
Self-Stabilizing ℓ-Exclusion Revisited. 3:1-3:10 - Zhenqi Huang, Sayan Mitra

, Nitin H. Vaidya:
Differentially Private Distributed Optimization. 4:1-4:10 - Ashish Choudhury

, Arpita Patra:
Optimally Resilient Asynchronous MPC with Linear Communication Complexity. 5:1-5:10 - Atish Das Sarma, Anisur Rahaman Molla, Gopal Pandurangan

:
Distributed Computation of Sparse Cuts via Random Walks. 6:1-6:10 - Arijit Paul, Quazi Rahman, Subir Bandyopadhyay, Yash P. Aneja:

A fast approach to solve the Route and Spectrum Allocation problem in OFDM networks. 7:1-7:4 - Aditya Dhoke, Roberto Palmieri

, Binoy Ravindran
:
On Reducing False Conflicts in Distributed Transactional Data Structures. 8:1-8:10 - Evangelos Kranakis

, Danny Krizanc, Fraser MacQuarrie, Sunil M. Shende:
Randomized Rendezvous Algorithms for Agents on a Ring with Different Speeds. 9:1-9:10 - Petr Kuznetsov, Srivatsan Ravi:

On Partial Wait-Freedom in Transactional Memory. 10:1-10:9 - João A. Silva

, Tiago M. Vale
, Ricardo J. Dias
, Hervé Paulino
, João Lourenço
:
Supporting Multiple Data Replication Models in Distributed Transactional Memory. 11:1-11:10 - Arunita Jaekel, Subir Bandyopadhyay, Saja Al-Mamoori, Sriharsha Varanasi:

Security-Aware Dynamic Lightpath Allocation Scheme for WDM Networks. 12:1-12:4 - Bo Zhang, Binoy Ravindran

, Roberto Palmieri
:
Reducing Aborts in Distributed Transactional Systems through Dependency Detection. 13:1-13:10 - Arun K. Pujari, S. Mini, Trideba Padhi

, Prabhanjan Sahoo:
Polyhedral Approach for Lifetime Maximization of Target Coverage Problem. 14:1-14:8 - Rohit Tripathi

, Gautam Barua:
Pricing with Bandwidth Guarantees for Clients with multi-ISP Connections. 15:1-15:10 - Min Shen, Ajay D. Kshemkalyani

, Ta Yuan Hsu:
OPCAM: Optimal Algorithms Implementing Causal Memories in Shared Memory Systems. 16:1-16:4 - Darko Petrovic, Thomas Ropars, André Schiper:

On the Performance of Delegation over Cache-Coherent Shared Memory. 17:1-17:10 - Guy Even, Moti Medina

, Dana Ron
:
Distributed Maximum Matching in Bounded Degree Graphs. 18:1-18:10 - Xavier Vilaça, Luís E. T. Rodrigues:

On the Range of Equilibria Utilities of a Repeated Epidemic Dissemination Game with a Mediator. 19:1-19:10 - Souvik Basu, Suman Bhattacharjee

, Siuli Roy, Somprakash Bandyopadhyay:
SAGE-PRoPHET: A Security Aided and Group Encounter based PRoPHET Routing Protocol for Dissemination of Post Disaster Situational Data. 20:1-20:10 - Sandip Chakraborty, Sukumar Nandi

:
Controlling Unfairness due to Physical Layer Capture and Channel Bonding in 802.11n+s Wireless Mesh Networks. 21:1-21:10 - Joy Chandra Mukherjee

, Arobinda Gupta:
Mobility Aware Event Dissemination in VANET. 22:1-22:9 - Nidhi Tiwari, Santonu Sarkar

, Maria Indrawan-Santiago, Umesh Bellur
:
Improving Energy Efficiency of IO-Intensive MapReduce Jobs. 23:1-23:4 - Manel Seddiki, Mahfoud Benchaïba:

An adaptive P2P overlay for MANETs. 24:1-24:8 - B. S. Panda, Bijaya K. Bhatta, Deepak Mishra

, Swades De:
Boruvka-Incremental Power Greedy Heuristic for Strong Minimum Energy Topology in Wireless Sensor Networks. 25:1-25:8 - David Bonnin, Corentin Travers:

Splitting and Renaming with a Majority of Faulty Processes. 26:1-26:10 - Shanti Chilukuri

, Anirudha Sahoo:
Delay-aware TDMA Scheduling for Multi-Hop Wireless Networks. 27:1-27:10 - Subhrabrata Choudhury, Vivek Nair, Jaydeep Howlader, B. Choudhury, Ashis Kumar Mal:

An integrated routing and offset-time adaptation scheme for OBS network. 28:1-28:10 - Manjiri Jog, Maitreya Natu, Sushama Shelke:

Distributed and Predictive-Preventive Defense Against DDoS Attacks. 29:1-29:4 - Nirnay Ghosh, Ishan Chokshi, Mithun Sarkar, Soumya K. Ghosh, Anil Kumar Kaushik, Sajal K. Das

:
NetSecuritas: An Integrated Attack Graph-based Security Assessment Tool for Enterprise Networks. 30:1-30:10 - K. Haribabu

, Chittaranjan Hota
:
Analysis of Floating Index Caching Technique for P2P Overlay Index Propagation. 31:1-31:9 - Suman Sankar Bhunia, Bijoy Das, Nandini Mukherjee:

Multi Criteria Decision Analysis assisted Routing in Wireless Sensor Network using Fuzzy rules. 32:1-32:7 - Poonam Goyal

, Sonal Kumari, Dhruv Kumar, Sundar Balasubramaniam, Navneet Goyal, Saiyedul Islam, Jagat Sesh Challa:
Parallelizing OPTICS for Commodity Clusters. 33:1-33:10 - Himanshu Chauhan, Vijay K. Garg:

Necessary and Sufficient Conditions on Partial Orders for Modeling Concurrent Computations. 34:1-34:10 - Thamer Alsulaiman, Andrew Berns, Sukumar Ghosh:

Self-stabilizing Power-law Networks. 35:1-35:4 - V. Sreejith, K. R. Anupama, Lucy J. Gudino, R. Suriyadeepan:

Partition Discovery and Connectivity Restoration in WSN using Mobile Relays. 36:1-36:9 - Arunmoezhi Ramachandran

, Neeraj Mittal:
A Fast Lock-Free Internal Binary Search Tree. 37:1-37:10 - Ajoy Kumar Datta, Lawrence L. Larmore, Toshimitsu Masuzawa:

Constant Space Self-Stabilizing Center Finding in Anonymous Tree Networks. 38:1-38:10 - Ram Narayan Yadav, Rajiv Misra

, Utkarsh Gupta, Sourabh Bhagat:
Opportunistic Spectrum Access in CR Network in Licensed and Unlicensed Channels. 39:1-39:8 - Marcos K. Aguilera, Joshua B. Leners, Ramakrishna Kotla, Michael Walfish:

Yesquel: Scalable SQL storage for Web applications. 40:1-40:4 - Aditya Akella, Theophilus Benson, Balakrishnan Chandrasekaran, Cheng Huang, Bruce M. Maggs, David A. Maltz:

A Universal Approach to Data Center Network Design. 41:1-41:10

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














