


default search action
16th NCA 2017: Cambridge, MA, USA
- Aris Gkoulalas-Divanis, Miguel P. Correia, Dimiter R. Avresky:

16th IEEE International Symposium on Network Computing and Applications, NCA 2017, Cambridge, MA, USA, October 30 - November 1, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-1465-5 - Josh Shaul:

Keynote - Internet imbalance: Have we given the attackers an edge?
Session 1: Security and Privacy
- Salvatore Signorello

, Samuel Marchal
, Jérôme François, Olivier Festor, Radu State:
Advanced interest flooding attacks in named-data networking. 1-10 - Giovanni Apruzzese

, Mirco Marchetti
, Michele Colajanni, Gabriele Gambigliani Zoccoli, Alessandro Guido:
Identifying malicious hosts involved in periodic communications. 11-18 - Areej Algaith

, Ivano Alessandro Elia, Ilir Gashi
, Marco Vieira
:
Diversity with intrusion detection systems: An empirical study. 19-23 - Abubakar Sadiq Sani, Dong Yuan, Wei Bao

, Zhao Yang Dong
:
Towards secure energy internet communication scheme: An identity-based key bootstrapping protocol supporting unicast and multicast. 25-29 - Muhammad Umer, Tahir Azim, Zeeshan Pervez

:
Reducing communication cost of encrypted data search with compressed bloom filters. 31-34
Session 2: Ad-Hoc and Sensor Networks
- Phi-Le Nguyen

, Yusheng Ji, Thanh Trung Nguyen
, Thanh-Hung Nguyen:
Constant stretch and load balanced routing protocol for bypassing multiple holes in wireless sensor networks. 35-43 - Lewis Tseng:

Towards reliable broadcast in practical sensor networks. 45-52 - Shima Asaadi, Kiana Alikhademi, Farshad Eshghi

, Juan E. Gilbert
:
TQOR: Trust-based QoS-oriented routing in cognitive MANETs. 53-60 - Joahannes Costa, Wellington Lobato, Allan Mariano de Souza, Denis do Rosário

, Leandro A. Villas
, Eduardo Cerqueira:
Centrality-based data dissemination protocol for vehicular ad hoc networks. 61-64 - Ademar Takeo Akabane

, Richard W. Pazzi
, Edmundo R. M. Madeira
, Leandro A. Villas
:
Applying egocentric betweenness measure in vehicular ad hoc networks. 65-68 - Chuku Ejike, Demetres Kouvatsos:

Combined sensing, performance and security trade-offs in cognitive radio networks. 69-72
Session 3: Cloud and Edge Computing
- Richard Gil Martinez, Zhongmiao Li, Antónia Lopes, Luís E. T. Rodrigues:

Augure: Proactive reconfiguration of cloud applications using heterogeneous resources. 73-80 - Pernelle Mensah, Samuel Dubus, Wael Kanoun, Christine Morin, Guillaume Piolle, Eric Totel:

Connectivity graph reconstruction for networking cloud infrastructures. 81-89 - Deafallah Alsadie

, Zahir Tari
, Eidah J. Alzahrani
, Albert Y. Zomaya
:
LIFE: A predictive approach for VM placement in cloud environments. 91-98 - Deafallah Alsadie

, Zahir Tari
, Eidah J. Alzahrani
, Albert Y. Zomaya
:
Energy-efficient tailoring of VM size and tasks in cloud data centers. 99-103 - Gary Roberts, Sixia Chen, Chadi Kari, Vivek K. Pallipuram:

Data migration algorithms in heterogeneous storage systems: A comparative performance evaluation. 105-108 - Mary Hogan

, Flavio Esposito
:
Stochastic delay forecasts for edge traffic engineering via Bayesian Networks. 109-112 - Evangelos Tasoulas, Hugo Lewi Hammer, Hårek Haugerud

, Anis Yazidi, Alfred Bratterud, Boning Feng:
The concept of workload delay as a quality-of-service metric for consolidated cloud environments with deadline requirements. 113-117 - Ricardo Filipe

, Rui Pedro Paiva
, Filipe Araújo
:
Client-side black-box monitoring for web sites. 119-123
Session 4: Fault Tolerance and Reliability
- Pascale Minet, Ines Khoufi, Anis Laouiti

:
Increasing reliability of a TSCH network for the industry 4.0. 125-134 - Mohamed Mohamedin, Masoomeh Javidi Kishi, Roberto Palmieri

:
Shield: A middleware to tolerate CPU transient faults in multicore architectures. 135-143 - Ziad Kassam

, Ali Shoker
, Paulo Sérgio Almeida
, Carlos Baquero:
Aggregation protocols in light of reliable communication. 145-148 - Shlomi Dolev

