Default Cover Image

26th IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW'06)

July 4 2006 to July 7 2006

Lisboa, Portugal

Table of Contents

Introduction
Message from the WWASN2006 ChairsFreely available from IEEE.pp. xxxiv
Introduction
Message from the Workshop Co-chairsFreely available from IEEE.pp. xv
Introduction
DEBS Introduction 2006Freely available from IEEE.pp. xxii
Introduction
ADSN Program CommitteeFreely available from IEEE.pp. xvi
Introduction
ADSN ForewordFreely available from IEEE.pp. xvii-xvii
Introduction
DABI Program CommitteeFreely available from IEEE.pp. xviii
Introduction
IWDDS 2006 CommitteeFreely available from IEEE.pp. xix
Introduction
IWDDS 2006 ForewordFreely available from IEEE.pp. xx-xx
Introduction
DEBS 2006 Program CommitteeFreely available from IEEE.pp. xxi
Introduction
IBC 2006 - CommitteeFreely available from IEEE.pp. xxiii
Introduction
IBC Foreword 2006Freely available from IEEE.pp. xxiv-xxiv
Introduction
MNSA 2006 Program CommitteeFreely available from IEEE.pp. xxv
Introduction
MNSA 2006 ForewordFreely available from IEEE.pp. xxvi-xxvi
Introduction
IWSAWC 2006 Program CommitteeFreely available from IEEE.pp. xxvii
Introduction
IWSAWC 2006 ForewordFreely available from IEEE.pp. xxviii-xxviii
Introduction
SIUMI 2006 COMMITTEEFreely available from IEEE.pp. xxx
Introduction
SIUMI 2006 ForewordFreely available from IEEE.pp. xxxi-xxxi
Introduction
P2P/DAKS 2006 ForewordFreely available from IEEE.pp. xxxii-xxxii
Introduction
P2P/DAKS 2006 Program CommitteeFreely available from IEEE.pp. xxxiii
Introduction
WWASN 2006 Organizing CommitteeFreely available from IEEE.pp. xxxv
Session 1: Keynote Address
Thou Shalt Not Trust non-Trustworthy SystemsFull-text access may be available. Sign in or learn about subscription options.pp. xxxviii
Session 2: Robust and Efficient Networking
GOLI: Greedy On-Demand Routing Scheme Using Location Information for Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1
Session 2: Robust and Efficient Networking
High Reliability in Autonomous Decentralized IC Card Ticket SystemFull-text access may be available. Sign in or learn about subscription options.pp. 2
Session 2: Robust and Efficient Networking
Fault-diameter of generalized Cartesian productsFull-text access may be available. Sign in or learn about subscription options.pp. 3
Session 3: Verification
Concurrency Tradeoffs in Dynamic AdaptationFull-text access may be available. Sign in or learn about subscription options.pp. 4
Session 3: Verification
Fault-Tolerance Verification of the Fluids and Combustion Facility of the International Space StationFull-text access may be available. Sign in or learn about subscription options.pp. 5
Session 4: Signals and Signaling Assurance
An Evaluation of the Effectiveness of Measurement-based Anomaly Detection TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 6
Session 4: Signals and Signaling Assurance
Assurance Technologies for Signal Control System by Optical LANFull-text access may be available. Sign in or learn about subscription options.pp. 7
Session 4: Signals and Signaling Assurance
Implementation and Performance Study of a New NAT/Firewall Signaling ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 8
Session 1: Keynote Address
From static distributed systems to dynamic systems: an approach for a first stepFull-text access may be available. Sign in or learn about subscription options.pp. xxxvi
Session I. B.: Clustering And Coordination in Dynamic Ad Hoc Networks
CoCoA: Coordinated Cooperative Localization for Mobile Multi-Robot Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 9
Session I. B.: Clustering And Coordination in Dynamic Ad Hoc Networks
A k-hop Clustering Protocol for Dense Mobile Ad-Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 10
Session II: Overlay Networks
The Bootstrapping ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 11
Session II: Overlay Networks
Network-Aware Overlays with Network CoordinatesFull-text access may be available. Sign in or learn about subscription options.pp. 12
Session II: Overlay Networks
Evaluation of Unstructured Overlay Maintenance Protocols under ChurnFull-text access may be available. Sign in or learn about subscription options.pp. 13
Session III.A: Keynote Address
Publish/Subscribe on the top of Overlay networks: when subscription dynamics meet churnFull-text access may be available. Sign in or learn about subscription options.pp. xxxvii
Session III.B.: Cooperative Applications in Dynamic Systems
Decentralized Electronic MailFull-text access may be available. Sign in or learn about subscription options.pp. 14
Session III.B.: Cooperative Applications in Dynamic Systems
Saving Energy and Reducing Latency in MANET File AccessFull-text access may be available. Sign in or learn about subscription options.pp. 15
Session IV: Distributed Applications for B2B Integration
Semantic Data Extraction for B2B IntegrationFull-text access may be available. Sign in or learn about subscription options.pp. 16
Session IV: Distributed Applications for B2B Integration
