NCA B

55 papers

YearTitle / Authors
2009A Case for Meta-Triggers in Wireless Sensor Networks.
Goce Trajcevski, Nikolay Valtchanov, Oliviu Ghica, Peter Scheuermann
2009A Collusion-Resistant Distributed Scalar Product Protocol with Application to Privacy-Preserving Computation of Trust.
Carlos Aguilar Melchor, Boussad Ait Salem, Philippe Gaborit
2009A Distributed Algorithm for Web Content Replication.
Sharrukh Zaman, Daniel Grosu
2009A New Architecture for Optical Burst Switching Networks Based on Cooperative Control.
Nuno M. Garcia, Przemyslaw Lenkiewicz, Mário M. Freire, Paulo P. Monteiro
2009A Novel Congestion Control Algorithm for High Performance Bulk Data Transfer.
Yongmao Ren, Haina Tang, Jun Li, Hualin Qian
2009A Privacy Preserving Intrusion Tolerant Voting Architecture.
Soontaree Tanaraksiritavorn, Shivakant Mishra
2009A Rapid Tag Identification Method with Two Slots in RFID Systems.
Yong Hwan Kim, Sung Soo Kim, Kwang Seon Ahn
2009A Rule Based Co-operative Approach for Cell Selection in High Speed Cellular Networks.
Joseph S. Gomes
2009Adaptive Network Coding for Heterogeneous Peer-to-Peer Streaming Systems.
Min Yang, Yuanyuan Yang
2009An Experimental Study of Diversity with Off-the-Shelf AntiVirus Engines.
Ilir Gashi, Vladimir Stankovic, Corrado Leita, Olivier Thonnard
2009Analysis of Round-Robin Implementations of Processor Sharing, Including Overhead.
Steve Thompson, Lester Lipsky, Sarah Tasneem, Feng Zhang
2009Attribute-Based Prevention of Phishing Attacks.
Michael Atighetchi, Partha P. Pal
2009Automating Intrusion Response via Virtualization for Realizing Uninterruptible Web Services.
Yih Huang, Anup K. Ghosh
2009Comparison of Price-Based Static and Dynamic Job Allocation Schemes for Grid Computing Systems.
Satish Penmatsa, Anthony T. Chronopoulos
2009Customizing Network Functions for High Performance Cloud Computing.
Takahiro Miyamoto, Michiaki Hayashi, Hideaki Tanaka
2009Detecting Botnets Using Command and Control Traffic.
Basil AsSadhan, José M. F. Moura, David E. Lapsley, Christine E. Jones, W. Timothy Strayer
2009Digital Investigation of Wormhole Attacks in Wireless Sensor Networks.
Bayrem Triki, Slim Rekhis, Noureddine Boudriga
2009Efficient Filtering Algorithm for Repeated Queries in DNS Log.
Zheng Wang, Xiaodong Lee, Jian Jin, Baoping Yan
2009Empirical Study of Tolerating Denial-of-Service Attacks with the Fosel Architecture.
Hakem Beitollahi, Geert Deconinck
2009Energy-Aware Prefetching for Parallel Disk Systems: Algorithms, Models, and Evaluation.
Adam Manzanares, Xiaojun Ruan, Shu Yin, Mais Nijim, Wei Luo, Xiao Qin
2009Estimating the Impact of Mobility Models' Parameters on Mobility Metrics in MANETs.
Elmano Ramalho Cavalcanti, Marco Aurélio Spohn
2009Evaluating Files to Audit for Detecting Intrusions in FileSystem Data.
Jesus Molina, Michel Cukier
2009FIRST.
Michael D. Kelly, Sean J. Geoghegan
2009Fast Macro Handover in Hierarchical Mobile IPv6.
Sung-hyun Nam, Hyunwoo Hwang, Ju-Hyun Kim, Kyung-Geun Lee
2009From Auto-adaptive to Survivable and Self-Regenerative Systems.
Michael Atighetchi, Partha P. Pal
2009Functional and Performance Analysis of CalRadio 1 Platform.
Riccardo Manfrin, Andrea Zanella, Michele Zorzi
2009Generic Danger Detection for Mission Continuity.
Richard Ford, William H. Allen, Katherine Hoffman, Attila Ondi, Marco M. Carvalho
2009GliteVM: How Science and Business May Benefit from Virtualization.
Giuseppe Minutoli, Antonio Puliafito
2009Improving Virtualized Windows Network Performance by Delegating Network Processing.
