The proceedings contain 55 papers from the Third ieee international symposium on network computing and applications, NCA 2004. The topics discussed include: intrusion tolerance for Internet applications;exploring the ...
详细信息
ISBN:
(纸本)0769522424
The proceedings contain 55 papers from the Third ieee international symposium on network computing and applications, NCA 2004. The topics discussed include: intrusion tolerance for Internet applications;exploring the network/software boundary: a telecommunication perspective;objective-greedy algorithms for long-term web prefetching;a methodological construction of an efficient sequential consistency protocol;frequent episode rules for Internet anomaly detection;performance analysis of cryptographic protocols on handheld devices;dynamic key messaging for cluster computing;and speculative network processor for quality-of-service-aware protocol processing.
The proceedings contain 42 papers. The topics discussed include: scalability challenges and solutions for emerging networks;constructing ad hoc networks;hardware- and software-based collective communication on the qua...
ISBN:
(纸本)0769514324
The proceedings contain 42 papers. The topics discussed include: scalability challenges and solutions for emerging networks;constructing ad hoc networks;hardware- and software-based collective communication on the quadrics network;a law-abiding peer-to-peer network for free-software distribution;dependability under malicious agreement in N-modular redundancy-on-demand systems;probabilistic semantically reliable multicast;replicated ]database recovery using multicast communication;comparison of the analytic N-burst model with other approximations to telecommunications traffic;optimal utilization of equivalent paths in computer networks with static routing;execution-driven simulation of IP router architectures;using simple remote evaluation to enable efficient application protocols in mobile environments;and data logistics in networkcomputing: the logistical session layer.
The proceedings contain 48 papers. The topics discussed include: quicksilver scalable multicast (QSM);execution patterns in automatic malware and human-centric attacks;a fast and robust content-based publish/subscribe...
详细信息
ISBN:
(纸本)9780769531922
The proceedings contain 48 papers. The topics discussed include: quicksilver scalable multicast (QSM);execution patterns in automatic malware and human-centric attacks;a fast and robust content-based publish/subscribe architecture;network planning optimization for multimedia networks;user profile-based authorization policies for network QoS services;multicoordinated agreement protocols for higher availability;generalizing RDP codes Using the combinatorial method;flexible parameterization of XOR based codes for distributed storage;supporting concurrent task deployment wireless sensor networks;failure, disconnection and partition detection in mobile environment;cross-layer architecture for differentiated services in ad hoc networks;dynamic routing selection for wireless sensor networks;and fair-queued Ethernet for medical applications.
The proceeding contains 45 papers. The topics discussed include: utilizing network processors in distributed enterprise environments;faster event forwarding in a content-based publish-subscribe system through lookup r...
详细信息
ISBN:
(纸本)0769526403
The proceeding contains 45 papers. The topics discussed include: utilizing network processors in distributed enterprise environments;faster event forwarding in a content-based publish-subscribe system through lookup reuse;improved result ranking in P2P file-sharing systems by probing for metadata;identifying known and unknown peer-to-peer traffic;slotted optical burst switching minimum bandwidth egress link scheduler;providing e-transaction guarantees in asynchronous systems with inaccurate failure detection;optimizing cauchy Reed-Solomon codes for fault-tolerant network storage applications;network-aware adaptation techniques for mobile file systems;congestion control for distributed hash tables;comparison of redundancy schemes for distributed storage systems;a primary-backup protocol for in-memory database replication;and a flexible replication mechanism with extended database connection layers.
The proceedings contain 46 papers. The topics discussed include: leveraging grid technology in network-centric environments;optimal content placement for en-route web caching;kernel-based web switches providing conten...
ISBN:
(纸本)0769519385
The proceedings contain 46 papers. The topics discussed include: leveraging grid technology in network-centric environments;optimal content placement for en-route web caching;kernel-based web switches providing content-aware routing;distributed cooperation schemes for document lookup in multiple cache servers;a genetic algorithm for multicast mapping in publish-subscribe systems;adaptive resource selection for grid-enabled network services;scheduling correlated broadcast data considering access frequencies with temporal variations;split-layer video multicast protocol: a new receiver-based rate-adaptation protocol;a scalable protocol for content-based routing in overlay networks;admission control in peer groups;group communication based on standard interfaces;and trigger grouping: a scalable approach to large scale information monitoring.
