default search action
15th NCA 2016: Cambridge, MA, USA
- Alessandro Pellegrini, Aris Gkoulalas-Divanis, Pierangelo di Sanzo, Dimiter R. Avresky:
15th IEEE International Symposium on Network Computing and Applications, NCA 2016, Cambridge, Boston, MA, USA, October 31 - November 2, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-3216-7 - D. R. Avresky, Mladen A. Vouk:
Message from the steering committee and general chairs. xiii - Aris Gkoulalas-Divanis, Alessandro Pellegrini, Pierangelo di Sanzo:
Message from the program chairs. xiv - Tim Strayer:
Keynote: Evolving Systems for Situational Awareness. xx
Session 1: Systems, Architectures, and Applications
- Florent Coriat, Anne Fladenmuller, Luciana Arantes, Olivier Marin:
Crowdsourcing-based architecture for post-disaster geolocation: A comparative performance evaluation. 1-9 - Rudyar Cortés, Xavier Bonnaire, Olivier Marin, Luciana Arantes, Pierre Sens:
GeoTrie: A scalable architecture for location-temporal range queries over massive geotagged data sets. 10-17 - Pedro P. L. L. do Nascimento, Richard W. Pazzi, Daniel L. Guidoni, Leandro A. Villas:
Characterizing GPS outages: Geodesic Dead Reckoning solution for VANETs and ITS. 18-21 - Ev Cheng, Kourtney Meiss, Kendall Park, John Gillis, Dave Weber, Salman Ahmad, Prasad Calyam:
Contextual geotracking service of incident markers in disaster search-and-rescue operations. 22-26
Session 2: Cloud Computing
- Thiago Kenji Okada, Alfredo Goldman, Gerson Geraldo H. Cavalheiro:
Using NAS Parallel Benchmarks to evaluate HPC performance in clouds. 27-30 - Maicon Anca dos Santos, André Rauber Du Bois, Gerson Geraldo H. Cavalheiro:
A user level approach to schedule BoT applications on private clouds. 31-34 - Serdar Kadioglu, Mike Colena, Samir Sebbah:
Heterogeneous resource allocation in Cloud Management. 35-38 - Eugenio A. Silva, Miguel Correia:
Leveraging an homomorphic encryption library to implement a coordination service. 39-42 - Nelson Mimura Gonzalez, Tereza Cristina Melo de Brito Carvalho, Charles Christian Miers:
Multi-phase proactive cloud scheduling framework based on high level workflow and resource characterization. 43-47 - André Pessoa Negrão, Luís Veiga, Paulo Ferreira:
Task based load balancing for cloud aware massively Multiplayer Online Games. 48-51
Session 3: Network Security I
- Karan Balu, Miguel L. Pardal, Miguel Correia:
DARSHANA: Detecting route hijacking for communication confidentiality. 52-59 - Diogo Raposo, Miguel L. Pardal, Luís E. T. Rodrigues, Miguel Correia:
MACHETE: Multi-path communication for security. 60-67 - Arnaldo Gouveia, Miguel Correia:
Feature set tuning in statistical learning network intrusion detection. 68-75 - Ahmed Bouhoula, Anis Yazidi:
A security Policy Query Engine for fully automated resolution of anomalies in firewall configurations. 76-80 - Philippe Massonet, Sébastien Dupont, Arnaud Michot, Anna Levin, Massimo Villari:
Enforcement of global security policies in federated cloud networks with virtual network functions. 81-84 - Aubrey Alston, Tamer Refaei:
Neutralizing interest flooding attacks in Named Data Networks using cryptographic route tokens. 85-88 - Luís Alberto Belém Pacheco, João J. C. Gondim, Priscila A. Solís Barreto, Eduardo Alchieri:
Evaluation of Distributed Denial of Service threat in the Internet of Things. 89-92
Session 4: Networking
- Edson Ticona Zegarra, Rafael Crivellari Saliba Schouery, Flávio Keidi Miyazawa, Leandro A. Villas:
