Abstract is missing.
- Computer Science as a Lens on the SciencesRichard M. Karp. 1-2 [doi]
- Real-Time Detection of Clone Attacks in Wireless Sensor NetworksKai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chang Du. 3-10 [doi]
- Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access ControlHaodong Wang, Bo Sheng, Chiu Chiang Tan, Qun Li. 11-18 [doi]
- Securing Wireless Data Networks against Eavesdropping using Smart AntennasSriram Lakshmanan, Cheng-Lin Tsao, Raghupathy Sivakumar, Karthikeyan Sundaresan. 19-27 [doi]
- On Security Vulnerabilities of Null Data Frames in IEEE 802.11 Based WLANsWenjun Gu, Zhimin Yang, Can Que, Dong Xuan, Weijia Jia. 28-35 [doi]
- Identifying Frequent Items in P2P SystemsMei Li, Wang-Chien Lee. 36-44 [doi]
- On the Impact of Mobile Hosts in Peer-to-Peer Data NetworksZhenyun Zhuang, Sandeep Kakumanu, Yeonsik Jeong, Raghupathy Sivakumar, Aravind Velayutham. 45-52 [doi]
- Is Random Scheduling Sufficient in P2P Video Streaming?Chao Liang, Yang Guo, Yong Liu. 53-60 [doi]
- Circumventing Server Bottlenecks: Indirect Large-Scale P2P Data CollectionDi Niu, Baochun Li. 61-68 [doi]
- Strong WORMRadu Sion. 69-76 [doi]
- Detecting Click Fraud in Pay-Per-Click Streams of Online Advertising NetworksLinfeng Zhang, Yong Guan. 77-84 [doi]
- Exploring Anti-Spam Models in Large Scale VoIP SystemsPushkar Patankar, Gunwoo Nam, George Kesidis, Chita R. Das. 85-92 [doi]
- Distributed Divide-and-Conquer Techniques for Effective DDoS Attack DefensesMuthusrinivasan Muthuprasanna, Govindarasu Manimaran. 93-102 [doi]
- Mobility-Assisted Spatiotemporal Detection in Wireless Sensor NetworksGuoliang Xing, Jianping Wang, Ke Shen, Qingfeng Huang, Xiaohua Jia, Hing-Cheung So. 103-110 [doi]
- Performance Analysis of Group Based Detection for Sparse Sensor NetworksJingbin Zhang, Gang Zhou, Sang Hyuk Son, John A. Stankovic, Kamin Whitehouse. 111-122 [doi]
- Enabling Accurate Node Control in Randomized Duty Cycling NetworksKang-Won Lee, Vasileios Pappas, Asser N. Tantawi. 123-132 [doi]
- CME: A Contour Mapping Engine in Wireless Sensor NetworksYingqi Xu, Wang-Chien Lee, Gail Mitchell. 133-140 [doi]
- LHT: A Low-Maintenance Indexing Scheme over DHTsYuzhe Tang, Shuigeng Zhou. 141-151 [doi]
- Distributed Line Graphs: A Universal Framework for Building DHTs Based on Arbitrary Constant-Degree GraphsYiming Zhang, Ling Liu, Dongsheng Li, Xicheng Lu. 152-159 [doi]
- iSky: Efficient and Progressive Skyline Computing in a Structured P2P NetworkLijiang Chen, Bin Cui, Hua Lu, Linhao Xu, Quanqing Xu. 160-167 [doi]
- Peer-to-Peer File Sharing Based on Network CodingMin Yang, Yuanyuan Yang. 168-175 [doi]
- Analysis of Maximum Executable Length for Detecting Text-Based MalwareP. Kumar Manna, Sanjay Ranka, Shigang Chen. 176-183 [doi]
- Efficient Distributed Third-Party Data Authentication for Tree HierarchiesHao Yuan, Mikhail J. Atallah. 184-193 [doi]
- Updates and Asynchronous Communication in Trusted Computing SystemsJosé Carlos Brustoloni, David Kyle. 194-205 [doi]
- On Detection of Malicious Users Using Group Testing TechniquesMy T. Thai, Ying Xuan, Incheol Shin, Taieb Znati. 206-213 [doi]
- The SCREAM Approach for Efficient Distributed Scheduling with Physical Interference in Wireless Mesh NetworksGurashish Singh Brar, Douglas M. Blough, Paolo Santi. 214-224 [doi]
- Achieving Global End-to-End Maxmin in Multihop Wireless NetworksLiang Zhang, Shigang Chen, Ying Jian. 225-232 [doi]
