| 2016 | 15th IEEE International Symposium on Network Computing and Applications, NCA 2016, Cambridge, Boston, MA, USA, October 31 - November 2, 2016 Alessandro Pellegrini, Aris Gkoulalas-Divanis, Pierangelo di Sanzo, Dimiter R. Avresky |
| 2016 | A Continuous Enhancement Routing Solution aware of data aggregation for Wireless Sensor Networks. Edson Ticona Zegarra, Rafael Crivellari Saliba Schouery, Flávio Keidi Miyazawa, Leandro A. Villas |
| 2016 | A QoS-aware controller for Apache Storm. Mohammad Reza Hoseiny Farahabady, Hamid R. Dehghani Samani, Yidan Wang, Albert Y. Zomaya, Zahir Tari |
| 2016 | A back-end offload architecture for security of resource-constrained networks. Jiyong Han, Daeyoung Kim |
| 2016 | A comparison of GPU execution time prediction using machine learning and analytical modeling. Marcos Amaris, Raphael Y. de Camargo, Mohamed Dyab, Alfredo Goldman, Denis Trystram |
| 2016 | A distributed self-reconfiguration algorithm for cylindrical lattice-based modular robots. André Naz, Benoît Piranda, Julien Bourgeois, Seth Copen Goldstein |
| 2016 | A hardware and software Web-based environment for Energy Consumption analysis in mobile devices. Sidartha A. L. Carvalho, Rafael N. Lima, Daniel C. Cunha, Abel G. Silva-Filho |
| 2016 | A network service design and deployment process for NFV systems. Sadaf Mustafiz, Francis Palma, Maria Toeroe, Ferhat Khendek |
| 2016 | A scalable peer-to-peer control plane architecture for Software Defined Networks. Kuldip Singh Atwal, Ajay Guleria, Mostafa A. Bassiouni |
| 2016 | A security Policy Query Engine for fully automated resolution of anomalies in firewall configurations. Ahmed Bouhoula, Anis Yazidi |
| 2016 | A user level approach to schedule BoT applications on private clouds. Maicon Anca dos Santos, André Rauber Du Bois, Gerson Geraldo H. Cavalheiro |
| 2016 | An algorithm based on response time and traffic demands to scale containers on a Cloud Computing system. Marcelo Cerqueira de Abranches, Priscila Solís |
| 2016 | An offset based global sleeping schedule for self-organizing wireless sensor networks. Stephanie Imelda Pella, Prakash Veeraraghavan, Somnath Ghosh |
| 2016 | Analysis of the propagation time of a rumour in large-scale distributed systems. Yves Mocquard, Bruno Sericola, Samantha Robert, Emmanuelle Anceaume |
| 2016 | Byzantine reliable broadcast in sparse networks. Sisi Duan, Lucas Nicely, Haibin Zhang |
| 2016 | CMTS: Consensus-based Multi-hop Time Synchronization protocol in wireless sensor networks. Amin Saiah, Chafika Benzaid, Nadjib Badache |
| 2016 | Characterizing GPS outages: Geodesic Dead Reckoning solution for VANETs and ITS. Pedro P. L. L. do Nascimento, Richard W. Pazzi, Daniel L. Guidoni, Leandro A. Villas |
| 2016 | Client-side monitoring techniques for web sites. Ricardo Filipe, Filipe Araújo |
| 2016 | Confidential and authenticated communications in a large fixed-wing UAV swarm. Richard B. Thompson, Preetha Thulasiraman |
| 2016 | Contextual geotracking service of incident markers in disaster search-and-rescue operations. Ev Cheng, Kourtney Meiss, Kendall Park, John Gillis, Dave Weber, Salman Ahmad, Prasad Calyam |
| 2016 | Cost sensitive moving target consensus. Sisi Duan, Yun Li, Karl N. Levitt |
