Abstract is missing.
- Sustainability and the Office of CyberInfrastructureJennifer M. Schopf. 1-3 [doi]
- An Experimental Study of Diversity with Off-the-Shelf AntiVirus EnginesIlir Gashi, Vladimir Stankovic, Corrado Leita, Olivier Thonnard. 4-11 [doi]
- Simulating Fixed Virtual Nodes for Adapting Wireline Protocols to MANETJiang Wu, Nancy D. Griffeth, Nancy A. Lynch, Calvin C. Newport, Ralph E. Droms. 12-19 [doi]
- QuoCast: A Resource-Aware Algorithm for Reliable Peer-to-Peer MulticastMouna Allani, Benoît Garbinato, Amirhossein Malekpour, Fernando Pedone. 20-27 [doi]
- Seed Scheduling for Peer-to-Peer NetworksFlavio Esposito, Ibrahim Matta, Pietro Michiardi, Nobuyuki Mitsutake, Damiano Carra. 28-35 [doi]
- Proximity-Aware Distributed Mutual Exclusion for Effective Peer-to-Peer Replica ManagementDenvil Smith, Nian-Feng Tzeng. 36-43 [doi]
- Streamline: An Architecture for Overlay MulticastAmirhossein Malekpour, Fernando Pedone, Mouna Allani, Benoît Garbinato. 44-51 [doi]
- Towards Improved Overlay Simulation Using Realistic TopologiesGert Pfeifer, Ryan C. Spring, Christof Fetzer. 52-59 [doi]
- Analysis of Round-Robin Implementations of Processor Sharing, Including OverheadSteve Thompson, Lester Lipsky, Sarah Tasneem, Feng Zhang. 60-65 [doi]
- Comparison of Price-Based Static and Dynamic Job Allocation Schemes for Grid Computing SystemsSatish Penmatsa, Anthony T. Chronopoulos. 66-73 [doi]
- A Rule Based Co-operative Approach for Cell Selection in High Speed Cellular NetworksJoseph S. Gomes. 74-81 [doi]
- Sharing Private Information Across Distributed DatabasesMichael Siegenthaler, Ken Birman. 82-89 [doi]
- Energy-Aware Prefetching for Parallel Disk Systems: Algorithms, Models, and EvaluationAdam Manzanares, Xiaojun Ruan, Shu Yin, Mais Nijim, Wei Luo, Xiao Qin. 90-97 [doi]
- From Auto-adaptive to Survivable and Self-Regenerative SystemsMichael Atighetchi, Partha Pratim Pal. 98-101 [doi]
- Generic Danger Detection for Mission ContinuityRichard Ford, William H. Allen, Katherine Hoffman, Attila Ondi, Marco Carvalho. 102-107 [doi]
- Survivability through Run-Time Software EvolutionSharon Simmons, Dennis Edwards. 108-113 [doi]
- Automating Intrusion Response via Virtualization for Realizing Uninterruptible Web ServicesYih Huang, Anup K. Ghosh. 114-117 [doi]
- Investigating the Use of Topology Adaptation for Robust Multi-path Transport: A Preliminary StudyMarco Arguedas, Carlos Perez, Marco M. Carvalho, Adrian Granados, Kelli Hoback, Wayne Kraus. 118-121 [doi]
- Wireless Transmission Energy Analysis for Interference-Aware and Confidentiality-Enhanced Multipath RoutingChung-wei Lee. 122-125 [doi]
- GliteVM: How Science and Business May Benefit from VirtualizationGiuseppe Minutoli, Antonio Puliafito. 126-129 [doi]
- Customizing Network Functions for High Performance Cloud ComputingTakahiro Miyamoto, Michiaki Hayashi, Hideaki Tanaka. 130-133 [doi]
- Volunteer Computing and Desktop Cloud: The Cloud@Home ParadigmVincenzo D. Cunsolo, Salvatore Distefano, Antonio Puliafito, Marco Scarpa. 134-139 [doi]
- A Collusion-Resistant Distributed Scalar Product Protocol with Application to Privacy-Preserving Computation of TrustCarlos Aguilar Melchor, Boussad Ait Salem, Philippe Gaborit. 140-147 [doi]
- A Privacy Preserving Intrusion Tolerant Voting ArchitectureSoontaree Tanaraksiritavorn, Shivakant Mishra. 148-155 [doi]
- Detecting Botnets Using Command and Control TrafficBasil AsSadhan, José M. F. Moura, David E. Lapsley, Christine E. Jones, W. Timothy Strayer. 156-162 [doi]
- Evaluating Files to Audit for Detecting Intrusions in FileSystem DataJesus Molina, Michel Cukier. 163-170 [doi]
- A Case for Meta-Triggers in Wireless Sensor NetworksGoce Trajcevski, Nikolay Valtchanov, Oliviu Ghica, Peter Scheuermann. 171-178 [doi]