- PAS: A Wireless-Enabled, Cell-Phone-Incorporated Personal Assistant System for Independent and Assisted LivingZheng Zeng, S. Yu, Wook Shin, Jennifer C. Hou. 233-242 [doi]
- Optimized Multipath Network Coding in Lossy Wireless NetworksXinyu Zhang, Baochun Li. 243-250 [doi]
- Compiler-Assisted Application-Level Checkpointing for MPI ProgramsXuejun Yang, Panfeng Wang, Hongyi Fu, Yunfei Du, Zhiyuan Wang, Jia Jia. 251-259 [doi]
- Byzantine Fault-Tolerant Web Services for n-Tier and Service Oriented ArchitecturesSajeeva L. Pallemulle, Haraldur D. Thorvaldsson, Kenneth J. Goldman. 260-268 [doi]
- A Formal Specification and Verification Framework for Designing and Verifying Reliable and Dependable Software for Computerized Numerical Control (CNC) SystemsYunan Cao, Zili Shao, Meng Wang, Chun Jason Xue, Youdong Chen, Hongxing Wei, Tianmiao Wang. 269-276 [doi]
- A Connectivity-Driven Retransmission Scheme Based On Transport Layer ReaddressingMichio Honda, Jin Nakazawa, Yoshifumi Nishida, Masahiro Kozuka, Hideyuki Tokuda. 277-285 [doi]
- A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh NetworksKui Ren, Wenjing Lou. 286-294 [doi]
- How to Monitor for Missing RFID tagsChiu Chiang Tan, Bo Sheng, Qun Li. 295-302 [doi]
- Controlled Information Sharing in Collaborative Distributed Query ProcessingSabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. 303-310 [doi]
- Efficient Privacy-Preserving k-Nearest Neighbor SearchYinian Qi, Mikhail J. Atallah. 311-319 [doi]
- Prospect and Challenges for Network DevelopmentHequan Wu. 320 [doi]
- Efficient and Robust Local Mutual Exclusion in Mobile Ad Hoc NetworksHagit Attiya, Alex Kogan, Jennifer L. Welch. 321-328 [doi]
- On the Longest RNG Edge of Wireless Ad Hoc NetworksPeng-Jun Wan, Lixin Wang, F. Frances Yao, Chih-Wei Yi. 329-336 [doi]
- Two-Phased Approximation Algorithms for Minimum CDS in Wireless Ad Hoc NetworksPeng-Jun Wan, Lixin Wang, F. Frances Yao. 337-344 [doi]
- DTP: Double-Pairwise Time Protocol for Disruption Tolerant NetworksQing Ye, Liang Cheng. 345-352 [doi]
- End-to-End Congestion Control for High Speed Networks Based on Population Ecology ModelsXiaomeng Huang, Fengyuan Ren, Guangwen Yang, Yongwei Wu, W. Zhen, Chuang Lin. 353-360 [doi]
- Measurement Manipulation and Space Selection in Network CoordinatesCristian Lumezanu, Neil Spring. 361-368 [doi]
- Inbound Traffic Load Balancing in BGP Multi-homed Stub NetworksXiaomei Liu, Li Xiao. 369-376 [doi]
- Relative Network Positioning via CDN RedirectionsAo-Jan Su, David R. Choffnes, Fabián E. Bustamante, Aleksandar Kuzmanovic. 377-386 [doi]
- Optimal Placements in Ring Network for Data Replicas in Distributed Database with MajorityVoting ProtocolZhao Zhang, Weili Wu, Shashi Shekhar. 387-394 [doi]
- Wavenet: A Wavelet-Based Approach to Monitor Changes on Data Distribution in NetworksMei Li, Ping Xia, Wang-Chien Lee. 395-402 [doi]
- Scalable and Adaptive Metadata Management in Ultra Large-Scale File SystemsYu Hua, Yifeng Zhu, Hong Jiang, Dan Feng, Lei Tian. 403-410 [doi]
- MR-PDP: Multiple-Replica Provable Data PossessionReza Curtmola, Osama Khan, Randal C. Burns, Giuseppe Ateniese. 411-420 [doi]
- Opportunity-Based Topology Control in Wireless Sensor NetworksYunhuai Liu, Qian Zhang, Lionel M. Ni. 421-428 [doi]
- Connectivity-Guaranteed and Obstacle-Adaptive Deployment Schemes for Mobile Sensor NetworksGuang Tan, Stephen A. Jarvis, Anne-Marie Kermarrec. 429-437 [doi]
- Sensor Node Localization Using Uncontrolled EventsZiguo Zhong, Dan Wang, Tian He. 438-445 [doi]