| 2016 | Cost-effective processing for Delay-sensitive applications in Cloud of Things systems. Yucen Nan, Wei Li, Wei Bao, Flávia Coimbra Delicato, Paulo F. Pires, Albert Y. Zomaya |
| 2016 | Cover-ability: Consistent versioning in asynchronous, fail-prone, message-passing environments. Nicolas C. Nicolaou, Antonio Fernández Anta, Chryssis Georgiou |
| 2016 | Crowdsourcing-based architecture for post-disaster geolocation: A comparative performance evaluation. Florent Coriat, Anne Fladenmuller, Luciana Arantes, Olivier Marin |
| 2016 | DARSHANA: Detecting route hijacking for communication confidentiality. Karan Balu, Miguel L. Pardal, Miguel Correia |
| 2016 | Decision-theoretic approach to designing cyber resilient systems. Vineet Mehta, Paul D. Rowe, Gene Lewis, Ashe Magalhaes, Mykel J. Kochenderfer |
| 2016 | Efficient transmission strategy selection algorithm for M2M communications: An evolutionary game approach. Safa Hamdoun, Abderrezak Rachedi, Hamidou Tembine, Yacine Ghamri-Doudane |
| 2016 | Enabling Software-Defined Networking for Wireless Mesh Networks in smart environments. Prithviraj Patil, Akram Hakiri, Yogesh D. Barve, Aniruddha S. Gokhale |
| 2016 | Energy efficient file distribution problem and its applications. Kshitiz Verma, Alberto García-Martínez, Samar Agnihotri |
| 2016 | Enforcement of global security policies in federated cloud networks with virtual network functions. Philippe Massonet, Sébastien Dupont, Arnaud Michot, Anna Levin, Massimo Villari |
| 2016 | Evaluating reliability techniques in the master-worker paradigm. Evgenia Christoforou, Antonio Fernández Anta, Kishori M. Konwar, Nicolas C. Nicolaou |
| 2016 | Evaluation of Distributed Denial of Service threat in the Internet of Things. Luís Alberto Belém Pacheco, João J. C. Gondim, Priscila A. Solís Barreto, Eduardo Alchieri |
| 2016 | Exploiting universal redundancy. Ali Shoker |
| 2016 | Fast hybrid network reconfiguration for large-scale lossless interconnection networks. Evangelos Tasoulas, Ernst Gunnar Gran, Tor Skeie, Bjørn Dag Johnsen |
| 2016 | Feature set tuning in statistical learning network intrusion detection. Arnaldo Gouveia, Miguel Correia |
| 2016 | GeoTrie: A scalable architecture for location-temporal range queries over massive geotagged data sets. Rudyar Cortés, Xavier Bonnaire, Olivier Marin, Luciana Arantes, Pierre Sens |
| 2016 | Heterogeneous resource allocation in Cloud Management. Serdar Kadioglu, Mike Colena, Samir Sebbah |
| 2016 | Keynote: Evolving Systems for Situational Awareness. Tim Strayer |
| 2016 | Label encoding algorithm for MPLS Segment Routing. Rabah Guedrez, Olivier Dugeon, Samer Lahoud, Géraldine Texier |
| 2016 | Leveraging an homomorphic encryption library to implement a coordination service. Eugenio A. Silva, Miguel Correia |
| 2016 | MACHETE: Multi-path communication for security. Diogo Raposo, Miguel L. Pardal, Luís E. T. Rodrigues, Miguel Correia |
| 2016 | MANETs monitoring with a distributed hybrid architecture. Jose Alvarez, Stéphane Maag, Fatiha Zaïdi |
| 2016 | Message from the program chairs. Aris Gkoulalas-Divanis, Alessandro Pellegrini, Pierangelo di Sanzo |
| 2016 | Message from the steering committee and general chairs. D. R. Avresky, Mladen A. Vouk |
| 2016 | Modeling dynamic location update strategies for PCS networks. Chung-Chin Lu, Ruey-Cheng Shyu, Yung-Chung Wang |