- Digital Investigation of Wormhole Attacks in Wireless Sensor NetworksBayrem Triki, Slim Rekhis, Noureddine Boudriga. 179-186 [doi]
- TinyPairing: Computing Tate Pairing on Sensor Nodes with Higher Speed and Less MemoryXiaokang Xiong, Duncan S. Wong, Xiaotie Deng. 187-194 [doi]
- Maintaining Network QoS Across NIC Device Driver Failures Using VirtualizationMichael Le, Andrew Gallagher, Yuval Tamir, Yoshio Turner. 195-202 [doi]
- Improving Virtualized Windows Network Performance by Delegating Network ProcessingYounggyun Koh, Calton Pu, Yasushi Shinjo, Hideki Eiraku, Go Saito, Daiyuu Nobori. 203-210 [doi]
- Introducing Virtual Execution Environments for Application Lifecycle Management and SLA-Driven Resource Distribution within Service ProvidersIñigo Goiri, Ferran Julià , Jorge Ejarque, Marc de Palol, Rosa M. Badia, Jordi Guitart, Jordi Torres. 211-218 [doi]
- Quality of Service Specifications: A Semantic ApproachAchilles Colombo Prudencio, Roberto Willrich, Michel Diaz, Saïd Tazi. 219-226 [doi]
- Estimating the Impact of Mobility Models Parameters on Mobility Metrics in MANETsElmano Ramalho Cavalcanti, Marco Aurélio Spohn. 227-233 [doi]
- Performance Evaluation of Concurrent Multipath Transfer Using SCTP Multihoming in Multihop Wireless NetworksIlknur Aydin, Chien-Chung Shen. 234-241 [doi]
- Unequal Error Protection (UEP) for Wavelet-Based Wireless 3D Mesh TransmissionFan Wu, Emmanuel Agu, Clifford Lindsay, Chung-Han Chen. 242-249 [doi]
- Introducing Probability in RFID Reader-to-Reader Anti-collisionFilippo Gandino, Renato Ferrero, Bartolomeo Montrucchio, Maurizio Rebaudengo. 250-257 [doi]
- Empirical Study of Tolerating Denial-of-Service Attacks with the Fosel ArchitectureHakem Beitollahi, Geert Deconinck. 258-261 [doi]
- TTM Based Security Enhancement for Inter-domain Routing ProtocolPeidong Zhu, Xiangjiang Hu, Huayang Cao, Xiaoqiang Wang. 262-265 [doi]
- Attribute-Based Prevention of Phishing AttacksMichael Atighetchi, Partha Pratim Pal. 266-269 [doi]
- FIRSTMichael D. Kelly, Sean J. Geoghegan. 270-273 [doi]
- Adaptive Network Coding for Heterogeneous Peer-to-Peer Streaming SystemsMin Yang, Yuanyuan Yang. 274-277 [doi]
- Small Coalitions: Lightweight Collaboration for Efficient P2P DownloadsGhassan Karame, Mario Cagalj, Srdjan Capkun. 278-283 [doi]
- A Distributed Algorithm for Web Content ReplicationSharrukh Zaman, Daniel Grosu. 284-287 [doi]
- A Novel Congestion Control Algorithm for High Performance Bulk Data TransferYongmao Ren, Haina Tang, Jun Li, Hualin Qian. 288-291 [doi]
- A Rapid Tag Identification Method with Two Slots in RFID SystemsYong Hwan Kim, Sung-Soo Kim, Kwang Seon Ahn. 292-295 [doi]
- Serving Handing Over Stations within the Mobile IEEE 802.16 Mesh Mode ContextNeila Krichene, Noureddine Boudriga. 296-299 [doi]
- Functional and Performance Analysis of CalRadio 1 PlatformRiccardo Manfrin, Andrea Zanella, Michele Zorzi. 300-305 [doi]
- RL-Based Queue Management for QoS Support in Multi-channel Multi-radio Mesh NetworksYu Zhou, Mira Yun, Timothy Kim, Amrinder Arora, Hyeong-Ah Choi. 306-309 [doi]
- A New Architecture for Optical Burst Switching Networks Based on Cooperative ControlNuno M. Garcia, Przemyslaw Lenkiewicz, Mário M. Freire, Paulo P. Monteiro. 310-313 [doi]
- Optimizations of Large Receive Offload in XenFumio Nakanjima, Hitoshi Oi. 314-318 [doi]
- TTEthernet Dataflow ConceptWilfried Steiner, Günther Bauer, Brendan Hall, Michael Paulitsch, Srivatsan Varadarajan. 319-322 [doi]
- Fast Macro Handover in Hierarchical Mobile IPv6Sung-Hyun Nam, Hyunwoo Hwang, Ju-Hyun Kim, Kyung-Geun Lee. 323-326 [doi]
- Efficient Filtering Algorithm for Repeated Queries in DNS LogZheng Wang, Xiaodong Lee, Jian Jin, Baoping Yan. 327-330 [doi]