Abstract is missing.
- PAWDS: A Roadmap Profile-Driven Adaptive System for Alert Dissemination in VANETsManuel Fogue, Piedad Garrido, Francisco J. Martinez, Juan-Carlos Cano, Carlos Miguel Tavares Calafate, Pietro Manzoni. 1-8 [doi]
- Belisarius: BFT Storage with ConfidentialityRicardo Padilha, Fernando Pedone. 9-16 [doi]
- B-Neck: A Distributed and Quiescent Max-Min Fair AlgorithmAlberto Mozo, José Luis López-Presa, Antonio Fernández Anta. 17-24 [doi]
- Treewidth and Hyperbolicity of the InternetFabien de Montgolfier, Mauricio Soto, Laurent Viennot. 25-32 [doi]
- Probabilistic FIFO Ordering in Publish/Subscribe NetworksAmirhossein Malekpour, Antonio Carzaniga, Giovanni Toffetti Carughi, Fernando Pedone. 33-40 [doi]
- A Resilient Architecture Oriented to P2P ComputingDamià Castellà Martínez, Francesc Giné, Francesc Solsona, Josep L. Lérida. 41-50 [doi]
- Self-Recovering Parallel Applications in Multi-core SystemsGilles Bizot, Dimiter Avresky, Fabien Chaix, Nacer-Eddine Zergainoh, Michael Nicolaidis. 51-58 [doi]
- A Hybrid Granularity Graph for Improving Adaptive Application Partitioning Efficacy in Mobile Computing EnvironmentsErmyas Abebe, Caspar Ryan. 59-66 [doi]
- Tracking Coverage throughout Epochs with Bounded UncertaintyFan Zhou, Goce Trajcevski, Besim Avci. 67-74 [doi]
- Towards Feasible Implementations of Low-Latency Multi-writer Atomic RegistersChryssis Georgiou, Nicolas C. Nicolaou, Alexander Russell, Alexander A. Shvartsman. 75-82 [doi]
- Byzantine Fault-Tolerant Transaction Processing for Replicated DatabasesAldelir Fernando Luiz, Lau Cheuk Lung, Miguel Correia. 83-90 [doi]
- SCAN: An Efficient Decoding Algorithm for RAID-6 CodesJianqiang Luo, Lihao Xu. 91-98 [doi]
- xMiner: Nip the Zero Day Exploits in the BudM. Zubair Rafique, Muhammad Abulaish. 99-106 [doi]
- A Subset Coding Based k-Anonymization Technique to Trade-Off Location Privacy and Data Integrity in Participatory Sensing SystemsManzur M. Murshed, Anindya Iqbal, Tishna Sabrina, Kh Mahmudul Alam. 107-114 [doi]
- Validation of Security Solutions for Communication Networks: A Policy-Based ApproachSlim Rekhis, Baha Bennour, Noureddine Boudriga. 115-122 [doi]
- Scheduler Vulnerabilities and Coordinated Attacks in Cloud ComputingFangfei Zhou, Manish Goel, Peter Desnoyers, Ravi Sundaram. 123-130 [doi]
- Engineering the Virtual Node Layer for Reactive MANET RoutingJiang Wu, Nancy D. Griffeth, Calvin C. Newport, Nancy A. Lynch. 131-138 [doi]
- Using Performance, Energy Consumption, and Resilience Experimental Measures to Evaluate Routing Protocols for Ad Hoc NetworksJesus Friginal, David de Andrés, Juan Carlos Ruiz, Pedro J. Gil. 139-146 [doi]
- Beyond Power Proportionality: Designing Power-Lean Cloud StorageLakshmi Ganesh, Hakim Weatherspoon, Ken Birman. 147-154 [doi]
- Thread-Based Live Checkpointing of Virtual MachinesVasinee Siripoonya, Kasidit Chanchio. 155-162 [doi]
- Predicting Software Anomalies Using Machine Learning TechniquesJavier Alonso, Lluís Belanche, Dimiter R. Avresky. 163-170 [doi]
- Adaptive Profiling for Root-Cause Analysis of Performance Anomalies in Web-Based ApplicationsJoão Paulo Magalhães, Luis Moura Silva. 171-178 [doi]
- Non-intrusive Estimation of QoS Degradation Impact on E-Commerce User SatisfactionNicolás Poggi, David Carrera, Ricard Gavaldà, Eduard Ayguadé. 179-186 [doi]
- Evaluating the Impact of Management Traffic and Self-Similarity on Wireless Network PerformanceTiago Flor Bento, Priscila Solis Barreto. 187-194 [doi]
- Optimal Model-Based Policies for Component Migration of Mobile Cloud ServicesRené Gabner, Hans-Peter Schwefel, Karin Anna Hummel, Günter Haring. 195-202 [doi]
- Formalization of the Necessary and Sufficient Connectivity Conditions to the Distributed Mutual Exclusion Problem in Dynamic NetworksPaulo Floriano, Alfredo Goldman, Luciana Arantes. 203-210 [doi]
- A Novel Multichannel Cognitive Radio Network with Throughput Analysis at Saturation LoadRashidul Hasan, Manzur M. Murshed. 211-218 [doi]
- NoC Reconfiguration for CMP VirtualizationFrancisco Triviño, Francisco José Alfaro, José L. Sánchez, José Flich. 219-222 [doi]
