| 2005 | A Concentric Multi-ring Overlay for Highly Reliable P2P Networks. Giscard Wepiwé, Plamen L. Simeonov |
| 2005 | A Policy-based Management Framework for Pervasive Systems using Axiomatized Rule-Actions. Chetan Shiva Shankar, Roy H. Campbell |
| 2005 | A Probabilistic Approach for Achieving Fair Bandwidth Allocations in CSFQ. Peng Wang, David L. Mills |
| 2005 | A Wide Area Network Simulation of Single-Round Group Membership Algorithms. Roger Khazan, Sophia Yuditskaya |
| 2005 | A formal framework (Expression + Analysis) for network security. Romain Laborde, François Barrère, Abdelmalek Benzekri |
| 2005 | An Adaptive Reputation-based Trust Framework for Peer-to-Peer Applications. William Sears, Zhen Yu, Yong Guan |
| 2005 | Architectural Issues of JMS Compliant Group Communication. Arnas Kupsys, Richard Ekwall |
| 2005 | Block Migration in Broadcast-based Multiprocessor Architectures. Constantine Katsinis |
| 2005 | C-CORE: Using Communication Cores for High Performance Network Services. Sanjay Kumar, Ada Gavrilovska, Karsten Schwan, Srikanth Sundaragopalan |
| 2005 | Challenges in Mobile Networking and Information Assurance. A. Ghosh |
| 2005 | Controlling the Coverage of Grid Information Dissemination Protocols. Bhavin Gandhi, Sameer Tilak, Michael J. Lewis, Nael B. Abu-Ghazaleh |
| 2005 | Cooperative Mobile Agents to Gather Global Information. Michel Charpentier, Gérard Padiou, Philippe Quéinnec |
| 2005 | Coverage by Randomly Deployed Wireless Sensor Networks. Peng-Jun Wan, Chih-Wei Yi |
| 2005 | Decentralized Schemes for Size Estimation in Large and Dynamic Groups. Dionysios Kostoulas, Dimitrios Psaltoulis, Indranil Gupta, Ken Birman, Alan J. Demers |
| 2005 | Developing a Consistent Domain-Oriented Distributed Object Service. Chryssis Georgiou, Peter M. Musial, Alexander A. Shvartsman |
| 2005 | Dynamic Quorums for DHT-based P2P Networks. Roberto Baldoni, Leonardo Querzoni, Antonino Virgillito, Ricardo Jiménez-Peris, Marta Patiño-Martínez |
| 2005 | Effectiveness of Traffic Camouflaging over Computer Networks. Wei Zhao |
| 2005 | Experimental Evaluation of a QoS-aware Application Server. Giorgia Lodi, Fabio Panzieri, Davide Rossi, Elisa Turrini |
| 2005 | Fourth IEEE International Symposium on Network Computing and Applications (NCA 2005), 27-29 July 2005, Cambridge, MA, USA |
| 2005 | Fourth IEEE International Symposium on Network Computing and Applications - Copyright. |
| 2005 | Fourth IEEE International Symposium on Network Computing and Applications - Title Page. |
| 2005 | Fundamental Network Processor Performance Bounds. Hao Che, Chethan Kumar, Basavaraj Menasinahal |
| 2005 | Hopcount in Application Layer Multicast Schemes. Milena Janic, Novi Ineke, Cempaka Wangi, Xiaoming Zhou, Piet Van Mieghem |
| 2005 | Improving Transaction Server Performance under Heavy Loads with Differentiated Service and Active Network Interfaces. Onur Demir, Kanad Ghose |
| 2005 | LAWN: A Protocol for Remote Authentication overWireless Networks. Arnab Paul, Rajnish Kumar, Umakishore Ramachandran |
| 2005 | Leveraging the Multiprocessing Capabilities of Modern Network Processors for Cryptographic Acceleration. Gunnar Gaubatz, Berk Sunar |
| 2005 | Location-based Publish/Subscribe. Patrick Th. Eugster, Benoît Garbinato, Adrian Holzer |
| 2005 | Message from the NCA 2005 Program Committee. |
| 2005 | Method for Task Migration in Grid Environments. Stephen Frechette, Dimiter R. Avresky |
| 2005 | Multicast in Fat-Tree-Based InfiniBand Networks. Jiazheng Zhou, Xuan-Yi Lin, Chun-Hsien Wu, Yeh-Ching Chung |
| 2005 | NCA 2005 Program Committee. |
| 2005 | NCA 2005 Symposium Referees. |
| 2005 | Networking Aspects in the DPASA Survivability Architecture: An Experience Report. Michael Atighetchi, Paul Rubel, Partha P. Pal, Jennifer Chong, Lyle Sudin |
| 2005 | New Generation Scalable and Dependable Servers. Robert W. Taylor |
| 2005 | On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks. Ye Zhu, Xinwen Fu, Riccardo Bettati |
| 2005 | Opening Address. Tad Elmer |
| 2005 | Performance Evaluation of a PC-based Active Router and Analysis of an Active Secure FTP Application. Alexandros G. Fragkiadakis, David J. Parish |
| 2005 | Protocol Composition Frameworks A Header-Driven Model. Daniel C. Bünzli, Sergio Mena, Uwe Nestmann |
| 2005 | Providing Hard Real-Time Guarantees in Context-Aware Applications: Challenges and Requirements. Malika Boulkenafed, Barbara Hughes, René Meier, Gregory Biegel, Vinny Cahill |
| 2005 | Reducing the Communication Cost via Chain Pattern Scheduling. Florina M. Ciorba, Theodore Andronikos, Ioannis Drositis, George K. Papakonstantinou, Panayotis Tsanakas |
| 2005 | Resilience for the Scalability of Dependability. Jean-Claude Laprie |
| 2005 | SFS-KNOPPIX. Kuniyasu Suzaki, Kengo Iijima, Toshiki Yagi, Hideyuki Tan, Kazuhiro Goto |
| 2005 | SLA Based Profit Optimization in Multi-tier Systems. Danilo Ardagna, Marco Trubian, Li Zhang |
| 2005 | Scalable QoS-Based Event Routing in Publish-Subscribe Systems. Nuno Carvalho, Filipe Araújo, Luís E. T. Rodrigues |
| 2005 | Self-organization in Cooperative Content Distribution Networks. Marc Schiely, Lars Renfer, Pascal Felber |
| 2005 | Slingshot: Time-Critical Multicast for Clustered Applications. Mahesh Balakrishnan, Stefan Pleisch, Ken Birman |
| 2005 | Smart Tunnel Union for NAT Traversal. Tzu-Chi Huang, Ce-Kuen Shieh, Wen-Huang Lai, Yu-Ben Miao |
| 2005 | Supporting Rate-based Control in DiffServ Networks. Chin-Ling Chen, Jia-Chun Yu |
| 2005 | TCP New Vegas: Improving the Performance of TCP Vegas Over High Latency Links. Joel Sing, Ben Soh |
| 2005 | Using Residual Times to Meet Deadlines in M/G/C Queues. Sarah Tasneem, Lester Lipsky, Reda A. Ammar, Howard A. Sholl |
| 2005 | pMIX: Untraceability for Small Hiding Groups. Carlos Aguilar Melchor, Yves Deswarte |