default search action
31st ICDCS 2011: Minneapolis, Minnesota, USA
- 2011 International Conference on Distributed Computing Systems, ICDCS 2011, Minneapolis, Minnesota, USA, June 20-24, 2011. IEEE Computer Society 2011, ISBN 978-0-7695-4364-2
Data Processing and Management
- Ramya Prabhakar, Sudharshan S. Vazhkudai, Youngjae Kim, Ali Raza Butt, Min Li, Mahmut T. Kandemir:
Provisioning a Multi-tiered Data Staging Area for Extreme-Scale Machines. 1-12 - Jia Zou, Gong Su, Arun Iyengar, Yu Yuan, Yi Ge:
Design and Analysis of a Distributed Multi-leg Stock Trading System. 13-24 - Rubao Lee, Tian Luo, Yin Huai, Fusheng Wang, Yongqiang He, Xiaodong Zhang:
YSmart: Yet Another SQL-to-MapReduce Translator. 25-36
Wireless Networking
- Yuanqing Zheng, Mo Li, Chen Qian:
PET: Probabilistic Estimating Tree for Large-Scale RFID Estimation. 37-46 - Huanzhong Li, Xue Liu, Wenbo He, Jian Li, Wenhua Dou:
End-to-End Delay Analysis in Wireless Network Coding: A Network Calculus-Based Approach. 47-56 - Neeraj Mittal, Yanyan Zeng, S. Venkatesan, R. Chandrasekaran:
Randomized Distributed Algorithms for Neighbor Discovery in Multi-hop Multi-channel Heterogeneous Wireless Networks. 57-66
Power Management
- Giacomo Ghidini, Sajal K. Das:
An Energy-Efficient Markov Chain-Based Randomized Duty Cycling Scheme for Wireless Sensor Networks. 67-76 - Xi Chen, Sunggeun Jin, Daji Qiao:
M-PSM: Mobility-Aware Power Save Mode for IEEE 802.11 WLANs. 77-86 - Zheng Zeng, Yan Gao, P. R. Kumar:
SOFA: A Sleep-Optimal Fair-Attention Scheduler for the Power-Saving Mode of WLANs. 87-98
Peer-to-Peer
- Wenjie Wang, Hyunseok Chang, Adam Goodman, Eric Wucherer, Sugih Jamin:
Meeting the Digital Rights Requirements of Live Broadcast in a Peer-to-Peer Network. 99-108 - Peter Gilbert, Venugopalan Ramasubramanian, Patrick Stuedi, Douglas B. Terry:
Peer-to-Peer Data Replication Meets Delay Tolerant Networking. 109-120 - Sascha Grau, Mathias Fischer, Guenter Schaefer:
On the Dependencies between Source Neighbors in Optimally DoS-stable P2P Streaming Topologies. 121-130
Distributed Systems
- Iñigo Goiri, Kien Le, Jordi Guitart, Jordi Torres, Ricardo Bianchini:
Intelligent Placement of Datacenters for Internet Services. 131-142 - Chadi Kari, Yoo-Ah Kim, Alexander Russell:
Data Migration in Heterogeneous Storage Systems. 143-150 - Wei Gao, Guohong Cao, Arun Iyengar, Mudhakar Srivatsa:
Supporting Cooperative Caching in Disruption Tolerant Networks. 151-161
Communications
- Hanwu Wang, Weijia Jia, Geyong Min:
Effective Channel Exploitation in IEEE 802.16j Networks for Maritime Communications. 162-171 - Jun Huang, Shucheng Liu, Guoliang Xing, Hongwei Zhang, Jianping Wang, Liusheng Huang:
Accuracy-Aware Interference Modeling and Measurement in Wireless Sensor Networks. 172-181 - Xiaoxia Huang, Dianjie Lu, Pan Li, Yuguang Fang:
Coolest Path: Spectrum Mobility Aware Routing Metrics in Cognitive Ad Hoc Networks. 182-191
Algorithms
- Felix Halim, Roland H. C. Yap, Yongzheng Wu:
A MapReduce-Based Maximum-Flow Algorithm for Large Small-World Network Graphs. 192-202 - Lu Zhang, Xueyan Tang:
The Client Assignment Problem for Continuous Distributed Interactive Applications. 203-214 - Julien Clément, Carole Delporte-Gallet, Hugues Fauconnier, Mihaela Sighireanu:
Guidelines for the Verification of Population Protocols. 215-224 - Chen Chen, Roman Vitenberg, Hans-Arno Jacobsen:
Scaling Construction of Low Fan-out Overlays for Topic-Based Publish/Subscribe Systems. 225-236
Multimedia
- Dimitrios Koutsonikolas, Y. Charlie Hu, Chih-Chun Wang, Mary L. Comer, Amr Mohamed:
Efficient Online WiFi Delivery of Layered-Coding Media Using Inter-layer Network Coding. 237-247 - Ruben Torres, Alessandro Finamore, Jin Ryong Kim, Marco Mellia, Maurizio M. Munafò, Sanjay G. Rao:
Dissecting Video Server Selection Strategies in the YouTube CDN. 248-257 - Donglin Hu, Shiwen Mao:
Resource Allocation for Medium Grain Scalable Videos over Femtocell Cognitive Radio Networks. 258-267 - Yu Wu, Chuan Wu, Bo Li, Xuanjia Qiu, Francis C. M. Lau:
CloudMedia: When Cloud on Demand Meets Video on Demand. 268-277
Networkin
- Eric Martin Heien, Derrick Kondo, David P. Anderson:
Correlated Resource Models of Internet End Hosts. 278-287 - Carlee Joe-Wong, Sangtae Ha, Mung Chiang:
Time-Dependent Broadband Pricing: Feasibility and Benefits. 288-298 - Wei-Min Yao, Sonia Fahmy:
Partitioning Network Testbed Experiments. 299-309 - Peng Yang, Wen Luo, Lisong Xu, Jitender S. Deogun, Ying Lu:
TCP Congestion Avoidance Algorithm Identification. 310-321
Fault Tolerance and Dependability
- Leonardo Fialho, Dolores Rexachs, Emilio Luque:
What is Missing in Current Checkpoint Interval Models? 322-332 - Raimondas Sasnauskas, Oscar Soria Dustmann, Benjamin Lucien Kaminski, Klaus Wehrle, Carsten Weise, Stefan Kowalewski:
Scalable Symbolic Execution of Distributed Systems. 333-342 - Louis-Claude Canon, Emmanuel Jeannot, Jon B. Weissman:
A Scheduling and Certification Algorithm for Defeating Collusion in Desktop Grids. 343-352 - Andreas Larsson, Philippas Tsigas:
A Self-stabilizing (k, r)-clustering Algorithm with Multiple Paths for Wireless Ad-hoc Networks. 353-362
Privacy
- Daniele Quercia, Ilias Leontiadis, Liam McNamara, Cecilia Mascolo, Jon Crowcroft:
SpotME If You Can: Randomized Responses for Location Obfuscation on Mobile Phones. 363-372 - Jinyuan Sun, Xiaoyan Zhu, Chi Zhang, Yuguang Fang:
HCPP: Cryptography Based Secure EHR System for Patient Privacy and Emergency Healthcare. 373-382 - Ming Li, Shucheng Yu, Ning Cao, Wenjing Lou:
Authorized Private Keyword Search over Encrypted Data in Cloud Computing. 383-392 - Ning Cao, Zhenyu Yang, Cong Wang, Kui Ren, Wenjing Lou:
Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing. 393-402
Systems
- Shuo Guo, Kyriakos Karenos, Minkyong Kim, Hui Lei, Johnathan M. Reason:
Delay-Cognizant Reliable Delivery for Publish/Subscribe Overlay Networks. 403-412 - Bo Zhao, Byung-Chul Tak, Guohong Cao:
Reducing the Delay and Power Consumption of Web Browsing on Smartphones in 3G Networks. 413-422 - Jerry Chi-Yuan Chou, Jinoh Kim, Doron Rotem:
Energy-Aware Scheduling in Disk Storage Systems. 423-433 - Yuxiong He, Sameh Elnikety, Hongyang Sun:
