


default search action
10th NCA 2011: Cambridge, MA, USA
- Proceedings of The Tenth IEEE International Symposium on Networking Computing and Applications, NCA 2011, August 25-27, 2011, Cambridge, Massachusetts, USA. IEEE Computer Society 2011, ISBN 978-1-4577-1052-0

- Manuel Fogué, Piedad Garrido

, Francisco J. Martinez
, Juan-Carlos Cano
, Carlos Miguel Tavares Calafate
, Pietro Manzoni
:
PAWDS: A Roadmap Profile-Driven Adaptive System for Alert Dissemination in VANETs. 1-8 - Ricardo Padilha, Fernando Pedone

:
Belisarius: BFT Storage with Confidentiality. 9-16 - Alberto Mozo, José Luis López-Presa

, Antonio Fernández Anta
:
B-Neck: A Distributed and Quiescent Max-Min Fair Algorithm. 17-24 - Fabien de Montgolfier, Mauricio Soto, Laurent Viennot:

Treewidth and Hyperbolicity of the Internet. 25-32 - Amirhossein Malekpour, Antonio Carzaniga

, Giovanni Toffetti Carughi, Fernando Pedone
:
Probabilistic FIFO Ordering in Publish/Subscribe Networks. 33-40 - Damià Castellà Martínez, Francesc Giné, Francesc Solsona

, Josep L. Lérida
:
A Resilient Architecture Oriented to P2P Computing. 41-50 - Gilles Bizot, Dimiter Avresky, Fabien Chaix, Nacer-Eddine Zergainoh, Michael Nicolaidis:

Self-Recovering Parallel Applications in Multi-core Systems. 51-58 - Ermyas Abebe, Caspar Ryan

:
A Hybrid Granularity Graph for Improving Adaptive Application Partitioning Efficacy in Mobile Computing Environments. 59-66 - Fan Zhou, Goce Trajcevski, Besim Avci:

Tracking Coverage throughout Epochs with Bounded Uncertainty. 67-74 - Chryssis Georgiou

, Nicolas C. Nicolaou, Alexander Russell
, Alexander A. Shvartsman
:
Towards Feasible Implementations of Low-Latency Multi-writer Atomic Registers. 75-82 - Aldelir Fernando Luiz, Lau Cheuk Lung, Miguel Correia

:
Byzantine Fault-Tolerant Transaction Processing for Replicated Databases. 83-90 - Jianqiang Luo, Lihao Xu:

SCAN: An Efficient Decoding Algorithm for RAID-6 Codes. 91-98 - M. Zubair Rafique, Muhammad Abulaish

:
xMiner: Nip the Zero Day Exploits in the Bud. 99-106 - M. Manzur Murshed

, Anindya Iqbal, Tishna Sabrina, Kh Mahmudul Alam:
A Subset Coding Based k-Anonymization Technique to Trade-Off Location Privacy and Data Integrity in Participatory Sensing Systems. 107-114 - Slim Rekhis

, Baha Bennour, Noureddine Boudriga:
Validation of Security Solutions for Communication Networks: A Policy-Based Approach. 115-122 - Fangfei Zhou, Manish Goel, Peter Desnoyers, Ravi Sundaram:

Scheduler Vulnerabilities and Coordinated Attacks in Cloud Computing. 123-130 - Jiang Wu, Nancy D. Griffeth, Calvin C. Newport, Nancy A. Lynch:

Engineering the Virtual Node Layer for Reactive MANET Routing. 131-138 - Jesus Friginal

, David de Andrés, Juan-Carlos Ruiz-Garcia
, Pedro J. Gil:
Using Performance, Energy Consumption, and Resilience Experimental Measures to Evaluate Routing Protocols for Ad Hoc Networks. 139-146 - Lakshmi Ganesh, Hakim Weatherspoon, Ken Birman

:
Beyond Power Proportionality: Designing Power-Lean Cloud Storage. 147-154 - Vasinee Siripoonya, Kasidit Chanchio:

Thread-Based Live Checkpointing of Virtual Machines. 155-162 - Javier Alonso, Lluís Belanche, Dimiter R. Avresky:

Predicting Software Anomalies Using Machine Learning Techniques. 163-170 - João Paulo Magalhães

, Luís Moura Silva:
Adaptive Profiling for Root-Cause Analysis of Performance Anomalies in Web-Based Applications. 171-178 - Nicolás Poggi, David Carrera

, Ricard Gavaldà
, Eduard Ayguadé
:
Non-intrusive Estimation of QoS Degradation Impact on E-Commerce User Satisfaction. 179-186 - Tiago Flor Bento, Priscila Solís Barreto:

Evaluating the Impact of Management Traffic and Self-Similarity on Wireless Network Performance. 187-194 - René Gabner, Hans-Peter Schwefel, Karin Anna Hummel

, Günter Haring:
Optimal Model-Based Policies for Component Migration of Mobile Cloud Services. 195-202 - Paulo Floriano, Alfredo Goldman

, Luciana Arantes:
Formalization of the Necessary and Sufficient Connectivity Conditions to the Distributed Mutual Exclusion Problem in Dynamic Networks. 203-210 - Rashidul Hasan, M. Manzur Murshed

