


default search action
32nd ICDCS 2012: Macau, China - Workshops
- 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), Macau, China, June 18-21, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-1423-7

DCPerf 2012: The Second International Workshop on Data Center Performance
Architecture
- Yunfei Shang, Dan Li, Mingwei Xu:

A Comparison Study of Energy Proportionality of Data Center Network Architectures. 1-7 - Márton Csernai, András Gulyás, Attila Korösi, Balázs Sonkoly

, Gergely Biczók
:
Poincaré: A Hyperbolic Data Center Architecture. 8-16 - Wei Zhou, Jizhong Han

, Zhang Zhang, Jiao Dai
:
Dynamic Random Access for Hadoop Distributed File System. 17-22 - Feng Yan, Alma Riska, Evgenia Smirni:

Fast Eventual Consistency with Performance Guarantees for Distributed Storage. 23-28
Networking
- Changlin Jiang, Dan Li, Mingwei Xu, Kai Zheng:

A Coding-based Approach to Mitigate TCP Incast in Data Center Networks. 29-34 - Yong Cui, Chunpeng Liao, Ivan Stojmenovic, Di Li, Hongyi Wang:

Cooperative Redundancy Elimination in Data Center Networks with Wireless Cards at Routers. 35-42 - Yuan Feng, Baochun Li, Bo Li:

Postcard: Minimizing Costs on Inter-Datacenter Traffic with Store-and-Forward. 43-50 - Weiwei Zhuang, Qingshan Jiang, Tengke Xiong:

An Intelligent Anti-phishing Strategy Model for Phishing Website Detection. 51-56 - Yuichi Ohsita

, Masayuki Murata
:
Data Center Network Topologies Using Optical Packet Switches. 57-64
PhoneCom 2012: The Second International Workshop on Sensing, Networking, and Computing with Smartphones
Session I: User, Social, and HCI
- Igor Pernek, Gregor Stiglic

, Peter Kokol
:
How Hard Am I Training? Using Smart Phones to Estimate Sport Activity Intensity. 65-68 - Kaori Fujinami, Satoshi Kouchi, Yuan Xue:

Design and Implementation of an On-body Placement-Aware Smartphone. 69-74 - Somasundaram Kothandapani, Dion Hoe-Lian Goh, Khasfariyati Razikin:

Influence of Playability and Usability in a Mobile Human Computation Game. 75-78 - Alvin Chin, Bin Xu, Fangxi Yin, Xia Wang, Wei Wang, Xiaoguang Fan, Dezhi Hong, Ying Wang:

Using Proximity and Homophily to Connect Conference Attendees in a Mobile Social Network. 79-87
Session II: Sensing, Location, and Networking
- Clemens Holzmann

, Matthias Hochgatterer:
Measuring Distance with Mobile Phones Using Single-Camera Stereo Vision. 88-93 - Jongwon Yoon, Sung-Bae Cho:

Mobile Intelligent Synthetic Character in Smartphone Using Behavior Selection Network. 94-97 - Peter Riedl, Rene Mayrhofer

:
Towards a Practical, Scalable Self-Localization System for Android Phones Based on WLAN Fingerprinting. 98-101 - Youngseol Lee, Sung-Bae Cho:

An Efficient Energy Management System for Android Phone Using Bayesian Networks. 102-107 - German Castignani, Alejandro Lampropulos, Alberto Blanc, Nicolas Montavont:

Wi2Me: A Mobile Sensing Platform for Wireless Heterogeneous Networks. 108-113 - Felix Büsching

, Sebastian Schildt
, Lars C. Wolf:
DroidCluster: Towards Smartphone Cluster Computing - The Streets are Paved with Potential Computer Clusters. 114-117
HotPOST 2012: The Fourth International Workshop on Hot Topics in Peer-to-Peer Computing and Online Social Networking
HotPOST 2012: Session 1
- Xuanjia Qiu, Wei Huang, Chuan Wu

, Zongpeng Li, Francis C. M. Lau:
Exploring the Sustainability of Credit-incentivized Peer-to-Peer Content Distribution. 118-126 - Jing Jiang, Zifei Shan, Wenpeng Sha, Xiao Wang, Yafei Dai:

Detecting and Validating Sybil Groups in the Wild. 127-132 - Feng Wang

, Haiyan Wang
, Kuai Xu
:
Diffusive Logistic Model Towards Predicting Information Diffusion in Online Social Networks. 133-139
HotPOST 2012: Session 2
- Stefanie Roos, Thorsten Strufe:

Provable Polylog Routing for Darknets. 140-146 - Junting Chen, James She:

An Analysis of Verifications in Microblogging Social Networks - Sina Weibo. 147-154 - Rammohan Narendula, Thanasis G. Papaioannou

, Karl Aberer:
Towards the Realization of Decentralized Online Social Networks: An Empirical Study. 155-162 - Feng Wang

, Kuai Xu
, Haiyan Wang
:
Discovering Shared Interests in Online Social Networks. 163-168
WWASN 2012: The Ninth Workshop on Wireless Ad Hoc and Sensor Networks
WWASN 2012: Session 1
- Liang Liu, Xiaolin Qin, Bohan Li, Yulei Liu, Guineng Zheng:

Energy-Efficient and Robust Spatial Window Aggregation Query Processing Algorithm in Wireless Sensor Networks. 169-177 - Jingzhe Du, Evangelos Kranakis

, Amiya Nayak
:
Cooperative Neighbor Discovery Protocol for a Wireless Network Using Two Antenna Patterns. 178-186 - Jie Zhou, Jiannong Cao

:
OSR: Optimal and Secure Routing Protocol in Multi-hop Wireless Networks. 187-193 - Zhuofan Liao, Shigeng Zhang, Jiannong Cao

, Weiping Wang, Jianxin Wang:
Minimizing Movement for Target Coverage in Mobile Sensor Networks. 194-200 - Hui Zhao, Ming Liu:

A Delay-Based Routing Protocol for Human-Oriented Delay Tolerant Mobile Sensor Network (DTMSN). 201-208 - Tian Wang, Weijia Jia

, Ping Shen:
BlueCat: An Efficient Way for Relative Mobile Localization. 209-215
WWASN 2012: Session 2
- Ilnaz Nikseresht, Hamed Yousefi, Ali Movaghar

, Mohammad Khansari
:
Interference-Aware Multipath Routing for Video Delivery in Wireless Multimedia Sensor Networks. 216-221 - Breeson Francis, Venkat Narasimhan, Amiya Nayak

, Ivan Stojmenovic:
Techniques for Enhancing TCP Performance in Wireless Networks. 222-230 - Weigang Wu, Haiqing Liu, Hejun Wu:

RES: A Robust and Efficient Snapshot Algorithm for Wireless Sensor Networks. 231-236 - Mouhannad Alattar, Françoise Sailhan, Julien Bourgeois

:
Trust-Enabled Link Spoofing Detection in MANET. 237-244 - Michael Fischer, Kui Wu, Pan Agathoklis:

Intelligent Illumination Model-Based Lighting Control. 245-249 - Reza Malekian

, Abdul Hanan Abdullah:
A Novel Approach to Improve Signal to Noise Ratio Based on Sector Antenna in Radio Networks. 250-253
CPNS 2012: The Second International Workshop on Cyber-physical Networking Systems
- Husheng Li, Robert Caiming Qiu, Zhiqiang Wu

:
Routing in Cyber Physical Systems with Application for Voltage Control in Microgrids: A Hybrid System Approach. 254-259 - Yuanyuan Zeng, Jie Wu, Naixue Xiong, Deshi Li:

Energy-Efficient Routing and Rate Allocation for Delay Tolerant Networks. 260-266 - Husheng Li:

System Stability Aware Multicast Routing in Cyber Physical Systems. 267-272 - Wei Li, Zimu Yuan, Biao Chen, Wei Zhao

:
Performance Comparison of Positioning Algorithms for Complex GPS Systems. 273-278
CPNS-TS2: Synchronization, Control, and Models
- Dechao Liu, Zhiyun Zheng, Zimu Yuan, Wei Li:

An Improved TPSN Algorithm for Time Synchronization in Wireless Sensor Network. 279-284 - Zhaoyang Zhang, Ken C. K. Lee, Honggang Wang

, Dong Xuan, Hua Fang
:
Epidemic Control Based on Fused Body Sensed and Social Network Information. 285-290 - Nauman Javed, Tilman Wolf

:
Automated Sensor Verification Using Outlier Detection in the Internet of Things. 291-296 - Kaliappa Ravindran:

Model-Based Engineering for Certification of Complex Adaptive Network Systems. 297-302 - Walid Taha, Paul Brauner, Yingfu Zeng, Robert Cartwright, Verónica Gaspes, Aaron D. Ames

, Alexandre Chapoutot
:
A Core Language for Executable Models of Cyber-Physical Systems (Preliminary Report). 303-308
CPNS-TS3: Systems and Applications
- Husheng Li:

Virtual Queue Based Distributed Data Traffic Scheduling for Cyber Physical Systems with Application in Smart Grid. 309-314 - Dapeng Wang, Jing Li, Kai Xing, Shan Jin, Kevin Liu:

Real-Time, Real-Location, and Real-Identity Service Information (R3SI) Based Application Enabled Mobile Service Architecture in Cellular Networks. 315-323 - Yaser P. Fallah

, Raja Sengupta:
A Cyber-physical Systems Approach to the Design of Vehicle Safety Networks. 324-329 - Shunqing Yan, Yongxin Zhu, Qiannan Zhang, Qin Wang, Ming Ni, Guangwei Xie:

A Case Study of CPNS Intelligence: Provenance Reasoning over Tracing Cross Contamination in Food Supply Chain. 330-335
ADSN 2012: The 11th International Workshop on Assurance in Distributed Systems and Networks
Session 1: Assurance Networks
- Yufeng Wang, Athanasios V. Vasilakos

, Qun Jin, Jianhua Ma:
On Studying Relationship between Altruism and the Psychological Phenomenon of Self-Deception in Rational and Autonomous Networks. 336-341 - Anri Kimura, Eitaro Kohno, Yoshiaki Kakuda:

Security and Dependability Enhancement of Wireless Sensor Networks with Multipath Routing Utilizing the Connectedness of Joint Nodes. 342-348
Session 2: Assurance-Driven Routing and Clustering
- Shohei Fujiwara, Tomoyuki Ohta, Yoshiaki Kakuda:

An Inter-domain Routing for Heterogeneous Mobile Ad Hoc Networks Using Packet Conversion and Address Sharing. 349-355 - Kenji Takagi, Yusuke Sakumoto, Chisa Takano, Masaki Aida:

On Convergence Rate of Autonomous Decentralized Structure Formation Technology for Clustering in Ad Hoc Networks. 356-361 - Md. Emdadul Haque, Xiaodong Lu, Kinji Mori:

Autonomous Local Coordination Technology for Congestion Control in Wireless Sensor Networks. 362-368
Session 3: Dependable Computing
- Wang Huan, Hidenori Nakazato:

Failure Detection in P2P-Grid Environments. 369-374 - Khalid Mahmood

, Hironao Takahashi, Yasukai Arakawa:
Gateway Access Permission Technology for High Assurance. 375-381 - Kaliappa Ravindran, Mohammad Rabby:

Replica Voting Based Mechanisms for Dissemination of Multi-modal Surveillance Data. 382-389
Session 4: Modeling and Architectures
- Takashi Kunifuji, Hiroshi Ito:

Realization of Flexible Railway System by Heterogeneous Real-Time Autonomous Integrating Architecture. 390-399 - Wei-Tek Tsai, Guanqiu Qi

, Yinong Chen
:
A Cost-Effective Intelligent Configuration Model in Cloud Computing. 400-408 - Chin-Tser Huang, Vipul Gupta:

Modeling and Automating Analysis of Server Duty and Client Obligation for High Assurance. 409-416
SPCC 2012: The Third International Conference on Security and Privacy in Cloud Computing
Technical Session I
- Wenjie Lin, David Lee:

Traceback Attacks in Cloud - Pebbletrace Botnet. 417-426 - Xiaoxin Wu, Donghui Wang:

On-Demand VPC Topology Construction for Virtual Perimeter Defense in Public Clouds. 427-435 - Jianping Wang

, Chunming Qiao, Raghuram S. Sudhaakar, Sateesh Addepalli, Yaohui Jin, Pablo Jesús Argibay-Losada:
Flow Inspection Router Assignment (FIRA) in Access/Aggregation Network Clouds. 436-445 - Angelos D. Keromytis, Roxana Geambasu, Simha Sethumadhavan, Salvatore J. Stolfo, Junfeng Yang, Azzedine Benameur, Marc Dacier

