| 2009 | A Case for Meta-Triggers in Wireless Sensor Networks. Goce Trajcevski, Nikolay Valtchanov, Oliviu Ghica, Peter Scheuermann |
| 2009 | A Collusion-Resistant Distributed Scalar Product Protocol with Application to Privacy-Preserving Computation of Trust. Carlos Aguilar Melchor, Boussad Ait Salem, Philippe Gaborit |
| 2009 | A Distributed Algorithm for Web Content Replication. Sharrukh Zaman, Daniel Grosu |
| 2009 | A New Architecture for Optical Burst Switching Networks Based on Cooperative Control. Nuno M. Garcia, Przemyslaw Lenkiewicz, Mário M. Freire, Paulo P. Monteiro |
| 2009 | A Novel Congestion Control Algorithm for High Performance Bulk Data Transfer. Yongmao Ren, Haina Tang, Jun Li, Hualin Qian |
| 2009 | A Privacy Preserving Intrusion Tolerant Voting Architecture. Soontaree Tanaraksiritavorn, Shivakant Mishra |
| 2009 | A Rapid Tag Identification Method with Two Slots in RFID Systems. Yong Hwan Kim, Sung Soo Kim, Kwang Seon Ahn |
| 2009 | A Rule Based Co-operative Approach for Cell Selection in High Speed Cellular Networks. Joseph S. Gomes |
| 2009 | Adaptive Network Coding for Heterogeneous Peer-to-Peer Streaming Systems. Min Yang, Yuanyuan Yang |
| 2009 | An Experimental Study of Diversity with Off-the-Shelf AntiVirus Engines. Ilir Gashi, Vladimir Stankovic, Corrado Leita, Olivier Thonnard |
| 2009 | Analysis of Round-Robin Implementations of Processor Sharing, Including Overhead. Steve Thompson, Lester Lipsky, Sarah Tasneem, Feng Zhang |
| 2009 | Attribute-Based Prevention of Phishing Attacks. Michael Atighetchi, Partha P. Pal |
| 2009 | Automating Intrusion Response via Virtualization for Realizing Uninterruptible Web Services. Yih Huang, Anup K. Ghosh |
| 2009 | Comparison of Price-Based Static and Dynamic Job Allocation Schemes for Grid Computing Systems. Satish Penmatsa, Anthony T. Chronopoulos |
| 2009 | Customizing Network Functions for High Performance Cloud Computing. Takahiro Miyamoto, Michiaki Hayashi, Hideaki Tanaka |
| 2009 | Detecting Botnets Using Command and Control Traffic. Basil AsSadhan, José M. F. Moura, David E. Lapsley, Christine E. Jones, W. Timothy Strayer |
| 2009 | Digital Investigation of Wormhole Attacks in Wireless Sensor Networks. Bayrem Triki, Slim Rekhis, Noureddine Boudriga |
| 2009 | Efficient Filtering Algorithm for Repeated Queries in DNS Log. Zheng Wang, Xiaodong Lee, Jian Jin, Baoping Yan |
| 2009 | Empirical Study of Tolerating Denial-of-Service Attacks with the Fosel Architecture. Hakem Beitollahi, Geert Deconinck |
| 2009 | Energy-Aware Prefetching for Parallel Disk Systems: Algorithms, Models, and Evaluation. Adam Manzanares, Xiaojun Ruan, Shu Yin, Mais Nijim, Wei Luo, Xiao Qin |
| 2009 | Estimating the Impact of Mobility Models' Parameters on Mobility Metrics in MANETs. Elmano Ramalho Cavalcanti, Marco Aurélio Spohn |
| 2009 | Evaluating Files to Audit for Detecting Intrusions in FileSystem Data. Jesus Molina, Michel Cukier |
| 2009 | FIRST. Michael D. Kelly, Sean J. Geoghegan |
| 2009 | Fast Macro Handover in Hierarchical Mobile IPv6. Sung-hyun Nam, Hyunwoo Hwang, Ju-Hyun Kim, Kyung-Geun Lee |
| 2009 | From Auto-adaptive to Survivable and Self-Regenerative Systems. Michael Atighetchi, Partha P. Pal |
| 2009 | Functional and Performance Analysis of CalRadio 1 Platform. Riccardo Manfrin, Andrea Zanella, Michele Zorzi |
| 2009 | Generic Danger Detection for Mission Continuity. Richard Ford, William H. Allen, Katherine Hoffman, Attila Ondi, Marco M. Carvalho |
| 2009 | GliteVM: How Science and Business May Benefit from Virtualization. Giuseppe Minutoli, Antonio Puliafito |
| 2009 | Improving Virtualized Windows Network Performance by Delegating Network Processing. Younggyun Koh, Calton Pu, Yasushi Shinjo, Hideki Eiraku, Go Saito, Daiyuu Nobori |
