Abstract is missing.
- Message from the NCA 2005 Program Committee [doi]
- NCA 2005 Symposium Referees [doi]
- Fourth IEEE International Symposium on Network Computing and Applications - Copyright [doi]
- NCA 2005 Program Committee [doi]
- Fourth IEEE International Symposium on Network Computing and Applications - Title Page [doi]
- Opening AddressT. Elmer. 1 [doi]
- Resilience for the Scalability of DependabilityJean-Claude Laprie. 5-6 [doi]
- Effectiveness of Traffic Camouflaging over Computer NetworksWei Zhao. 7 [doi]
- New Generation Scalable and Dependable ServersRobert W. Taylor. 8 [doi]
- Challenges in Mobile Networking and Information AssuranceA. Ghosh. 9 [doi]
- An Adaptive Reputation-based Trust Framework for Peer-to-Peer ApplicationsWilliam Sears, Zhen Yu, Yong Guan. 13-20 [doi]
- LAWN: A Protocol for Remote Authentication overWireless NetworksArnab Paul, Rajnish Kumar, Umakishore Ramachandran. 21-28 [doi]
- pMIX: Untraceability for Small Hiding GroupsCarlos Aguilar Melchor, Yves Deswarte. 29-40 [doi]
- Decentralized Schemes for Size Estimation in Large and Dynamic GroupsDionysios Kostoulas, Dimitrios Psaltoulis, Indranil Gupta, Ken Birman, Alan J. Demers. 41-48 [doi]
- Method for Task Migration in Grid EnvironmentsStephen Frechette, Dimiter R. Avresky. 49-58 [doi]
- A Probabilistic Approach for Achieving Fair Bandwidth Allocations in CSFQPeng Wang, David L. Mills. 59-66 [doi]
- Supporting Rate-based Control in DiffServ NetworksChin-Ling Chen, Jia-Chun Yu. 67-72 [doi]
- TCP New Vegas: Improving the Performance of TCP Vegas Over High Latency LinksJoel Sing, Ben Soh. 73-82 [doi]
- A Concentric Multi-ring Overlay for Highly Reliable P2P NetworksGiscard Wepiwé, Plamen L. Simeonov. 83-90 [doi]
- Dynamic Quorums for DHT-based P2P NetworksRoberto Baldoni, Leonardo Querzoni, Antonino Virgillito, Ricardo Jiménez-Peris, Marta Patiño-Martínez. 91-100 [doi]
- Scalable QoS-Based Event Routing in Publish-Subscribe SystemsNuno Carvalho, Filipe Araújo, Luís Rodrigues. 101-108 [doi]
- Self-organization in Cooperative Content Distribution NetworksMarc Schiely, Lars Renfer, Pascal Felber. 109-118 [doi]
- Providing Hard Real-Time Guarantees in Context-Aware Applications: Challenges and RequirementsMalika Boulkenafed, Barbara Hughes, René Meier, Gregory Biegel, Vinny Cahill. 119-127 [doi]
- Using Residual Times to Meet Deadlines in M/G/C QueuesSarah Tasneem, Lester Lipsky, Reda A. Ammar, Howard A. Sholl. 128-138 [doi]
- Architectural Issues of JMS Compliant Group CommunicationArnas Kupsys, Richard Ekwall. 139-148 [doi]
- Developing a Consistent Domain-Oriented Distributed Object ServiceChryssis Georgiou, Peter M. Musial, Alexander A. Shvartsman. 149-158 [doi]
- A Wide Area Network Simulation of Single-Round Group Membership AlgorithmsRoger Khazan, Sophia Yuditskaya. 159-170 [doi]
- C-CORE: Using Communication Cores for High Performance Network ServicesSanjay Kumar, Ada Gavrilovska, Karsten Schwan, Srikanth Sundaragopalan. 171-178 [doi]
- Fundamental Network Processor Performance BoundsHao Che, Chethan Kumar, Basavaraj Menasinahal. 179-185 [doi]
- Reducing the Communication Cost via Chain Pattern SchedulingFlorina M. Ciorba, Theodore Andronikos, Ioannis Drositis, George K. Papakonstantinou, Panayotis Tsanakas. 186-196 [doi]
- Hopcount in Application Layer Multicast SchemesMilena Janic, Novi Ineke, Cempaka Wangi, Xiaoming Zhou, Piet Van Mieghem. 197-204 [doi]
- Slingshot: Time-Critical Multicast for Clustered ApplicationsMahesh Balakrishnan, Stefan Pleisch, Ken Birman. 205-214 [doi]
- On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity AttacksYe Zhu, Xinwen Fu, Riccardo Bettati. 215-218 [doi]
- Networking Aspects in the DPASA Survivability Architecture: An Experience ReportMichael Atighetchi, Paul Rubel, Partha Pratim Pal, Jennifer Chong, Lyle Sudin. 219-222 [doi]
- A formal framework (Expression + Analysis) for network securityRomain Laborde, François Barrère, Abdelmalek Benzekri. 223-227 [doi]
- Smart Tunnel Union for NAT TraversalTzu-Chi Huang, Ce-Kuen Shieh, Wen-Huang Lai, Yu-Ben Miao. 227-231 [doi]
- Block Migration in Broadcast-based Multiprocessor ArchitecturesConstantine Katsinis. 231-234 [doi]
- Leveraging the Multiprocessing Capabilities of Modern Network Processors for Cryptographic AccelerationGunnar Gaubatz, Berk Sunar. 235-238 [doi]
- Multicast in Fat-Tree-Based InfiniBand NetworksJiazheng Zhou, Xuan-Yi Lin, Chun-Hsien Wu, Yeh-Ching Chung. 239-242 [doi]
- Protocol Composition Frameworks A Header-Driven ModelDaniel C. Bünzli, Sergio Mena, Uwe Nestmann. 243-246 [doi]
- SFS-KNOPPIXKuniyasu Suzaki, Kengo Iijima, Toshiki Yagi, Hideyuki Tan, Kazuhiro Goto. 247-250 [doi]
- Improving Transaction Server Performance under Heavy Loads with Differentiated Service and Active Network InterfacesOnur Demir, Kanad Ghose. 251-254 [doi]
- A Policy-based Management Framework for Pervasive Systems using Axiomatized Rule-ActionsChetan Shiva Shankar, Roy H. Campbell. 255-258 [doi]
- Experimental Evaluation of a QoS-aware Application ServerGiorgia Lodi, Fabio Panzieri, Davide Rossi, Elisa Turrini. 259-262 [doi]
- SLA Based Profit Optimization in Multi-tier SystemsDanilo Ardagna, Marco Trubian, Li Zhang. 263-266 [doi]
- Controlling the Coverage of Grid Information Dissemination ProtocolsBhavin Gandhi, Sameer Tilak, Michael J. Lewis, Nael B. Abu-Ghazaleh. 267-270 [doi]
- Cooperative Mobile Agents to Gather Global InformationMichel Charpentier, Gérard Padiou, Philippe Quéinnec. 271-274 [doi]
- Coverage by Randomly Deployed Wireless Sensor NetworksPeng-Jun Wan, Chih-Wei Yi. 275-278 [doi]
- Location-based Publish/SubscribePatrick Th. Eugster, Benoît Garbinato, Adrian Holzer. 279-282 [doi]
- Performance Evaluation of a PC-based Active Router and Analysis of an Active Secure FTP ApplicationAlexandros G. Fragkiadakis, David J. Parish. 283-286 [doi]