


default search action
15th NCA 2016: Cambridge, MA, USA
- Alessandro Pellegrini, Aris Gkoulalas-Divanis, Pierangelo di Sanzo, Dimiter R. Avresky:

15th IEEE International Symposium on Network Computing and Applications, NCA 2016, Cambridge, Boston, MA, USA, October 31 - November 2, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-3216-7 - D. R. Avresky, Mladen A. Vouk:

Message from the steering committee and general chairs. xiii - Aris Gkoulalas-Divanis, Alessandro Pellegrini

, Pierangelo di Sanzo
:
Message from the program chairs. xiv - Tim Strayer:

Keynote: Evolving Systems for Situational Awareness. xx
Session 1: Systems, Architectures, and Applications
- Florent Coriat, Anne Fladenmuller, Luciana Arantes

, Olivier Marin
:
Crowdsourcing-based architecture for post-disaster geolocation: A comparative performance evaluation. 1-9 - Rudyar Cortés, Xavier Bonnaire, Olivier Marin

, Luciana Arantes, Pierre Sens:
GeoTrie: A scalable architecture for location-temporal range queries over massive geotagged data sets. 10-17 - Pedro P. L. L. do Nascimento, Richard W. Pazzi

, Daniel L. Guidoni, Leandro A. Villas
:
Characterizing GPS outages: Geodesic Dead Reckoning solution for VANETs and ITS. 18-21 - Ev Cheng, Kourtney Meiss, Kendall Park, John Gillis, Dave Weber, Salman Ahmad

, Prasad Calyam:
Contextual geotracking service of incident markers in disaster search-and-rescue operations. 22-26
Session 2: Cloud Computing
- Thiago Kenji Okada, Alfredo Goldman

, Gerson Geraldo H. Cavalheiro:
Using NAS Parallel Benchmarks to evaluate HPC performance in clouds. 27-30 - Maicon Anca dos Santos, André Rauber Du Bois, Gerson Geraldo H. Cavalheiro:

A user level approach to schedule BoT applications on private clouds. 31-34 - Serdar Kadioglu, Mike Colena, Samir Sebbah:

Heterogeneous resource allocation in Cloud Management. 35-38 - Eugenio A. Silva, Miguel Correia

:
Leveraging an homomorphic encryption library to implement a coordination service. 39-42 - Nelson Mimura Gonzalez, Tereza Cristina Melo de Brito Carvalho

, Charles Christian Miers
:
Multi-phase proactive cloud scheduling framework based on high level workflow and resource characterization. 43-47 - André Pessoa Negrão, Luís Veiga

, Paulo Ferreira
:
Task based load balancing for cloud aware massively Multiplayer Online Games. 48-51
Session 3: Network Security I
- Karan Balu, Miguel L. Pardal, Miguel Correia

:
DARSHANA: Detecting route hijacking for communication confidentiality. 52-59 - Diogo Raposo, Miguel L. Pardal, Luís E. T. Rodrigues, Miguel Correia

:
MACHETE: Multi-path communication for security. 60-67 - Arnaldo Gouveia, Miguel Correia

:
Feature set tuning in statistical learning network intrusion detection. 68-75 - Ahmed Bouhoula, Anis Yazidi:

A security Policy Query Engine for fully automated resolution of anomalies in firewall configurations. 76-80 - Philippe Massonet

, Sébastien Dupont, Arnaud Michot, Anna Levin, Massimo Villari
:
Enforcement of global security policies in federated cloud networks with virtual network functions. 81-84 - Aubrey Alston, Tamer Refaei:

Neutralizing interest flooding attacks in Named Data Networks using cryptographic route tokens. 85-88 - Luís Alberto Belém Pacheco, João J. C. Gondim

, Priscila A. Solís Barreto, Eduardo Alchieri:
Evaluation of Distributed Denial of Service threat in the Internet of Things. 89-92
Session 4: Networking
- Edson Ticona Zegarra, Rafael Crivellari Saliba Schouery

, Flávio Keidi Miyazawa, Leandro A. Villas
:
A Continuous Enhancement Routing Solution aware of data aggregation for Wireless Sensor Networks. 93-100 - Evangelos Tasoulas, Ernst Gunnar Gran

