Default Cover Image

2016 IEEE 15th International Symposium on Network Computing and Applications (NCA)

Oct. 31 2016 to Nov. 2 2016

Cambridge, Boston, MA, USA

Table of Contents

ProceedingsFreely available from IEEE.pp. ii-ii
ProceedingsFreely available from IEEE.pp. iii-iii
Copyright pageFreely available from IEEE.pp. iv-iv
Table of contentsFreely available from IEEE.pp. v-xii
Conference committeeFreely available from IEEE.pp. xv-xv
Technical program commiteeFreely available from IEEE.pp. xvi-xvii
External reviewersFreely available from IEEE.pp. xviii-xix
Using NAS Parallel Benchmarks to evaluate HPC performance in cloudsFull-text access may be available. Sign in or learn about subscription options.pp. 27-30
A user level approach to schedule BoT applications on private cloudsFull-text access may be available. Sign in or learn about subscription options.pp. 31-34
Heterogeneous resource allocation in Cloud ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 35-38
Leveraging an homomorphic encryption library to implement a coordination serviceFull-text access may be available. Sign in or learn about subscription options.pp. 39-42
Task based load balancing for cloud aware massively Multiplayer Online GamesFull-text access may be available. Sign in or learn about subscription options.pp. 48-51
DARSHANA: Detecting route hijacking for communication confidentialityFull-text access may be available. Sign in or learn about subscription options.pp. 52-59
MACHETE: Multi-path communication for securityFull-text access may be available. Sign in or learn about subscription options.pp. 60-67
Feature set tuning in statistical learning network intrusion detectionFull-text access may be available. Sign in or learn about subscription options.pp. 68-75
A security Policy Query Engine for fully automated resolution of anomalies in firewall configurationsFull-text access may be available. Sign in or learn about subscription options.pp. 76-80
Neutralizing interest flooding attacks in Named Data Networks using cryptographic route tokensFull-text access may be available. Sign in or learn about subscription options.pp. 85-88
Fast hybrid network reconfiguration for large-scale lossless interconnection networksFull-text access may be available. Sign in or learn about subscription options.pp. 101-108
An offset based global sleeping schedule for self-organizing wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 109-112
Label encoding algorithm for MPLS Segment RoutingFull-text access may be available. Sign in or learn about subscription options.pp. 113-117
Named Data Networking for tactical communication environmentsFull-text access may be available. Sign in or learn about subscription options.pp. 118-121
A network service design and deployment process for NFV systemsFull-text access may be available. Sign in or learn about subscription options.pp. 131-139
ViTeNA: An SDN-based virtual network embedding algorithm for multi-tenant data centersFull-text access may be available. Sign in or learn about subscription options.pp. 140-147
A scalable peer-to-peer control plane architecture for Software Defined NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 148-152
Enabling Software-Defined Networking for Wireless Mesh Networks in smart environmentsFull-text access may be available. Sign in or learn about subscription options.pp. 153-157
SDAR: Software Defined Intra-Domain Routing in Named Data NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 158-161
Smart scene management for IoT-based constrained devices using checkpointingFull-text access may be available. Sign in or learn about subscription options.pp. 170-174
Byzantine reliable broadcast in sparse networksFull-text access may be available. Sign in or learn about subscription options.pp. 175-182
Evaluating reliability techniques in the master-worker paradigmFull-text access may be available. Sign in or learn about subscription options.pp. 183-190
NoSQL Undo: Recovering NoSQL databases by undoing operationsFull-text access may be available. Sign in or learn about subscription options.pp. 191-198
Exploiting universal redundancyFull-text access may be available. Sign in or learn about subscription options.pp. 199-203
Towards designing reliable messaging patternsFull-text access may be available. Sign in or learn about subscription options.pp. 204-207
vtTLS: A vulnerability-tolerant communication protocolFull-text access may be available. Sign in or learn about subscription options.pp. 212-215
Optimal proportion computation with population protocolsFull-text access may be available. Sign in or learn about subscription options.pp. 216-223
CMTS: Consensus-based Multi-hop Time Synchronization protocol in wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 232-236
V-Hadoop: Virtualized Hadoop using containersFull-text access may be available. Sign in or learn about subscription options.pp. 237-241
Energy efficient file distribution problem and its applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 246-249
Analysis of the propagation time of a rumour in large-scale distributed systemsFull-text access may be available. Sign in or learn about subscription options.pp. 264-271
Cost sensitive moving target consensusFull-text access may be available. Sign in or learn about subscription options.pp. 272-281
Peripheral authentication for autonomous vehiclesFull-text access may be available. Sign in or learn about subscription options.pp. 282-285
On the privacy-utility tradeoff in participatory sensing systemsFull-text access may be available. Sign in or learn about subscription options.pp. 294-301
Decision-theoretic approach to designing cyber resilient systemsFull-text access may be available. Sign in or learn about subscription options.pp. 302-309
The Blockchain AnomalyFull-text access may be available. Sign in or learn about subscription options.pp. 310-317
Safety analysis of Bitcoin improvement proposalsFull-text access may be available. Sign in or learn about subscription options.pp. 318-325
A QoS-aware controller for Apache StormFull-text access may be available. Sign in or learn about subscription options.pp. 334-342
SLA and profit-aware SaaS provisioning through proactive renegotiationFull-text access may be available. Sign in or learn about subscription options.pp. 351-358
Modeling dynamic location update strategies for PCS networksFull-text access may be available. Sign in or learn about subscription options.pp. 359-362
Client-side monitoring techniques for web sitesFull-text access may be available. Sign in or learn about subscription options.pp. 363-366
To route or to secure: Tradeoffs in ICNs over MANETsFull-text access may be available. Sign in or learn about subscription options.pp. 367-374
Confidential and authenticated communications in a large fixed-wing UAV swarmFull-text access may be available. Sign in or learn about subscription options.pp. 375-382
A back-end offload architecture for security of resource-constrained networksFull-text access may be available. Sign in or learn about subscription options.pp. 383-387
MANETs monitoring with a distributed hybrid architectureFull-text access may be available. Sign in or learn about subscription options.pp. 388-391
Secure complex monitoring event processingFull-text access may be available. Sign in or learn about subscription options.pp. 392-395
List of authorsFreely available from IEEE.pp. 396-399
Showing 76 out of 76