Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
NCA
NCA 2016
Generate Citations
2016 IEEE 15th International Symposium on Network Computing and Applications (NCA)
Oct. 31 2016 to Nov. 2 2016
Cambridge, Boston, MA, USA
Table of Contents
Proceedings
Freely available from IEEE.
pp. ii-ii
Proceedings
Freely available from IEEE.
pp. iii-iii
Copyright page
Freely available from IEEE.
pp. iv-iv
Table of contents
Freely available from IEEE.
pp. v-xii
Message from the steering committee and general chairs
Freely available from IEEE.
pp. xiii-xiii
by
D. R. Avresky
,
Mladen A. Vouk
Message from the program chairs
Freely available from IEEE.
pp. xiv-xiv
by
Aris Gkoulalas-Divanis
,
Alessandro Pellegrini
,
Pierangelo Di Sanzo
Conference committee
Freely available from IEEE.
pp. xv-xv
Technical program commitee
Freely available from IEEE.
pp. xvi-xvii
External reviewers
Freely available from IEEE.
pp. xviii-xix
Keynote: Evolving Systems for Situational Awareness
Freely available from IEEE.
pp. xx-xx
by
Tim Strayer
Crowdsourcing-based architecture for post-disaster geolocation: A comparative performance evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Florent Coriat
,
Anne Fladenmuller
,
Luciana Arantes
,
Olivier Marin
GeoTrie: A scalable architecture for location-temporal range queries over massive geotagged data sets
Full-text access may be available. Sign in or learn about subscription options.
pp. 10-17
by
Rudyar Cortés
,
Xavier Bonnaire
,
Olivier Marin
,
Luciana Arantes
,
Pierre Sens
Characterizing GPS outages: Geodesic Dead Reckoning solution for VANETs and ITS
Full-text access may be available. Sign in or learn about subscription options.
pp. 18-21
by
Pedro P. L. L. do Nascimento
,
Richard W. Pazzi
,
Daniel L. Guidoni
,
Leandro A. Villas
Contextual geotracking service of incident markers in disaster search-and-rescue operations
Full-text access may be available. Sign in or learn about subscription options.
pp. 22-26
by
Ev Cheng
,
Kourtney Meiss
,
Kendall Park
,
John Gillis
,
Dave Weber
,
Salman Ahmad
,
Prasad Calyam
Using NAS Parallel Benchmarks to evaluate HPC performance in clouds
Full-text access may be available. Sign in or learn about subscription options.
pp. 27-30
by
Thiago Kenji Okada
,
Alfredo Goldman
,
Gerson Geraldo H. Cavalheiro
A user level approach to schedule BoT applications on private clouds
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-34
by
Maicon Ança dos Santos
,
André R. Du Bois
,
Gerson Geraldo H. Cavalheiro
Heterogeneous resource allocation in Cloud Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-38
by
Serdar Kadioglu
,
Mike Colena
,
Samir Sebbah
Leveraging an homomorphic encryption library to implement a coordination service
Full-text access may be available. Sign in or learn about subscription options.
pp. 39-42
by
Eugenio A. Silva
,
Miguel Correia
Multi-phase proactive cloud scheduling framework based on high level workflow and resource characterization
Full-text access may be available. Sign in or learn about subscription options.
pp. 43-47
by
Nelson Mimura Gonzalez
,
Tereza Cristina Melo de Brito Carvalho
,
Charles Christian Miers
Task based load balancing for cloud aware massively Multiplayer Online Games
Full-text access may be available. Sign in or learn about subscription options.
pp. 48-51
by
André Pessoa Negrão
,
Luís Veiga
,
Paulo Ferreira
DARSHANA: Detecting route hijacking for communication confidentiality
Full-text access may be available. Sign in or learn about subscription options.
pp. 52-59
by
Karan Balu
,
Miguel L. Pardal
,
Miguel Correia
MACHETE: Multi-path communication for security
Full-text access may be available. Sign in or learn about subscription options.
pp. 60-67
by
Diogo Raposo
,
Miguel L. Pardal
,
Luís Rodrigues
,
Miguel Correia
Feature set tuning in statistical learning network intrusion detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 68-75
by
Arnaldo Gouveia
,
Miguel Correia
A security Policy Query Engine for fully automated resolution of anomalies in firewall configurations
Full-text access may be available. Sign in or learn about subscription options.
pp. 76-80
by
Ahmed Bouhoula
,
Anis Yazidi
Enforcement of global security policies in federated cloud networks with virtual network functions
Full-text access may be available. Sign in or learn about subscription options.
pp. 81-84
by
Philippe Massonet
,
Sébastien Dupont
,
Arnaud Michot
,
Anna Levin
,
Massimo Villari
Neutralizing interest flooding attacks in Named Data Networks using cryptographic route tokens
Full-text access may be available. Sign in or learn about subscription options.