, Tor Skeie, Bjørn Dag Johnsen:
Fast hybrid network reconfiguration for large-scale lossless interconnection networks. 101-108 - Stephanie Imelda Pella

, Prakash Veeraraghavan
, Somnath Ghosh:
An offset based global sleeping schedule for self-organizing wireless sensor networks. 109-112 - Rabah Guedrez, Olivier Dugeon, Samer Lahoud

, Géraldine Texier:
Label encoding algorithm for MPLS Segment Routing. 113-117 - M. Tamer Refaei, Sean Ha, Zac Cavallero, Creighton Hager:

Named Data Networking for tactical communication environments. 118-121 - Klaus-Tycho Foerster

, Demian Jaeger, David Stolz, Roger Wattenhofer:
Reducing the latency-tail of short-lived flows: Adding forward error correction in data centers. 122-125 - Alvaro Velasquez, Piotr Wojciechowski

, K. Subramani
, Steven L. Drager, Sumit Kumar Jha
:
The cardinality-constrained paths problem: Multicast data routing in heterogeneous communication networks. 126-130
Session 5: Software-Defined Networks
- Sadaf Mustafiz, Francis Palma, Maria Toeroe, Ferhat Khendek

:
A network service design and deployment process for NFV systems. 131-139 - Daniel Caixinha, Pradeeban Kathiravelu, Luís Veiga

:
ViTeNA: An SDN-based virtual network embedding algorithm for multi-tenant data centers. 140-147 - Kuldip Singh Atwal, Ajay Guleria

, Mostafa A. Bassiouni:
A scalable peer-to-peer control plane architecture for Software Defined Networks. 148-152 - Prithviraj Patil, Akram Hakiri

, Yogesh D. Barve
, Aniruddha S. Gokhale
:
Enabling Software-Defined Networking for Wireless Mesh Networks in smart environments. 153-157 - Yaoqing Liu, Hitesh Wadekar:

SDAR: Software Defined Intra-Domain Routing in Named Data Networks. 158-161
Session 6: Internet of Things
- Yucen Nan, Wei Li, Wei Bao

, Flávia Coimbra Delicato, Paulo F. Pires, Albert Y. Zomaya
:
Cost-effective processing for Delay-sensitive applications in Cloud of Things systems. 162-169 - Francois Aissaoui

, Gene Cooperman, Thierry Monteil, Saïd Tazi:
Smart scene management for IoT-based constrained devices using checkpointing. 170-174
Session 7: Fault Tolerance
- Sisi Duan, Lucas Nicely, Haibin Zhang:

Byzantine reliable broadcast in sparse networks. 175-182 - Evgenia Christoforou, Antonio Fernández Anta, Kishori M. Konwar, Nicolas C. Nicolaou:

Evaluating reliability techniques in the master-worker paradigm. 183-190 - David R. Matos

, Miguel Correia
:
NoSQL Undo: Recovering NoSQL databases by undoing operations. 191-198 - Ali Shoker

:
Exploiting universal redundancy. 199-203 - Naghmeh Ramezani Ivaki

, Nuno Laranjeiro
, Filipe Araújo
:
Towards designing reliable messaging patterns. 204-207 - Priscila Solís

, Henrique Domingues Garcia
:
Traffic Engineering based on Shortest Path routing algorithms for FTV (Free-Viewpoint Television) applications. 208-211 - André Joaquim, Miguel L. Pardal, Miguel Correia

:
vtTLS: A vulnerability-tolerant communication protocol. 212-215
Session 8: Distributed Computing I and Energy Efficiency
- Yves Mocquard, Emmanuelle Anceaume, Bruno Sericola:

Optimal proportion computation with population protocols. 216-223 - Nicolas C. Nicolaou, Antonio Fernández Anta

, Chryssis Georgiou:
Cover-ability: Consistent versioning in asynchronous, fail-prone, message-passing environments. 224-231 - Amin Saiah, Chafika Benzaid

, Nadjib Badache:
CMTS: Consensus-based Multi-hop Time Synchronization protocol in wireless sensor networks. 232-236 - Srihari Radhakrishnan, Bryan J. Muscedere, Khuzaima Daudjee:

V-Hadoop: Virtualized Hadoop using containers. 237-241 - Sidartha A. L. Carvalho, Rafael N. Lima, Daniel C. Cunha, Abel G. Silva-Filho:

A hardware and software Web-based environment for Energy Consumption analysis in mobile devices. 242-245 - Kshitiz Verma, Alberto García-Martínez

, Samar Agnihotri:
Energy efficient file distribution problem and its applications. 246-249 - Sidartha A. L. Carvalho, Daniel C. Cunha, Abel G. Silva-Filho:

On the use of nonlinear methods for low-power CPU frequency prediction based on Android context variables. 250-253
Session 9: Distributed Computing II
- André Naz, Benoît Piranda, Julien Bourgeois, Seth Copen Goldstein:

A distributed self-reconfiguration algorithm for cylindrical lattice-based modular robots. 254-263 - Yves Mocquard, Bruno Sericola, Samantha Robert, Emmanuelle Anceaume:

Analysis of the propagation time of a rumour in large-scale distributed systems. 264-271 - Sisi Duan, Yun Li, Karl N. Levitt:

Cost sensitive moving target consensus. 272-281
Session 10: Mobile Computing and Security
- Shlomi Dolev

, Nisha Panwar
:
Peripheral authentication for autonomous vehicles. 282-285 - Safa Hamdoun, Abderrezak Rachedi

, Hamidou Tembine
, Yacine Ghamri-Doudane:
Efficient transmission strategy selection algorithm for M2M communications: An evolutionary game approach. 286-293 - Rim Ben Messaoud, Nouha Sghaier, Mohamed Ali Moussa, Yacine Ghamri-Doudane:

On the privacy-utility tradeoff in participatory sensing systems. 294-301 - Vineet Mehta, Paul D. Rowe, Gene Lewis, Ashe Magalhaes, Mykel J. Kochenderfer:

Decision-theoretic approach to designing cyber resilient systems. 302-309 - Christopher Natoli, Vincent Gramoli

:
The Blockchain Anomaly. 310-317 - Emmanuelle Anceaume, Thibaut Lajoie-Mazenc, Romaric Ludinard

, Bruno Sericola:
Safety analysis of Bitcoin improvement proposals. 318-325
Session 11: Performance, QoS, and Monitoring
- Marcos Amaris

, Raphael Y. de Camargo, Mohamed Dyab, Alfredo Goldman
, Denis Trystram:
A comparison of GPU execution time prediction using machine learning and analytical modeling. 326-333 - Mohammad Reza Hoseiny Farahabady

, Hamid R. Dehghani Samani, Yidan Wang, Albert Y. Zomaya
, Zahir Tari
:
A QoS-aware controller for Apache Storm. 334-342 - Marcelo Cerqueira de Abranches, Priscila Solís

:
An algorithm based on response time and traffic demands to scale containers on a Cloud Computing system. 343-350 - Aya Omezzine, Narjès Bellamine Ben Saoud

, Saïd Tazi, Gene Cooperman:
SLA and profit-aware SaaS provisioning through proactive renegotiation. 351-358 - Chung-Chin Lu, Ruey-Cheng Shyu, Yung-Chung Wang:

Modeling dynamic location update strategies for PCS networks. 359-362 - Ricardo Filipe

, Filipe Araújo
:
Client-side monitoring techniques for web sites. 363-366
Session 12: Network Security II
- Hasanat Kazmi, Hasnain Lakhani, Ashish Gehani, Rashid Tahir

, Fareed Zaffar:
To route or to secure: Tradeoffs in ICNs over MANETs. 367-374 - Richard B. Thompson, Preetha Thulasiraman:

Confidential and authenticated communications in a large fixed-wing UAV swarm. 375-382 - Jiyong Han, Daeyoung Kim:

A back-end offload architecture for security of resource-constrained networks. 383-387 - Jose Alvarez, Stéphane Maag, Fatiha Zaïdi:

MANETs monitoring with a distributed hybrid architecture. 388-391 - Mehdi Bentounsi, Salima Benbernou:

Secure complex monitoring event processing. 392-395

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














