default search action
32nd ICDCS 2012: Macau, China - Workshops
- 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), Macau, China, June 18-21, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-1423-7
DCPerf 2012: The Second International Workshop on Data Center Performance
Architecture
- Yunfei Shang, Dan Li, Mingwei Xu:
A Comparison Study of Energy Proportionality of Data Center Network Architectures. 1-7 - Márton Csernai, András Gulyás, Attila Korösi, Balázs Sonkoly, Gergely Biczók:
Poincaré: A Hyperbolic Data Center Architecture. 8-16 - Wei Zhou, Jizhong Han, Zhang Zhang, Jiao Dai:
Dynamic Random Access for Hadoop Distributed File System. 17-22 - Feng Yan, Alma Riska, Evgenia Smirni:
Fast Eventual Consistency with Performance Guarantees for Distributed Storage. 23-28
Networking
- Changlin Jiang, Dan Li, Mingwei Xu, Kai Zheng:
A Coding-based Approach to Mitigate TCP Incast in Data Center Networks. 29-34 - Yong Cui, Chunpeng Liao, Ivan Stojmenovic, Di Li, Hongyi Wang:
Cooperative Redundancy Elimination in Data Center Networks with Wireless Cards at Routers. 35-42 - Yuan Feng, Baochun Li, Bo Li:
Postcard: Minimizing Costs on Inter-Datacenter Traffic with Store-and-Forward. 43-50 - Weiwei Zhuang, Qingshan Jiang, Tengke Xiong:
An Intelligent Anti-phishing Strategy Model for Phishing Website Detection. 51-56 - Yuichi Ohsita, Masayuki Murata:
Data Center Network Topologies Using Optical Packet Switches. 57-64
PhoneCom 2012: The Second International Workshop on Sensing, Networking, and Computing with Smartphones
Session I: User, Social, and HCI
- Igor Pernek, Gregor Stiglic, Peter Kokol:
How Hard Am I Training? Using Smart Phones to Estimate Sport Activity Intensity. 65-68 - Kaori Fujinami, Satoshi Kouchi, Yuan Xue:
Design and Implementation of an On-body Placement-Aware Smartphone. 69-74 - Somasundaram Kothandapani, Dion Hoe-Lian Goh, Khasfariyati Razikin:
Influence of Playability and Usability in a Mobile Human Computation Game. 75-78 - Alvin Chin, Bin Xu, Fangxi Yin, Xia Wang, Wei Wang, Xiaoguang Fan, Dezhi Hong, Ying Wang:
Using Proximity and Homophily to Connect Conference Attendees in a Mobile Social Network. 79-87
Session II: Sensing, Location, and Networking
- Clemens Holzmann, Matthias Hochgatterer:
Measuring Distance with Mobile Phones Using Single-Camera Stereo Vision. 88-93 - Jongwon Yoon, Sung-Bae Cho:
Mobile Intelligent Synthetic Character in Smartphone Using Behavior Selection Network. 94-97 - Peter Riedl, Rene Mayrhofer:
Towards a Practical, Scalable Self-Localization System for Android Phones Based on WLAN Fingerprinting. 98-101 - Youngseol Lee, Sung-Bae Cho:
An Efficient Energy Management System for Android Phone Using Bayesian Networks. 102-107 - German Castignani, Alejandro Lampropulos, Alberto Blanc, Nicolas Montavont:
Wi2Me: A Mobile Sensing Platform for Wireless Heterogeneous Networks. 108-113 - Felix Büsching, Sebastian Schildt, Lars C. Wolf:
DroidCluster: Towards Smartphone Cluster Computing - The Streets are Paved with Potential Computer Clusters. 114-117
HotPOST 2012: The Fourth International Workshop on Hot Topics in Peer-to-Peer Computing and Online Social Networking
HotPOST 2012: Session 1
- Xuanjia Qiu, Wei Huang, Chuan Wu, Zongpeng Li, Francis C. M. Lau:
Exploring the Sustainability of Credit-incentivized Peer-to-Peer Content Distribution. 118-126 - Jing Jiang, Zifei Shan, Wenpeng Sha, Xiao Wang, Yafei Dai:
Detecting and Validating Sybil Groups in the Wild. 127-132 - Feng Wang, Haiyan Wang, Kuai Xu:
Diffusive Logistic Model Towards Predicting Information Diffusion in Online Social Networks. 133-139
HotPOST 2012: Session 2
- Stefanie Roos, Thorsten Strufe:
Provable Polylog Routing for Darknets. 140-146 - Junting Chen, James She:
An Analysis of Verifications in Microblogging Social Networks - Sina Weibo. 147-154 - Rammohan Narendula, Thanasis G. Papaioannou, Karl Aberer:
Towards the Realization of Decentralized Online Social Networks: An Empirical Study. 155-162 - Feng Wang, Kuai Xu, Haiyan Wang:
Discovering Shared Interests in Online Social Networks. 163-168
WWASN 2012: The Ninth Workshop on Wireless Ad Hoc and Sensor Networks
WWASN 2012: Session 1
- Liang Liu, Xiaolin Qin, Bohan Li, Yulei Liu, Guineng Zheng:
Energy-Efficient and Robust Spatial Window Aggregation Query Processing Algorithm in Wireless Sensor Networks. 169-177 - Jingzhe Du, Evangelos Kranakis, Amiya Nayak:
Cooperative Neighbor Discovery Protocol for a Wireless Network Using Two Antenna Patterns. 178-186 - Jie Zhou, Jiannong Cao:
OSR: Optimal and Secure Routing Protocol in Multi-hop Wireless Networks. 187-193 - Zhuofan Liao, Shigeng Zhang, Jiannong Cao, Weiping Wang, Jianxin Wang:
Minimizing Movement for Target Coverage in Mobile Sensor Networks. 194-200 - Hui Zhao, Ming Liu:
A Delay-Based Routing Protocol for Human-Oriented Delay Tolerant Mobile Sensor Network (DTMSN). 201-208 - Tian Wang, Weijia Jia, Ping Shen:
BlueCat: An Efficient Way for Relative Mobile Localization. 209-215
WWASN 2012: Session 2
- Ilnaz Nikseresht, Hamed Yousefi, Ali Movaghar, Mohammad Khansari:
Interference-Aware Multipath Routing for Video Delivery in Wireless Multimedia Sensor Networks. 216-221 - Breeson Francis, Venkat Narasimhan, Amiya Nayak, Ivan Stojmenovic:
Techniques for Enhancing TCP Performance in Wireless Networks. 222-230 - Weigang Wu, Haiqing Liu, Hejun Wu:
RES: A Robust and Efficient Snapshot Algorithm for Wireless Sensor Networks. 231-236 - Mouhannad Alattar, Françoise Sailhan, Julien Bourgeois:
Trust-Enabled Link Spoofing Detection in MANET. 237-244 - Michael Fischer, Kui Wu, Pan Agathoklis:
Intelligent Illumination Model-Based Lighting Control. 245-249 - Reza Malekian, Abdul Hanan Abdullah:
A Novel Approach to Improve Signal to Noise Ratio Based on Sector Antenna in Radio Networks. 250-253
CPNS 2012: The Second International Workshop on Cyber-physical Networking Systems
- Husheng Li, Robert Caiming Qiu, Zhiqiang Wu:
Routing in Cyber Physical Systems with Application for Voltage Control in Microgrids: A Hybrid System Approach. 254-259 - Yuanyuan Zeng, Jie Wu, Naixue Xiong, Deshi Li:
Energy-Efficient Routing and Rate Allocation for Delay Tolerant Networks. 260-266 - Husheng Li:
System Stability Aware Multicast Routing in Cyber Physical Systems. 267-272 - Wei Li, Zimu Yuan, Biao Chen, Wei Zhao:
Performance Comparison of Positioning Algorithms for Complex GPS Systems. 273-278
CPNS-TS2: Synchronization, Control, and Models
- Dechao Liu, Zhiyun Zheng, Zimu Yuan, Wei Li:
An Improved TPSN Algorithm for Time Synchronization in Wireless Sensor Network. 279-284 - Zhaoyang Zhang, Ken C. K. Lee, Honggang Wang, Dong Xuan, Hua Fang:
Epidemic Control Based on Fused Body Sensed and Social Network Information. 285-290 - Nauman Javed, Tilman Wolf:
Automated Sensor Verification Using Outlier Detection in the Internet of Things. 291-296 - Kaliappa Ravindran:
Model-Based Engineering for Certification of Complex Adaptive Network Systems. 297-302 - Walid Taha, Paul Brauner, Yingfu Zeng, Robert Cartwright, Verónica Gaspes, Aaron D. Ames, Alexandre Chapoutot:
A Core Language for Executable Models of Cyber-Physical Systems (Preliminary Report). 303-308
CPNS-TS3: Systems and Applications
- Husheng Li:
Virtual Queue Based Distributed Data Traffic Scheduling for Cyber Physical Systems with Application in Smart Grid. 309-314 - Dapeng Wang, Jing Li, Kai Xing, Shan Jin, Kevin Liu:
Real-Time, Real-Location, and Real-Identity Service Information (R3SI) Based Application Enabled Mobile Service Architecture in Cellular Networks. 315-323 - Yaser P. Fallah, Raja Sengupta:
A Cyber-physical Systems Approach to the Design of Vehicle Safety Networks. 324-329 - Shunqing Yan, Yongxin Zhu, Qiannan Zhang, Qin Wang, Ming Ni, Guangwei Xie:
A Case Study of CPNS Intelligence: Provenance Reasoning over Tracing Cross Contamination in Food Supply Chain. 330-335
ADSN 2012: The 11th International Workshop on Assurance in Distributed Systems and Networks
Session 1: Assurance Networks
- Yufeng Wang, Athanasios V. Vasilakos, Qun Jin, Jianhua Ma:
On Studying Relationship between Altruism and the Psychological Phenomenon of Self-Deception in Rational and Autonomous Networks. 336-341 - Anri Kimura, Eitaro Kohno, Yoshiaki Kakuda:
Security and Dependability Enhancement of Wireless Sensor Networks with Multipath Routing Utilizing the Connectedness of Joint Nodes. 342-348
Session 2: Assurance-Driven Routing and Clustering
- Shohei Fujiwara, Tomoyuki Ohta, Yoshiaki Kakuda:
An Inter-domain Routing for Heterogeneous Mobile Ad Hoc Networks Using Packet Conversion and Address Sharing. 349-355 - Kenji Takagi, Yusuke Sakumoto, Chisa Takano, Masaki Aida:
On Convergence Rate of Autonomous Decentralized Structure Formation Technology for Clustering in Ad Hoc Networks. 356-361 - Md. Emdadul Haque, Xiaodong Lu, Kinji Mori:
Autonomous Local Coordination Technology for Congestion Control in Wireless Sensor Networks. 362-368
Session 3: Dependable Computing
- Wang Huan, Hidenori Nakazato:
Failure Detection in P2P-Grid Environments. 369-374 - Khalid Mahmood, Hironao Takahashi, Yasukai Arakawa:
Gateway Access Permission Technology for High Assurance. 375-381 - Kaliappa Ravindran, Mohammad Rabby:
Replica Voting Based Mechanisms for Dissemination of Multi-modal Surveillance Data. 382-389
Session 4: Modeling and Architectures
- Takashi Kunifuji, Hiroshi Ito:
Realization of Flexible Railway System by Heterogeneous Real-Time Autonomous Integrating Architecture. 390-399 - Wei-Tek Tsai, Guanqiu Qi, Yinong Chen:
A Cost-Effective Intelligent Configuration Model in Cloud Computing. 400-408 - Chin-Tser Huang, Vipul Gupta:
Modeling and Automating Analysis of Server Duty and Client Obligation for High Assurance. 409-416
SPCC 2012: The Third International Conference on Security and Privacy in Cloud Computing
Technical Session I
- Wenjie Lin, David Lee:
Traceback Attacks in Cloud - Pebbletrace Botnet. 417-426 - Xiaoxin Wu, Donghui Wang:
On-Demand VPC Topology Construction for Virtual Perimeter Defense in Public Clouds. 427-435 - Jianping Wang, Chunming Qiao, Raghuram S. Sudhaakar, Sateesh Addepalli, Yaohui Jin, Pablo Jesús Argibay-Losada:
Flow Inspection Router Assignment (FIRA) in Access/Aggregation Network Clouds. 436-445 - Angelos D. Keromytis, Roxana Geambasu, Simha Sethumadhavan, Salvatore J. Stolfo, Junfeng Yang, Azzedine Benameur, Marc Dacier, Matthew C. Elder, Darrell M. Kienzle, Angelos Stavrou:
The MEERKATS Cloud Security Architecture. 446-450 - Kai Wang, Yaxuan Qi, Baohua Yang, Yibo Xue, Jun Li:
LiveSec: Towards Effective Security Management in Large-Scale Production Networks. 451-460
Technical Session II
- Kuai Xu, Feng Wang, Lin Gu:
Profiling-as-a-Service in Multi-tenant Cloud Computing Environments. 461-465 - Ming Li, Shucheng Yu, Wenjing Lou, Y. Thomas Hou:
Toward Privacy-Assured Cloud Data Services with Flexible Search Functionalities. 466-470 - Yinqi Tang, Dawu Gu, Ning Ding, Haining Lu:
Phrase Search over Encrypted Data with Symmetric Encryption Scheme. 471-480 - Yan Zhu, Di Ma, Shan-Biao Wang:
Secure Data Retrieval of Outsourced Data with Complex Query Support. 481-490 - Vinícius Maia Pacheco, Ricardo Staciarini Puttini:
SaaS Anonymous Cloud Service Consumption Structure. 491-499
Technical Session III
- Khalid Nawaf Alharbi, Xiaodong Lin:
PDP: A Privacy-Preserving Data Provenance Scheme. 500-505 - Aiiad Albeshri, Colin Boyd, Juan Manuel González Nieto:
GeoProof: Proofs of Geographic Location for Cloud Computing Environment. 506-514 - Bo Chen, Reza Curtmola:
Robust Dynamic Provable Data Possession. 515-525 - Yang Zhang, Junliang Chen:
Access Control as a Service for Public Cloud Storage. 526-536
NFSP 2012: The First International Workshop on Network Forensics, Security and Privacy
Session I: Forensics
- Shui Yu, Wanlei Zhou, Wanchun Dou, S. Kami Makki:
Why it is Hard to Fight against Cyber Criminals? 537-541 - Junwei Huang, Zhen Ling, Tao Xiang, Jie Wang, Xinwen Fu:
When Digital Forensic Research Meets Laws. 542-551 - Juanru Li, Dawu Gu, Yuhao Luo:
Android Malware Forensics: Reconstruction of Malicious Events. 552-558 - Hongcheng Tian, Jun Bi, Peiyao Xiao:
A Flow-Based Traceback Scheme on an AS-Level Overlay Network. 559-564 - James Mao, F. Yan, Kai-Hau Yeung:
Trade-off between Being Attacked and Being Protected. 565-572
Session II: Authentication, Identification, and Privacy
- Pengfei You, Yuxing Peng, Weidong Liu, Shoufu Xue:
Security Issues and Solutions in Cloud Computing. 573-577 - Dawei Sun, Guiran Chang, Changsheng Miao, Xingwei Wang:
Building a High Serviceability Model by Checkpointing and Replication Strategy in Cloud Computing Environments. 578-587 - Jing Liu, Yang Xiao, C. L. Philip Chen:
Authentication and Access Control in the Internet of Things. 588-592 - Christoph Neumann, Olivier Heen, Stéphane Onno:
An Empirical Study of Passive 802.11 Device Fingerprinting. 593-602 - Liudong Xing, Honggang Wang, Yujie Wang, Chaonan Wang:
Two-Party Trust Sensitivity Analysis for Social Networks. 603-607
Session III: Intrusion Detection and Prevention
- Moutaz Alazab, Veelasha Moonsamy, Lynn Margaret Batten, Patrik Lantz, Ronghua Tian:
Analysis of Malicious and Benign Android Applications. 608-616 - Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou:
Semi-supervised and Compound Classification of Network Traffic. 617-621 - Wahbeh H. Qardaji, Ninghui Li:
Anonymizing Network Traces with Temporal Pseudonym Consistency. 622-633 - Fuye Han, Zhen Chen, HongFeng Xu, Yong Liang:
Garlic: A Distributed Botnets Suppression System. 634-639 - Wenlin Han, Wei Xiong, Yang Xiao, Magdy Ellabidy, Athanasios V. Vasilakos, Naixue Xiong:
A Class of Non-statistical Traffic Anomaly Detection in Complex Network Systems. 640-646
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.