Default Cover Image

2011 31st International Conference on Distributed Computing Systems

June 20 2011 to June 24 2011

Minneapolis, Minnesota USA

ISSN: 1063-6927

ISBN: 978-0-7695-4364-2

Table of Contents

Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-xii
Papers
General Chair's WelcomeFreely available from IEEE.pp. xiii
Papers
Message from the Program ChairFreely available from IEEE.pp. xiv
Papers
Technical Program CommitteeFreely available from IEEE.pp. xv-xix
Papers
Provisioning a Multi-tiered Data Staging Area for Extreme-Scale MachinesFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Papers
Design and Analysis of a Distributed Multi-leg Stock Trading SystemFull-text access may be available. Sign in or learn about subscription options.pp. 13-24
Papers
YSmart: Yet Another SQL-to-MapReduce TranslatorFull-text access may be available. Sign in or learn about subscription options.pp. 25-36
Papers
PET: Probabilistic Estimating Tree for Large-Scale RFID EstimationFull-text access may be available. Sign in or learn about subscription options.pp. 37-46
Papers
End-to-End Delay Analysis in Wireless Network Coding: A Network Calculus-Based ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 47-56
Papers
An Energy-Efficient Markov Chain-Based Randomized Duty Cycling Scheme for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 67-76
Papers
M-PSM: Mobility-Aware Power Save Mode for IEEE 802.11 WLANsFull-text access may be available. Sign in or learn about subscription options.pp. 77-86
Papers
SOFA: A Sleep-Optimal Fair-Attention Scheduler for the Power-Saving Mode of WLANsFull-text access may be available. Sign in or learn about subscription options.pp. 87-98
Papers
Meeting the Digital Rights Requirements of Live Broadcast in a Peer-to-Peer NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 99-108
Papers
Peer-to-Peer Data Replication Meets Delay Tolerant NetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 109-120
Papers
On the Dependencies between Source Neighbors in Optimally DoS-stable P2P Streaming TopologiesFull-text access may be available. Sign in or learn about subscription options.pp. 121-130
Papers
Intelligent Placement of Datacenters for Internet ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 131-142
Papers
Data Migration in Heterogeneous Storage SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 143-150
Papers
Supporting Cooperative Caching in Disruption Tolerant NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 151-161
Papers
Effective Channel Exploitation in IEEE 802.16j Networks for Maritime CommunicationsFull-text access may be available. Sign in or learn about subscription options.pp. 162-171
Papers
Accuracy-Aware Interference Modeling and Measurement in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 172-181
Papers
Coolest Path: Spectrum Mobility Aware Routing Metrics in Cognitive Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 182-191
Papers
A MapReduce-Based Maximum-Flow Algorithm for Large Small-World Network GraphsFull-text access may be available. Sign in or learn about subscription options.pp. 192-202
Papers
The Client Assignment Problem for Continuous Distributed Interactive ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 203-214
Papers
Guidelines for the Verification of Population ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 215-224
Papers
Scaling Construction of Low Fan-out Overlays for Topic-Based Publish/Subscribe SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 225-236
Papers
Dissecting Video Server Selection Strategies in the YouTube CDNFull-text access may be available. Sign in or learn about subscription options.pp. 248-257
Papers
Resource Allocation for Medium Grain Scalable Videos over Femtocell Cognitive Radio NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 258-267
Papers
CloudMedia: When Cloud on Demand Meets Video on DemandFull-text access may be available. Sign in or learn about subscription options.pp. 268-277
Papers
Correlated Resource Models of Internet End HostsFull-text access may be available. Sign in or learn about subscription options.pp. 278-287
Papers
Time-Dependent Broadband Pricing: Feasibility and BenefitsFull-text access may be available. Sign in or learn about subscription options.pp. 288-298
Papers
Partitioning Network Testbed ExperimentsFull-text access may be available. Sign in or learn about subscription options.pp. 299-309
Papers
TCP Congestion Avoidance Algorithm IdentificationFull-text access may be available. Sign in or learn about subscription options.pp. 310-321
Papers
What is Missing in Current Checkpoint Interval Models?Full-text access may be available. Sign in or learn about subscription options.pp. 322-332
Papers
Scalable Symbolic Execution of Distributed SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 333-342
Papers
A Scheduling and Certification Algorithm for Defeating Collusion in Desktop GridsFull-text access may be available. Sign in or learn about subscription options.pp. 343-352
Papers
A Self-stabilizing (k,r)-clustering Algorithm with Multiple Paths for Wireless Ad-hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 353-362
Papers
SpotME If You Can: Randomized Responses for Location Obfuscation on Mobile PhonesFull-text access may be available. Sign in or learn about subscription options.pp. 363-372
Papers
HCPP: Cryptography Based Secure EHR System for Patient Privacy and Emergency HealthcareFull-text access may be available. Sign in or learn about subscription options.pp. 373-382
Papers
Authorized Private Keyword Search over Encrypted Data in Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 383-392
Papers
Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 393-402
Papers
Delay-Cognizant Reliable Delivery for Publish/Subscribe Overlay NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 403-412
Papers
Reducing the Delay and Power Consumption of Web Browsing on Smartphones in 3G NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 413-422
Papers
Energy-Aware Scheduling in Disk Storage SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 423-433
Papers
Tians Scheduling: Using Partial Processing in Best-Effort ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 434-445
Papers
Starlink: Runtime Interoperability between Heterogeneous Middleware ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 446-455
