


default search action
3rd NCA 2004: Cambridge, MA, USA
- 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), 30 August - 1 September 2004, Cambridge, MA, USA. IEEE Computer Society 2004, ISBN 0-7695-2242-4

 
NCA 2004 Long Papers
Session 1: Overlay Networks
- Roie Melamed, Idit Keidar:

Araneola: A Scalable Reliable Multicast System for Dynamic Environments. 5-14 - Li-Wei H. Lehman, Steven Lerman:

PCoord: Network Position Estimation Using Peer-to-Peer Measurements. 15-24 - Shlomi Dolev

, Ronen I. Kat:
HyperTree for Self-Stabilizing Peer-to-Peer Systems. 25-32 
Session 2: Keynote Speaker
- Yves Deswarte, David Powell:

Intrusion Tolerance for Internet Applications. 35-36 
Session 3: Overlap Networks
- Filipe Araújo, Luís E. T. Rodrigues:

GeoPeer: A Location-Aware Peer-to-Peer System. 39-46 - Jianming Lv, Xueqi Cheng:

WonGoo: A Pure Peer-to-Peer Full Text Information Retrieval System Based On Semantic Overlay Networks. 47-54 
Session 4: Keynote Speaker
- Mark E. Segal:

Exploring the Network/Software Boundary: A Telecommunications Perspective. 57- 
Session 5: Web Protocols
- Bin Wu, Ajay D. Kshemkalyani:

Objective-Greedy Algorithms for Long-Term Web Prefetching. 61-68 - Paolo Romano

, Francesco Quaglia, Bruno Ciciani:
A Protocol for Improved User Perceived QoS in Web Transactional Applications. 69-76 - Giancarlo Ruffo

, Rossano Schifanella
, Matteo Sereno, Roberto Politi:
WALTy: A User Behavior Tailored Tool for Evaluating Web Application Performance. 77-86 
Session 6: Grid Computing
- Rebecca L. Collins, James S. Plank

:
Downloading Replicated, Wide-Area Files - A Framework and Empirical Evaluation. 89-96 - Vishal Iyengar, Sameer Tilak, Michael J. Lewis, Nael B. Abu-Ghazaleh

:
Non-Uniform Information Dissemination for Dynamic Grid Resource Discovery. 97-106 
Session 7: Keynote Speaker
- André Schiper:

Group Communication: Where Are We Today and Future Challenges. 109-117 
Session 8: Protocols and Verification
- Joshua A. Tauber, Nancy A. Lynch, Michael J. Tsai:

Compiling IOA without Global Synchronization. 121-130 - Arnas Kupsys, Stefan Pleisch, André Schiper, Matthias Wiesmann:

Towards JMS Compliant Group Communication - A Semantic Mapping. 131-140 - Vicent Cholvi

, Antonio Fernández, Ernesto Jiménez
, Michel Raynal:
A Methodological Construction of an Efficient Sequential Consistency Protocol. 141-148 
Session 9: Keynote Speaker
- Alan G. Ganek, Cristiane P. Hilkner, John W. Sweitzer, Brent A. Miller, Joseph L. Hellerstein:

The Response to IT Complexity: Autonomic Computing. 151-157 
Session 10: Network Security
- Min Qin, Kai Hwang:

Frequent Episode Rules for Internet Anomaly Detection. 161-168 - Patroklos G. Argyroudis, Raja Verma, Hitesh Tewari

, Donal O'Mahony
:
Performance Analysis of Cryptographic Protocols on Handheld Devices. 169-174 
Session 11: System Area Networks/InfiniBand
- Victoria Ungureanu, Benjamin Melamed, Michael N. Katehakis:

The LC Assignment Policy for Cluster-Based Servers. 177-184 - Christian Osendorfer, Jie Tao, Carsten Trinitis, Martin Mairandres:

ViSMI: Software Distributed Shared Memory for InfiniBand Clusters. 185-191 - Ming Zhu, Yang Wang, Meng Ding, Constantine Katsinis:

Dynamic Key Messaging for Cluster Computing. 192-199 
Session 12: Keynote Speaker
- Michael Krause:

Are Processors Free? Impact on RDMA and Protocol Off-Load Technologies. 203- 
Session 13: Network Processors and Switching Architectures
- Jürgen Foag:

Speculative Network Processor for Quality-of-Service-Aware Protocol Processing. 207-214 - Satyen Sukhtankar, Diana Hecht, Warren Rosen:

A Novel Switch Architecture for High-Performance Computing and Signal Processing Networks. 215-222 - Saad Mneimneh:

An Iterative Switching Algorithm With (Possibly) One Iteration. 223-231 
Session 14: Performance Modeling and Analysis
- Imad Antonios, Lester Lipsky:

On the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic. 235-242 - Christos Bouras, Kostas Stamos

:
An Adaptive Admission Control Algorithm for Bandwidth Brokers. 243-250 
Session 15: Mobile Ad-Hoc and Sensors Networks
- Antonio Corradi

