Default Cover Image

2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW)

June 30 2014 to July 3 2014

Madrid

Table of Contents

[Title page i]Freely available from IEEE.pp. i-i
[Title page iii]Freely available from IEEE.pp. iii-iii
[Copyright notice]Freely available from IEEE.pp. iv-iv
Table of contentsFreely available from IEEE.pp. v-viii
Welcome Message from the Workshop Co-ChairsFreely available from IEEE.pp. ix-ix
Message from the HotPOST 2014 Workshop OrganizersFreely available from IEEE.pp. x-x
HotPOST 2014 CommitteesFreely available from IEEE.pp. xi-xii
Message from the DCPerf 2014 Workshop OrganizersFreely available from IEEE.pp. xiii-xiii
DCPerf 2014 CommitteesFreely available from IEEE.pp. xiv-xv
Message from the ADSN 2014 Workshop OrganizersFreely available from IEEE.pp. xvi-xvi
ADSN 2014 CommitteesFreely available from IEEE.pp. xvii-xviii
Message from the DASec 2014 Workshop OrganizersFreely available from IEEE.pp. xix-xix
DASec 2014 CommitteesFreely available from IEEE.pp. xx-xx
Decentralized Adaptive Helper Selection in Multi-channel P2P Streaming SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Are Circles Communities? A Comparative Analysis of Selective Sharing in Google+Full-text access may be available. Sign in or learn about subscription options.pp. 8-15
Friend or Flood? Social Prevention of Flooding Attacks in Mobile Opportunistic NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 16-21
Secure Fallback Authentication and the Trusted Friend AttackFull-text access may be available. Sign in or learn about subscription options.pp. 22-28
Socially-Optimal ISP-Aware P2P Content Distribution via a Primal-Dual ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 29-36
Let Our Browsers Socialize: Building User-Centric Content Communities on WebRTCFull-text access may be available. Sign in or learn about subscription options.pp. 37-44
A Hybrid Cloud Architecture for a Social Science Research Computing Data CenterFull-text access may be available. Sign in or learn about subscription options.pp. 45-50
Impact of Ethernet Multipath Routing on Data Center Network ConsolidationsFull-text access may be available. Sign in or learn about subscription options.pp. 57-62
Controlling the Delay of Small Flows in DatacentersFull-text access may be available. Sign in or learn about subscription options.pp. 70-75
Deploying and Extending On-Premise Cloud Storage Based on ownCloudFull-text access may be available. Sign in or learn about subscription options.pp. 76-81
Behavioral Security Threat Detection Strategies for Data Center Switches and RoutersFull-text access may be available. Sign in or learn about subscription options.pp. 82-87
OS-Assisted Task Preemption for HadoopFull-text access may be available. Sign in or learn about subscription options.pp. 94-99
Data Center Network Throughput Analysis Using Queueing Petri NetsFull-text access may be available. Sign in or learn about subscription options.pp. 100-105
On Balance among Energy, Performance and Recovery in Storage SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 106-112
Dynamic Scheduling for Speculative Execution to Improve MapReduce Performance in Heterogeneous EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 119-124
Preserving Routes during Fast ConvergenceFull-text access may be available. Sign in or learn about subscription options.pp. 125-132
An Efficient Edge-Based Authentication for Network Coding against Entropy AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 133-139
On Parameters for the Secure Dispersed Data Transfer Scheme Using a Multipath Routing MethodFull-text access may be available. Sign in or learn about subscription options.pp. 140-145
Model-Based Engineering Techniques for QoS Auditing in Distributed Cloud ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 146-153
Analysis of Permanent Faults in Transaction Level SystemC ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 154-160
Protection Mechanism in Privileged Memory Space for Embedded Systems, Real-Time OSFull-text access may be available. Sign in or learn about subscription options.pp. 161-166
Vehicular Coordination via a Safety Kernel in the Gulliver Test-BedFull-text access may be available. Sign in or learn about subscription options.pp. 167-176
Privacy Preserving Statistics in the Smart GridFull-text access may be available. Sign in or learn about subscription options.pp. 182-187
Content and Popularity Analysis of Tor Hidden ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 188-193
A Criticism to Society (As Seen by Twitter Analytics)Full-text access may be available. Sign in or learn about subscription options.pp. 194-200
MDoctor: A Mobile Malware Prognosis ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 201-206
A Software Architecture for Progressive Scanning of On-line CommunitiesFull-text access may be available. Sign in or learn about subscription options.pp. 207-212
Author IndexFreely available from IEEE.pp. 213-214
[Publisher's information]Freely available from IEEE.pp. 216-216
Showing 47 out of 47