default search action
31st ICDCS 2011: Minneapolis, Minnesota, USA - Workshops
- 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 20-24 June 2011, Minneapolis, Minnesota, USA. IEEE Computer Society 2011, ISBN 978-0-7695-4386-4
DCperf 2011 - The First International Workshop on Data Center Performance
Virtualization Management
- Hadi Goudarzi, Massoud Pedram:
Maximizing Profit in Cloud Computing System via Resource Allocation. 1-6 - Xin Sun, Sen Su, Peng Xu, Shuang Chi, Yan Luo:
Multi-dimensional Resource Integrated Scheduling in a Shared Data Center. 7-13 - Jian Tan, Parijat Dube, Xiaoqiao Meng, Li Zhang:
Exploiting Resource Usage Patterns for Better Utilization Prediction. 14-19
Network and I/O
- Yuki Hayashi, Hayato Itsumi, Miki Yamamoto:
Improving Fairness of Quantized Congestion Notification for Data Center Ethernet Networks. 20-25 - Santosh Kulkarni, Prathima Agrawal:
A Probabilistic Approach to Address TCP Incast in Data Center Networks. 26-33 - Giuliano Casale, Stephan Kraft, Diwakar Krishnamurthy:
A Model of Storage I/O Performance Interference in Virtualized Systems. 34-39 - Carey Williamson:
The Edge of Smartness. 40-46
System and Data Managment
- Luis Garcés-Erice, Sean Rooney:
Scaling OS Streaming through Minimizing Cache Redundancy. 47-53 - Xiaoshu Lu, Tao Lu, Matias Remes, Martti Viljanen:
Energy Efficiency Assessment for Data Center in Finland: Case Study. 54-60 - Lei Xu, Jian Hu, Stephen Mkandawire, Hong Jiang:
SHHC: A Scalable Hybrid Hash Cluster for Cloud Backup Services in Data Centers. 61-65 - Fan Ping, Xiaohu Li, Christopher McConnell, Rohini Vabbalareddy, Jeong-Hyon Hwang:
Towards Optimal Data Replication Across Data Centers. 66-71
Performance Modeling and Evaluation
- Christina Delimitrou, Christos Kozyrakis:
Cross-Examination of Datacenter Workload Modeling Techniques. 72-79 - Jeffrey J. Evans, Charles E. Lucas:
PARSE 2.0: A Tool for Parallel Application Run Time Behavior Evaluation. 80-86 - Hamzeh Khazaei, Jelena V. Misic, Vojislav B. Misic:
Modelling of Cloud Computing Centers Using M/G/m Queues. 87-92 - Peer Hasselmeyer, Nico d'Heureuse:
DC-PET: A System for Data Center Performance Estimation. 93-99
SAHNS 2011 - The Third International Workshop on Specialized Ad Hoc Networks and Systems
Paper Session 1
- K. Amjad:
Performance Analysis of DSR Protocol under the Influence of RPGM Model in Mobile Ad-hoc Networks. 100-104 - Daisuke Kasamatsu, Yuta Kawamura, Masahiro Oki, Norihiko Shinomiya:
Broadcasting Method Based on Topology Control for Fault-Tolerant MANET. 105-110 - Xiaoguang Li, Jie Wu:
Fine-Grained Localization with Pairwise Nodes Coverage. 111-117
Keynote Address
- J. J. Garcia-Luna-Aceves:
Scale-free Networking without Routing Tables. 118
Paper Session 2
- Matthew Holiday, Neeraj Mittal, Subbarayan Venkatesan:
Secure Location Verification with Randomly-Selected Base Stations. 119-122
SIMPLEX 2011 - The Third Annual Workshop on Simplifying Complex Networks for Practitioners
Social Networks Analysis
- Tianyi Wang, Yang Chen, Zengbin Zhang, Tianyin Xu, Long Jin, Pan Hui, Beixing Deng, Xing Li:
Understanding Graph Sampling Algorithms for Social Network Analysis. 123-128 - Khanh Nguyen, Cuong Pham, Duc A. Tran, Feng Zhang:
Preserving Social Locality in Data Replication for Online Social Networks. 129-133
Network Structures
- Enrico Gregori, Luciano Lenzini, Chiara Orsini:
k-clique Communities in the Internet AS-level Topology Graph. 134-139 - Mehmet Burak Akgün, Mehmet Hadi Gunes:
Link-Level Network Topology Generation. 140-145
Network Influence and Robustness
- Gyan Ranjan, Zhi-Li Zhang:
A Geometric Approach to Robustness in Complex Networks. 146-153 - Abedelaziz Mohaisen, Huy Tran, Nicholas Hopper, Yongdae Kim:
Understanding Social Networks Properties for Trustworthy Computing. 154-159 - Zaixin Lu, Wei Zhang, Weili Wu, Bin Fu, Ding-Zhu Du:
Approximation and Inapproximation for the Influence Maximization Problem in Social Networks under Deterministic Linear Threshold Model. 160-165 - Ville Satopaa, Jeannie R. Albrecht, David E. Irwin, Barath Raghavan:
Finding a "Kneedle" in a Haystack: Detecting Knee Points in System Behavior. 166-171
SN 2011 - The Fourth International Workshop on Sensor Networks
- F. Javier Atero, Juan J. Vinagre, Eduardo Morgado, Mark Richard Wilby:
A Low Energy and Adaptive Architecture for Efficient Routing and Robust Mobility Management in Wireless Sensor Networks. 172-181 - Bilal Abu Bakr, Leszek Lilien:
A Quantitative Comparison of Energy Consumption and WSN Lifetime for LEACH and LEACH-SM. 182-191 - Ataul Bari, Subir Bandyopadhyay, Arunita Jaekel:
Localized Energy-Aware Fault Management in Relay Based Sensor Networks. 192-197 - Hai Van Luu, Xueyan Tang:
An Efficient Multi-path Data Collection Scheme in Wireless Sensor Networks. 198-207 - Andrew Goodney, D. Negandhi, K. Joshi, Young H. Cho:
Marina-Scale Water Temperature Sensing in Real Time Using Microtomography. 208-217 - Amulya Ratna Swain, R. C. Hansdah:
A Weighted Average Based External Clock Synchronization Protocol for Wireless Sensor Networks. 218-229 - Yi-Tao Wang, Rajive L. Bagrodia:
SenSec: A Scalable and Accurate Framework for Wireless Sensor Network Security Evaluation. 230-239 - Xiuchao Wu, Kenneth N. Brown, Cormac J. Sreenan:
Exploiting Rush Hours for Energy-Efficient Contact Probing in Opportunistic Data Collection. 240-247
SPCC 2011 - The Second International Workshop on Security and Privacy in Cloud Computing
- Jakub Szefer, Ruby B. Lee:
A Case for Hardware Protection of Guest VMs from Compromised Hypervisors in Cloud Computing. 248-252 - Marian Kamal Iskander, Dave W. Wilkinson, Adam J. Lee, Panos K. Chrysanthis:
Enforcing Policy and Data Consistency of Cloud Transactions. 253-262 - Yan Huang, David Evans:
Private Editing Using Untrusted Cloud Services. 263-272 - M. Chuah, W. Hu:
Privacy-Aware BedTree Based Solution for Fuzzy Multi-keyword Search over Encrypted Data. 273-281 - Cong Wang, Qian Wang, Kui Ren:
Towards Secure and Effective Utilization over Encrypted Cloud Data. 282-286
WWASN 2011 - The Eighth International Workshop on Wireless Ad Hoc and Sensor Networking
Coverage
- Pouya Ostovari, Mehdi Dehghan, Jie Wu:
Connected Point Coverage in Wireless Sensor Networks Using Robust Spanning Trees. 287-293 - Surendra Sharma, Sarang Deshpande, Krishna M. Sivalingam:
On Guided Navigation in Target Tracking Sensor Networks Using Alpha-Beta Filters. 294-303 - Shantanu Sharma, Awadhesh Kumar Singh:
Democratic Leader Finding Algorithm for Large Mobile Ad Hoc Networks. 304-312
Security
- Sangwon Hyun, Peng Ning, An Liu:
Mitigating Wireless Jamming Attacks via Channel Migration. 313-322 - Subir Biswas, Jelena V. Misic, Vojislav B. Misic:
ID-based Safety Message Authentication for Security and Trust in Vehicular Networks. 323-331 - Salmin Sultana, Elisa Bertino, Mohamed Shehab:
A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks. 332-338
Protocols
- Cong Liu, Jie Wu, Xin Guan, Li Chen:
Cooperative File Sharing in Hybrid Delay Tolerant Networks. 339-344 - Xiaoyan Wang, Jie Li, Kui Wu:
Transmission Rate Enhancement of Cooperative Communications in Wireless Networks. 345-349 - Wei Zha, Wee Keong Ng:
Predict Energy Consumption of Trigger-Driven Sensor Network by Markov Chains. 350-356
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.