Younggyun Koh, Calton Pu, Yasushi Shinjo, Hideki Eiraku, Go Saito, Daiyuu Nobori
2009Introducing Probability in RFID Reader-to-Reader Anti-collision.
Filippo Gandino, Renato Ferrero, Bartolomeo Montrucchio, Maurizio Rebaudengo
2009Introducing Virtual Execution Environments for Application Lifecycle Management and SLA-Driven Resource Distribution within Service Providers.
Iñigo Goiri, Ferran Julià, Jorge Ejarque, Marc de Palol, Rosa M. Badia, Jordi Guitart, Jordi Torres
2009Investigating the Use of Topology Adaptation for Robust Multi-path Transport: A Preliminary Study.
Marco Arguedas, Carlos Perez, Marco M. Carvalho, Adrian Granados, Kelli Hoback, Wayne Kraus
2009Maintaining Network QoS Across NIC Device Driver Failures Using Virtualization.
Michael Le, Andrew Gallagher, Yuval Tamir, Yoshio Turner
2009Optimizations of Large Receive Offload in Xen.
Fumio Nakanjima, Hitoshi Oi
2009Performance Evaluation of Concurrent Multipath Transfer Using SCTP Multihoming in Multihop Wireless Networks.
Ilknur Aydin, Chien-Chung Shen
2009Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, NCA 2009, July 9-11, 2009, Cambridge, Massachusetts, USA
2009Proximity-Aware Distributed Mutual Exclusion for Effective Peer-to-Peer Replica Management.
Denvil Smith, Nian-Feng Tzeng
2009Quality of Service Specifications: A Semantic Approach.
Achilles Colombo Prudêncio, Roberto Willrich, Michel Diaz, Saïd Tazi
2009QuoCast: A Resource-Aware Algorithm for Reliable Peer-to-Peer Multicast.
Mouna Allani, Benoît Garbinato, Amirhossein Malekpour, Fernando Pedone
2009RL-Based Queue Management for QoS Support in Multi-channel Multi-radio Mesh Networks.
Yu Zhou, Mira Yun, Timothy Kim, Amrinder Arora, Hyeong-Ah Choi
2009Seed Scheduling for Peer-to-Peer Networks.
Flavio Esposito, Ibrahim Matta, Pietro Michiardi, Nobuyuki Mitsutake, Damiano Carra
2009Serving Handing Over Stations within the Mobile IEEE 802.16 Mesh Mode Context.
Neila Krichene, Noureddine Boudriga
2009Sharing Private Information Across Distributed Databases.
Michael Siegenthaler, Ken Birman
2009Simulating Fixed Virtual Nodes for Adapting Wireline Protocols to MANET.
Jiang Wu, Nancy D. Griffeth, Nancy A. Lynch, Calvin C. Newport, Ralph E. Droms
2009Small Coalitions: Lightweight Collaboration for Efficient P2P Downloads.
Ghassan Karame, Mario Cagalj, Srdjan Capkun
2009Streamline: An Architecture for Overlay Multicast.
Amirhossein Malekpour, Fernando Pedone, Mouna Allani, Benoît Garbinato
2009Survivability through Run-Time Software Evolution.
Sharon Simmons, Dennis Edwards
2009Sustainability and the Office of CyberInfrastructure.
Jennifer M. Schopf
2009TTEthernet Dataflow Concept.
Wilfried Steiner, Günther Bauer, Brendan Hall, Michael Paulitsch, Srivatsan Varadarajan
2009TTM Based Security Enhancement for Inter-domain Routing Protocol.
Peidong Zhu, Xiangjiang Hu, Huayang Cao, Xiaoqiang Wang
2009TinyPairing: Computing Tate Pairing on Sensor Nodes with Higher Speed and Less Memory.
Xiaokang Xiong, Duncan S. Wong, Xiaotie Deng
2009Towards Improved Overlay Simulation Using Realistic Topologies.
Gert Pfeifer, Ryan C. Spring, Christof Fetzer
2009Unequal Error Protection (UEP) for Wavelet-Based Wireless 3D Mesh Transmission.
Fan Wu, Emmanuel Agu, Clifford Lindsay, Chung-Han Chen
2009Volunteer Computing and Desktop Cloud: The Cloud@Home Paradigm.
Vincenzo D. Cunsolo, Salvatore Distefano, Antonio Puliafito, Marco Scarpa
2009Wireless Transmission Energy Analysis for Interference-Aware and Confidentiality-Enhanced Multipath Routing.
Chung-wei Lee