Tians Scheduling: Using Partial Processing in Best-Effort Applications. 434-445
Middleware
- Yérom-David Bromberg, Paul Grace, Laurent Réveillère:
Starlink: Runtime Interoperability between Heterogeneous Middleware Protocols. 446-455 - Valerio Schiavoni, Etienne Rivière, Pascal Felber:
WHISPER: Middleware for Confidential Communication in Large-Scale Networks. 456-466 - Sapan Bhatia, Andy C. Bavier, Larry L. Peterson, Soner Sevinc:
sfatables: A Firewall-like Policy Engine for Federated Systems. 467-476
Sensor Networking
- Xiao Wang, Xinbing Wang, Jun Zhao:
Impact of Mobility and Heterogeneity on Coverage and Energy Consumption in Wireless Sensor Networks. 477-487 - Shaojie Tang, Xiang-Yang Li, Xingfa Shen, Jianhui Zhang, Guojun Dai, Sajal K. Das:
Cool: On Coverage with Solar-Powered Sensors. 488-496 - Rui Zhang, Yanchao Zhang:
LR-Seluge: Loss-Resilient and Secure Code Dissemination in Wireless Sensor Networks. 497-506
Wireless Security
- Andréa W. Richa, Christian Scheideler, Stefan Schmid, Jin Zhang:
Competitive and Fair Medium Access Despite Reactive Jamming. 507-516 - Hongbo Liu, Zhenhua Liu, Yingying Chen, Wenyuan Xu:
Localizing Multiple Jamming Attackers in Wireless Networks. 517-528 - Rui Zhang, Yanchao Zhang, Xiaoxia Huang:
JR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks. 529-538
Cloud Computing
- Sudarsun Kannan, Ada Gavrilovska, Karsten Schwan:
Cloud4Home - Enhancing Data Services with @Home Clouds. 539-548 - Cong Wang, Kui Ren, Jia Wang, Karthik Mahendra Raje Urs:
Harnessing the Cloud for Securely Solving Large-Scale Systems of Linear Equations. 549-558 - Upendra Sharma, Prashant J. Shenoy, Sambit Sahu, Anees Shaikh:
A Cost-Aware Elasticity Provisioning System for the Cloud. 559-570 - PengCheng Xiong, Zhikui Wang, Simon Malkowski, Qingyang Wang, Deepal Jayasinghe, Calton Pu:
Economical and Robust Provisioning of N-Tier Cloud Workloads: A Multi-level Control Approach. 571-580
Security and Anonymity
- Binbin Chen, Haifeng Yu:
Secure Aggregation with Malicious Node Revocation in Sensor Networks. 581-592 - Fan Zhang, Wenbo He, Xue Liu:
Defending Against Traffic Analysis in Wireless Networks through Traffic Reshaping. 593-602 - Chryssis Georgiou, Seth Gilbert, Dariusz R. Kowalski:
Confidential Gossip. 603-612 - Yong Wang, Daniel Burgener, Aleksandar Kuzmanovic, Gabriel Maciá-Fernández:
Understanding the Network and User-Targeting Properties of Web Advertising Networks. 613-622
Performance
- Tao Tang, Xuejun Yang, Yisong Lin:
Cache Miss Analysis for GPU Programs Based on Stack Distance Profile. 623-634 - Biplob K. Debnath, Sudipta Sengupta, Jin Li, David J. Lilja, David Hung-Chang Du:
BloomFlash: Bloom Filter on Flash-Based Storage. 635-644 - Mohammad Maifi Hasan Khan, Jin Heo, Shen Li, Tarek F. Abdelzaher:
Understanding Vicious Cycles in Server Clusters. 645-654 - Sukhyun Song, Peter J. Keleher, Alan Sussman:
Searching for Bandwidth-Constrained Clusters. 655-664
Fault Tolerance
- Yuriy Brun, George Edwards, Jae Young Bang, Nenad Medvidovic:
Smart Redundancy for Distributed Computation. 665-676 - Bharath Balasubramanian, Vijay K. Garg:
Fused Data Structures for Handling Multiple Faults in Distributed Systems. 677-688 - André Martin, Thomas Knauth, Stephan Creutz, Diogo Becker de Brum, Stefan Weigert, Christof Fetzer, Andrey Brito:
Low-Overhead Fault Tolerance for High-Throughput Data Processing Systems. 689-699 - Eyal Bin, Ofer Biran, Odellia Boni, Erez Hadad, Elliot K. Kolodner, Yosef Moatti, Dean H. Lorenz:
Guaranteeing High Availability Goals for Virtual Machine Placement. 700-709
Security
- Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
Efficient and Private Access to Outsourced Data. 710-719 - Kailas Patil, Xinshu Dong, Xiaolei Li, Zhenkai Liang, Xuxian Jiang:
Towards Fine-Grained Access Control in JavaScript Contexts. 720-729 - Ashish Kundu, Elisa Bertino:
A New Class of Buffer Overflow Attacks. 730-739 - Wenbo He, Xue Liu, Mai Ren:
Location Cheating: A Security Challenge to Location-Based Social Network Services. 740-749
Localization and Tracking
- Dengyuan Wu, Xiuzhen Cheng, Dechang Chen, Wei Cheng, Biao Chen, Wei Zhao:
A Monte Carlo Method for Mobile Target Counting. 750-759 - Bin Xu, Ran Yu, Guodong Sun, Zheng Yang:
Whistle: Synchronization-Free TDOA for Localization. 760-769 - Pengpeng Chen, Ziguo Zhong, Tian He:
Bubble Trace: Mobile Target Tracking under Insufficient Anchor Coverage. 770-779 - Jren-Chit Chin, David K. Y. Yau, Nageswara S. V. Rao:
Efficient and Robust Localization of Multiple Radiation Sources in Complex Environments. 780-789
Publish / Subscribe Systems
- Yaxiong Zhao, Jie Wu:
Towards Approximate Event Processing in a Large-Scale Content-Based Network. 790-799 - Young Yoon, Vinod Muthusamy, Hans-Arno Jacobsen:
Foundations for Highly Available Content-Based Publish/Subscribe Overlays. 800-811 - Alex King Yeung Cheung, Hans-Arno Jacobsen:
Green Resource Allocation Algorithms for Publish/Subscribe Systems. 812-823 - K. R. Jayaram, Patrick Eugster:
Split and Subsume: Subscription Normalization for Effective Content-Based Messaging. 824-835
Routing
- Ke Xu, Hongying Liu, Jiangchuan Liu, Meng Shen:
One More Weight is Enough: Toward the Optimal Traffic Engineering with OSPF. 836-846 - Yanhua Li, Zhi-Li Zhang, Daniel Boley:
The Routing Continuum from Shortest-Path to All-Path: A Unifying Theory. 847-856 - Chen Qian, Simon S. Lam:
Greedy Distance Vector Routing. 857-868 - Varun Khare, Beichuan Zhang:
Making CDN and ISP Routings Symbiotic. 869-878
Sensor and Ubiquitous Computing Applications
- Hanjiang Luo, Kaishun Wu, Zhongwen Guo, Lin Gu, Zhong Yang, Lionel M. Ni:
SID: Ship Intrusion Detection with Wireless Sensor Networks. 879-888 - Zhi Li, Yanmin Zhu, Hongzi Zhu, Minglu Li:
Compressive Sensing Approach to Urban Traffic Sensing. 889-898 - Xiaodong Wang, Xiaorui Wang, Guoliang Xing, Jinzhu Chen, Cheng-Xian Lin, Yixin Chen:
Towards Optimal Sensor Placement for Hot Server Detection in Data Centers. 899-908 - Jin Teng, Boying Zhang, Xinfeng Li, Xiaole Bai, Dong Xuan:
E-Shadow: Lubricating Social Interaction Using Mobile Phones. 909-918
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.