pp. 85-88
by
Aubrey Alston
,
Tamer Refaei
Evaluation of Distributed Denial of Service threat in the Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-92
by
Luis Alberto B. Pacheco
,
João J. C. Gondim
,
Priscila A. Solis Barreto
,
Eduardo Alchieri
A Continuous Enhancement Routing Solution aware of data aggregation for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-100
by
Edson Ticona Zegarra
,
Rafael C. S. Schouery
,
Flávio K. Miyazawa
,
Leandro A. Villas
Fast hybrid network reconfiguration for large-scale lossless interconnection networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 101-108
by
Evangelos Tasoulas
,
Ernst Gunnar Gran
,
Tor Skeie
,
Bjørn Dag Johnsen
An offset based global sleeping schedule for self-organizing wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 109-112
by
Stephanie Imelda Pella
,
Prakash Veeraraghavan
,
Somnath Ghosh
Label encoding algorithm for MPLS Segment Routing
Full-text access may be available. Sign in or learn about subscription options.
pp. 113-117
by
Rabah Guedrez
,
Olivier Dugeon
,
Samer Lahoud
,
Géraldine Texier
Named Data Networking for tactical communication environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 118-121
by
M. Tamer Refaei
,
Sean Ha
,
Zac Cavallero
,
Creighton Hager
Reducing the latency-tail of short-lived flows: Adding forward error correction in data centers
Full-text access may be available. Sign in or learn about subscription options.
pp. 122-125
by
Klaus-Tycho Foerster
,
Demian Jaeger
,
David Stolz
,
Roger Wattenhofer
The cardinality-constrained paths problem: Multicast data routing in heterogeneous communication networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 126-130
by
Alvaro Velasquez
,
Piotr Wojciechowski
,
K. Subramani
,
Steven L. Drager
,
Sumit Kumar Jha
A network service design and deployment process for NFV systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 131-139
by
Sadaf Mustafiz
,
Francis Palma
,
Maria Toeroe
,
Ferhat Khendek
ViTeNA: An SDN-based virtual network embedding algorithm for multi-tenant data centers
Full-text access may be available. Sign in or learn about subscription options.
pp. 140-147
by
Daniel Caixinha
,
Pradeeban Kathiravelu
,
Luís Veiga
A scalable peer-to-peer control plane architecture for Software Defined Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 148-152
by
Kuldip Singh Atwal
,
Ajay Guleria
,
Mostafa Bassiouni
Enabling Software-Defined Networking for Wireless Mesh Networks in smart environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 153-157
by
Prithviraj Patil
,
Akram Hakiri
,
Yogesh Barve
,
Aniruddha Gokhale
SDAR: Software Defined Intra-Domain Routing in Named Data Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 158-161
by
Yaoqing Liu
,
Hitesh Wadekar
Cost-effective processing for Delay-sensitive applications in Cloud of Things systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 162-169
by
Yucen Nan
,
Wei Li
,
Wei Bao
,
Flavia C. Delicato
,
Paulo F. Pires
,
Albert Y. Zomaya
Smart scene management for IoT-based constrained devices using checkpointing
Full-text access may be available. Sign in or learn about subscription options.
pp. 170-174
by
François Aïssaoui
,
Gene Cooperman
,
Thierry Monteil
,
Saïd Tazi
Byzantine reliable broadcast in sparse networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 175-182
by
Sisi Duan
,
Lucas Nicely
,
Haibin Zhang
Evaluating reliability techniques in the master-worker paradigm
Full-text access may be available. Sign in or learn about subscription options.
pp. 183-190
by
Evgenia Christoforou
,
Antonio Fernández Anta
,
Kishori M. Konwar
,
Nicolas Nicolaou
NoSQL Undo: Recovering NoSQL databases by undoing operations
Full-text access may be available. Sign in or learn about subscription options.
pp. 191-198
by
David Matos
,
Miguel Correia
Exploiting universal redundancy
Full-text access may be available. Sign in or learn about subscription options.
pp. 199-203
by
Ali Shoker
Towards designing reliable messaging patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 204-207
by
Naghmeh Ivaki
,
Nuno Laranjeiro
,
Filipe Araujo
Traffic Engineering based on Shortest Path routing algorithms for FTV (Free-Viewpoint Television) applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 208-211
by
Priscila Solis
,
Henrique Domingues Garcia
vtTLS: A vulnerability-tolerant communication protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 212-215
by
André Joaquim
,
Miguel L. Pardal
,
Miguel Correia
Optimal proportion computation with population protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 216-223
by
Yves Mocquard
,
Emmanuelle Anceaume
,
Bruno Sericola
Cover-ability: Consistent versioning in asynchronous, fail-prone, message-passing environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 224-231
by
Nicolas Nicolaou
,
Antonio Fernández Anta
,
Chryssis Georgiou
CMTS: Consensus-based Multi-hop Time Synchronization protocol in wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 232-236
by
Amin Saïah
,
Chafika Benzaïd
,
Nadjib Badache
V-Hadoop: Virtualized Hadoop using containers
Full-text access may be available. Sign in or learn about subscription options.