Automatic Web Service Composition Using ConGologFull-text access may be available. Sign in or learn about subscription options.pp. 17
Session IV: Distributed Applications for B2B Integration
Benchmarking a Semantic Web Service Architecture for Fault-tolerant B2B IntegrationFull-text access may be available. Sign in or learn about subscription options.pp. 18
Session 1: General Publish/Subscribe Considerations
Revisiting Content-Based Publish/SubscribeFull-text access may be available. Sign in or learn about subscription options.pp. 19
Session 1: General Publish/Subscribe Considerations
On Quality-of-Service and Publish-SubscribeFull-text access may be available. Sign in or learn about subscription options.pp. 20
Session 2: Applications I
Preventing Spam in Publish/SubscribeFull-text access may be available. Sign in or learn about subscription options.pp. 21
Session 2: Applications I
An Event Service Supporting Autonomic Management of Ubiquitous Systems for e-HealthFull-text access may be available. Sign in or learn about subscription options.pp. 22
Session 3: Applications II
Automatic Subscriptions In Publish-Subscribe SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 23
Session 3: Applications II
Semantic and Rule Based Event-driven Services-Oriented Agricultural Recommendation SystemFull-text access may be available. Sign in or learn about subscription options.pp. 24
Session 4: Performance I
Dimension-Based Subscription Pruning for Publish/Subscribe SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 25
Session 4: Performance I
Throughput Performance of Java Messaging Services Using WebsphereMQFull-text access may be available. Sign in or learn about subscription options.pp. 26
Session 4: Performance II
Finding Optimal Join Tree forMulti-Join Stream Queries in a Production SystemFull-text access may be available. Sign in or learn about subscription options.pp. 27
Session 4: Performance II
Reducing Latency in Rendezvous-Based Publish-Subscribe Systems for Wireless Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 28
Session 6: Systems Reconfiguration
Reconfiguring Publish/Subscribe Overlay TopologiesFull-text access may be available. Sign in or learn about subscription options.pp. 29
Session 6: Systems Reconfiguration
Preservation of Correctness During System Reconfiguration in Data Distribution Service for Real-Time Systems (DDS)Full-text access may be available. Sign in or learn about subscription options.pp. 30
Session 6: Accuracy and Quality
On The Accuracy of Event Distribution Lists for Publish/Subscribe in Dynamic Distributed SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 31
Session 6: Accuracy and Quality
Handling Overload in Publish/Subscribe SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 32
Session 6: Accuracy and Quality
Coping with Variable Latency and Disorder in Distributed Event StreamsFull-text access may be available. Sign in or learn about subscription options.pp. 33
Session 7: Programming and Testing
Specification-Based Unit Testing of Publish/Subscribe ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 34
IBC 2006 Program
Multi-radio channel allocation in competitive wireless networksFull-text access may be available. Sign in or learn about subscription options.pp. 36
IBC 2006 Program
The Power of the DefenderFull-text access may be available. Sign in or learn about subscription options.pp. 37
IBC 2006 Program
Interdomain Routing as Social ChoiceFull-text access may be available. Sign in or learn about subscription options.pp. 38-38
IBC 2006 Program
Flow-based resource allocation in a multiple-access wireless market-setting using an auctionFull-text access may be available. Sign in or learn about subscription options.pp. 39
IBC 2006 Program
Enforcing Truthful-Rating Equilibria in Electronic MarketplacesFull-text access may be available. Sign in or learn about subscription options.pp. 40
IBC 2006 Program
WS-Auction: Mechanism Design for aWeb Services MarketFull-text access may be available. Sign in or learn about subscription options.pp. 41
Session 1: Distributed Multimedia Networking
Distributed Coordination for Scalable Multimedia Streaming ModelFull-text access may be available. Sign in or learn about subscription options.pp. 42
Session 1: Distributed Multimedia Networking
Designing a Video-on-Demand System for a Brazilian High Speed NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 43
Session 1: Distributed Multimedia Networking
A Propagation of Virtual Space Information Using a Peer-to-peer Architecture for Massively Multiplayer Online GamesFull-text access may be available. Sign in or learn about subscription options.pp. 44
Session 2: Multimedia Tools and Systems
Concurrency Control in Multi-Role AssociationFull-text access may be available. Sign in or learn about subscription options.pp. 45
Session 2: Multimedia Tools and Systems
Performance Evaluation of the . Accrual Failure DetectorFull-text access may be available. Sign in or learn about subscription options.pp. 46
Session 2: Multimedia Tools and Systems