| 2016 | Multi-phase proactive cloud scheduling framework based on high level workflow and resource characterization. Nelson Mimura Gonzalez, Tereza Cristina Melo de Brito Carvalho, Charles Christian Miers |
| 2016 | Named Data Networking for tactical communication environments. M. Tamer Refaei, Sean Ha, Zac Cavallero, Creighton Hager |
| 2016 | Neutralizing interest flooding attacks in Named Data Networks using cryptographic route tokens. Aubrey Alston, Tamer Refaei |
| 2016 | NoSQL Undo: Recovering NoSQL databases by undoing operations. David R. Matos, Miguel Correia |
| 2016 | On the privacy-utility tradeoff in participatory sensing systems. Rim Ben Messaoud, Nouha Sghaier, Mohamed Ali Moussa, Yacine Ghamri-Doudane |
| 2016 | On the use of nonlinear methods for low-power CPU frequency prediction based on Android context variables. Sidartha A. L. Carvalho, Daniel C. Cunha, Abel G. Silva-Filho |
| 2016 | Optimal proportion computation with population protocols. Yves Mocquard, Emmanuelle Anceaume, Bruno Sericola |
| 2016 | Peripheral authentication for autonomous vehicles. Shlomi Dolev, Nisha Panwar |
| 2016 | Reducing the latency-tail of short-lived flows: Adding forward error correction in data centers. Klaus-Tycho Foerster, Demian Jaeger, David Stolz, Roger Wattenhofer |
| 2016 | SDAR: Software Defined Intra-Domain Routing in Named Data Networks. Yaoqing Liu, Hitesh Wadekar |
| 2016 | SLA and profit-aware SaaS provisioning through proactive renegotiation. Aya Omezzine, Narjès Bellamine Ben Saoud, Saïd Tazi, Gene Cooperman |
| 2016 | Safety analysis of Bitcoin improvement proposals. Emmanuelle Anceaume, Thibaut Lajoie-Mazenc, Romaric Ludinard, Bruno Sericola |
| 2016 | Secure complex monitoring event processing. Mehdi Bentounsi, Salima Benbernou |
| 2016 | Smart scene management for IoT-based constrained devices using checkpointing. Francois Aissaoui, Gene Cooperman, Thierry Monteil, Saïd Tazi |
| 2016 | Task based load balancing for cloud aware massively Multiplayer Online Games. André Pessoa Negrão, Luís Veiga, Paulo Ferreira |
| 2016 | The Blockchain Anomaly. Christopher Natoli, Vincent Gramoli |
| 2016 | The cardinality-constrained paths problem: Multicast data routing in heterogeneous communication networks. Alvaro Velasquez, Piotr Wojciechowski, K. Subramani, Steven L. Drager, Sumit Kumar Jha |
| 2016 | To route or to secure: Tradeoffs in ICNs over MANETs. Hasanat Kazmi, Hasnain Lakhani, Ashish Gehani, Rashid Tahir, Fareed Zaffar |
| 2016 | Towards designing reliable messaging patterns. Naghmeh Ramezani Ivaki, Nuno Laranjeiro, Filipe Araújo |
| 2016 | Traffic Engineering based on Shortest Path routing algorithms for FTV (Free-Viewpoint Television) applications. Priscila Solís, Henrique Domingues Garcia |
| 2016 | Using NAS Parallel Benchmarks to evaluate HPC performance in clouds. Thiago Kenji Okada, Alfredo Goldman, Gerson Geraldo H. Cavalheiro |
| 2016 | V-Hadoop: Virtualized Hadoop using containers. Srihari Radhakrishnan, Bryan J. Muscedere, Khuzaima Daudjee |
| 2016 | ViTeNA: An SDN-based virtual network embedding algorithm for multi-tenant data centers. Daniel Caixinha, Pradeeban Kathiravelu, Luís Veiga |
| 2016 | vtTLS: A vulnerability-tolerant communication protocol. André Joaquim, Miguel L. Pardal, Miguel Correia |