


default search action
32nd ICDCS 2012: Macau, China
- 2012 IEEE 32nd International Conference on Distributed Computing Systems, Macau, China, June 18-21, 2012. IEEE Computer Society 2012, ISBN 978-1-4577-0295-2
- Rahul Singh, Prashant J. Shenoy
, K. K. Ramakrishnan
, Rahul Kelkar, Harrick M. Vin:
eTransform: Transforming Enterprise Data Centers by Automated Consolidation. 1-11 - Xitao Wen, Kai Chen, Yan Chen, Yongqiang Liu, Yong Xia, Chengchen Hu:
VirtualKnotter: Online Virtual Machine Shuffling for Congestion Resolving in Virtualized Datacenter. 12-21 - Shaolei Ren
, Yuxiong He, Fei Xu:
Provably-Efficient Job Scheduling for Energy and Fairness in Geographically Distributed Data Centers. 22-31 - Xin Wu, Xiaowei Yang:
DARD: Distributed Adaptive Routing for Datacenter Networks. 32-41 - Wenping Liu, Hongbo Jiang, Xiang Bai, Guang Tan, Chonggang Wang, Wenyu Liu
, Kechao Cai:
Skeleton Extraction from Incomplete Boundaries in Sensor Networks Based on Distance Transform. 42-51 - Wenping Liu, Hongbo Jiang, Chonggang Wang, Chang Liu, Yang Yang, Wenyu Liu
, Bo Li:
Connectivity-based and Boundary-Free Skeleton Extraction in Sensor Networks. 52-61 - Ze Li, Haiying Shen:
A Kautz-based Real-Time and Energy-Efficient Wireless Sensor and Actuator Network. 62-71 - Desheng Zhang, Tian He, Fan Ye, Raghu K. Ganti, Hui Lei:
EQS: Neighbor Discovery and Rendezvous Maintenance with Extended Quorum System for Mobile Sensing Applications. 72-81 - Ahsan Arefin, Zixia Huang, Klara Nahrstedt, Pooja Agarwal:
4D TeleCast: Towards Large Scale Multi-site and Multi-view Dissemination of 3DTI Contents. 82-91 - Xinyu Yang, Jie Lin, Paul Moulema, Wei Yu
, Xinwen Fu
, Wei Zhao
:
A Novel En-route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Networked Systems. 92-101 - Jim Dowling, Amir Hossein Payberah
:
Shuffling with a Croupier: Nat-Aware Peer-Sampling. 102-111 - Michael Gray, Peter Peterson, Peter L. Reiher:
Scaling Down Off-the-Shelf Data Compression: Backwards-Compatible Fine-Grain Mixing. 112-121 - Siyuan Liu, Lei Kang, Lei Chen
, Lionel M. Ni:
Distributed Incomplete Pattern Matching via a Novel Weighted Bloom Filter. 122-131 - Wei Gao, Guohong Cao, Mudhakar Srivatsa, Arun Iyengar:
Distributed Maintenance of Cache Freshness in Opportunistic Mobile Networks. 132-141 - Binh Han, Ling Liu, Edward Omiecinski:
NEAT: Road Network Aware Trajectory Clustering. 142-151 - Zhu Ren, Peng Cheng, Jiming Chen, David K. Y. Yau, Youxian Sun:
Dynamic Activation Policies for Event Capture with Rechargeable Sensors. 152-162 - Debraj De, Wen-Zhan Song
, Mingsen Xu, Chengliang Wang, Diane J. Cook, Xiaoming Huo:
FindingHuMo: Real-Time Tracking of Motion Trajectories from Anonymous Binary Sensing in Smart Environments. 163-172 - Chi-Yao Hong, Matthew Caesar
, Nick G. Duffield
, Jia Wang:
Tiresias: Online Anomaly Detection for Hierarchical Operational Network Data. 173-182 - Alexandre Maurer, Sébastien Tixeuil:
Limiting Byzantine Influence in Multihop Asynchronous Networks. 183-192 - Hein Meling, Keith Marzullo, Alessandro Mei
:
When You Don't Trust Clients: Byzantine Proposer Fast Paxos. 193-202 - Rahim Delaviz, Nazareno Andrade, Johan A. Pouwelse
, Dick H. J. Epema:
SybilRes: A Sybil-resilient Flow-Based Decentralized Reputation Mechanism. 203-213 - Lingjun Li, Xinxin Zhao, Guoliang Xue, Gabriel Silva:
Privacy Preserving Group Ranking. 214-223 - Linke Guo, Chi Zhang, Jinyuan Sun, Yuguang Fang
:
PAAS: A Privacy-Preserving Attribute-Based Authentication System for eHealth Networks. 224-233 - Abhishek Singh, Guido Urdaneta, Maarten van Steen
, Roman Vitenberg:
Robust Overlays for Privacy-Preserving Data Dissemination over a Social Graph. 234-244 - Zhipeng Cai, Shouling Ji, Jing He, Anu G. Bourgeois:
Optimal Distributed Data Collection for Asynchronous Cognitive Radio Networks. 245-254 - Xu Chen, Jianwei Huang:
Game Theoretic Analysis of Distributed Spectrum Sharing with Database. 255-264 - Franck Le, Mudhakar Srivatsa, Arun Iyengar:
Byte Caching in Wireless Networks. 265-274 - Sergio Arévalo
, Antonio Fernández Anta
, Damien Imbs, Ernesto Jiménez
, Michel Raynal:
Failure Detectors in Homonymous Distributed Systems (with an Application to Consensus). 275-284 - Yongmin Tan, Hiep Nguyen, Zhiming Shen, Xiaohui Gu, Chitra Venkatramani, Deepak Rajan:
PREPARE: Predictive Performance Anomaly Prevention for Virtualized Cloud Systems. 285-294 - Qiang Zheng, Guohong Cao, Tom La Porta, Ananthram Swami:
Optimal Recovery from Large-Scale Failures in IP Networks. 295-304 - Enhua Tan, Lei Guo, Songqing Chen, Xiaodong Zhang, Yihong Eric Zhao:
Spammer Behavior Analysis and Detection in User Generated Content on Social Networks. 305-314 - Jeffrey Seibert, Sheila Becker, Cristina Nita-Rotaru, Radu State:
Securing Virtual Coordinates by Enforcing Physical Laws. 315-324 - Qiyan Wang, Nikita Borisov
:
Octopus: A Secure and Anonymous DHT Lookup. 325-334 - Kaiwen Zhang, Vinod Muthusamy, Hans-Arno Jacobsen:
Total Order in Content-Based Publish/Subscribe Systems. 335-344 - Reza Sherafat Kazemzadeh, Hans-Arno Jacobsen:
Publiy+: A Peer-Assisted Publish/Subscribe Service for Timely Dissemination of Bulk Content. 345-354 - Jiachen Chen, Mayutan Arumaithurai
, Xiaoming Fu
, K. K. Ramakrishnan
:
G-COPSS: A Content Centric Communication Infrastructure for Gaming Applications. 355-365 - Yong Cui, Xin Wang, Hongyi Wang, Guangjin Pan, Yining Wang:
FMTCP: A Fountain Code-Based Multipath Transmission Control Protocol. 366-375 - Shan Chu, Xin Wang, Minming Li
:
Enforcing High-Performance Operation of Multi-hop Wireless Networks with MIMO Relays. 376-385 - Junliang Liu, Zheng Yang, Ivan Stojmenovic:
Receiver Consensus: On-time Warning Delivery for Vehicular Ad-hoc Networks. 386-395 - Shen Li, Hieu Khac Le, Nam Pham, Jin Heo, Tarek F. Abdelzaher:
Joint Optimization of Computing and Cooling Energy: Analytic Model and a Machine Room Case Study. 396-405 - Liting Hu, Kyung Dong Ryu, Dilma Da Silva, Karsten Schwan:
v-Bundle: Flexible Group Resource Offerings in Clouds. 406-415 - Jianguo Yao, Xue Liu, Wenbo He
, Ashikur Rahman
:
Dynamic Control of Electricity Cost with Power Demand Smoothing and Peak Shaving for Distributed Internet Data Centers. 416-424 - Wei Wang
, Baochun Li, Ben Liang
:
Towards Optimal Capacity Segmentation with Hybrid Cloud Pricing. 425-434 - Ken C. K. Lee, Kanchan Bankar, Baihua Zheng
, Chi-Yin Chow
, Honggang Wang
:
Dash: A Novel Search Engine for Database-Generated Dynamic Web Pages. 435-444 - Weixiong Rao, Lei Chen
, Pan Hui, Sasu Tarkoma
:
MOVE: A Large Scale Keyword-Based Content Filtering and Dissemination System. 445-454 - Sebastiano Peluso, Pedro Ruivo, Paolo Romano
, Francesco Quaglia, Luís E. T. Rodrigues:
When Scalability Meets Consistency: Genuine Multiversion Update-Serializable Partial Data Replication. 455-465 - Ahmed Eldawy
, Rohit Khandekar, Kun-Lung Wu:
Clustering Streaming Graphs. 466-475 - Ajoy Kumar Datta, Lawrence L. Larmore, Stéphane Devismes
, Karel Heurtefeux
, Yvan Rivierre:
Competitive Self-Stabilizing k-Clustering. 476-485 - Hyun Chul Chung, Saira Viqar, Jennifer L. Welch:
Neighbor Knowledge of Mobile Nodes in a Road Network. 486-495 - Aly Farahat, Ali Ebnenasir:
Local Reasoning for Global Convergence of Parameterized Rings. 496-505 - Shantanu Das
, Paola Flocchini, Giuseppe Prencipe
, Nicola Santoro
, Masafumi Yamashita:
The Power of Lights: Synchronizing Asynchronous Robots Using Visible Bits. 506-515 - Hui Jin, Xi Yang, Xian-He Sun, Ioan Raicu:
ADAPT: Availability-Aware MapReduce Data Placement for Non-dedicated Distributed Computing. 516-525 - Qi Zhang, Quanyan Zhu, Mohamed Faten Zhani
, Raouf Boutaba:
Dynamic Service Placement in Geographically Distributed Clouds. 526-535 - Kan Yang
, Xiaohua Jia
:
Attributed-Based Access Control for Multi-authority Systems in Cloud Storage. 536-545 - Yunus Basagalar, Vassilios Lekakis, Pete Keleher:
Growing Secure Distributed Systems from a Spore. 546-555 - Yibo Wu
, Xinbing Wang:
Achieving Full View Coverage with Randomly-Deployed Heterogeneous Camera Sensors. 556-565 - Feng Li, Jun Luo
, Shi-Qing Xin, Wenping Wang, Ying He
:
LAACAD: Load Balancing k-Area Coverage through Autonomous Deployment in Wireless Sensor Networks. 566-575 - Xiaonan Guo, Dian Zhang, Lionel M. Ni:
Localizing Multiple Objects in an RF-based Dynamic Environment. 576-585 - Young-Woo Kwon
, Eli Tilevich
:
Energy-Efficient and Fault-Tolerant Distributed Mobile Execution. 586-595 - Yuanrui Zhang, Jun Liu, Mahmut T. Kandemir:
Software-Directed Data Access Scheduling for Reducing Disk Energy Consumption. 596-605 - Sungju Huh, Jonghun Yoo, Myungsun Kim, Seongsoo Hong:
Providing Fair Share Scheduling on Multicore Cloud Servers via Virtual Runtime-based Task Migration Algorithm. 606-614 - James Elliott, Kishor Kharbas, David Fiala, Frank Mueller, Kurt B. Ferreira, Christian Engelmann
:
Combining Partial Redundancy and Checkpointing for HPC. 615-626 - Jesús Carretero
, Florin Isaila, Anne-Marie Kermarrec
, François Taïani
, Juan Manuel Tirado:
Geology: Modular Georecommendation in Gossip-Based Social Networks. 637-646 - Xiaohui Liang, Xu Li, Rongxing Lu, Xiaodong Lin, Xuemin (Sherman) Shen
:
SEER: A Secure and Efficient Service Review System for Service-Oriented Mobile Social Networks. 647-656 - Pei-Chun Cheng, Jong Han Park, Keyur Patel, Shane Amante, Lixia Zhang:
Explaining BGP Slow Table Transfers. 657-666 - Ying Zhang, Makan Pourzandi:
Studying Impacts of Prefix Interception Attack by Exploring BGP AS-PATH Prepending. 667-677 - Tong Yang, Ruian Duan, Jianyuan Lu, Shenjiang Zhang, Huichen Dai, Bin Liu:
CLUE: Achieving Fast Update over Compressed Table for Parallel Lookup with Reduced Dynamic Redundancy. 678-687 - Yi Wang, Keqiang He, Huichen Dai, Wei Meng, Junchen Jiang, Bin Liu, Yan Chen:
Scalable Name Lookup in NDN Using Effective Name Component Encoding. 688-697 - Tam Vu, Akash Baid, Yanyong Zhang, Thu D. Nguyen, Junichiro Fukuyama, Richard P. Martin, Dipankar Raychaudhuri:
DMap: A Shared Hosting Scheme for Dynamic Identifier to Locator Mappings in the Global Internet. 698-707 - Xingyu Ma, Chengchen Hu, Kai Chen, Che Zhang, Hongtao Zhang, Kai Zheng, Yan Chen, Xianda Sun:
Error Tolerant Address Configuration for Data Center Networks with Malfunctioning Devices. 708-717

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.