


Остановите войну!
for scientists:


default search action
12th NCA 2013: Cambridge, MA, USA
- 2013 IEEE 12th International Symposium on Network Computing and Applications, Cambridge, MA, USA, August 22-24, 2013. IEEE Computer Society 2013
Session 1 (Short Papers): Sensor and Cloud 1
- Nader Mohamed, Jameela Al-Jaroodi, Imad Jawhar, Abdulla Eid:
Using Mobile Sensors to Enhance Coverage in Linear Wireless Sensor Networks. 1-6 - Yiming Han, Anthony T. Chronopoulos
:
A Hierarchical Distributed Loop Self-Scheduling Scheme for Cloud Systems. 7-10 - Nader Mohamed, Jameela Al-Jaroodi, Imad Jawhar, Abdulla Eid:
Reliability Analysis of Linear Wireless Sensor Networks. 11-16
Best Student Paper
- João Paiva, João Leitão
, Luís E. T. Rodrigues:
Rollerchain: A DHT for Efficient Replication. 17-24
Session 2: Data Streams and Content Management
- Emmanuelle Anceaume, Yann Busnel
:
Sketch *-Metric: Comparing Data Streams via Sketching. 25-32 - Stefan Wieser, László Böszörményi, Pier Luca Montessoro:
Flocks: Evaluation of a QoS- and Content-Aware Overlay. 33-40 - Pavel Troubil, Hana Rudová, Petr Holub
:
Media Streams Planning with Transcoding. 41-48
Session 3 (Short Papers): Distributed Data Processing
- Bairong Lei, Ivan Surya, Shahin Kamali, Khuzaima Daudjee:
Data Partitioning for Video-on-Demand Services. 49-54 - Hicham Lakhlef, Hakim Mabed, Julien Bourgeois:
Distributed and Dynamic Map-less Self-reconfiguration for Microrobot Networks. 55-60 - Amir H. Basirat, Asad I. Khan
:
Introducing an Intelligent MapReduce Framework for Distributed Data Processing in Clouds. 61-64
Session 4: Dependability and Performance
- Jorda Polo
, Yolanda Becerra
, David Carrera
, Jordi Torres
, Eduard Ayguadé
, Mike Spreitzer, Malgorzata Steinder:
Enabling Distributed Key-Value Stores with Low Latency-Impact Snapshot Support. 65-72 - Hassen Sallay
, Adel Ammar
, Majdi Ben Saad, Sami Bourouis
:
A Real Time Adaptive Intrusion Detection Alert Classifier for High Speed Networks. 73-80 - João Paulo Magalhães
, Luís Moura Silva:
Self-healing Performance Anomalies in Web-based Applications. 81-88 - Guilherme Amantea, Hervé Rivano
, Alfredo Goldman
:
A Delay-Tolerant Network Routing Algorithm Based on Column Generation. 89-96
Session 5 (Short Papers): Sensor and Cloud 2
- Ines Ayadi, Noemie Simoni, Gladys Diaz
:
NaaS: QoS-aware Cloud Networking Services. 97-100 - Salman Ali AlQahtani, Mohammed Alhassany:
Performance Modeling and Evaluation of Novel Scheduling Algorithm for LTE Networks. 101-105 - Lin Wang, Fa Zhang, Chenying Hou, Jordi Arjona Aroca, Zhiyong Liu:
Incorporating Rate Adaptation Into Green Networking for Future Data Centers. 106-109
Best Paper
- Claude Fachkha
, Elias Bou-Harb
, Mourad Debbabi:
Towards a Forecasting Model for Distributed Denial of Service Activities. 110-117
Session 6: Energy and SLA-aware Resource Management 1
- Yangguang Shi, Fa Zhang, Zhiyong Liu:
A Universally Stable and Energy-Efficient Scheduling Protocol for Packet Switching Network. 118-126 - Andrés J. Gonzalez, Bjarne E. Helvik
:
Hybrid Cloud Management to Comply Efficiently with SLA Availability Guarantees. 127-134 - Leandro A. Villas, Daniel L. Guidoni, Jo Ueyama:
