default search action
ICDCN 2016: Singapore
- Proceedings of the 17th International Conference on Distributed Computing and Networking, Singapore, January 4-7, 2016. ACM 2016, ISBN 978-1-4503-4032-8
Wireless and mobile networks
- Bogdan S. Chlebus, Shailesh Vaya:
Distributed communication in bare-bones wireless networks. 1:1-1:10 - Peter Hegarty, Anders Martinsson, Dmitry Zhelezov:
When can multi-agent rendezvous be executed in time linear in the diameter of a plane configuration? 2:1-2:8 - Md. Majharul Islam Rajib, Asis Nasipuri:
A predictive retransmission scheme for cooperative routing in intermittently connected sensor networks. 3:1-3:10 - Ying Li, Radim Bartos:
Connectedness-aware copy-adaptive routing protocol in intermittently connected networks. 4:1-4:4
Byzantine and fault-tolerant algorithms
- Achour Mostéfaoui, Hamouma Moumen, Michel Raynal:
Modular randomized byzantine k-set agreement in asynchronous message-passing systems. 5:1-5:10 - Silvia Bonomi, Antonella Del Pozzo, Maria Potop-Butucaru:
Tight self-stabilizing mobile byzantine-tolerant atomic register. 6:1-6:10 - Manfred Schwarz, Kyrill Winkler, Ulrich Schmid:
Fast consensus under eventually stabilizing message adversaries. 7:1-7:10 - Christian Fernández-Campusano, Mikel Larrea, Roberto Cortiñas, Michel Raynal:
A communication-efficient leader election algorithm in partially synchronous systems prone to crash-recovery and omission failures. 8:1-8:4
Infrastructure networking
- Ertem Esiner, Anwitaman Datta:
Layered security for storage at the edge: on decentralized multi-factor access control. 9:1-9:10 - Hugo Meyer, José Carlos Sancho, Milica Mrdakovic, Shuping Peng, Dimitra Simeonidou, Wang Miao, Nicola Calabretta:
Scaling architecture-on-demand based optical networks. 10:1-10:10 - Walid Benchaita, Samir Ghamri-Doudane, Sébastien Tixeuil:
Stability and optimization of DNS-based request redirection in CDNs. 11:1-11:10 - Md. Rakibul Haque, Mahmuda Naznin, Rifat Shahriyar:
Distributed low overhead ID in a wireless sensor network. 12:1-12:4
Internet and web applications
- Christian Decker, Jochen Seidel, Roger Wattenhofer:
Bitcoin meets strong consistency. 13:1-13:10 - Binanda Sengupta, Samiran Bag, Sushmita Ruj, Kouichi Sakurai:
Retricoin: Bitcoin based on compact proofs of retrievability. 14:1-14:10 - Paritosh Garg, Kishore Kothapalli:
STIC-D: algorithmic techniques for efficient parallel pagerank computation on real-world graphs. 15:1-15:10 - Anshu S. Anand, R. K. Shyamasundar, Sathya Peri:
Opacity proof for CaPR+ algorithm. 16:1-16:4
Distributed systems and applications
- Faizal Riaz-ud-Din, Robin Doss, Wanlei Zhou:
String matching query verification on cloud-hosted databases. 17:1-17:10 - Cesare Cugnasco, Yolanda Becerra, Jordi Torres, Eduard Ayguadé:
D8-tree: a de-normalized approach for multidimensional data analysis on key-value databases. 18:1-18:10 - Mohammad Roohitavaf, Sandeep S. Kulkarni:
Stabilization and fault-tolerance in presence of unchangeable environment actions. 19:1-19:10 - Swetha P. T. Srinivasan, Umesh Bellur, Ramamurthy Badrinath:
Debunking the myth that tight packing is energy conserving. 20:1-20:4
Best paper session
- Klaus-Tycho Förster, Thomas Luedi, Jochen Seidel, Roger Wattenhofer:
Local checkability, no strings attached. 21:1-21:10 - Yuan He, Krishnan Gopalakrishnan, Eli Gafni:
Group mutual exclusion in linear time and space. 22:1-22:10 - Armando Castañeda, Danny Dolev, Amitabh Trehan:
