Conferences in DBLP
Roie Melamed , Idit Keidar Araneola: A Scalable Reliable Multicast System for Dynamic Environments. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:5-14 [Conf ] Li-wei Lehman , Steven Lerman PCoord: Network Position Estimation Using Peer-to-Peer Measurements. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:15-24 [Conf ] Shlomi Dolev , Ronen I. Kat HyperTree for Self-Stabilizing Peer-to-Peer Systems. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:25-32 [Conf ] Yves Deswarte , David Powell Intrusion Tolerance for Internet Applications. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:35-36 [Conf ] Filipe Araújo , Luís Rodrigues GeoPeer: A Location-Aware Peer-to-Peer System. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:39-46 [Conf ] Jianming Lv , Xueqi Cheng WonGoo: A Pure Peer-to-Peer Full Text Information Retrieval System Based On Semantic Overlay Networks. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:47-54 [Conf ] Mark E. Segal Exploring the Network/Software Boundary: A Telecommunications Perspective. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:57-0 [Conf ] Bin Wu , Ajay D. Kshemkalyani Objective-Greedy Algorithms for Long-Term Web Prefetching. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:61-68 [Conf ] Paolo Romano , Francesco Quaglia , Bruno Ciciani A Protocol for Improved User Perceived QoS in Web Transactional Applications. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:69-76 [Conf ] Giancarlo Ruffo , Rossano Schifanella , Matteo Sereno , Roberto Politi WALTy: A User Behavior Tailored Tool for Evaluating Web Application Performance. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:77-86 [Conf ] Rebecca L. Collins , James S. Plank Downloading Replicated, Wide-Area Files - A Framework and Empirical Evaluation. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:89-96 [Conf ] Vishal Iyengar , Sameer Tilak , Michael J. Lewis , Nael B. Abu-Ghazaleh Non-Uniform Information Dissemination for Dynamic Grid Resource Discovery. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:97-106 [Conf ] André Schiper Group Communication: Where Are We Today and Future Challenges. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:109-117 [Conf ] Joshua A. Tauber , Nancy A. Lynch , Michael J. Tsai Compiling IOA without Global Synchronization. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:121-130 [Conf ] Arnas Kupsys , Stefan Pleisch , André Schiper , Matthias Wiesmann Towards JMS Compliant Group Communication - A Semantic Mapping. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:131-140 [Conf ] Vicent Cholvi , Antonio Fernández , Ernesto Jiménez , Michel Raynal A Methodological Construction of an Efficient Sequential Consistency Protocol. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:141-148 [Conf ] Alan G. Ganek , Cristiane P. Hilkner , John W. Sweitzer , Brent Miller , Joseph L. Hellerstein The Response to IT Complexity: Autonomic Computing. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:151-157 [Conf ] Min Qin , Kai Hwang Frequent Episode Rules for Internet Anomaly Detection. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:161-168 [Conf ] Patroklos G. Argyroudis , Raja Verma , Hitesh Tewari , Donal O'Mahony Performance Analysis of Cryptographic Protocols on Handheld Devices. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:169-174 [Conf ] Victoria Ungureanu , Benjamin Melamed , Michael Katehakis The LC Assignment Policy for Cluster-Based Servers. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:177-184 [Conf ] Christian Osendorfer , Jie Tao , Carsten Trinitis , Martin Mairandres ViSMI: Software Distributed Shared Memory for InfiniBand Clusters. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:185-191 [Conf ] Ming Zhu , Yang Wang , Meng Ding , Constantine Katsinis Dynamic Key Messaging for Cluster Computing. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:192-199 [Conf ] Michael Krause Are Processors Free? Impact on RDMA and Protocol Off-Load Technologies. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:203-0 [Conf ] Jürgen Foag Speculative Network Processor for Quality-of-Service-Aware Protocol Processing. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:207-214 [Conf ] Satyen Sukhtankar , Diana Hecht , Warren Rosen A Novel Switch Architecture for High-Performance Computing and Signal Processing Networks. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:215-222 [Conf ] Saad Mneimneh An Iterative Switching Algorithm With (Possibly) One Iteration. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:223-231 [Conf ] Imad Antonios , Lester Lipsky On the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:235-242 [Conf ] Christos Bouras , Kostas Stamos An Adaptive Admission Control Algorithm for Bandwidth Brokers. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:243-250 [Conf ] Antonio Corradi , Rebecca Montanari , Daniela Tibaldi Context-Based Access Control Management in Ubiquitous Environments. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:253-260 [Conf ] Zhengming Shen , Johnson Thomas Location-Triggered Routing Protocol in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:261-268 [Conf ] Yong Xun , Mieczyslaw M. Kokar , Kenneth Baclawski Using a Task-Specific QoS for Controlling Sensing Requests and Scheduling. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:269-276 [Conf ] Richard Ekwall , Sergio Mena , Stefan Pleisch , André Schiper Towards Flexible Finite-State-Machine-Based Protocol Composition. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:281-286 [Conf ] Ken Mano , Yoshinobu Kawabe The Nepi Network Programming System: A Programming Environment for Distributed Systems. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:287-292 [Conf ] Galen S. Swint , Calton Pu , Younggyun Koh , Ling Liu , Wenchang Yan , Charles Consel , Koichi Moriyama , Jonathan Walpole Infopipes: The ISL/ISG Implementation Evaluation. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:293-296 [Conf ] Giancarlo Fortino , Carlo Mastroianni , Wilma Russo A Multi-Policy, Cooperative Playback Control Protocol. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:297-302 [Conf ] Gabriela Jacques-Silva , Roberto Jung Drebes , Júlio Gerchman , Taisy Silva Weber FIONA: A Fault Injector for Dependability Evaluation of Java-Based Network Applications. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:303-308 [Conf ] Vlad Olaru , Walter F. Tichy Request Distribution-Aware Caching in Cluster-Based Web Servers. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:311-316 [Conf ] Eiji Kawai , Youki Kadobayashi , Suguru Yamaguchi A Fast Polling I/O Implementation with Real-time Signals. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:317-322 [Conf ] Ying Qian , Ahmad Afsahi , Reza Zamani Myrinet Networks: A Performance Study. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:323-328 [Conf ] Tariq Omari , Seyed H. Hosseini , K. Vairavan Traveling Token for Dynamic Load Balancing. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:329-332 [Conf ] Abdelilah Maach , Gregor von Bochmann , Hussein T. Mouftah Shared Protection for Time Slotted Optical Networks. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:333-336 [Conf ] Dario Bottazzi , Antonio Corradi , Rebecca Montanari Context-Awareness for Impromptu Collaboration in MANETs. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:339-342 [Conf ] Afrand Agah , Sajal K. Das , Kalyan Basu , Mehran Asadi Intrusion Detection in Sensor Networks: A Non-Cooperative Game Approach. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:343-346 [Conf ] Stefan Birrer , Fabián E. Bustamante Resilient Peer-to-Peer Multicast from the Ground Up. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:351-355 [Conf ] Philip J. Sokolowski , Daniel Grosu Performance of the NAS Parallel Benchmarks on Grid Enabled Clusters. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:356-361 [Conf ] Syed Naqvi , Michel Riguidel VIPSEC: Virtualized and Pluggable Security Services Infrastructure for Adaptive Grid Computing. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:362-365 [Conf ] SungJin Choi , MaengSoon Baik , Chong-Sun Hwang , Joon-Min Gil , Heon-Chang Yu Volunteer Availability based Fault Tolerant Scheduling Mechanism in Desktop Grid Computing Environment. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:366-371 [Conf ] Bei Di Chen , Muthucumaru Maheswaran A Fair Synchronization Protocol with Cheat Proofing for Decentralized Online Multiplayer Games. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:372-375 [Conf ] Muthucumaru Maheswaran , Balasubramaneyam Maniymaran , Shah Asaduzzaman , Arindam Mitra Towards a Quality of Service Aware Public Computing Utility. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:376-379 [Conf ] Dan Williams , Emin Gün Sirer Optimal Parameter Selection for Efficient Memory Integrity Verification Using Merkle Hash Trees. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:383-388 [Conf ] Julian B. Grizzard , Sven Krasser , Henry L. Owen , Gregory J. Conti , Eric R. Dodson Towards an Approach for Automatically Repairing Compromised Network Systems. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:389-392 [Conf ] Anthony T. Chronopoulos , F. Balbi , D. Veljkovic , N. Kolani Implementation of Distributed Key Generation Algorithms using Secure Sockets. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:393-398 [Conf ] Dimitris Kamenopoulos , Iosif A. Osman , Panayotis Tsanakas Distance Measurement in Volunteer Computing Networks: A Completely Decentralized Approach. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:399-404 [Conf ] Muhammad J. Bohio , Ali Miri Self-Healing in Group Key Distribution Using Subset Difference Method. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:405-408 [Conf ] Gustavo A. Santana Torrellas A Framework for Multi-Agent System Engineering using Ontology Domain Modelling for Security Architecture Risk Assessment in E-Commerce Security Services. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:409-412 [Conf ]