, Roman Manevich, Amit Rokach:
Programming reflexes (Extended abstract). 149-152 - Klaus-Tycho Foerster

:
On the consistent migration of unsplittable flows: Upper and lower complexity bounds. 153-156 - Simone Economo, Emiliano Silvestri

, Pierangelo di Sanzo
, Alessandro Pellegrini
, Francesco Quaglia:
Prompt application-transparent transaction revalidation in software transactional memory. 157-162
Session 5: Big Data Analytics and Machine Learning
- Corentin Hardy, Erwan Le Merrer, Bruno Sericola:

Distributed deep learning on edge-devices: Feasibility via adaptive compression. 163-170 - Rafael Aquino de Carvalho, Alfredo Goldman

, Gerson Geraldo H. Cavalheiro:
Is Intel high performance analytics toolkit a good alternative to Apache Spark? 171-178 - Dimiter R. Avresky, Alessandro Pellegrini

, Pierangelo di Sanzo
:
Machine learning-based management of cloud applications in hybrid clouds: A Hadoop case study. 179-183 - Evangelos Pournaras, Jovan Nikolic:

On-demand self-adaptive data analytics in large-scale decentralized networks. 185-194 - Jundong Chen

, He Li, Zeju Wu, Md. Shafaeat Hossain:
Sentiment analysis of the correlation between regular tweets and retweets. 195-199
Session 6: Internet of Things and Cyber-Physical Systems
- Luís Alberto Belém Pacheco, Eduardo Alchieri, Priscila A. Solís Barreto:

Enhancing and evaluating an architecture for privacy in the integration of Internet of Things and cloud computing. 201-208 - Nicolas J. Small, Sven Akkermans

, Wouter Joosen, Danny Hughes:
Niflheim: An end-to-end middleware for applications on a multi-tier IoT infrastructure. 209-216 - Mosarrat Jahan, Suranga Seneviratne, Ben Chu, Aruna Seneviratne, Sanjay K. Jha

:
Privacy preserving data access scheme for IoT devices. 217-226 - Mikiko Sode Tanaka, Takahiro Katoh, Kazuo Ishida:

Child-observation system with wide area networks of IoT child observation using information terminal bus stops in Nonoichi city. 227-230 - Adila Mebrek, Leïla Merghem-Boulahia, Moez Esseghir:

Efficient green solution for a balanced energy consumption and delay in the IoT-Fog-Cloud computing. 231-234 - Asma Lahbib, Khalifa Toumi, Sameh Elleuch, Anis Laouiti, Steven Martin:

Link reliable and trust aware RPL routing protocol for Internet of Things. 235-240 - Ngoc-Tu Nguyen

, Ming C. Leu, Xiaoqing Frank Liu:
Real-time communication for manufacturing cyber-physical systems. 241-244
Session 7: Containers, Scheduling and Resource Allocation
- Eidah J. Alzahrani

, Zahir Tari
, Young Choon Lee
, Deafallah Alsadie
, Albert Y. Zomaya
:
adCFS: Adaptive completely fair scheduling policy for containerised workflows systems. 245-252 - Damien Carver, Julien Sopena, Sébastien Monnet:

ACDC: Advanced consolidation for dynamic containers. 253-260 - Zhongmiao Li, Peter Van Roy, Paolo Romano

:
Enhancing throughput of partially replicated state machines via multi-partition operation scheduling. 261-270 - Yidan Wang, Zahir Tari

, M. Reza HoseinyFarahabady
, Albert Y. Zomaya
:
QoS-aware resource allocation for stream processing engines using priority channels. 271-279 - Young Ki Kim, Mohammad Reza Hoseiny Farahabady, Young Choon Lee

, Albert Y. Zomaya
:
A resource allocation controller for key-value data stores. 281-284 - Marcelo Cerqueira de Abranches, Priscila Solís

, Eduardo Alchieri:
PAS-CA: A cloud computing auto-scalability method for high-demand web systems. 285-288 - Khaled Almi'ani

, Young Choon Lee
, Bernard Mans
:
Resource demand aware scheduling for workflows in clouds. 289-293
Session 8: Networking
- Kutalmis Akpinar, Kien A. Hua:

Deduplication overlay network. 295-303 - Stefan Hommes

, Petko Valtchev
, Khalil Blaiech, Salaheddine Hamadi, Omar Cherkaoui, Radu State:
Optimising packet forwarding in multi-tenant networks using rule compilation. 305-313 - Yves Mocquard, Bruno Sericola, Emmanuelle Anceaume:

Probabilistic analysis of counting protocols in large-scale asynchronous and anonymous systems. 315-322 - Bassirou Ngom

, Mesaac Makpangou:
Summary prefix tree: An over DHT indexing data structure for efficient superset search. 323-327 - Diego Fernández