Compact routing messages in self-healing trees. 23:1-23:10 - Sebastian Brandt, Klaus-Tycho Förster, Roger Wattenhofer:
Augmenting anycast network flows. 24:1-24:10 - Girisha De Silva, Bin Bin Chen, Mun Choon Chan:
Collaborative cellular tail energy reduction: feasibility and fairness. 25:1-25:10 - Vishal Girisagar, Tram Truong Huu, Mohan Gurusamy:
Mapping workflow resource requests for bandwidth efficiency in data centers. 26:1-26:10 - Gil Einziger, Roy Friedman:
Counting with TinyTable: every bit counts! 27:1-27:10
Miscellaneous
- Jurek Czyzowicz, Stefan Dobrev, Konstantinos Georgiou, Evangelos Kranakis, Fraser MacQuarrie:
Evacuating two robots from multiple unknown exits in a circle. 28:1-28:8 - Ravi Kishore, Chiranjeevi Vanarasa, Tushant Jha, Kannan Srinathan:
On perfectly secret message transmission in digraphs tolerating dual failures. 29:1-29:10 - Iosif Salem, Elad Michael Schiller, Marina Papatriantafilou, Philippas Tsigas:
Shared-object system equilibria: delay and throughput analysis. 30:1-30:10 - Anshu Yadav, Varsha Apte:
Dynamic server consolidation algorithms: a profit model for evaluation and an improvement. 31:1-31:4
Applications
- Oliver Jensen, Mohamed G. Gouda, Lili Qiu:
A secure credit card protocol over NFC. 32:1-32:9 - Sonia Soubam, Dipyaman Banerjee, Vinayak S. Naik, Dipanjan Chakraborty:
BluePark: tracking parking and un-parking events in indoor garages. 33:1-33:4 - Souvik Basu, Siuli Roy, DasBit Sipra, Somprakash Bandyopadhyay:
A human mobility based knowledge sharing approach for post disaster need assessment using DTN. 34:1-34:4 - Megha Chaudhary, Aneesh Bansal, Divya Bansal, Bhaskaran Raman, K. K. Ramakrishnan, Naveen Aggarwal:
Finding occupancy in buses using crowdsourced data from smartphones. 35:1-35:4 - Caroline Quéva, Damien Couroussé, Henri-Pierre Charles:
Self-optimisation using runtime code generation for wireless sensor networks. 36:1-36:6 - Debnath Mukherjee, Suman Datta:
Incremental time series algorithms for IoT analytics: an example from autoregression. 37:1-37:6 - Avik Ghose, Arijit Chowdhury, Vivek Chandel, Tanushree Banerjee, Tapas Chakravarty:
An enhanced automated system for evaluating harsh driving using smartphone sensors. 38:1-38:6 - Sayantani Saha, Rounak Das, Suman Datta, Sarmistha Neogy:
A cloud security framework for a data centric WSN application. 39:1-39:6 - Sriyanjana Adhikary, Sankhayan Choudhury, Samiran Chattopadhyay:
A new routing protocol for WBAN to enhance energy consumption and network lifetime. 40:1-40:6 - Raghu K. Ganti, Mudhakar Srivatsa, B. S. Manjunath:
Entity reconciliation in a multi-camera network. 41:1-41:6 - Alice Toniolo, Alun D. Preece, Will Webberley, Timothy J. Norman, Paul Sullivan, Timothy Dropps:
Conversational intelligence analysis. 42:1-42:6 - Rui Zhao, Anna Zhou, Kezhi Mao:
Automatic detection of cyberbullying on social networks based on bullying features. 43:1-43:6 - Bing Tian Dai, Kasthuri Jayarajah, Ee-Peng Lim, Archan Misra, Shriguru Nayak:
A study on Singapore haze. 44:1-44:6 - Philips Kokoh Prasetyo, Palakorn Achananuparp, Ee-Peng Lim:
On analyzing geotagged tweets for location-based patterns. 45:1-45:6 - Ghadeer Neama, Rana W. Alaskar, Mohammad A. Alkandari:
Privacy, security, risk, and trust concerns in e-commerce. 46:1-46:6 - Chafika Benzaid, Abderrahman Boulgheraif, Fatma Zohra Dahmane, Ameer Al-Nemrat, Khaled Zeraoulia:
Intelligent detection of MAC spoofing attack in 802.11 network. 47:1-47:5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.