Papers
WHISPER: Middleware for Confidential Communication in Large-Scale NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 456-466
Papers
sfatables: A Firewall-like Policy Engine for Federated SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 467-476
Papers
Impact of Mobility and Heterogeneity on Coverage and Energy Consumption in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 477-487
Cool: On Coverage with Solar-Powered SensorsFull-text access may be available. Sign in or learn about subscription options.pp. 488-496
Papers
LR-Seluge: Loss-Resilient and Secure Code Dissemination in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 497-506
Papers
Competitive and Fair Medium Access Despite Reactive JammingFull-text access may be available. Sign in or learn about subscription options.pp. 507-516
Papers
Localizing Multiple Jamming Attackers in Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 517-528
Papers
JR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 529-538
Papers
Cloud4Home -- Enhancing Data Services with @Home CloudsFull-text access may be available. Sign in or learn about subscription options.pp. 539-548
Papers
Harnessing the Cloud for Securely Solving Large-Scale Systems of Linear EquationsFull-text access may be available. Sign in or learn about subscription options.pp. 549-558
Papers
A Cost-Aware Elasticity Provisioning System for the CloudFull-text access may be available. Sign in or learn about subscription options.pp. 559-570
Papers
Secure Aggregation with Malicious Node Revocation in Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 581-592
Papers
Defending Against Traffic Analysis in Wireless Networks through Traffic ReshapingFull-text access may be available. Sign in or learn about subscription options.pp. 593-602
Papers
Confidential GossipFull-text access may be available. Sign in or learn about subscription options.pp. 603-612
Papers
Understanding the Network and User-Targeting Properties of Web Advertising NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 613-622
Papers
Cache Miss Analysis for GPU Programs Based on Stack Distance ProfileFull-text access may be available. Sign in or learn about subscription options.pp. 623-634
Papers
BloomFlash: Bloom Filter on Flash-Based StorageFull-text access may be available. Sign in or learn about subscription options.pp. 635-644
Papers
Understanding Vicious Cycles in Server ClustersFull-text access may be available. Sign in or learn about subscription options.pp. 645-654
Papers
Searching for Bandwidth-Constrained ClustersFull-text access may be available. Sign in or learn about subscription options.pp. 655-664
Papers
Smart Redundancy for Distributed ComputationFull-text access may be available. Sign in or learn about subscription options.pp. 665-676
Papers
Fused Data Structures for Handling Multiple Faults in Distributed SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 677-688
Papers
Low-Overhead Fault Tolerance for High-Throughput Data Processing SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 689-699
Papers
Guaranteeing High Availability Goals for Virtual Machine PlacementFull-text access may be available. Sign in or learn about subscription options.pp. 700-709
Papers
Efficient and Private Access to Outsourced DataFull-text access may be available. Sign in or learn about subscription options.pp. 710-719
Papers
Towards Fine-Grained Access Control in JavaScript ContextsFull-text access may be available. Sign in or learn about subscription options.pp. 720-729
Papers
A New Class of Buffer Overflow AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 730-739
Papers
Location Cheating: A Security Challenge to Location-Based Social Network ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 740-749
Papers
A Monte Carlo Method for Mobile Target CountingFull-text access may be available. Sign in or learn about subscription options.pp. 750-759
Papers
Whistle: Synchronization-Free TDOA for LocalizationFull-text access may be available. Sign in or learn about subscription options.pp. 760-769
Papers
Bubble Trace: Mobile Target Tracking under Insufficient Anchor CoverageFull-text access may be available. Sign in or learn about subscription options.pp. 770-779
Papers
Efficient and Robust Localization of Multiple Radiation Sources in Complex EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 780-789
Papers
Towards Approximate Event Processing in a Large-Scale Content-Based NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 790-799
Papers
Foundations for Highly Available Content-Based Publish/Subscribe OverlaysFull-text access may be available. Sign in or learn about subscription options.pp. 800-811
Papers
Green Resource Allocation Algorithms for Publish/Subscribe SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 812-823
Papers
Split and Subsume: Subscription Normalization for Effective Content-Based MessagingFull-text access may be available. Sign in or learn about subscription options.pp. 824-835
Papers
One More Weight is Enough: Toward the Optimal Traffic Engineering with OSPFFull-text access may be available. Sign in or learn about subscription options.pp. 836-846
Papers
The Routing Continuum from Shortest-Path to All-Path: A Unifying TheoryFull-text access may be available. Sign in or learn about subscription options.pp. 847-856
Papers
Greedy Distance Vector RoutingFull-text access may be available. Sign in or learn about subscription options.pp. 857-868
Papers
Making CDN and ISP Routings SymbioticFull-text access may be available. Sign in or learn about subscription options.pp. 869-878
Papers
SID: Ship Intrusion Detection with Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 879-888
Papers
Compressive Sensing Approach to Urban Traffic SensingFull-text access may be available. Sign in or learn about subscription options.pp. 889-898
Papers
Towards Optimal Sensor Placement for Hot Server Detection in Data CentersFull-text access may be available. Sign in or learn about subscription options.pp. 899-908
Papers
E-Shadow: Lubricating Social Interaction Using Mobile PhonesFull-text access may be available. Sign in or learn about subscription options.pp. 909-918
Papers
Author IndexFreely available from IEEE.pp. 919-922
Papers
[Publisher Information]Freely available from IEEE.pp. 924
Showing 96 out of 96