3D Localization in Wireless Sensor Networks Using Unmanned Aerial Vehicle. 135-142
Session 7 (Short Papers): Viability and Recommendation
- Sebastiano Peluso, Roberto Palmieri
, Francesco Quaglia, Binoy Ravindran
:
On the Viability of Speculative Transactional Replication in Database Systems: A Case Study with PostgreSQL. 143-148 - Wenjun Jiang, Jie Wu, Guojun Wang:
RATE: Recommendation-aware Trust Evaluation in Online Social Networks. 149-152 - Wilfried Daniels, Pedro Javier del Cid, Danny Hughes, Sam Michiels
, Chris Blondia, Wouter Joosen:
Composition-Safe re-parametrization in Distributed Component-based WSN Applications. 153-156
Session 8: Customization and Configuration of Networks
- Maria Fazio
, Giovanni Merlino
, Dario Bruneo
, Antonio Puliafito:
An Architecture for Runtime Customization of Smart Devices. 157-164 - Hosnieh Rafiee, Christoph Meinel:
A Secure, Flexible Framework for DNS Authentication in IPv6 Autoconfiguration. 165-172
Session 9 (Short Papers): Sensors and Cloud 3
- Mo'taz Al-Hami
, Abdallah Khreishah, Jie Wu:
Video Streaming over Wireless LAN with Network Coding. 173-176 - Behnaz Bostanipour, Benoît Garbinato
:
Improving Neighbor Detection for Proximity-Based Mobile Applications. 177-182 - Phongphun Kijsanayothin, Rattikorn Hewett:
Exploit-based Analysis of Attack Models. 183-186
Session 10: Wireless Sensor Networks
- Soochang Park, Noël Crespi, Seungmin Oh, Sang-Ha Kim
:
Overlay Multicast Protocol with Proxy Districts for Dynamic Wireless Sensor Networks. 187-194 - Aris Leivadeas, Chrysa Papagianni
, Symeon Papavassiliou:
Energy Aware Networked Cloud Mapping. 195-202 - Mayutan Arumaithurai, Jan Seedorf, Maurizio Dusi, Edo Monticelli, Renato Lo Cigno
:
Quality-of-Experience Driven Acceleration of Thin Client Connections. 203-210 - Gowri Sankar Ramachandran
, Sam Michiels
, Wouter Joosen, Danny Hughes, Barry Porter:
Analysis of Sensor Network Operating System Performance Throughout the Software Life Cycle. 211-218
Session 11: Distributed Techniques
- Sudhanshu Mishra, Alexandru Turcu, Roberto Palmieri
, Binoy Ravindran
:
HyflowCPP: A Distributed Transactional Memory Framework for C++. 219-226 - Ali Shoker
, Jean Paul Bahsoun, Maysam Yabandeh:
Improving Independence of Failures in BFT. 227-234 - Chryssis Georgiou
, Peter M. Musial, Christos Ploutarchou:
Tempo-Toolkit: Tempo to Java Translation Module. 235-242 - Hector Marco-Gisbert
, Ismael Ripoll
:
Preventing Brute Force Attacks Against Stack Canary Protection on Networking Servers. 243-250
Session 12 (Short Papers): Energy and SLA-aware Resource Management 2
- Pedro Javier del Cid, Nelson Matthys, Danny Hughes, Sam Michiels
, Wouter Joosen:
ACS: Specifying "Smart" Applications Using Sense-Process-Consume Flows. 251-254 - Lina Xu, Declan T. Delaney
, Gregory M. P. O'Hare
, Rem W. Collier
:
The Impact of Transmission Power Control in Wireless Sensor Networks. 255-258 - Pedro Neves, Paulo Ferreira
, João Pedro Barreto
:
Leveraging Web Prefetching Systems with Data Deduplication. 259-262

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.