:
A Novel Multichannel Cognitive Radio Network with Throughput Analysis at Saturation Load. 211-218 - Francisco Triviño, Francisco José Alfaro

, José L. Sánchez
, José Flich
:
NoC Reconfiguration for CMP Virtualization. 219-222 - André F. Esteves, Pedro R. M. Inácio

, Manuela Pereira
, Mário M. Freire
:
On-line Detection of Encrypted Traffic Generated by Mesh-Based Peer-to-Peer Live Streaming Applications: The Case of GoalBit. 223-228 - Shabnam Ataee, Benoît Garbinato

, Mouna Allani, Fernando Pedone
:
ScaleStream - An Adaptive Replication Algorithm for Scalable Multimedia Streaming. 229-234 - Mahathir Almashor

, Ibrahim Khalil
:
Timely Arbitrator Selection in P2P Virtual Environments with 3D Voronoi Diagrams. 235-240 - Sebastian Holzapfel, Matthäus Wander, Arno Wacker, Torben Weis

:
SYNI - TCP Hole Punching Based on SYN Injection. 241-246 - Carlos Augusto S. Cunha, Luís Moura Silva:

Application of a Self-Healing Video-Streaming Architecture to RTSP Servers. 247-250 - Juan C. Granda, Pelayo Nuño

, Daniel F. García
, Francisco J. Suárez
:
Towards Resilient Synchronous e-Training Platforms. 251-256 - Ermyas Abebe, Caspar Ryan

:
Improving Adaptive Offloading Using Distributed Abstract Class Graphs in Mobile Environments. 257-264 - Adrian Holzer, François Vessaz, Samuel Pierre, Benoît Garbinato

:
PLAN-B: Proximity-Based Lightweight Adaptive Network Broadcasting. 265-270 - Nuno Carvalho, Paolo Romano

, Luís E. T. Rodrigues:
A Generic Framework for Replicated Software Transactional Memories. 271-274 - Evgenia Christoforou, Antonio Fernández Anta, Chryssis Georgiou

, Miguel A. Mosteiro:
Algorithmic Mechanisms for Internet Supercomputing under Unreliable Communication. 275-280 - Diogo Reis, Hugo M. Miranda

:
A Framework for Transparent Active Replication in Remote Method Invocation. 281-284 - Abdullah Mohammed Almuhaideb

, Phu Dung Le, Bala Srinivasan:
Two-Party Mobile Authentication Protocols for Wireless Roaming Networks. 285-288 - Shusmita Anwar Sharna, Mohammad R. Amin, M. Manzur Murshed

:
An Enhanced-MDP Based Vertical Handoff Algorithm for QoS Support over Heterogeneous Wireless Networks. 289-293 - Johann Márquez-Barja

, Carlos Miguel Tavares Calafate
, Juan-Carlos Cano
, Pietro Manzoni
:
Performance Trade-Offs of a IEEE 802.21-Based Vertical Handover Decision Algorithm under Different Network Conditions. 294-297 - Stefan Wieser, László Böszörményi:

Decentralized Topology Aggregation for QoS Estimation in Large Overlay Networks. 298-301 - Mochan Shrestha, Lihao Xu:

Efficient Encoding for Generalized Reed Solomon Codes. 302-305 - Yongmao Ren

, Hualin Qian, Yuepeng E, Jun Li, Jingguo Ge:
IPv4+6. 306-309 - Carlos Guerrero

, Carlos Juiz
, Ramón Puigjaner:
Improving Web Cache Performance via Adaptive Content Fragmentation Design. 310-313 - Vinit Padhye, Anand Tripathi:

Building Autonomically Scalable Services on Wide-Area Shared Computing Platforms. 314-319 - Juan A. Villar, Francisco J. Andujar, José L. Sánchez

, Francisco José Alfaro, José Duato:
Evaluation of an Alternative for Increasing Switch Radix. 320-323 - Tzong-An Su, Chen-Feng Chiu:

From a Database Management System to a Policy-Based Network Management System. 324-327 - Mikkel Hagen, Ryan Zarick:

Performance Evaluation of DCB's Priority-Based Flow Control. 328-333 - Ricardo Filipe, João Pedro Barreto

:
End-to-End Data Deduplication for the Mobile Web. 334-337 - Carlos Manuel Vaz, Luís Moura Silva, António Dourado:

Detecting User-Visible Failures in Web-Sites by Using End-to-End Fine-Grained Monitoring: An Experimental Study. 338-341 - Anwar Sadat, Gour C. Karmakar:

Optimum Clusters for Reliable and Energy Efficient Wireless Sensor Networks. 342-347 - Kh Mahmudul Alam, Joarder Kamruzzaman

, Gour C. Karmakar, M. Manzur Murshed
:
Dynamic Event Coverage in Hybrid Wireless Sensor Networks. 348-353 - Shaila Pervin, Joarder Kamruzzaman

, Gour C. Karmakar:
Quality Adjustable Query Processing Framework for Wireless Sensor Networks. 354-358 - Makhlouf Hadji, Wajdi Louati, Djamal Zeghlache

:
Constrained Pricing for Cloud Resource Allocation. 359-365 - Dhiah Al-Shammary

, Ibrahim Khalil
, Loay Edwar George
:
Clustering SOAP Web Services on Internet Computing Using Fast Fractals. 366-371

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














