Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICDCSW
ICDCSW 2014
Generate Citations
2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW)
June 30 2014 to July 3 2014
Madrid
Table of Contents
[Title page i]
Freely available from IEEE.
pp. i-i
[Title page iii]
Freely available from IEEE.
pp. iii-iii
[Copyright notice]
Freely available from IEEE.
pp. iv-iv
Table of contents
Freely available from IEEE.
pp. v-viii
Welcome Message from the Workshop Co-Chairs
Freely available from IEEE.
pp. ix-ix
Message from the HotPOST 2014 Workshop Organizers
Freely available from IEEE.
pp. x-x
HotPOST 2014 Committees
Freely available from IEEE.
pp. xi-xii
Message from the DCPerf 2014 Workshop Organizers
Freely available from IEEE.
pp. xiii-xiii
DCPerf 2014 Committees
Freely available from IEEE.
pp. xiv-xv
Message from the ADSN 2014 Workshop Organizers
Freely available from IEEE.
pp. xvi-xvi
ADSN 2014 Committees
Freely available from IEEE.
pp. xvii-xviii
Message from the DASec 2014 Workshop Organizers
Freely available from IEEE.
pp. xix-xix
DASec 2014 Committees
Freely available from IEEE.
pp. xx-xx
Decentralized Adaptive Helper Selection in Multi-channel P2P Streaming Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Seyedakbar Mostafavi
,
Mehdi Dehghan
Are Circles Communities? A Comparative Analysis of Selective Sharing in Google+
Full-text access may be available. Sign in or learn about subscription options.
pp. 8-15
by
Steffen Brauer
,
Thomas C. Schmidt
Friend or Flood? Social Prevention of Flooding Attacks in Mobile Opportunistic Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 16-21
by
Iain Parris
,
Tristan Henderson
Secure Fallback Authentication and the Trusted Friend Attack
Full-text access may be available. Sign in or learn about subscription options.
pp. 22-28
by
Ashar Javed
,
David Bletgen
,
Florian Kohlar
,
Markus Dürmuth
,
Jörg Schwenk
Socially-Optimal ISP-Aware P2P Content Distribution via a Primal-Dual Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 29-36
by
Jian Zhao
,
Chuan Wu
Let Our Browsers Socialize: Building User-Centric Content Communities on WebRTC
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-44
by
Max Jonas Werner
,
Christian Vogt
,
Thomas C. Schmidt
A Hybrid Cloud Architecture for a Social Science Research Computing Data Center
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-50
by
Steven Abramson
,
William Horka
,
Leonard Wisniewski
Exercising High-Level Parallel Programming on Streams: A Systems Biology Use Case
Full-text access may be available. Sign in or learn about subscription options.
pp. 51-56
by
Marco Aldinucci
,
Maurizio Drocco
,
Guilherme Peretti Pezzi
,
Claudia Misale
,
Fabio Tordini
,
Massimo Torquati
Impact of Ethernet Multipath Routing on Data Center Network Consolidations
Full-text access may be available. Sign in or learn about subscription options.
pp. 57-62
by
Dallal Belabed
,
Stefano Secci
,
Guy Pujolle
,
Deep Medhi
Cayley-Graph-Based Data Centers and Space Requirements of a Routing Scheme Using Automata
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-69
by
Miguel Camelo
,
Pere Vilà
,
Lluís Fàbrega
,
Dimitri Papadimitriou
Controlling the Delay of Small Flows in Datacenters
Full-text access may be available. Sign in or learn about subscription options.
pp. 70-75
by
Damiano Carra
Deploying and Extending On-Premise Cloud Storage Based on ownCloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 76-81
by
Thomas Hildmann
,
Odej Kao
Behavioral Security Threat Detection Strategies for Data Center Switches and Routers
Full-text access may be available. Sign in or learn about subscription options.
pp. 82-87
by
Ram Krishnan
,
Dilip Krishnaswamy
,
Dave Mcdysan
Automated Modeling of I/O Performance and Interference Effects in Virtualized Storage Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 88-93
by
Qais Noorshams
,
Axel Busch
,
Andreas Rentschler
,
Dominik Bruhn
,
Samuel Kounev
,
Petr Tuma
,
Ralf Reussner
OS-Assisted Task Preemption for Hadoop
Full-text access may be available. Sign in or learn about subscription options.
