![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
15th NCA 2016: Cambridge, MA, USA
- Alessandro Pellegrini, Aris Gkoulalas-Divanis, Pierangelo di Sanzo, Dimiter R. Avresky:
15th IEEE International Symposium on Network Computing and Applications, NCA 2016, Cambridge, Boston, MA, USA, October 31 - November 2, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-3216-7 - D. R. Avresky, Mladen A. Vouk:
Message from the steering committee and general chairs. xiii - Aris Gkoulalas-Divanis, Alessandro Pellegrini
, Pierangelo di Sanzo
:
Message from the program chairs. xiv - Tim Strayer:
Keynote: Evolving Systems for Situational Awareness. xx
Session 1: Systems, Architectures, and Applications
- Florent Coriat, Anne Fladenmuller, Luciana Arantes
, Olivier Marin
:
Crowdsourcing-based architecture for post-disaster geolocation: A comparative performance evaluation. 1-9 - Rudyar Cortés, Xavier Bonnaire, Olivier Marin
, Luciana Arantes, Pierre Sens:
GeoTrie: A scalable architecture for location-temporal range queries over massive geotagged data sets. 10-17 - Pedro P. L. L. do Nascimento, Richard W. Pazzi
, Daniel L. Guidoni, Leandro A. Villas:
Characterizing GPS outages: Geodesic Dead Reckoning solution for VANETs and ITS. 18-21 - Ev Cheng, Kourtney Meiss, Kendall Park, John Gillis, Dave Weber, Salman Ahmad
, Prasad Calyam:
Contextual geotracking service of incident markers in disaster search-and-rescue operations. 22-26
Session 2: Cloud Computing
- Thiago Kenji Okada, Alfredo Goldman
, Gerson Geraldo H. Cavalheiro:
Using NAS Parallel Benchmarks to evaluate HPC performance in clouds. 27-30 - Maicon Anca dos Santos, André Rauber Du Bois, Gerson Geraldo H. Cavalheiro:
A user level approach to schedule BoT applications on private clouds. 31-34 - Serdar Kadioglu, Mike Colena, Samir Sebbah:
Heterogeneous resource allocation in Cloud Management. 35-38 - Eugenio A. Silva, Miguel Correia
:
Leveraging an homomorphic encryption library to implement a coordination service. 39-42 - Nelson Mimura Gonzalez, Tereza Cristina Melo de Brito Carvalho
, Charles Christian Miers:
Multi-phase proactive cloud scheduling framework based on high level workflow and resource characterization. 43-47 - André Pessoa Negrão, Luís Veiga
, Paulo Ferreira
:
Task based load balancing for cloud aware massively Multiplayer Online Games. 48-51
Session 3: Network Security I
- Karan Balu, Miguel L. Pardal, Miguel Correia
:
DARSHANA: Detecting route hijacking for communication confidentiality. 52-59 - Diogo Raposo, Miguel L. Pardal, Luís E. T. Rodrigues, Miguel Correia
:
MACHETE: Multi-path communication for security. 60-67 - Arnaldo Gouveia, Miguel Correia
:
Feature set tuning in statistical learning network intrusion detection. 68-75 - Ahmed Bouhoula, Anis Yazidi:
A security Policy Query Engine for fully automated resolution of anomalies in firewall configurations. 76-80 - Philippe Massonet
, Sébastien Dupont, Arnaud Michot, Anna Levin, Massimo Villari
:
Enforcement of global security policies in federated cloud networks with virtual network functions. 81-84 - Aubrey Alston, Tamer Refaei:
Neutralizing interest flooding attacks in Named Data Networks using cryptographic route tokens. 85-88 - Luís Alberto Belém Pacheco, João J. C. Gondim
, Priscila A. Solís Barreto, Eduardo Alchieri:
Evaluation of Distributed Denial of Service threat in the Internet of Things. 89-92
Session 4: Networking
- Edson Ticona Zegarra, Rafael Crivellari Saliba Schouery
, Flávio Keidi Miyazawa, Leandro A. Villas:
A Continuous Enhancement Routing Solution aware of data aggregation for Wireless Sensor Networks. 93-100 - Evangelos Tasoulas, Ernst Gunnar Gran, Tor Skeie, Bjørn Dag Johnsen:
Fast hybrid network reconfiguration for large-scale lossless interconnection networks. 101-108 - Stephanie Imelda Pella, Prakash Veeraraghavan
, Somnath Ghosh:
An offset based global sleeping schedule for self-organizing wireless sensor networks. 109-112 - Rabah Guedrez, Olivier Dugeon, Samer Lahoud
, Géraldine Texier:
Label encoding algorithm for MPLS Segment Routing. 113-117 - M. Tamer Refaei, Sean Ha, Zac Cavallero, Creighton Hager:
Named Data Networking for tactical communication environments. 118-121 - Klaus-Tycho Foerster
, Demian Jaeger, David Stolz, Roger Wattenhofer:
Reducing the latency-tail of short-lived flows: Adding forward error correction in data centers. 122-125 - Alvaro Velasquez, Piotr Wojciechowski
, K. Subramani
, Steven L. Drager, Sumit Kumar Jha
:
The cardinality-constrained paths problem: Multicast data routing in heterogeneous communication networks. 126-130
Session 5: Software-Defined Networks
- Sadaf Mustafiz, Francis Palma, Maria Toeroe, Ferhat Khendek
:
A network service design and deployment process for NFV systems. 131-139 - Daniel Caixinha, Pradeeban Kathiravelu, Luís Veiga
:
ViTeNA: An SDN-based virtual network embedding algorithm for multi-tenant data centers. 140-147 - Kuldip Singh Atwal, Ajay Guleria
, Mostafa A. Bassiouni:
A scalable peer-to-peer control plane architecture for Software Defined Networks. 148-152 - Prithviraj Patil, Akram Hakiri
, Yogesh D. Barve
, Aniruddha S. Gokhale
:
Enabling Software-Defined Networking for Wireless Mesh Networks in smart environments. 153-157 - Yaoqing Liu, Hitesh Wadekar:
SDAR: Software Defined Intra-Domain Routing in Named Data Networks. 158-161
Session 6: Internet of Things
- Yucen Nan, Wei Li, Wei Bao
, Flávia Coimbra Delicato, Paulo F. Pires, Albert Y. Zomaya
:
Cost-effective processing for Delay-sensitive applications in Cloud of Things systems. 162-169 - Francois Aissaoui
, Gene Cooperman, Thierry Monteil, Saïd Tazi:
Smart scene management for IoT-based constrained devices using checkpointing. 170-174
Session 7: Fault Tolerance
- Sisi Duan, Lucas Nicely, Haibin Zhang:
Byzantine reliable broadcast in sparse networks. 175-182 - Evgenia Christoforou, Antonio Fernández Anta, Kishori M. Konwar, Nicolas C. Nicolaou:
Evaluating reliability techniques in the master-worker paradigm. 183-190 - David R. Matos
, Miguel Correia
:
NoSQL Undo: Recovering NoSQL databases by undoing operations. 191-198 - Ali Shoker
:
Exploiting universal redundancy. 199-203 - Naghmeh Ramezani Ivaki
, Nuno Laranjeiro
, Filipe Araújo
:
Towards designing reliable messaging patterns. 204-207 - Priscila Solís
, Henrique Domingues Garcia:
Traffic Engineering based on Shortest Path routing algorithms for FTV (Free-Viewpoint Television) applications. 208-211 - André Joaquim, Miguel L. Pardal, Miguel Correia:
vtTLS: A vulnerability-tolerant communication protocol. 212-215
Session 8: Distributed Computing I and Energy Efficiency
- Yves Mocquard, Emmanuelle Anceaume, Bruno Sericola:
Optimal proportion computation with population protocols. 216-223 - Nicolas C. Nicolaou, Antonio Fernández Anta
, Chryssis Georgiou:
Cover-ability: Consistent versioning in asynchronous, fail-prone, message-passing environments. 224-231 - Amin Saiah, Chafika Benzaid
, Nadjib Badache:
CMTS: Consensus-based Multi-hop Time Synchronization protocol in wireless sensor networks. 232-236 - Srihari Radhakrishnan, Bryan J. Muscedere, Khuzaima Daudjee:
V-Hadoop: Virtualized Hadoop using containers. 237-241 - Sidartha A. L. Carvalho, Rafael N. Lima, Daniel C. Cunha, Abel G. Silva-Filho:
A hardware and software Web-based environment for Energy Consumption analysis in mobile devices. 242-245 - Kshitiz Verma, Alberto García-Martínez
, Samar Agnihotri:
Energy efficient file distribution problem and its applications. 246-249 - Sidartha A. L. Carvalho, Daniel C. Cunha, Abel G. Silva-Filho:
On the use of nonlinear methods for low-power CPU frequency prediction based on Android context variables. 250-253
Session 9: Distributed Computing II
- André Naz, Benoît Piranda, Julien Bourgeois, Seth Copen Goldstein:
A distributed self-reconfiguration algorithm for cylindrical lattice-based modular robots. 254-263 - Yves Mocquard, Bruno Sericola, Samantha Robert, Emmanuelle Anceaume:
Analysis of the propagation time of a rumour in large-scale distributed systems. 264-271 - Sisi Duan, Yun Li, Karl N. Levitt:
Cost sensitive moving target consensus. 272-281
Session 10: Mobile Computing and Security
- Shlomi Dolev
, Nisha Panwar:
Peripheral authentication for autonomous vehicles. 282-285 - Safa Hamdoun, Abderrezak Rachedi
, Hamidou Tembine
, Yacine Ghamri-Doudane:
Efficient transmission strategy selection algorithm for M2M communications: An evolutionary game approach. 286-293 - Rim Ben Messaoud, Nouha Sghaier, Mohamed Ali Moussa, Yacine Ghamri-Doudane:
On the privacy-utility tradeoff in participatory sensing systems. 294-301 - Vineet Mehta, Paul D. Rowe, Gene Lewis, Ashe Magalhaes, Mykel J. Kochenderfer:
Decision-theoretic approach to designing cyber resilient systems. 302-309 - Christopher Natoli, Vincent Gramoli
:
The Blockchain Anomaly. 310-317 - Emmanuelle Anceaume, Thibaut Lajoie-Mazenc, Romaric Ludinard
, Bruno Sericola:
Safety analysis of Bitcoin improvement proposals. 318-325
Session 11: Performance, QoS, and Monitoring
- Marcos Amaris
, Raphael Y. de Camargo, Mohamed Dyab, Alfredo Goldman
, Denis Trystram:
A comparison of GPU execution time prediction using machine learning and analytical modeling. 326-333 - Mohammad Reza Hoseiny Farahabady
, Hamid R. Dehghani Samani, Yidan Wang, Albert Y. Zomaya
, Zahir Tari
:
A QoS-aware controller for Apache Storm. 334-342 - Marcelo Cerqueira de Abranches, Priscila Solís
:
An algorithm based on response time and traffic demands to scale containers on a Cloud Computing system. 343-350 - Aya Omezzine, Narjès Bellamine Ben Saoud
, Saïd Tazi, Gene Cooperman:
SLA and profit-aware SaaS provisioning through proactive renegotiation. 351-358 - Chung-Chin Lu, Ruey-Cheng Shyu, Yung-Chung Wang:
Modeling dynamic location update strategies for PCS networks. 359-362 - Ricardo Filipe
, Filipe Araújo
:
Client-side monitoring techniques for web sites. 363-366
Session 12: Network Security II
- Hasanat Kazmi, Hasnain Lakhani, Ashish Gehani, Rashid Tahir
, Fareed Zaffar:
To route or to secure: Tradeoffs in ICNs over MANETs. 367-374 - Richard B. Thompson, Preetha Thulasiraman:
Confidential and authenticated communications in a large fixed-wing UAV swarm. 375-382 - Jiyong Han, Daeyoung Kim:
A back-end offload architecture for security of resource-constrained networks. 383-387 - Jose Alvarez, Stéphane Maag, Fatiha Zaïdi:
MANETs monitoring with a distributed hybrid architecture. 388-391 - Mehdi Bentounsi, Salima Benbernou:
Secure complex monitoring event processing. 392-395
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.