default search action
4th NCA 2005: Cambridge, MA, USA
- Fourth IEEE International Symposium on Network Computing and Applications (NCA 2005), 27-29 July 2005, Cambridge, MA, USA. IEEE Computer Society 2005, ISBN 0-7695-2326-9
Cover
- Fourth IEEE International Symposium on Network Computing and Applications - Title Page.
- Fourth IEEE International Symposium on Network Computing and Applications - Copyright.
Introduction
- Message from the NCA 2005 Program Committee.
- NCA 2005 Program Committee.
- NCA 2005 Symposium Referees.
Opening Address
- Tad Elmer:
Opening Address. 1
Invited Talks
- Jean-Claude Laprie:
Resilience for the Scalability of Dependability. 5-6 - Wei Zhao:
Effectiveness of Traffic Camouflaging over Computer Networks. 7 - Robert W. Taylor:
New Generation Scalable and Dependable Servers. 8 - A. Ghosh:
Challenges in Mobile Networking and Information Assurance. 9
Security and Trust
- William Sears, Zhen Yu, Yong Guan:
An Adaptive Reputation-based Trust Framework for Peer-to-Peer Applications. 13-20 - Arnab Paul, Rajnish Kumar, Umakishore Ramachandran:
LAWN: A Protocol for Remote Authentication overWireless Networks. 21-28 - Carlos Aguilar Melchor, Yves Deswarte:
pMIX: Untraceability for Small Hiding Groups. 29-40
Large Groups and Grids Scheduling
- Dionysios Kostoulas, Dimitrios Psaltoulis, Indranil Gupta, Ken Birman, Alan J. Demers:
Decentralized Schemes for Size Estimation in Large and Dynamic Groups. 41-48 - Stephen Frechette, Dimiter R. Avresky:
Method for Task Migration in Grid Environments. 49-58
Networking Protocols
- Peng Wang, David L. Mills:
A Probabilistic Approach for Achieving Fair Bandwidth Allocations in CSFQ. 59-66 - Chin-Ling Chen, Jia-Chun Yu:
Supporting Rate-based Control in DiffServ Networks. 67-72 - Joel Sing, Ben Soh:
TCP New Vegas: Improving the Performance of TCP Vegas Over High Latency Links. 73-82
Peer-to-Peer Publish-Subscribe Systems
- Giscard Wepiwé, Plamen L. Simeonov:
A Concentric Multi-ring Overlay for Highly Reliable P2P Networks. 83-90 - Roberto Baldoni, Leonardo Querzoni, Antonino Virgillito, Ricardo Jiménez-Peris, Marta Patiño-Martínez:
Dynamic Quorums for DHT-based P2P Networks. 91-100 - Nuno Carvalho, Filipe Araújo, Luís E. T. Rodrigues:
Scalable QoS-Based Event Routing in Publish-Subscribe Systems. 101-108 - Marc Schiely, Lars Renfer, Pascal Felber:
Self-organization in Cooperative Content Distribution Networks. 109-118
Real-Time Scheduling
- Malika Boulkenafed, Barbara Hughes, René Meier, Gregory Biegel, Vinny Cahill:
Providing Hard Real-Time Guarantees in Context-Aware Applications: Challenges and Requirements. 119-127 - Sarah Tasneem, Lester Lipsky, Reda A. Ammar, Howard A. Sholl:
Using Residual Times to Meet Deadlines in M/G/C Queues. 128-138
Middleware for Dependable Computing
- Arnas Kupsys, Richard Ekwall:
Architectural Issues of JMS Compliant Group Communication. 139-148 - Chryssis Georgiou, Peter M. Musial, Alexander A. Shvartsman:
Developing a Consistent Domain-Oriented Distributed Object Service. 149-158 - Roger Khazan, Sophia Yuditskaya:
A Wide Area Network Simulation of Single-Round Group Membership Algorithms. 159-170
Network Processors and Scheduling
- Sanjay Kumar, Ada Gavrilovska, Karsten Schwan, Srikanth Sundaragopalan:
C-CORE: Using Communication Cores for High Performance Network Services. 171-178 - Hao Che, Chethan Kumar, Basavaraj Menasinahal:
Fundamental Network Processor Performance Bounds. 179-185 - Florina M. Ciorba, Theodore Andronikos, Ioannis Drositis, George K. Papakonstantinou, Panayotis Tsanakas:
Reducing the Communication Cost via Chain Pattern Scheduling. 186-196
Multicast Protocols
- Milena Janic, Novi Ineke, Cempaka Wangi, Xiaoming Zhou, Piet Van Mieghem:
Hopcount in Application Layer Multicast Schemes. 197-204 - Mahesh Balakrishnan, Stefan Pleisch, Ken Birman:
Slingshot: Time-Critical Multicast for Clustered Applications. 205-214
Short Papers
- Ye Zhu, Xinwen Fu, Riccardo Bettati:
On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks. 215-218 - Michael Atighetchi, Paul Rubel, Partha P. Pal, Jennifer Chong, Lyle Sudin:
Networking Aspects in the DPASA Survivability Architecture: An Experience Report. 219-222 - Romain Laborde, François Barrère, Abdelmalek Benzekri:
A formal framework (Expression + Analysis) for network security. 223-227 - Tzu-Chi Huang, Ce-Kuen Shieh, Wen-Huang Lai, Yu-Ben Miao:
Smart Tunnel Union for NAT Traversal. 227-231 - Constantine Katsinis:
Block Migration in Broadcast-based Multiprocessor Architectures. 231-234 - Gunnar Gaubatz, Berk Sunar:
Leveraging the Multiprocessing Capabilities of Modern Network Processors for Cryptographic Acceleration. 235-238 - Jiazheng Zhou, Xuan-Yi Lin, Chun-Hsien Wu, Yeh-Ching Chung:
Multicast in Fat-Tree-Based InfiniBand Networks. 239-242 - Daniel C. Bünzli, Sergio Mena, Uwe Nestmann:
Protocol Composition Frameworks A Header-Driven Model. 243-246 - Kuniyasu Suzaki, Kengo Iijima, Toshiki Yagi, Hideyuki Tan, Kazuhiro Goto:
SFS-KNOPPIX. 247-250 - Onur Demir, Kanad Ghose:
Improving Transaction Server Performance under Heavy Loads with Differentiated Service and Active Network Interfaces. 251-254 - Chetan Shiva Shankar, Roy H. Campbell:
A Policy-based Management Framework for Pervasive Systems using Axiomatized Rule-Actions. 255-258 - Giorgia Lodi, Fabio Panzieri, Davide Rossi, Elisa Turrini:
Experimental Evaluation of a QoS-aware Application Server. 259-262 - Danilo Ardagna, Marco Trubian, Li Zhang:
SLA Based Profit Optimization in Multi-tier Systems. 263-266 - Bhavin Gandhi, Sameer Tilak, Michael J. Lewis, Nael B. Abu-Ghazaleh:
Controlling the Coverage of Grid Information Dissemination Protocols. 267-270 - Michel Charpentier, Gérard Padiou, Philippe Quéinnec:
Cooperative Mobile Agents to Gather Global Information. 271-274 - Peng-Jun Wan, Chih-Wei Yi:
Coverage by Randomly Deployed Wireless Sensor Networks. 275-278 - Patrick Th. Eugster, Benoît Garbinato, Adrian Holzer:
Location-based Publish/Subscribe. 279-282 - Alexandros G. Fragkiadakis, David J. Parish:
Performance Evaluation of a PC-based Active Router and Analysis of an Active Secure FTP Application. 283-286
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.