Abstract is missing.
- Keynote: Evolving Systems for Situational AwarenessTim Strayer. [doi]
- Message from the steering committee and general chairsD. R. Avresky, Mladen A. Vouk. [doi]
- Message from the program chairsAris Gkoulalas-Divanis, Alessandro Pellegrini 0001, Pierangelo di Sanzo. [doi]
- Crowdsourcing-based architecture for post-disaster geolocation: A comparative performance evaluationFlorent Coriat, Anne Fladenmuller, Luciana Arantes, Olivier Marin. 1-9 [doi]
- GeoTrie: A scalable architecture for location-temporal range queries over massive geotagged data setsRudyar Cortes, Xavier Bonnaire, Olivier Marin, Luciana Arantes, Pierre Sens. 10-17 [doi]
- Characterizing GPS outages: Geodesic Dead Reckoning solution for VANETs and ITSPedro P. L. L. do Nascimento, Richard W. Pazzi, Daniel L. Guidoni, Leandro A. Villas. 18-21 [doi]
- Contextual geotracking service of incident markers in disaster search-and-rescue operationsEv Cheng, Kourtney Meiss, Kendall Park, John Gillis, Dave Weber, Salman Ahmad, Prasad Calyam. 22-26 [doi]
- Using NAS Parallel Benchmarks to evaluate HPC performance in cloudsThiago Kenji Okada, Alfredo Goldman, Gerson Geraldo H. Cavalheiro. 27-30 [doi]
- A user level approach to schedule BoT applications on private cloudsMaicon Anca dos Santos, André Rauber Du Bois, Gerson Geraldo H. Cavalheiro. 31-34 [doi]
- Heterogeneous resource allocation in Cloud ManagementSerdar Kadioglu, Mike Colena, Samir Sebbah. 35-38 [doi]
- Leveraging an homomorphic encryption library to implement a coordination serviceEugenio A. Silva, Miguel Correia. 39-42 [doi]
- Multi-phase proactive cloud scheduling framework based on high level workflow and resource characterizationNelson Mimura Gonzalez, Tereza Cristina Melo de Brito Carvalho, Charles Christian Miers. 43-47 [doi]
- Task based load balancing for cloud aware massively Multiplayer Online GamesAndré Pessoa Negrão, Luís Veiga, Paulo Ferreira. 48-51 [doi]
- DARSHANA: Detecting route hijacking for communication confidentialityKaran Balu, Miguel L. Pardal, Miguel Correia. 52-59 [doi]
- MACHETE: Multi-path communication for securityDiogo Raposo, Miguel L. Pardal, Luís E. T. Rodrigues, Miguel Correia. 60-67 [doi]
- Feature set tuning in statistical learning network intrusion detectionArnaldo Gouveia, Miguel Correia. 68-75 [doi]
- A security Policy Query Engine for fully automated resolution of anomalies in firewall configurationsAhmed Bouhoula, Anis Yazidi. 76-80 [doi]
- Enforcement of global security policies in federated cloud networks with virtual network functionsPhilippe Massonet, Sebastien Dupont, Arnaud Michot, Anna Levin, Massimo Villari. 81-84 [doi]
- Neutralizing interest flooding attacks in Named Data Networks using cryptographic route tokensAubrey Alston, Tamer Refaei. 85-88 [doi]
- Evaluation of Distributed Denial of Service threat in the Internet of ThingsLuis Alberto B. Pacheco, João José Costa Gondim, Priscila A. Solis Barreto, Eduardo Alchieri. 89-92 [doi]
- A Continuous Enhancement Routing Solution aware of data aggregation for Wireless Sensor NetworksEdson Ticona Zegarra, Rafael C. S. Schouery, Flávio Keidi Miyazawa, Leandro A. Villas. 93-100 [doi]
- Fast hybrid network reconfiguration for large-scale lossless interconnection networksEvangelos Tasoulas, Ernst Gunnar Gran, Tor Skeie, Bjørn Dag Johnsen. 101-108 [doi]