Motion Analysis for the Standing Long JumpFull-text access may be available. Sign in or learn about subscription options.pp. 47
Session 2: Multimedia Tools and Systems
COCA: A Contract-Based Infrastructure for Composing Adaptive Multimedia SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 48
Session 3: Distributed Multimedia Applications
An Application of Question Answering System for Collaborative LearningFull-text access may be available. Sign in or learn about subscription options.pp. 49
Session 3: Distributed Multimedia Applications
Evaluation of Automatic Generation of an Instruction Set Simulator for Educational UseFull-text access may be available. Sign in or learn about subscription options.pp. 50
Session 3: Distributed Multimedia Applications
Robust Wide Disaster Information and Sharing System over Japan Gigabit NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 51
Session 3: Distributed Multimedia Applications
Study of Server Workload in Large Online NewspaperFull-text access may be available. Sign in or learn about subscription options.pp. 52
Session 4: Advanced Internet Technologies for Multimedia Systems
SIP Terminal Mobility for both IPv4 and IPv6Full-text access may be available. Sign in or learn about subscription options.pp. 53
Session 4: Advanced Internet Technologies for Multimedia Systems
Evaluation of a Network Extraction Topology Algorithm for Reducing Search Space of a GA-based Routing ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 54-54
Session 4: Advanced Internet Technologies for Multimedia Systems
Using an Interpolation Algorithm for VCR like Functions in Multimedia CommunicationsFull-text access may be available. Sign in or learn about subscription options.pp. 55
Session 4: Advanced Internet Technologies for Multimedia Systems
Enhanced PCF Protocols for Real-time Multimedia Services over 802.11 Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 56
Session 1: Prototyping and Context Recognition
Restriction, Modification and Extension of Consumer Devices for Prototyping Ubiquitous Computing EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 57
Session 1: Prototyping and Context Recognition
Dealing with Class Skew in Context RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 58
Session 2: Architectures
AwareOffice: Integrating Modular Context-Aware ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 59
Session 2: Architectures
Architecture for Providing Services in the Ubiquitous Computing EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 60
Session 2: Architectures
Sharing sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 61
Session 3: Novel User Interfaces
The Key KnobFull-text access may be available. Sign in or learn about subscription options.pp. 62
Session 3: Novel User Interfaces
Developing Gestural InputFull-text access may be available. Sign in or learn about subscription options.pp. 63
Session 3: Novel User Interfaces
Thracker - Using Capacitive Sensing for Gesture RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 64
Session 4: Wearable Computing
Flexible Network Infrastructure for Wearable Computing Using Conductive Fabric and Its EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 65
Session 4: Wearable Computing
Fair Dice: A Tilt and Motion-Aware Cube with a ConscienceFull-text access may be available. Sign in or learn about subscription options.pp. 66
Session 4: Wearable Computing
Wearable Computer for Ubiquitous Informal CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 67
Session 1: Middleware for Context Aware Provisioning
Contory: A Smart Phone Middleware Supporting Multiple Context Provisioning StrategiesFull-text access may be available. Sign in or learn about subscription options.pp. 68
Session 1: Middleware for Context Aware Provisioning
SIP-Based Proactive Handoff Management for Session Continuity in the Wireless InternetFull-text access may be available. Sign in or learn about subscription options.pp. 69
Session 1: Middleware for Context Aware Provisioning
Service Plans for Context- and QoS-aware Dynamic MiddlewareFull-text access may be available. Sign in or learn about subscription options.pp. 70
Session 2: Application Provisioning and Novel Application Areas
An OptimizedWorkload for Failure Data Analysis of Mobile P2P over Bluetooth Ad-Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 71
Session 2: Application Provisioning and Novel Application Areas
Quality Composition in Web-Service DesignFull-text access may be available. Sign in or learn about subscription options.pp. 72
Session A: Trust and Learning
Fuzzy Trust for Peer-to-Peer SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 73
Session A: Trust and Learning
Trustworthiness of Peers Based on Access Control in Peer-to-Peer Overlay NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 74
Session A: Trust and Learning
Improve Searching by Reinforcement Learning in Unstructured P2PsFull-text access may be available. Sign in or learn about subscription options.pp. 75
Showing 100 out of 116