default search action
5th NCA 2006: Cambridge, MA, USA
- Fifth IEEE International Symposium on Network Computing and Applications, NCA 2006, 24-26 July 2006, Cambridge, Massachusetts, USA. IEEE Computer Society 2006, ISBN 0-7695-2640-3
Keynote Speech Abstracts
- Mike Afergan:
Experience with some Principles for Building an Internet-Scale Reliable System. 3 - Alan Ganek:
Challenges in Managing Complexity: Autonomic Computing. 4 - Leslie Lamport:
The +CAL Algorithm Language. 5 - Ravishankar K. Iyer:
Application-Aware Reliability and Security: The Trusted ILLIAC Approach. 6
Networking Protocols
- Jiazheng Zhou, Xuan-Yi Lin, Yeh-Ching Chung:
A Tree-Turn Model for Irregular Networks. 11-18 - Seth E. Webster, Richard Lippmann, Marc A. Zissman:
Experience Using Active and Passive Mapping for Network Situational Awareness. 19-26 - Bo Yan, Hamid Gharavi:
Multi-Path Multi-Channel Routing Protocol. 27-31 - Jay A. Patel, Indranil Gupta, Noshir S. Contractor:
JetStream: Achieving Predictable Gossip Dissemination by Leveraging Social Network Principles. 32-39 - Florent Claerhout, Ajoy Kumar Datta, Maria Gradinariu, Michel Hurfin:
Self* Architecture for Trajectory Tracking in Wireless Sensor Networks. 40-47 - Gene Cooperman, Viet Ha Nguyen, Igor Malioutov:
Parallelization of Geant4 Using TOP-C and Marshalgen. 48-55 - Luís Moura Silva, Henrique Madeira, João Gabriel Silva:
Software Aging and Rejuvenation in a SOAP-based Server. 56-65 - Paul Royal, Mitch Halpin, Ada Gavrilovska, Karsten Schwan:
Utilizing Network Processors in Distributed Enterprise Environments. 66-76
Peer-to-Peer and Publish Subscribe Systems
- Zhenhui Shen, Srikanta Tirthapura:
Faster Event Forwarding in a Content-Based Publish-Subscribe System through Lookup ReuseEvent. 77-84 - Wai Gen Yee, Linh Thai Nguyen, Ophir Frieder:
Improved Result Ranking in P2P File-Sharing Systems by Probing for Metadata. 85-92 - Fivos Constantinou, Panayiotis Mavrommatis:
Identifying Known and Unknown Peer-to-Peer Traffic. 93-102
Real-Time Scheduling
- Frederic Thouin, Mark Coates, Dominic Goodwill:
Video-on-Demand Equipment Allocation. 103-110 - Zhenghao Zhang, Lin Liu, Yuanyuan Yang:
Slotted Optical Burst Switching (SOBS) Networks. 111-117 - Raúl Martínez, Francisco José Alfaro, José L. Sánchez:
Implementing the Advanced Switching Minimum Bandwidth Egress Link Scheduler. 118-125 - Michael Treaster, William Conner, Indranil Gupta, Klara Nahrstedt:
ContagAlert: Using Contagion Theory for Adaptive, Distributed Alert Propagation. 126-136
Security and Trust
- Stephen Frechette, Dimiter R. Avresky:
A Proxy Network Topology and Reconfiguration Algorithm for Resistance to DoS Attacks. 137-144 - Leonardo B. Oliveira, Hao Chi Wong, Marshall W. Bern, Ricardo Dahab, Antonio Alfredo Ferreira Loureiro:
SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks. 145-154
Middleware
- Paolo Romano, Francesco Quaglia:
Providing e-Transaction Guarantees in Asynchronous Systems with Inaccurate Failure Detection. 155-162 - Carlos Aguilar Melchor, Yves Deswarte:
From DC-Nets to pMIXes: Multiple Variants for Anonymous Communications. 163-172
Distributed Storage
- James S. Plank, Lihao Xu:
Optimizing Cauchy Reed-Solomon Codes for Fault-Tolerant Network Storage Applications. 173-180 - Benjamin Atkin, Kenneth P. Birman:
Network-Aware Adaptation Techniques for Mobile File Systems. 181-188 - Fabius Klemm, Jean-Yves Le Boudec, Karl Aberer:
Congestion Control for Distributed Hash Tables. 189-195 - Peter Sobe, Kathrin Peter:
Comparison of Redundancy Schemes for Distributed Storage Systems. 196-203 - Lásaro J. Camargos, Fernando Pedone, Rodrigo Schmidt:
A Primary-Backup Protocol for In-Memory Database Replication. 204-211 - Nobutatsu Nakamura, Ken-ichiro Fujiyama, Eiji Kawai, Hideki Sunahara:
A Flexible Replication Mechanism with Extended Database Connection Layers. 212-222
Short Papers
- Bin Wu, Ajay D. Kshemkalyani:
Analysis Models for Blind Search in Unstructured Overlays. 223-226 - Wei Shen, Qing-An Zeng:
A Novel Decision Strategy of Vertical Handoff in Overlay Wireless Networks. 227-230 - Axel Treßel, Jörg Keller:
A System for Secure IP Telephone Conferences. 231-234 - Mauro Andreolini, Sara Casolari, Michele Colajanni:
A Distributed Architecture for Gracefully Degradable Web-Based Services. 235-238 - Alejandro Martínez, Francisco José Alfaro, José L. Sánchez, José Duato:
Full QoS Support with 2 VCs for Single-chip Switches. 239-242 - Hou-Cheng Tzeng, Ching-Te Chiu:
A Flexible Cross Connect LCAS for Bandwidth Maximization in 2.5G EoS. 243-246 - Jie Hu, Raymond Klefstad:
Decentralized Load Balancing on Unstructured Peer-2-Peer Computing Grids. 247-250 - Junchang Ma, Zhimin Gu:
Finding Shared Fragments in Large Collections of Web Pages for Fragment-Based Web Caching. 251-254 - Yongjun Li, Wandong Cai, Wei Wang, Guangli Tian:
Lossy Node Identification in Wireless Sensor Network. 255-258 - Huifang Cheng, Zhimin Gu:
IntranetWeb: a Peer-to-Peer Based Scalable Web Caching System. 259-262 - Li-jia Chen, Jing Wu, Puliu Yan, Jian-guo Zhou, Hao Jiang:
A Novel Probability Evaluation Method for Selective Forwarding Routing in Wireless Sensor Network. 263-268
Adaptive Grid Computing Workshop
- Bo Lang, Ian T. Foster, Frank Siebenlist, Rachana Ananthakrishnan, Timothy Freeman:
A Multipolicy Authorization Framework for Grid Security. 269-272 - Wilson Lozano, Wilson Rivera:
An Adaptive Quality of Service Based Scheduling Algorithm for Wide Area Large Scale Problems. 273-276 - Weibin Pei, Zhongliang Chen, Chunhao Feng, Zhi Wang:
Design and Implementation of a Plain Grid Monitoring and Information Service. 277-284
Trustworthy Network Computing Workshop
- Partha P. Pal, Franklin Webber, Michael Atighetchi, Nate Combs:
Trust Assessment from Observed Behavior: Toward and Essential Service for Trusted Network Computing. 285-292 - Harry Gros-Desormeaux, Hacène Fouchal, Philippe Hunel:
An Improved Test Derivation Technique. 293-300
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.