, Matthew C. Elder, Darrell M. Kienzle, Angelos Stavrou
:
The MEERKATS Cloud Security Architecture. 446-450 - Kai Wang, Yaxuan Qi, Baohua Yang, Yibo Xue, Jun Li:

LiveSec: Towards Effective Security Management in Large-Scale Production Networks. 451-460
Technical Session II
- Kuai Xu

, Feng Wang
, Lin Gu:
Profiling-as-a-Service in Multi-tenant Cloud Computing Environments. 461-465 - Ming Li, Shucheng Yu

, Wenjing Lou, Y. Thomas Hou
:
Toward Privacy-Assured Cloud Data Services with Flexible Search Functionalities. 466-470 - Yinqi Tang, Dawu Gu, Ning Ding, Haining Lu:

Phrase Search over Encrypted Data with Symmetric Encryption Scheme. 471-480 - Yan Zhu

, Di Ma
, Shan-Biao Wang:
Secure Data Retrieval of Outsourced Data with Complex Query Support. 481-490 - Vinícius Maia Pacheco, Ricardo Staciarini Puttini:

SaaS Anonymous Cloud Service Consumption Structure. 491-499
Technical Session III
- Khalid Nawaf Alharbi, Xiaodong Lin:

PDP: A Privacy-Preserving Data Provenance Scheme. 500-505 - Aiiad Albeshri

, Colin Boyd, Juan Manuel González Nieto:
GeoProof: Proofs of Geographic Location for Cloud Computing Environment. 506-514 - Bo Chen, Reza Curtmola:

Robust Dynamic Provable Data Possession. 515-525 - Yang Zhang, Junliang Chen:

Access Control as a Service for Public Cloud Storage. 526-536
NFSP 2012: The First International Workshop on Network Forensics, Security and Privacy
Session I: Forensics
- Shui Yu

, Wanlei Zhou
, Wanchun Dou, S. Kami Makki:
Why it is Hard to Fight against Cyber Criminals? 537-541 - Junwei Huang, Zhen Ling, Tao Xiang, Jie Wang, Xinwen Fu

:
When Digital Forensic Research Meets Laws. 542-551 - Juanru Li, Dawu Gu, Yuhao Luo:

Android Malware Forensics: Reconstruction of Malicious Events. 552-558 - Hongcheng Tian, Jun Bi

, Peiyao Xiao:
A Flow-Based Traceback Scheme on an AS-Level Overlay Network. 559-564 - James Mao, F. Yan, Kai-Hau Yeung

:
Trade-off between Being Attacked and Being Protected. 565-572
Session II: Authentication, Identification, and Privacy
- Pengfei You, Yuxing Peng, Weidong Liu, Shoufu Xue:

Security Issues and Solutions in Cloud Computing. 573-577 - Dawei Sun, Guiran Chang, Changsheng Miao, Xingwei Wang:

Building a High Serviceability Model by Checkpointing and Replication Strategy in Cloud Computing Environments. 578-587 - Jing Liu, Yang Xiao

, C. L. Philip Chen
:
Authentication and Access Control in the Internet of Things. 588-592 - Christoph Neumann, Olivier Heen, Stéphane Onno:

An Empirical Study of Passive 802.11 Device Fingerprinting. 593-602 - Liudong Xing, Honggang Wang

, Yujie Wang, Chaonan Wang:
Two-Party Trust Sensitivity Analysis for Social Networks. 603-607
Session III: Intrusion Detection and Prevention
- Moutaz Alazab

, Veelasha Moonsamy, Lynn Margaret Batten, Patrik Lantz
, Ronghua Tian:
Analysis of Malicious and Benign Android Applications. 608-616 - Jun Zhang

, Chao Chen, Yang Xiang
, Wanlei Zhou
:
Semi-supervised and Compound Classification of Network Traffic. 617-621 - Wahbeh H. Qardaji, Ninghui Li:

Anonymizing Network Traces with Temporal Pseudonym Consistency. 622-633 - Fuye Han, Zhen Chen, HongFeng Xu, Yong Liang:

Garlic: A Distributed Botnets Suppression System. 634-639 - Wenlin Han, Wei Xiong, Yang Xiao

, Magdy Ellabidy, Athanasios V. Vasilakos
, Naixue Xiong:
A Class of Non-statistical Traffic Anomaly Detection in Complex Network Systems. 640-646

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