- On-line Detection of Encrypted Traffic Generated by Mesh-Based Peer-to-Peer Live Streaming Applications: The Case of GoalBitAndré F. Esteves, Pedro R. M. Inácio, Manuela Pereira, Mário M. Freire. 223-228 [doi]
- ScaleStream - An Adaptive Replication Algorithm for Scalable Multimedia StreamingShabnam Ataee, Benoît Garbinato, Mouna Allani, Fernando Pedone. 229-234 [doi]
- Timely Arbitrator Selection in P2P Virtual Environments with 3D Voronoi DiagramsMahathir Almashor, Ibrahim Khalil. 235-240 [doi]
- SYNI - TCP Hole Punching Based on SYN InjectionSebastian Holzapfel, Matthäus Wander, Arno Wacker, Torben Weis. 241-246 [doi]
- Application of a Self-Healing Video-Streaming Architecture to RTSP ServersCarlos Augusto S. Cunha, Luis Moura Silva. 247-250 [doi]
- Towards Resilient Synchronous e-Training PlatformsJuan C. Granda, Pelayo Nuño, Daniel F. García, Francisco J. Suárez. 251-256 [doi]
- Improving Adaptive Offloading Using Distributed Abstract Class Graphs in Mobile EnvironmentsErmyas Abebe, Caspar Ryan. 257-264 [doi]
- PLAN-B: Proximity-Based Lightweight Adaptive Network BroadcastingAdrian Holzer, François Vessaz, Samuel Pierre, Benoît Garbinato. 265-270 [doi]
- A Generic Framework for Replicated Software Transactional MemoriesNuno Carvalho, Paolo Romano, Luís Rodrigues. 271-274 [doi]
- Algorithmic Mechanisms for Internet Supercomputing under Unreliable CommunicationEvgenia Christoforou, Antonio Fernández Anta, Chryssis Georgiou, Miguel A. Mosteiro. 275-280 [doi]
- A Framework for Transparent Active Replication in Remote Method InvocationDiogo Reis, Hugo M. Miranda. 281-284 [doi]
- Two-Party Mobile Authentication Protocols for Wireless Roaming NetworksAbdullah M. Almuhaideb, Phu Dung Le, Bala Srinivasan. 285-288 [doi]
- An Enhanced-MDP Based Vertical Handoff Algorithm for QoS Support over Heterogeneous Wireless NetworksShusmita Anwar Sharna, Mohammad R. Amin, Manzur M. Murshed. 289-293 [doi]
- Performance Trade-Offs of a IEEE 802.21-Based Vertical Handover Decision Algorithm under Different Network ConditionsJohann Márquez-Barja, Carlos Miguel Tavares Calafate, Juan-Carlos Cano, Pietro Manzoni. 294-297 [doi]
- Decentralized Topology Aggregation for QoS Estimation in Large Overlay NetworksStefan Wieser, László Böszörményi. 298-301 [doi]
- Efficient Encoding for Generalized Reed Solomon CodesMochan Shrestha, Lihao Xu. 302-305 [doi]
- IPv4+6Yongmao Ren, Hualin Qian, Yuepeng E., Jun Li, Jingguo Ge. 306-309 [doi]
- Improving Web Cache Performance via Adaptive Content Fragmentation DesignCarlos Guerrero, Carlos Juiz, Ramón Puigjaner. 310-313 [doi]
- Building Autonomically Scalable Services on Wide-Area Shared Computing PlatformsVinit Padhye, Anand Tripathi. 314-319 [doi]
- Evaluation of an Alternative for Increasing Switch RadixJuan A. Villar, Francisco J. Andujar, José L. Sánchez, Francisco José Alfaro, José Duato. 320-323 [doi]
- From a Database Management System to a Policy-Based Network Management SystemTzong-An Su, Chen-Feng Chiu. 324-327 [doi]
- Performance Evaluation of DCB's Priority-Based Flow ControlMikkel Hagen, Ryan Zarick. 328-333 [doi]
- End-to-End Data Deduplication for the Mobile WebRicardo Filipe, João Barreto. 334-337 [doi]
- Detecting User-Visible Failures in Web-Sites by Using End-to-End Fine-Grained Monitoring: An Experimental StudyCarlos Manuel Vaz, Luís Moura Silva, António Dourado. 338-341 [doi]
- Optimum Clusters for Reliable and Energy Efficient Wireless Sensor NetworksAnwar Sadat, Gour C. Karmakar. 342-347 [doi]
- Dynamic Event Coverage in Hybrid Wireless Sensor NetworksKh Mahmudul Alam, Joarder Kamruzzaman, Gour C. Karmakar, Manzur M. Murshed. 348-353 [doi]
- Quality Adjustable Query Processing Framework for Wireless Sensor NetworksShaila Pervin, Joarder Kamruzzaman, Gour C. Karmakar. 354-358 [doi]
- Constrained Pricing for Cloud Resource AllocationMakhlouf Hadji, Wajdi Louati, Djamal Zeghlache. 359-365 [doi]
- Clustering SOAP Web Services on Internet Computing Using Fast FractalsDhiah Al-Shammary, Ibrahim Khalil, Loay E. George. 366-371 [doi]