- Quality of Trilateration: Confidence Based Iterative LocalizationZheng Yang, Yunhao Liu. 446-453 [doi]
- Deadlock-Free Fully Adaptive Routing in 2-Dimensional Tori Based on New Virtual Network Partitioning SchemeDong Xiang, Yi Pan, Qi Wang, Zhen Chen. 454-461 [doi]
- DCAR: Distributed Coding-Aware Routing in Wireless NetworksJilin Le, John C. S. Lui, Dah-Ming Chiu. 462-469 [doi]
- Utility-Based Opportunistic Routing in Multi-Hop Wireless NetworksJie Wu, Mingming Lu, Feng Li. 470-477 [doi]
- Decentralized Routing in Nonhomogeneous Poisson NetworksChi Zhang, Pan Li, Yuguang Fang, Pramod P. Khargonekar. 478-485 [doi]
- Multi-Site Retrieval of Declustered DataAli Saman Tosun. 486-493 [doi]
- A Nonblocking Approach for Reaching an Agreement on Request Total OrdersYun Wang, Jie Wu. 494-501 [doi]
- An Arbitrary Tree-Structured Replica Control ProtocolJean Paul Bahsoun, Robert Basmadjian, Rachid Guerraoui. 502-511 [doi]
- Correlation-Aware Object Placement for Multi-Object OperationsMing Zhong, Kai Shen, Joel I. Seiferas. 512-521 [doi]
- Locality Sensitive Information Brokerage in Distributed Sensor NetworksHong Lu, Andrew Jiang, Steve Liu. 522-529 [doi]
- Mobile Filtering for Error-Bounded Data Collection in Sensor NetworksDan Wang, Jianliang Xu, Jiangchuan Liu, Feng Wang. 530-537 [doi]
- Data Estimation in Sensor Networks Using Physical and Statistical MethodologiesYingshu Li, Chunyu Ai, Wiwek P. Deshmukh, Yiwei Wu. 538-545 [doi]
- Probing Queries in Wireless Sensor NetworksLiqiang Pan, Jizhou Luo, Jianzhong Li. 546-553 [doi]
- Quantum-Adaptive Scheduling for Multi-Core Network ProcessorsYue Zhang, Bin Liu, Lei Shi, Jingnan Yao, Laxmi N. Bhuyan. 554-561 [doi]
- SERvartuka: Dynamic Distribution of State to Improve SIP Server ScalabilityVijay A. Balasubramaniyan, Arup Acharya, Mustaque Ahamad, Mudhakar Srivatsa, Italo Dacosta, Charles P. Wright. 562-572 [doi]
- Fast Path Session Creation on Network ProcessorsBo Xu, Yaxuan Qi, Fei He, Zongwei Zhou, Yibo Xue, Jun Li. 573-580 [doi]
- Reconfigurable Real-Time Middleware for Distributed Cyber-Physical Systems with Aperiodic EventsYuanfang Zhang, Christopher D. Gill, Chenyang Lu. 581-588 [doi]
- Availability and Fairness Support for Storage QoS GuaranteeGang Peng, Tzi-cker Chiueh. 589-596 [doi]
- Can We Really Recover Data if Storage Subsystem Fails?Weijun Xiao, Qing Yang. 597-604 [doi]
- QoS Scheduling for Networked Storage SystemYingping Lu, David Hung-Chang Du, Chuanyi Liu, Xianbo Zhang. 605-612 [doi]
- stdchk: A Checkpoint Storage System for Desktop Grid ComputingSamer Al-Kiswany, Matei Ripeanu, Sudharshan S. Vazhkudai, Abdullah Gharaibeh. 613-624 [doi]
- Challenges and Future Research Directions in Large-Scale Complex SystemsTaieb Znati. 625-626 [doi]
- Routing of XML and XPath Queries in Data Dissemination NetworksGuoli Li, Shuang Hou, Hans-Arno Jacobsen. 627-638 [doi]
- Multi-query Optimization for Distributed Similarity Query ProcessingYi Zhuang, Qing Li, Lei Chen 0002. 639-646 [doi]
- Towards Multi-Site Collaboration in 3D Tele-Immersive EnvironmentsWanmin Wu, Zhenyu Yang, Indranil Gupta, Klara Nahrstedt. 647-654 [doi]
- Fair K Mutual Exclusion Algorithm for Peer to Peer SystemsVijay Anand Reddy, Prateek Mittal, Indranil Gupta. 655-662 [doi]
- Conditions for Set Agreement with an Application to Synchronous SystemsFrançois Bonnet, Michel Raynal. 663-672 [doi]
