default search action
13th NCA 2014: Cambridge, MA, USA
- 2014 IEEE 13th International Symposium on Network Computing and Applications, NCA 2014, Cambridge, MA, USA, 21-23 August, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-5392-9
- Shlomi Dolev, Lukasz Krzywiecki, Nisha Panwar, Michael Segal:
Dynamic Attribute Based Vehicle Authentication. 1-8 - Behnaz Bostanipour, Benoît Garbinato:
Using Virtual Mobile Nodes for Neighbor Detection in Proximity-Based Mobile Applications. 9-16 - Allan Mariano de Souza, Guilherme Maia, Leandro A. Villas:
ADD: A Data Dissemination Solution for Highly Dynamic Highway Environments. 17-23 - Jesus Friginal, Marc-Olivier Killijian, Roberto Pasqua, Matthieu Roy, Gilles Trédan:
Does Mobility Matter? An Evaluation Methodology for Opportunistic Apps. 24-31 - Marco Antonio To, Gerardo Morales, Stephane Maag:
Strip Interoperability for Wireless Ad Hoc Routing Protocols. 32-36 - Ademar Takeo Akabane, Leandro Aparecido Villas, Edmundo Roberto Mauro Madeira:
GTO: A Broadcast Protocol for Highway Environments over Diverse Traffic Conditions. 37-40 - Chung-Jae Lee, Ki-Il Kim:
A Deadline Aware DTN Approach Based on Epidemic Routing. 41-44 - Claudio Correa, Jo Ueyama, Rodolfo Ipolito Meneguette, Leandro Aparecido Villas:
VANets: An Exploratory Evaluation in Vehicular Ad Hoc Network for Urban Environment. 45-49 - Dimiter Avresky, Fabien Chaix, Michael Nicolaidis:
Congestion-Aware Adaptive Routing in 2D-Mesh Multicores. 50-58 - Francisco J. Andujar, Juan A. Villar, José L. Sánchez, Francisco J. Alfaro, José Duato:
Optimal Configuration for N-Dimensional Twin Torus Networks. 59-66 - Maria Fazio, Antonio Celesti, Massimo Villari, Antonio Puliafito:
Resource Management in Cloud Federation Using XMPP. 67-70 - André Pessoa Negrão, Miguel Adaixo, Luís Veiga, Paulo Ferreira:
On-Demand Resource Allocation Middleware for Massively Multiplayer Online Games. 71-74 - Dishelt Francisco Torres Paz, Jorge Antonio Perez Espinoza, Jose Juan Garcia-Hernandez:
A Low-Complexity Fault-Tolerant Document Storage System. 75-79 - Yiming Han, Anthony T. Chronopoulos:
A Resilient Hierarchical Distributed Loop Self-Scheduling Scheme for Cloud Systems. 80-84 - Doan B. Hoang, Lingfeng Chen:
Health Records Protection in Cloud Environment. 85-90 - Babul P. Tewari, Sasthi C. Ghosh:
Interference Avoidance through Frequency Assignment and Association Control in IEEE 802.11 WLAN. 91-95 - Hengky Susanto, Byung-Guk Kim:
Recovery of Information Lost by the Least Squares Estimation in Real-Time Network Environment. 96-100 - Sondes Ben Cheikh, Slim Hammadi, Christian Tahon:
Based-Agent Distributed Architecture to Manage the Dynamic Multi-hop Ridesharing System. 101-104 - Klaithem Al Nuaimi, Nader Mohamed, Mariam Al Nuaimi, Jameela Al-Jaroodi:
A Novel Approach for Dual-Direction Load Balancing and Storage Optimization in Cloud Services. 105-112 - Safraz Rampersaud, Daniel Grosu:
A Sharing-Aware Greedy Algorithm for Virtual Machine Maximization. 113-120 - Leonardo A. F. Leite, Carlos Eduardo Moreira Dos Santos, Daniel Cordeiro, Marco Aurélio Gerosa, Fabio Kon:
Deploying Large-Scale Service Compositions on the Cloud with the CHOReOS Enactment Engine. 121-128 - Shlomi Dolev, Shimrit Tzur-David:
SDN-Based Private Interconnection. 129-136 - Matthäus Wander, Lorenz Schwittmann, Christopher Boelmann, Torben Weis:
GPU-Based NSEC3 Hash Breaking. 137-144 - Hector Marco-Gisbert, Ismael Ripoll:
On the Effectiveness of NX, SSP, RenewSSP, and ASLR against Stack Buffer Overflows. 145-152 - Sena Efsun Cebeci, Öznur Özkasap, Giuseppe Anastasi:
Green Proxy-Based Approaches for BitTorrent. 153-156 - Ana C. Riekstin, Guilherme C. Januario, Bruno Bastos Rodrigues, Viviane T. Nascimento, M. Roxana Pirlea, Tereza Cristina M. B. Carvalho, Catalin Meirosu:
Orchestration of Energy Efficiency Functionalities for a Sustainable Network Management. 157-161 - Shlomi Dolev, Sergey Frenkel, Marina Kopeetsky:
Entropy Adaptive On-Line Compression. 162-166 - Jiri Marek, Hana Rudová, Petr Holub:
Local Search Heuristics for Media Streams Planning with Transcoding. 167-170 - José Rodrigues Torres Neto, Daniel Ludovico Guidoni, Leandro A. Villas:
A New Solution to Perform Automatic Meter Reading Using Unmanned Aerial Vehicle. 171-174 - Jeff Burke, Paolo Gasti, Naveen Nathan, Gene Tsudik:
Secure Sensing over Named Data Networking. 175-180 - Giacomo Brambilla, Marco Picone, Michele Amoretti, Francesco Zanichelli:
An Adaptive Peer-to-Peer Overlay Scheme for Location-Based Services. 181-188 - Subhankar Ghosal, Sasthi C. Ghosh:
A Probabilistic Greedy Algorithm with Forced Assignment and Compression for Fast Frequency Assignment in Cellular Network. 189-196 - Pavel Troubil, Hana Rudová, Petr Holub:
Media Streams Planning with Uncertain Link Capacities. 197-204 - Leandro Pacheco, Daniele Sciascia, Fernando Pedone:
Parallel Deferred Update Replication. 205-212 - Mohamed Mohamedin, Roberto Palmieri, Binoy Ravindran:
On Making Transactional Applications Resilient to Data Corruption Faults. 213-220 - Eliza Gomes, Mário Antônio Ribeiro Dantas:
An Advance Reservation Mechanism to Enhance Throughput in an Opportunistic High Performance Computing Environment. 221-228 - Nusrat Nowsheen, Gour C. Karmakar, Joarder Kamruzzaman:
An Adaptive Approach to Opportunistic Data Forwarding in Underwater Acoustic Sensor Networks. 229-236 - Matheus A. De Paulo, Mariá C. V. Nascimento, Valério Rosset:
RLP: A Community Detection-Based Routing Protocol for Wireless Sensor Networks. 237-244 - Mariam Al Nuaimi, Khaled Shuaib, Klaithem Al Nuaimi:
Clustering in WSN Using Node Ranking with Hybrid Nodes Duty-Cycle and Energy Threshold. 245-252 - Viveck R. Cadambe, Nancy A. Lynch, Muriel Médard, Peter M. Musial:
A Coded Shared Atomic Memory Algorithm for Message Passing Architectures. 253-260 - Bryan Dixon, Shivakant Mishra, Jeannette Pepin:
Time and Location Power Based Malicious Code Detection Techniques for Smartphones. 261-268 - Srikanth Sastry, Josef Widder:
Solvability-Based Comparison of Failure Detectors. 269-276 - Yi Cheng Ren, Junichi Suzuki, Dung H. Phan, Shingo Omura, Ryuichi Hosoya:
An Evolutionary Game Theoretic Approach for Configuring Cloud-Integrated Body Sensor Networks. 277-281 - Tatiana Aubonnet, Noëmie Simoni:
Self-Control Cloud Services. 282-286 - Rafael Lopes Gomes, Luiz Fernando Bittencourt, Edmundo Roberto Mauro Madeira:
Supporting SLA Negotiation for VSDN Based on Similarity and Price Issues. 287-290 - Trung Nguyen, Jean Leneutre:
Formal Analysis of Secure Device Pairing Protocols. 291-295 - Waseem Abbas, Sajal Bhatia, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Immunization against Infection Propagation in Heterogeneous Networks. 296-300 - William Mahoney, Abhishek Parakh, Matthew Battey:
Hardware Implementation of Quasigroup Encryption for SCADA Networks. 301-305 - Thiago S. Rocha, Eduardo Souto:
ETSSDetector: A Tool to Automatically Detect Cross-Site Scripting Vulnerabilities. 306-309
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.