NCA B

50 papers

YearTitle / Authors
20142014 IEEE 13th International Symposium on Network Computing and Applications, NCA 2014, Cambridge, MA, USA, 21-23 August, 2014
2014A Coded Shared Atomic Memory Algorithm for Message Passing Architectures.
Viveck R. Cadambe, Nancy A. Lynch, Muriel Médard, Peter M. Musial
2014A Deadline Aware DTN Approach Based on Epidemic Routing.
Chung-Jae Lee, Ki-Il Kim
2014A Low-Complexity Fault-Tolerant Document Storage System.
Dishelt Francisco Torres Paz, Jorge Antonio Perez Espinoza, Jose Juan Garcia-Hernandez
2014A New Solution to Perform Automatic Meter Reading Using Unmanned Aerial Vehicle.
José Rodrigues Torres Neto, Daniel Ludovico Guidoni, Leandro A. Villas
2014A Novel Approach for Dual-Direction Load Balancing and Storage Optimization in Cloud Services.
Klaithem Al Nuaimi, Nader Mohamed, Mariam Al Nuaimi, Jameela Al-Jaroodi
2014A Probabilistic Greedy Algorithm with Forced Assignment and Compression for Fast Frequency Assignment in Cellular Network.
Subhankar Ghosal, Sasthi C. Ghosh
2014A Resilient Hierarchical Distributed Loop Self-Scheduling Scheme for Cloud Systems.
Yiming Han, Anthony T. Chronopoulos
2014A Sharing-Aware Greedy Algorithm for Virtual Machine Maximization.
Safraz Rampersaud, Daniel Grosu
2014ADD: A Data Dissemination Solution for Highly Dynamic Highway Environments.
Allan Mariano de Souza, Guilherme Maia, Leandro A. Villas
2014An Adaptive Approach to Opportunistic Data Forwarding in Underwater Acoustic Sensor Networks.
Nusrat Nowsheen, Gour C. Karmakar, Joarder Kamruzzaman
2014An Adaptive Peer-to-Peer Overlay Scheme for Location-Based Services.
Giacomo Brambilla, Marco Picone, Michele Amoretti, Francesco Zanichelli
2014An Advance Reservation Mechanism to Enhance Throughput in an Opportunistic High Performance Computing Environment.
Eliza Gomes, Mário Antônio Ribeiro Dantas
2014An Evolutionary Game Theoretic Approach for Configuring Cloud-Integrated Body Sensor Networks.
Yi Cheng Ren, Junichi Suzuki, Dung H. Phan, Shingo Omura, Ryuichi Hosoya
2014Based-Agent Distributed Architecture to Manage the Dynamic Multi-hop Ridesharing System.
Sondes Ben Cheikh, Slim Hammadi, Christian Tahon
2014Clustering in WSN Using Node Ranking with Hybrid Nodes Duty-Cycle and Energy Threshold.
Mariam Al Nuaimi, Khaled Shuaib, Klaithem Al Nuaimi
2014Congestion-Aware Adaptive Routing in 2D-Mesh Multicores.
Dimiter Avresky, Fabien Chaix, Michael Nicolaidis
2014Deploying Large-Scale Service Compositions on the Cloud with the CHOReOS Enactment Engine.
Leonardo A. F. Leite, Carlos Eduardo Moreira Dos Santos, Daniel Cordeiro, Marco Aurélio Gerosa, Fabio Kon
2014Does Mobility Matter? An Evaluation Methodology for Opportunistic Apps.
Jesus Friginal, Marc-Olivier Killijian, Roberto Pasqua, Matthieu Roy, Gilles Trédan
2014Dynamic Attribute Based Vehicle Authentication.
Shlomi Dolev, Lukasz Krzywiecki, Nisha Panwar, Michael Segal
2014ETSSDetector: A Tool to Automatically Detect Cross-Site Scripting Vulnerabilities.
Thiago S. Rocha, Eduardo Souto
2014Entropy Adaptive On-Line Compression.
Shlomi Dolev, Sergey Frenkel, Marina Kopeetsky
2014Formal Analysis of Secure Device Pairing Protocols.
Trung Nguyen, Jean Leneutre
2014GPU-Based NSEC3 Hash Breaking.