| 2009 | Introducing Probability in RFID Reader-to-Reader Anti-collision. Filippo Gandino, Renato Ferrero, Bartolomeo Montrucchio, Maurizio Rebaudengo |
| 2009 | Introducing Virtual Execution Environments for Application Lifecycle Management and SLA-Driven Resource Distribution within Service Providers. Iñigo Goiri, Ferran Julià, Jorge Ejarque, Marc de Palol, Rosa M. Badia, Jordi Guitart, Jordi Torres |
| 2009 | Investigating the Use of Topology Adaptation for Robust Multi-path Transport: A Preliminary Study. Marco Arguedas, Carlos Perez, Marco M. Carvalho, Adrian Granados, Kelli Hoback, Wayne Kraus |
| 2009 | Maintaining Network QoS Across NIC Device Driver Failures Using Virtualization. Michael Le, Andrew Gallagher, Yuval Tamir, Yoshio Turner |
| 2009 | Optimizations of Large Receive Offload in Xen. Fumio Nakanjima, Hitoshi Oi |
| 2009 | Performance Evaluation of Concurrent Multipath Transfer Using SCTP Multihoming in Multihop Wireless Networks. Ilknur Aydin, Chien-Chung Shen |
| 2009 | Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, NCA 2009, July 9-11, 2009, Cambridge, Massachusetts, USA |
| 2009 | Proximity-Aware Distributed Mutual Exclusion for Effective Peer-to-Peer Replica Management. Denvil Smith, Nian-Feng Tzeng |
| 2009 | Quality of Service Specifications: A Semantic Approach. Achilles Colombo Prudêncio, Roberto Willrich, Michel Diaz, Saïd Tazi |
| 2009 | QuoCast: A Resource-Aware Algorithm for Reliable Peer-to-Peer Multicast. Mouna Allani, Benoît Garbinato, Amirhossein Malekpour, Fernando Pedone |
| 2009 | RL-Based Queue Management for QoS Support in Multi-channel Multi-radio Mesh Networks. Yu Zhou, Mira Yun, Timothy Kim, Amrinder Arora, Hyeong-Ah Choi |
| 2009 | Seed Scheduling for Peer-to-Peer Networks. Flavio Esposito, Ibrahim Matta, Pietro Michiardi, Nobuyuki Mitsutake, Damiano Carra |
| 2009 | Serving Handing Over Stations within the Mobile IEEE 802.16 Mesh Mode Context. Neila Krichene, Noureddine Boudriga |
| 2009 | Sharing Private Information Across Distributed Databases. Michael Siegenthaler, Ken Birman |
| 2009 | Simulating Fixed Virtual Nodes for Adapting Wireline Protocols to MANET. Jiang Wu, Nancy D. Griffeth, Nancy A. Lynch, Calvin C. Newport, Ralph E. Droms |
| 2009 | Small Coalitions: Lightweight Collaboration for Efficient P2P Downloads. Ghassan Karame, Mario Cagalj, Srdjan Capkun |
| 2009 | Streamline: An Architecture for Overlay Multicast. Amirhossein Malekpour, Fernando Pedone, Mouna Allani, Benoît Garbinato |
| 2009 | Survivability through Run-Time Software Evolution. Sharon Simmons, Dennis Edwards |
| 2009 | Sustainability and the Office of CyberInfrastructure. Jennifer M. Schopf |
| 2009 | TTEthernet Dataflow Concept. Wilfried Steiner, Günther Bauer, Brendan Hall, Michael Paulitsch, Srivatsan Varadarajan |
| 2009 | TTM Based Security Enhancement for Inter-domain Routing Protocol. Peidong Zhu, Xiangjiang Hu, Huayang Cao, Xiaoqiang Wang |
| 2009 | TinyPairing: Computing Tate Pairing on Sensor Nodes with Higher Speed and Less Memory. Xiaokang Xiong, Duncan S. Wong, Xiaotie Deng |
| 2009 | Towards Improved Overlay Simulation Using Realistic Topologies. Gert Pfeifer, Ryan C. Spring, Christof Fetzer |
| 2009 | Unequal Error Protection (UEP) for Wavelet-Based Wireless 3D Mesh Transmission. Fan Wu, Emmanuel Agu, Clifford Lindsay, Chung-Han Chen |
| 2009 | Volunteer Computing and Desktop Cloud: The Cloud@Home Paradigm. Vincenzo D. Cunsolo, Salvatore Distefano, Antonio Puliafito, Marco Scarpa |
| 2009 | Wireless Transmission Energy Analysis for Interference-Aware and Confidentiality-Enhanced Multipath Routing. Chung-wei Lee |