- An offset based global sleeping schedule for self-organizing wireless sensor networksStephanie Imelda Pella, Prakash Veeraraghavan, Somnath Ghosh. 109-112 [doi]
- Label encoding algorithm for MPLS Segment RoutingRabah Guedrez, Olivier Dugeon, Samer Lahoud, Géraldine Texier. 113-117 [doi]
- Named Data Networking for tactical communication environmentsM. Tamer Refaei, Sean Ha, Zac Cavallero, Creighton Hager. 118-121 [doi]
- Reducing the latency-tail of short-lived flows: Adding forward error correction in data centersKlaus-Tycho Foerster, Demian Jaeger, David Stolz, Roger Wattenhofer. 122-125 [doi]
- The cardinality-constrained paths problem: Multicast data routing in heterogeneous communication networksAlvaro Velasquez, Piotr J. Wojciechowski, K. Subramani, Steven L. Drager, Sumit Kumar Jha. 126-130 [doi]
- A network service design and deployment process for NFV systemsSadaf Mustafiz, Francis Palma, Maria Toeroe, Ferhat Khendek. 131-139 [doi]
- ViTeNA: An SDN-based virtual network embedding algorithm for multi-tenant data centersDaniel Caixinha, Pradeeban Kathiravelu, Luís Veiga. 140-147 [doi]
- A scalable peer-to-peer control plane architecture for Software Defined NetworksKuldip Singh Atwal, Ajay Guleria, Mostafa A. Bassiouni. 148-152 [doi]
- Enabling Software-Defined Networking for Wireless Mesh Networks in smart environmentsPrithviraj Patil, Akram Hakiri, Yogesh D. Barve, Aniruddha S. Gokhale. 153-157 [doi]
- SDAR: Software Defined Intra-Domain Routing in Named Data NetworksYaoqing Liu, Hitesh Wadekar. 158-161 [doi]
- Cost-effective processing for Delay-sensitive applications in Cloud of Things systemsYucen Nan, Wei Li 0007, Wei Bao, Flávia Coimbra Delicato, Paulo F. Pires, Albert Y. Zomaya. 162-169 [doi]
- Smart scene management for IoT-based constrained devices using checkpointingFrancois Aissaoui, Gene Cooperman, Thierry Monteil, Saïd Tazi. 170-174 [doi]
- Byzantine reliable broadcast in sparse networksSisi Duan, Lucas Nicely, Haibin Zhang. 175-182 [doi]
- Evaluating reliability techniques in the master-worker paradigmEvgenia Christoforou, Antonio Fernández Anta, Kishori M. Konwar, Nicolas C. Nicolaou. 183-190 [doi]
- NoSQL Undo: Recovering NoSQL databases by undoing operationsDavid Matos, Miguel Correia. 191-198 [doi]
- Exploiting universal redundancyAli Shoker. 199-203 [doi]
- Towards designing reliable messaging patternsNaghmeh Ivaki, Nuno Laranjeiro, Filipe Araujo. 204-207 [doi]
- Traffic Engineering based on Shortest Path routing algorithms for FTV (Free-Viewpoint Television) applicationsPriscila Solis, Henrique Domingues Garcia. 208-211 [doi]
- vtTLS: A vulnerability-tolerant communication protocolAndre Joaquim, Miguel L. Pardal, Miguel Correia. 212-215 [doi]
- Optimal proportion computation with population protocolsYves Mocquard, Emmanuelle Anceaume, Bruno Sericola. 216-223 [doi]
- Cover-ability: Consistent versioning in asynchronous, fail-prone, message-passing environmentsNicolas C. Nicolaou, Antonio Fernández Anta, Chryssis Georgiou. 224-231 [doi]
- CMTS: Consensus-based Multi-hop Time Synchronization protocol in wireless sensor networksAmin Saiah, Chafika Benzaid, Nadjib Badache. 232-236 [doi]
- V-Hadoop: Virtualized Hadoop using containersSrihari Radhakrishnan, Bryan J. Muscedere, Khuzaima Daudjee. 237-241 [doi]