, Rebecca Montanari
, Daniela Tibaldi:
Context-Based Access Control Management in Ubiquitous Environments. 253-260 - Zhengming Shen, Johnson P. Thomas:

Location-Triggered Routing Protocol in Mobile Ad Hoc Networks. 261-268 - Yong Xun, Mieczyslaw M. Kokar, Kenneth Baclawski:

Using a Task-Specific QoS for Controlling Sensing Requests and Scheduling. 269-276 
NCA 2004 Short Papers
Session 1: Protocols and Programming for Distributed Systems
- Richard Ekwall, Sergio Mena, Stefan Pleisch, André Schiper:

Towards Flexible Finite-State-Machine-Based Protocol Composition. 281-286 - Ken Mano, Yoshinobu Kawabe:

The Nepi Network Programming System: A Programming Environment for Distributed Systems. 287-292 - Galen S. Swint, Calton Pu, Younggyun Koh, Ling Liu, Wenchang Yan, Charles Consel, Koichi Moriyama

, Jonathan Walpole:
Infopipes: The ISL/ISG Implementation Evaluation. 293-296 - Giancarlo Fortino

, Carlo Mastroianni
, Wilma Russo
:
A Multi-Policy, Cooperative Playback Control Protocol. 297-302 - Gabriela Jacques-Silva, Roberto Jung Drebes, Júlio Gerchman, Taisy Silva Weber:

FIONA: A Fault Injector for Dependability Evaluation of Java-Based Network Applications. 303-308 
Session 2: System Area Networks
- Vlad Olaru, Walter F. Tichy:

Request Distribution-Aware Caching in Cluster-Based Web Servers. 311-316 - Eiji Kawai, Youki Kadobayashi, Suguru Yamaguchi:

A Fast Polling I/O Implementation with Real-time Signals. 317-322 - Ying Qian, Ahmad Afsahi, Reza Zamani:

Myrinet Networks: A Performance Study. 323-328 - Tariq Omari, Seyed H. Hosseini, K. Vairavan:

Traveling Token for Dynamic Load Balancing. 329-332 - Abdelilah Maach, Gregor von Bochmann, Hussein T. Mouftah:

Shared Protection for Time Slotted Optical Networks. 333-336 
Session 3: Routing and Security in MANET
- Dario Bottazzi, Antonio Corradi

, Rebecca Montanari
:
Context-Awareness for Impromptu Collaboration in MANETs. 339-342 - Afrand Agah, Sajal K. Das

, Kalyan Basu, Mehran Asadi:
Intrusion Detection in Sensor Networks: A Non-Cooperative Game Approach. 343-346 
NCA 2004 Workshop Papers
Adaptive Grid Computing Workshop
- Stefan Birrer, Fabián E. Bustamante:

Resilient Peer-to-Peer Multicast from the Ground Up. 351-355 - Philip J. Sokolowski, Daniel Grosu

:
Performance of the NAS Parallel Benchmarks on Grid Enabled Clusters. 356-361 - Syed Naqvi, Michel Riguidel:

VIPSEC: Virtualized and Pluggable Security Services Infrastructure for Adaptive Grid Computing. 362-365 - SungJin Choi, MaengSoon Baik, Chong-Sun Hwang, Joon-Min Gil, Heon-Chang Yu:

Volunteer Availability based Fault Tolerant Scheduling Mechanism in Desktop Grid Computing Environment. 366-371 - Bei Di Chen, Muthucumaru Maheswaran:

A Fair Synchronization Protocol with Cheat Proofing for Decentralized Online Multiplayer Games. 372-375 - Muthucumaru Maheswaran, Balasubramaneyam Maniymaran, Shah Asaduzzaman, Arindam Mitra:

Towards a Quality of Service Aware Public Computing Utility. 376-379 
Trustworthy Network Computing Workshop
- Dan Williams, Emin Gün Sirer:

Optimal Parameter Selection for Efficient Memory Integrity Verification Using Merkle Hash Trees. 383-388 - Julian B. Grizzard, Sven Krasser, Henry L. Owen, Gregory J. Conti, Eric R. Dodson:

Towards an Approach for Automatically Repairing Compromised Network Systems. 389-392 - Anthony T. Chronopoulos

, F. Balbi, D. Veljkovic, N. Kolani:
Implementation of Distributed Key Generation Algorithms using Secure Sockets. 393-398 - Dimitris Kamenopoulos, Iosif A. Osman, Panayotis Tsanakas:

Distance Measurement in Volunteer Computing Networks: A Completely Decentralized Approach. 399-404 - Muhammad J. Bohio, Ali Miri:

Self-Healing in Group Key Distribution Using Subset Difference Method. 405-408 - Gustavo A. Santana Torrellas:

A Framework for Multi-Agent System Engineering using Ontology Domain Modelling for Security Architecture Risk Assessment in E-Commerce Security Services. 409-412 

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