, Hugo Lorenzo, Francisco Javier Nóvoa
, Fidel Cacheda, Victor Carneiro
:
Tools for managing network traffic flows: A comparative analysis. 329-333 - Roberto Rigolin Ferreira Lopes

, Antti Viidanoja, Maximilien Lhotellier, Michal Mazurkiewicz, Giampaolo Melis, Anne Diefenbach, Tobias Ginzler, Norman Jansen:
Trade-off analysis of a service-oriented and hierarchical queuing mechanism. 335-338 - Yelena Rykalova, Lev B. Levitin:

Virtual cut-through routing in toroidal interconnection networks. 339-342
Session 9: Endpoint and Mobile Device Security
- Muhammad Ikram

, Mohamed Ali Kâafar
:
A first look at mobile Ad-Blocking apps. 343-350 - Sileshi Demesie Yalew, Gerald Q. Maguire Jr.

, Seif Haridi, Miguel Correia:
Hail to the Thief: Protecting data from mobile ransomware with ransomsafedroid. 351-358 - Sami S. Albouq, Erik M. Fredericks:

Securing communication between service providers and road side units in a connected vehicle infrastructure. 359-363 - Pasha Shahegh, Tommy Dietz, Michel Cukier, Areej Algaith

, Attila Brozik, Ilir Gashi
:
AVAMAT: AntiVirus and malware analysis tool. 365-368 - Shlomi Dolev

, Mohammad Ghanayim, Alexander Binun, Sergey Frenkel, Yeali S. Sun:
Relationship of Jaccard and edit distance in malware clustering and online identification (Extended abstract). 369-373 - Zainab Abaid, Mohamed Ali Kâafar

, Sanjay Jha
:
Quantifying the impact of adversarial evasion attacks on machine learning based android malware classifiers. 375-384
Session 10: Blockchain and Distributed Ledgers
- Maxim Amelchenko, Shlomi Dolev

:
Blockchain abbreviation: Implemented by message passing and shared memory (Extended abstract). 385-391 - Ali Shoker

:
Sustainable blockchain through proof of exercise. 393-401 - Nesrine Kaaniche

, Maryline Laurent
:
A blockchain-based data usage auditing architecture with enhanced privacy and availability. 403-407 - Remo Manuel Frey, Pascal Buhler, Alexander Gerdes, Thomas Hardjono, Klaus Ludwig Fuchs

, Alexander Ilic
:
The effect of a blockchain-supported, privacy-preserving system on disclosure of personal data. 409-413
Session 11: Software-Defined Networking and Network Function Virtualization
- Yefim Dinitz, Shlomi Dolev

, Daniel Khankin:
Dependence graph and master switch for seamless dependent routes replacement in SDN (extended abstract). 415-421 - Sergei Frenkel, Daniel Khankin, Alona Kutsyy:

Predicting and choosing alternatives of route updates per QoS VNF in SDN. 423-428 - Sara Farahmandian, Doan B. Hoang:

SDS2: A novel software-defined security service for protecting cloud computing infrastructure. 429-436 - Raj Mani Shukla, Shamik Sengupta:

A novel software-defined network based approach for charging station allocation to plugged-in electric vehicles. 437-441 - Iulisloi Zacarias, Janaina Schwarzrock, Luciano Paschoal Gaspary, Anderson Kohl, Ricardo Queiroz de Araujo Fernandes, Jorgito M. Stocchero

, Edison Pignaton de Freitas
:
Employing SDN to control video streaming applications in military mobile networks. 443-446 - Mohammad Abu-Lebdeh, Diala Naboulsi, Roch H. Glitho, Constant Wette Tchouati:

NFV orchestrator placement for geo-distributed systems. 447-451 - Fabien Charmet, Richard Waldinger, Gregory Blanc

, Christophe Kiennert, Khalifa Toumi:
Preserving confidentiality during the migration of virtual SDN topologies: A formal approach. 453-457
Session 12: 5G Networks
- Durgesh Singh, Sasthi C. Ghosh:

A distributed algorithm for D2D communication in 5G using stochastic model. 459-466 - Hussein Al Dorai, Luay Alirkhis, Riyadh Ali Al-Essawi:

5G accessibility optimization in high interference environments. 467-471 - Shankar K. Ghosh

, Sasthi C. Ghosh:
A predictive handoff mechanism for 5G ultra dense networks. 473-477 - Sultan Alotaibi, Robert Akl:

Radio resource management in LTE femtocell networks. 479-483 - Maxweel S. Carmo, Sandino Jardim, Augusto Neto

, Rui L. Aguiar
, Daniel Corujo:
Towards fog-based slice-defined WLAN infrastructures to cope with future 5G use cases. 485-489

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