pp. 237-241
by
Srihari Radhakrishnan
,
Bryan J. Muscedere
,
Khuzaima Daudjee
A hardware and software Web-based environment for Energy Consumption analysis in mobile devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 242-245
by
Sidartha A. L. Carvalho
,
Rafael N. Lima
,
Daniel C. Cunha
,
Abel G. Silva-Filho
Energy efficient file distribution problem and its applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 246-249
by
Kshitiz Verma
,
Alberto García-Martínez
,
Samar Agnihotri
On the use of nonlinear methods for low-power CPU frequency prediction based on Android context variables
Full-text access may be available. Sign in or learn about subscription options.
pp. 250-253
by
Sidartha A. L. Carvalho
,
Daniel C. Cunha
,
Abel G. Silva-Filho
A distributed self-reconfiguration algorithm for cylindrical lattice-based modular robots
Full-text access may be available. Sign in or learn about subscription options.
pp. 254-263
by
André Naz
,
Benoît Piranda
,
Julien Bourgeois
,
Seth Copen Goldstein
Analysis of the propagation time of a rumour in large-scale distributed systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 264-271
by
Yves Mocquard
,
Bruno Sericola
,
Samantha Robert
,
Emmanuelle Anceaume
Cost sensitive moving target consensus
Full-text access may be available. Sign in or learn about subscription options.
pp. 272-281
by
Sisi Duan
,
Yun Li
,
Karl Levitt
Peripheral authentication for autonomous vehicles
Full-text access may be available. Sign in or learn about subscription options.
pp. 282-285
by
Shlomi Dolev
,
Nisha Panwar
Efficient transmission strategy selection algorithm for M2M communications: An evolutionary game approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 286-293
by
Safa Hamdoun
,
Abderrezak Rachedi
,
Hamidou Tembine
,
Yacine Ghamri-Doudane
On the privacy-utility tradeoff in participatory sensing systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 294-301
by
Rim Ben Messaoud
,
Nouha Sghaier
,
Mohamed Ali Moussa
,
Yacine Ghamri-Doudane
Decision-theoretic approach to designing cyber resilient systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 302-309
by
Vineet Mehta
,
Paul D. Rowe
,
Gene Lewis
,
Ashe Magalhaes
,
Mykel Kochenderfer
The Blockchain Anomaly
Full-text access may be available. Sign in or learn about subscription options.
pp. 310-317
by
Christopher Natoli
,
Vincent Gramoli
Safety analysis of Bitcoin improvement proposals
Full-text access may be available. Sign in or learn about subscription options.
pp. 318-325
by
Emmanuelle Anceaume
,
Thibaut Lajoie-Mazenc
,
Romaric Ludinard
,
Bruno Sericola
A comparison of GPU execution time prediction using machine learning and analytical modeling
Full-text access may be available. Sign in or learn about subscription options.
pp. 326-333
by
Marcos Amarís
,
Raphael Y. de Camargo
,
Mohamed Dyab
,
Alfredo Goldman
,
Denis Trystram
A QoS-aware controller for Apache Storm
Full-text access may be available. Sign in or learn about subscription options.
pp. 334-342
by
M. Reza Hoseiny Farahabady
,
Hamid R. Dehghani Samani
,
Yidan Wang
,
Albert Y. Zomaya
,
Zahir Tari
An algorithm based on response time and traffic demands to scale containers on a Cloud Computing system
Full-text access may be available. Sign in or learn about subscription options.
pp. 343-350
by
Marcelo Cerqueira de Abranches
,
Priscila Solis
SLA and profit-aware SaaS provisioning through proactive renegotiation
Full-text access may be available. Sign in or learn about subscription options.
pp. 351-358
by
Aya Omezzine
,
Narjes Bellamine Ben Saoud
,
Saïd Tazi
,
Gene Cooperman
Modeling dynamic location update strategies for PCS networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 359-362
by
Chung-Chin Lu
,
Ruey-Cheng Shyu
,
Yung-Chung Wang
Client-side monitoring techniques for web sites
Full-text access may be available. Sign in or learn about subscription options.
pp. 363-366
by
Ricardo Filipe
,
Filipe Araujo
To route or to secure: Tradeoffs in ICNs over MANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 367-374
by
Hasanat Kazmi
,
Hasnain Lakhani
,
Ashish Gehani
,
Rashid Tahir
,
Fareed Zaffar
Confidential and authenticated communications in a large fixed-wing UAV swarm
Full-text access may be available. Sign in or learn about subscription options.
pp. 375-382
by
Richard B. Thompson
,
Preetha Thulasiraman
A back-end offload architecture for security of resource-constrained networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 383-387
by
Jiyong Han
,
Daeyoung Kim
MANETs monitoring with a distributed hybrid architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 388-391
by
Jose Alvarez
,
Stephane Maag
,
Fatiha Zaïdi
Secure complex monitoring event processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 392-395
by
Mehdi Bentounsi
,
Salima Benbernou
List of authors
Freely available from IEEE.
pp. 396-399
Showing 76 out of 76