Matthäus Wander, Lorenz Schwittmann, Christopher Boelmann, Torben Weis
2014GTO: A Broadcast Protocol for Highway Environments over Diverse Traffic Conditions.
Ademar Takeo Akabane, Leandro Aparecido Villas, Edmundo Roberto Mauro Madeira
2014Green Proxy-Based Approaches for BitTorrent.
Sena Efsun Cebeci, Öznur Özkasap, Giuseppe Anastasi
2014Hardware Implementation of Quasigroup Encryption for SCADA Networks.
William Mahoney, Abhishek Parakh, Matthew Battey
2014Health Records Protection in Cloud Environment.
Doan B. Hoang, Lingfeng Chen
2014Immunization against Infection Propagation in Heterogeneous Networks.
Waseem Abbas, Sajal Bhatia, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos
2014Interference Avoidance through Frequency Assignment and Association Control in IEEE 802.11 WLAN.
Babul P. Tewari, Sasthi C. Ghosh
2014Local Search Heuristics for Media Streams Planning with Transcoding.
Jiri Marek, Hana Rudová, Petr Holub
2014Media Streams Planning with Uncertain Link Capacities.
Pavel Troubil, Hana Rudová, Petr Holub
2014On Making Transactional Applications Resilient to Data Corruption Faults.
Mohamed Mohamedin, Roberto Palmieri, Binoy Ravindran
2014On the Effectiveness of NX, SSP, RenewSSP, and ASLR against Stack Buffer Overflows.
Hector Marco-Gisbert, Ismael Ripoll
2014On-Demand Resource Allocation Middleware for Massively Multiplayer Online Games.
André Pessoa Negrão, Miguel Adaixo, Luís Veiga, Paulo Ferreira
2014Optimal Configuration for N-Dimensional Twin Torus Networks.
Francisco J. Andujar, Juan A. Villar, José L. Sánchez, Francisco J. Alfaro, José Duato
2014Orchestration of Energy Efficiency Functionalities for a Sustainable Network Management.
Ana C. Riekstin, Guilherme C. Januario, Bruno Bastos Rodrigues, Viviane T. Nascimento, M. Roxana Pirlea, Tereza Cristina M. B. Carvalho, Catalin Meirosu
2014Parallel Deferred Update Replication.
Leandro Pacheco, Daniele Sciascia, Fernando Pedone
2014RLP: A Community Detection-Based Routing Protocol for Wireless Sensor Networks.
Matheus A. De Paulo, Mariá C. V. Nascimento, Valério Rosset
2014Recovery of Information Lost by the Least Squares Estimation in Real-Time Network Environment.
Hengky Susanto, Byung-Guk Kim
2014Resource Management in Cloud Federation Using XMPP.
Maria Fazio, Antonio Celesti, Massimo Villari, Antonio Puliafito
2014SDN-Based Private Interconnection.
Shlomi Dolev, Shimrit Tzur-David
2014Secure Sensing over Named Data Networking.
Jeff Burke, Paolo Gasti, Naveen Nathan, Gene Tsudik
2014Self-Control Cloud Services.
Tatiana Aubonnet, Noëmie Simoni
2014Solvability-Based Comparison of Failure Detectors.
Srikanth Sastry, Josef Widder
2014Strip Interoperability for Wireless Ad Hoc Routing Protocols.
Marco Antonio To, Gerardo Morales, Stephane Maag
2014Supporting SLA Negotiation for VSDN Based on Similarity and Price Issues.
Rafael Lopes Gomes, Luiz Fernando Bittencourt, Edmundo Roberto Mauro Madeira
2014Time and Location Power Based Malicious Code Detection Techniques for Smartphones.
Bryan Dixon, Shivakant Mishra, Jeannette Pepin
2014Using Virtual Mobile Nodes for Neighbor Detection in Proximity-Based Mobile Applications.
Behnaz Bostanipour, Benoît Garbinato
2014VANets: An Exploratory Evaluation in Vehicular Ad Hoc Network for Urban Environment.
Claudio Correa, Jo Ueyama, Rodolfo Ipolito Meneguette, Leandro Aparecido Villas