A Continuous Enhancement Routing Solution aware of data aggregation for Wireless Sensor Networks. 93-100 - Evangelos Tasoulas, Ernst Gunnar Gran, Tor Skeie, Bjørn Dag Johnsen:
Fast hybrid network reconfiguration for large-scale lossless interconnection networks. 101-108 - Stephanie Imelda Pella, Prakash Veeraraghavan, Somnath Ghosh:
An offset based global sleeping schedule for self-organizing wireless sensor networks. 109-112 - Rabah Guedrez, Olivier Dugeon, Samer Lahoud, Géraldine Texier:
Label encoding algorithm for MPLS Segment Routing. 113-117 - M. Tamer Refaei, Sean Ha, Zac Cavallero, Creighton Hager:
Named Data Networking for tactical communication environments. 118-121 - Klaus-Tycho Foerster, Demian Jaeger, David Stolz, Roger Wattenhofer:
Reducing the latency-tail of short-lived flows: Adding forward error correction in data centers. 122-125 - Alvaro Velasquez, Piotr Wojciechowski, K. Subramani, Steven L. Drager, Sumit Kumar Jha:
The cardinality-constrained paths problem: Multicast data routing in heterogeneous communication networks. 126-130
Session 5: Software-Defined Networks
- Sadaf Mustafiz, Francis Palma, Maria Toeroe, Ferhat Khendek:
A network service design and deployment process for NFV systems. 131-139 - Daniel Caixinha, Pradeeban Kathiravelu, Luís Veiga:
ViTeNA: An SDN-based virtual network embedding algorithm for multi-tenant data centers. 140-147 - Kuldip Singh Atwal, Ajay Guleria, Mostafa A. Bassiouni:
A scalable peer-to-peer control plane architecture for Software Defined Networks. 148-152 - Prithviraj Patil, Akram Hakiri, Yogesh D. Barve, Aniruddha S. Gokhale:
Enabling Software-Defined Networking for Wireless Mesh Networks in smart environments. 153-157 - Yaoqing Liu, Hitesh Wadekar:
SDAR: Software Defined Intra-Domain Routing in Named Data Networks. 158-161
Session 6: Internet of Things
- Yucen Nan, Wei Li, Wei Bao, Flávia Coimbra Delicato, Paulo F. Pires, Albert Y. Zomaya:
Cost-effective processing for Delay-sensitive applications in Cloud of Things systems. 162-169 - Francois Aissaoui, Gene Cooperman, Thierry Monteil, Saïd Tazi:
Smart scene management for IoT-based constrained devices using checkpointing. 170-174
Session 7: Fault Tolerance
- Sisi Duan, Lucas Nicely, Haibin Zhang:
Byzantine reliable broadcast in sparse networks. 175-182 - Evgenia Christoforou, Antonio Fernández Anta, Kishori M. Konwar, Nicolas C. Nicolaou:
Evaluating reliability techniques in the master-worker paradigm. 183-190 - David R. Matos, Miguel Correia:
NoSQL Undo: Recovering NoSQL databases by undoing operations. 191-198 - Ali Shoker:
Exploiting universal redundancy. 199-203 - Naghmeh Ramezani Ivaki, Nuno Laranjeiro, Filipe Araújo:
Towards designing reliable messaging patterns. 204-207 - Priscila Solís, Henrique Domingues Garcia:
Traffic Engineering based on Shortest Path routing algorithms for FTV (Free-Viewpoint Television) applications. 208-211 - André Joaquim, Miguel L. Pardal, Miguel Correia:
vtTLS: A vulnerability-tolerant communication protocol. 212-215
Session 8: Distributed Computing I and Energy Efficiency
- Yves Mocquard, Emmanuelle Anceaume, Bruno Sericola:
Optimal proportion computation with population protocols. 216-223 - Nicolas C. Nicolaou, Antonio Fernández Anta, Chryssis Georgiou:
Cover-ability: Consistent versioning in asynchronous, fail-prone, message-passing environments. 224-231 - Amin Saiah, Chafika Benzaid, Nadjib Badache:
CMTS: Consensus-based Multi-hop Time Synchronization protocol in wireless sensor networks. 232-236 - Srihari Radhakrishnan, Bryan J. Muscedere, Khuzaima Daudjee:
V-Hadoop: Virtualized Hadoop using containers. 237-241 - Sidartha A. L. Carvalho, Rafael N. Lima, Daniel C. Cunha, Abel G. Silva-Filho:
A hardware and software Web-based environment for Energy Consumption analysis in mobile devices. 242-245 - Kshitiz Verma, Alberto García-Martínez, Samar Agnihotri:
Energy efficient file distribution problem and its applications. 246-249 - Sidartha A. L. Carvalho, Daniel C. Cunha, Abel G. Silva-Filho:
On the use of nonlinear methods for low-power CPU frequency prediction based on Android context variables. 250-253
Session 9: Distributed Computing II
- André Naz, Benoît Piranda, Julien Bourgeois, Seth Copen Goldstein:
A distributed self-reconfiguration algorithm for cylindrical lattice-based modular robots. 254-263 - Yves Mocquard, Bruno Sericola, Samantha Robert, Emmanuelle Anceaume:
Analysis of the propagation time of a rumour in large-scale distributed systems. 264-271 - Sisi Duan, Yun Li, Karl N. Levitt:
Cost sensitive moving target consensus. 272-281
Session 10: Mobile Computing and Security
- Shlomi Dolev, Nisha Panwar:
Peripheral authentication for autonomous vehicles. 282-285 - Safa Hamdoun, Abderrezak Rachedi, Hamidou Tembine, Yacine Ghamri-Doudane:
Efficient transmission strategy selection algorithm for M2M communications: An evolutionary game approach. 286-293 - Rim Ben Messaoud, Nouha Sghaier, Mohamed Ali Moussa, Yacine Ghamri-Doudane:
On the privacy-utility tradeoff in participatory sensing systems. 294-301 - Vineet Mehta, Paul D. Rowe, Gene Lewis, Ashe Magalhaes, Mykel J. Kochenderfer:
Decision-theoretic approach to designing cyber resilient systems. 302-309 - Christopher Natoli, Vincent Gramoli:
The Blockchain Anomaly. 310-317 - Emmanuelle Anceaume, Thibaut Lajoie-Mazenc, Romaric Ludinard, Bruno Sericola:
Safety analysis of Bitcoin improvement proposals. 318-325
Session 11: Performance, QoS, and Monitoring
- Marcos Amaris, Raphael Y. de Camargo, Mohamed Dyab, Alfredo Goldman, Denis Trystram:
A comparison of GPU execution time prediction using machine learning and analytical modeling. 326-333 - Mohammad Reza Hoseiny Farahabady, Hamid R. Dehghani Samani, Yidan Wang, Albert Y. Zomaya, Zahir Tari:
A QoS-aware controller for Apache Storm. 334-342 - Marcelo Cerqueira de Abranches, Priscila Solís:
An algorithm based on response time and traffic demands to scale containers on a Cloud Computing system. 343-350 - Aya Omezzine, Narjès Bellamine Ben Saoud, Saïd Tazi, Gene Cooperman:
SLA and profit-aware SaaS provisioning through proactive renegotiation. 351-358 - Chung-Chin Lu, Ruey-Cheng Shyu, Yung-Chung Wang:
Modeling dynamic location update strategies for PCS networks. 359-362 - Ricardo Filipe, Filipe Araújo:
Client-side monitoring techniques for web sites. 363-366
Session 12: Network Security II
- Hasanat Kazmi, Hasnain Lakhani, Ashish Gehani, Rashid Tahir, Fareed Zaffar:
To route or to secure: Tradeoffs in ICNs over MANETs. 367-374 - Richard B. Thompson, Preetha Thulasiraman:
Confidential and authenticated communications in a large fixed-wing UAV swarm. 375-382 - Jiyong Han, Daeyoung Kim:
A back-end offload architecture for security of resource-constrained networks. 383-387 - Jose Alvarez, Stéphane Maag, Fatiha Zaïdi:
MANETs monitoring with a distributed hybrid architecture. 388-391 - Mehdi Bentounsi, Salima Benbernou:
Secure complex monitoring event processing. 392-395
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.