pp. 94-99
by
Mario Pastorelli
,
Matteo Dellámico
,
Pietro Michiardi
Data Center Network Throughput Analysis Using Queueing Petri Nets
Full-text access may be available. Sign in or learn about subscription options.
pp. 100-105
by
Piotr Rygielski
,
Samuel Kounev
On Balance among Energy, Performance and Recovery in Storage Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 106-112
by
Junyao Zhang
,
Jiangling Yin
,
Jun Wang
,
Jian Zhou
A Control Method of Guaranteeing Throughput for TCP Communication Considering Handover over WLAN
Full-text access may be available. Sign in or learn about subscription options.
pp. 113-118
by
Hiroyasu Obata
,
Ayaka Momota
,
Junichi Funasaka
,
Kenji Ishida
Dynamic Scheduling for Speculative Execution to Improve MapReduce Performance in Heterogeneous Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 119-124
by
Hyungjae Jung
,
Hidenori Nakazato
Preserving Routes during Fast Convergence
Full-text access may be available. Sign in or learn about subscription options.
pp. 125-132
by
Jorge A. Cobb
An Efficient Edge-Based Authentication for Network Coding against Entropy Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-139
by
Ryo Iguchi
,
Yoshifumi Manabe
On Parameters for the Secure Dispersed Data Transfer Scheme Using a Multipath Routing Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 140-145
by
Eitaro Kohno
,
Anri Kimura
,
Yoshiaki Kakuda
Model-Based Engineering Techniques for QoS Auditing in Distributed Cloud Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 146-153
by
Kaliappa Ravindran
Analysis of Permanent Faults in Transaction Level SystemC Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 154-160
by
Reza Hajisheykhi
,
Ali Ebnenasir
,
Sandeep S. Kulkarni
Protection Mechanism in Privileged Memory Space for Embedded Systems, Real-Time OS
Full-text access may be available. Sign in or learn about subscription options.
pp. 161-166
by
Shimpei Yamada
,
Yukikazu Nakamoto
Vehicular Coordination via a Safety Kernel in the Gulliver Test-Bed
Full-text access may be available. Sign in or learn about subscription options.
pp. 167-176
by
António Casimiro
,
Oscar Morales Ponce
,
Thomas Petig
,
Elad M. Schiller
Machine-Learning-Based Feature Selection Techniques for Large-Scale Network Intrusion Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 177-181
by
O.Y. Al-Jarrah
,
A. Siddiqui
,
M. Elsalamouny
,
P.D. Yoo
,
S. Muhaidat
,
K. Kim
Privacy Preserving Statistics in the Smart Grid
Full-text access may be available. Sign in or learn about subscription options.
pp. 182-187
by
Iraklis Leontiadis
,
Refik Molva
,
Melek Önen
Content and Popularity Analysis of Tor Hidden Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 188-193
by
Alex Biryukov
,
Ivan Pustogarov
,
Fabrice Thill
,
Ralf-Philipp Weinmann
A Criticism to Society (As Seen by Twitter Analytics)
Full-text access may be available. Sign in or learn about subscription options.
pp. 194-200
by
Stefano Cresci
,
Marinella Petrocchi
,
Angelo Spognardi
,
Maurizio Tesconi
,
Roberto Di Pietro
MDoctor: A Mobile Malware Prognosis Application
Full-text access may be available. Sign in or learn about subscription options.
pp. 201-206
by
Eemil Lagerspetz
,
Hien Thi Thu Truong
,
Sasu Tarkoma
,
N. Asokan
A Software Architecture for Progressive Scanning of On-line Communities
Full-text access may be available. Sign in or learn about subscription options.
pp. 207-212
by
Roberto Baldoni
,
Fabrizio DAmore
,
Massimo Mecella
,
Daniele Ucci
Author Index
Freely available from IEEE.
pp. 213-214
[Publisher's information]
Freely available from IEEE.
pp. 216-216
Showing 47 out of 47