The proceedings contain 54 papers. The topics discussed include: an experimental study of diversity with off-the-shelf antivirus engines;simulating fixed virtual nodes for adapting wireline protocols to MANET;seed sch...
ISBN:
(纸本)9780769536989
The proceedings contain 54 papers. The topics discussed include: an experimental study of diversity with off-the-shelf antivirus engines;simulating fixed virtual nodes for adapting wireline protocols to MANET;seed scheduling for peer-to-peer networks;proximity-aware distributed mutual exclusion for effective peer-to-peer replica management;towards improved overlay simulation using realistic topologies;analysis of round-robin implementations of processor sharing, including overhead;comparison of price-based static and dynamic job allocation schemes for grid computing systems;a rule based co-operative approach for cell selection in high speed cellular networks;sharing private information across distributed databases;energy-aware prefetching for parallel disk systems;attribute-based prevention of phishing attacks;TTM based security enhancement for inter-domain routing protocol;and introducing probability in RFID reader-to-reader anti-collision.
The proceedings contain 57 papers. The topics discussed include: B-Neck: a distributed and quiescent max-min fair algorithm;probabilistic FIFO ordering in publish/subscribe networks;a hybrid granularity graph for impr...
ISBN:
(纸本)9780769544892
The proceedings contain 57 papers. The topics discussed include: B-Neck: a distributed and quiescent max-min fair algorithm;probabilistic FIFO ordering in publish/subscribe networks;a hybrid granularity graph for improving adaptive application partitioning efficacy in mobile computing environments;byzantine fault-tolerant transaction processing for replicated databases;SCAN: an efficient decoding algorithm for RAID-6 codes;a subset coding based K-anonymization technique to trade-off location privacy and data integrity in participatory sensing systems;validation of security solutions for communication networks: a policy-based approach;using performance, energy consumption, and resilience experimental measures to evaluate routing protocols for ad hoc networks;beyond power proportionality: designing power-lean cloud storage;and predicting software anomalies using machine learning techniques.
The proceedings contain 43 papers. The topics discussed include: approximate analytical models for networked servers subject to MMPP arrival processes;using virtualization to improve software rejuvenation;impact of re...
详细信息
ISBN:
(纸本)0769529224
The proceedings contain 43 papers. The topics discussed include: approximate analytical models for networked servers subject to MMPP arrival processes;using virtualization to improve software rejuvenation;impact of request dispatching granularity in geographically distributed web systems;study of bursty Internet traffic;discovering web workload characteristics through cluster analysis;transparent and accurate traffic load estimation for enterprise wireless LAN;distributed subscription clustering with limited knowledge sharing for content-based publish/subscribe systems;fail-aware publish/subscribe;message diffusion in unstructured overlay networks;exploiting host name locality for reduced stretch P2P routing;security and performance analysis of a secure clustering protocol for sensor networks;and dynamic load balancing for network intrusion detection systems based on distributed architectures.
The proceedings contain 45 papers. The topics discussed include: resilience for the scalability of dependability;effectiveness of traffic camouflaging over computer networks;new generation scalable and dependable serv...
详细信息
ISBN:
(纸本)0769523269
The proceedings contain 45 papers. The topics discussed include: resilience for the scalability of dependability;effectiveness of traffic camouflaging over computer networks;new generation scalable and dependable servers;challenges in mobile networking and information assurance;an adaptive reputation-based trust framework for peer-to-peer applications;decentralized schemes for size estimation in large and dynamic groups;method for task migration in Grid environments;a probabilistic approach for achieving fair bandwidth allocations in CSFQ;supporting rate-based control in diffServ networks;a concentric multi-ring overlay for highly reliable P2P networks;dynamic quorums for DHT-based P2P networks;scalable QoS-based event routing in publish-subscribe systems;self-organization in cooperative content distribution networks;using residual times to meet deadlines in M/G/C queues;and architectural issues of JMS compliant group communication.
暂无评论