- A hardware and software Web-based environment for Energy Consumption analysis in mobile devicesSidartha A. L. Carvalho, Rafael N. Lima, Daniel C. Cunha, Abel G. Silva-Filho. 242-245 [doi]
- Energy efficient file distribution problem and its applicationsKshitiz Verma, Alberto García-Martínez, Samar Agnihotri. 246-249 [doi]
- On the use of nonlinear methods for low-power CPU frequency prediction based on Android context variablesSidartha A. L. Carvalho, Daniel C. Cunha, Abel G. Silva-Filho. 250-253 [doi]
- A distributed self-reconfiguration algorithm for cylindrical lattice-based modular robotsAndré Naz, Benoît Piranda, Julien Bourgeois, Seth Copen Goldstein. 254-263 [doi]
- Analysis of the propagation time of a rumour in large-scale distributed systemsYves Mocquard, Bruno Sericola, Samantha Robert, Emmanuelle Anceaume. 264-271 [doi]
- Cost sensitive moving target consensusSisi Duan, Yun Li, Karl N. Levitt. 272-281 [doi]
- Peripheral authentication for autonomous vehiclesShlomi Dolev, Nisha Panwar. 282-285 [doi]
- Efficient transmission strategy selection algorithm for M2M communications: An evolutionary game approachSafa Hamdoun, Abderrezak Rachedi, Hamidou Tembine, Yacine Ghamri-Doudane. 286-293 [doi]
- On the privacy-utility tradeoff in participatory sensing systemsRim Ben Messaoud, Nouha Sghaier, Mohamed Ali Moussa, Yacine Ghamri-Doudane. 294-301 [doi]
- Decision-theoretic approach to designing cyber resilient systemsVineet Mehta, Paul D. Rowe, Gene Lewis, Ashe Magalhaes, Mykel J. Kochenderfer. 302-309 [doi]
- The Blockchain AnomalyChristopher Natoli, Vincent Gramoli. 310-317 [doi]
- Safety analysis of Bitcoin improvement proposalsEmmanuelle Anceaume, Thibaut Lajoie-Mazenc, Romaric Ludinard, Bruno Sericola. 318-325 [doi]
- A comparison of GPU execution time prediction using machine learning and analytical modelingMarcos Amaris, Raphael Y. de Camargo, Mohamed Dyab, Alfredo Goldman, Denis Trystram. 326-333 [doi]
- A QoS-aware controller for Apache StormMohammad Reza Hoseiny Farahabady, Hamid R. Dehghani Samani, Yidan Wang, Albert Y. Zomaya, Zahir Tari. 334-342 [doi]
- An algorithm based on response time and traffic demands to scale containers on a Cloud Computing systemMarcelo Cerqueira de Abranches, Priscila Solis. 343-350 [doi]
- SLA and profit-aware SaaS provisioning through proactive renegotiationAya Omezzine, Narjès Bellamine-Ben Saoud, Saïd Tazi, Gene Cooperman. 351-358 [doi]
- Modeling dynamic location update strategies for PCS networksChung-Chin Lu, Ruey-Cheng Shyu, Yung-Chung Wang. 359-362 [doi]
- Client-side monitoring techniques for web sitesRicardo Filipe, Filipe Araujo. 363-366 [doi]
- To route or to secure: Tradeoffs in ICNs over MANETsHasanat Kazmi, Hasnain Lakhani, Ashish Gehani, Rashid Tahir, Fareed Zaffar. 367-374 [doi]
- Confidential and authenticated communications in a large fixed-wing UAV swarmRichard B. Thompson, Preetha Thulasiraman. 375-382 [doi]
- A back-end offload architecture for security of resource-constrained networksJiyong Han, Daeyoung Kim 0001. 383-387 [doi]
- MANETs monitoring with a distributed hybrid architectureJose Alvarez, Stéphane Maag, Fatiha Zaïdi. 388-391 [doi]
- Secure complex monitoring event processingMehdi Bentounsi, Salima Benbernou. 392-395 [doi]