- Distributed Connected Dominating Set Construction in Geometric k-Disk GraphsKai Xing, Wei Cheng, E. K. Park, Shmuel Rotenstreich. 673-680 [doi]
- Weak vs. Self vs. Probabilistic StabilizationStéphane Devismes, Sébastien Tixeuil, Masafumi Yamashita. 681-688 [doi]
- WebIBC: Identity Based Cryptography for Client Side Security in Web ApplicationsZhi Guan, Zhen Cao, Xuan Zhao, Ruichuan Chen, Zhong Chen, Xianghao Nan. 689-696 [doi]
- J2EE Architecture for Database Cluster-Based High Volume E-Commerce Web ApplicationsVishal S. Batra, Wen-Syan Li, Sumit Negi. 697-704 [doi]
- Online Measurement of the Capacity of Multi-Tier Websites Using Hardware Performance CountersJia Rao, Cheng-Zhong Xu. 705-712 [doi]
- Heuristics-Based Strategies for Resolving Context Inconsistencies in Pervasive Computing ApplicationsChang Xu, Shing-Chi Cheung, Wing Kwon Chan, Chunyang Ye. 713-721 [doi]
- MC2: Multiple Clients on a Multilevel CacheGala Yadgar, Michael Factor, Kai Li, Assaf Schuster. 722-730 [doi]
- On Cooperative Caching in Wireless P2P NetworksJing Zhao, Ping Zhang, Guohong Cao. 731-739 [doi]
- PFC: Transparent Optimization of Existing Prefetching Strategies for Multi-Level Storage SystemsZhe Zhang, Kyuhyung Lee, Xiaosong Ma, Yuanyuan Zhou. 740-751 [doi]
- Online Optimization for Latency Assignment in Distributed Real-Time SystemsCristian Lumezanu, Sumeer Bhola, Mark Astley. 752-759 [doi]
- Resource Bundles: Using Aggregation for Statistical Wide-Area Resource Discovery and AllocationMichael Cardosa, Abhishek Chandra. 760-768 [doi]
- Autotuning Configurations in Distributed Systems for Performance Improvements Using Evolutionary StrategiesAnooshiravan Saboori, Guofei Jiang, Haifeng Chen. 769-776 [doi]
- Accessibility-Based Resource Selection in Loosely-Coupled Distributed SystemsJinoh Kim, Abhishek Chandra, Jon B. Weissman. 777-784 [doi]
- Fully Adaptive Power Saving Protocols for Ad Hoc Networks Using the Hyper Quorum SystemShan-Hung Wu, Ming-Syan Chen, Chung-Min Chen. 785-792 [doi]
- Hotness-Aware Sensor NetworksDong Li, Yanmin Zhu, Li Cui, Lionel M. Ni. 793-800 [doi]
- Improving Energy Conservation Using Bulk Transmission over High-Power Radios in Sensor NetworksCigdem Sengul, Mehedi Bakht, Albert F. Harris III, Tarek F. Abdelzaher, Robin Kravets. 801-808 [doi]
- Energy and Timing Constrained System Reward Maximization on Wireless NetworksJiayu Gong, Xiliang Zhong, Cheng-Zhong Xu. 809-816 [doi]
- Game Theoretic Peer Selection for Resilient Peer-to-Peer Media Streaming SystemsMark Kai Ho Yeung, Yu-Kwong Kwok. 817-824 [doi]
- Toward Predictive Failure Management for Distributed Stream Processing SystemsXiaohui Gu, Spiros Papadimitriou, Philip S. Yu, Shu-Ping Chang. 825-832 [doi]
- Crystal: An Emulation Framework for Practical Peer-to-Peer Multimedia Streaming SystemsMea Wang, Hassan Shojania, Baochun Li. 833-840 [doi]
- Video Distribution Under Multiple ConstraintsBoaz Patt-Shamir, Dror Rawitz. 841-848 [doi]
- Bandwidth Allocation for Elastic Real-Time Flows in Multihop Wireless Networks Based on Network Utility MaximizationPraveen Jayachandran, Tarek F. Abdelzaher. 849-857 [doi]
- PIRD: P2P-Based Intelligent Resource Discovery in Internet-Based Distributed SystemsHaiying Shen, Ze Li, Ting Li, Yingwu Zhu. 858-865 [doi]
- Frequency Domain Filter Design and Analysis of Request Scheduling in Internet ServersMinghua Xu, Cheng-Zhong Xu. 866-873 [doi]
- Adaptive Distributed Time-Slot Based Scheduling for Fairness in Multi-Hop Wireless NetworksAnanth Rao, Ion Stoica. 874-882 [doi]