The SCEAS System
Navigation Menu

Conferences in DBLP

Network Computing and Applications (nca)
2004 (conf/nca/2004)

  1. Roie Melamed, Idit Keidar
    Araneola: A Scalable Reliable Multicast System for Dynamic Environments. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:5-14 [Conf]
  2. Li-wei Lehman, Steven Lerman
    PCoord: Network Position Estimation Using Peer-to-Peer Measurements. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:15-24 [Conf]
  3. Shlomi Dolev, Ronen I. Kat
    HyperTree for Self-Stabilizing Peer-to-Peer Systems. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:25-32 [Conf]
  4. Yves Deswarte, David Powell
    Intrusion Tolerance for Internet Applications. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:35-36 [Conf]
  5. Filipe Araújo, Luís Rodrigues
    GeoPeer: A Location-Aware Peer-to-Peer System. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:39-46 [Conf]
  6. Jianming Lv, Xueqi Cheng
    WonGoo: A Pure Peer-to-Peer Full Text Information Retrieval System Based On Semantic Overlay Networks. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:47-54 [Conf]
  7. Mark E. Segal
    Exploring the Network/Software Boundary: A Telecommunications Perspective. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:57-0 [Conf]
  8. Bin Wu, Ajay D. Kshemkalyani
    Objective-Greedy Algorithms for Long-Term Web Prefetching. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:61-68 [Conf]
  9. Paolo Romano, Francesco Quaglia, Bruno Ciciani
    A Protocol for Improved User Perceived QoS in Web Transactional Applications. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:69-76 [Conf]
  10. Giancarlo Ruffo, Rossano Schifanella, Matteo Sereno, Roberto Politi
    WALTy: A User Behavior Tailored Tool for Evaluating Web Application Performance. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:77-86 [Conf]
  11. Rebecca L. Collins, James S. Plank
    Downloading Replicated, Wide-Area Files - A Framework and Empirical Evaluation. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:89-96 [Conf]
  12. Vishal Iyengar, Sameer Tilak, Michael J. Lewis, Nael B. Abu-Ghazaleh
    Non-Uniform Information Dissemination for Dynamic Grid Resource Discovery. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:97-106 [Conf]
  13. André Schiper
    Group Communication: Where Are We Today and Future Challenges. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:109-117 [Conf]
  14. Joshua A. Tauber, Nancy A. Lynch, Michael J. Tsai
    Compiling IOA without Global Synchronization. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:121-130 [Conf]
  15. Arnas Kupsys, Stefan Pleisch, André Schiper, Matthias Wiesmann
    Towards JMS Compliant Group Communication - A Semantic Mapping. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:131-140 [Conf]
  16. Vicent Cholvi, Antonio Fernández, Ernesto Jiménez, Michel Raynal
    A Methodological Construction of an Efficient Sequential Consistency Protocol. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:141-148 [Conf]
  17. Alan G. Ganek, Cristiane P. Hilkner, John W. Sweitzer, Brent Miller, Joseph L. Hellerstein
    The Response to IT Complexity: Autonomic Computing. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:151-157 [Conf]
  18. Min Qin, Kai Hwang
    Frequent Episode Rules for Internet Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:161-168 [Conf]
  19. Patroklos G. Argyroudis, Raja Verma, Hitesh Tewari, Donal O'Mahony
    Performance Analysis of Cryptographic Protocols on Handheld Devices. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:169-174 [Conf]
  20. Victoria Ungureanu, Benjamin Melamed, Michael Katehakis
    The LC Assignment Policy for Cluster-Based Servers. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:177-184 [Conf]
  21. Christian Osendorfer, Jie Tao, Carsten Trinitis, Martin Mairandres
    ViSMI: Software Distributed Shared Memory for InfiniBand Clusters. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:185-191 [Conf]
  22. Ming Zhu, Yang Wang, Meng Ding, Constantine Katsinis
    Dynamic Key Messaging for Cluster Computing. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:192-199 [Conf]
  23. Michael Krause
    Are Processors Free? Impact on RDMA and Protocol Off-Load Technologies. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:203-0 [Conf]
  24. Jürgen Foag
    Speculative Network Processor for Quality-of-Service-Aware Protocol Processing. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:207-214 [Conf]
  25. Satyen Sukhtankar, Diana Hecht, Warren Rosen
    A Novel Switch Architecture for High-Performance Computing and Signal Processing Networks. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:215-222 [Conf]
  26. Saad Mneimneh
    An Iterative Switching Algorithm With (Possibly) One Iteration. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:223-231 [Conf]
  27. Imad Antonios, Lester Lipsky
    On the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:235-242 [Conf]
  28. Christos Bouras, Kostas Stamos
    An Adaptive Admission Control Algorithm for Bandwidth Brokers. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:243-250 [Conf]
  29. Antonio Corradi, Rebecca Montanari, Daniela Tibaldi
    Context-Based Access Control Management in Ubiquitous Environments. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:253-260 [Conf]
  30. Zhengming Shen, Johnson Thomas
    Location-Triggered Routing Protocol in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:261-268 [Conf]
  31. Yong Xun, Mieczyslaw M. Kokar, Kenneth Baclawski
    Using a Task-Specific QoS for Controlling Sensing Requests and Scheduling. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:269-276 [Conf]
  32. Richard Ekwall, Sergio Mena, Stefan Pleisch, André Schiper
    Towards Flexible Finite-State-Machine-Based Protocol Composition. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:281-286 [Conf]
  33. Ken Mano, Yoshinobu Kawabe
    The Nepi Network Programming System: A Programming Environment for Distributed Systems. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:287-292 [Conf]
  34. Galen S. Swint, Calton Pu, Younggyun Koh, Ling Liu, Wenchang Yan, Charles Consel, Koichi Moriyama, Jonathan Walpole
    Infopipes: The ISL/ISG Implementation Evaluation. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:293-296 [Conf]
  35. Giancarlo Fortino, Carlo Mastroianni, Wilma Russo
    A Multi-Policy, Cooperative Playback Control Protocol. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:297-302 [Conf]
  36. Gabriela Jacques-Silva, Roberto Jung Drebes, Júlio Gerchman, Taisy Silva Weber
    FIONA: A Fault Injector for Dependability Evaluation of Java-Based Network Applications. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:303-308 [Conf]
  37. Vlad Olaru, Walter F. Tichy
    Request Distribution-Aware Caching in Cluster-Based Web Servers. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:311-316 [Conf]
  38. Eiji Kawai, Youki Kadobayashi, Suguru Yamaguchi
    A Fast Polling I/O Implementation with Real-time Signals. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:317-322 [Conf]
  39. Ying Qian, Ahmad Afsahi, Reza Zamani
    Myrinet Networks: A Performance Study. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:323-328 [Conf]
  40. Tariq Omari, Seyed H. Hosseini, K. Vairavan
    Traveling Token for Dynamic Load Balancing. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:329-332 [Conf]
  41. Abdelilah Maach, Gregor von Bochmann, Hussein T. Mouftah
    Shared Protection for Time Slotted Optical Networks. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:333-336 [Conf]
  42. Dario Bottazzi, Antonio Corradi, Rebecca Montanari
    Context-Awareness for Impromptu Collaboration in MANETs. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:339-342 [Conf]
  43. Afrand Agah, Sajal K. Das, Kalyan Basu, Mehran Asadi
    Intrusion Detection in Sensor Networks: A Non-Cooperative Game Approach. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:343-346 [Conf]
  44. Stefan Birrer, Fabián E. Bustamante
    Resilient Peer-to-Peer Multicast from the Ground Up. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:351-355 [Conf]
  45. Philip J. Sokolowski, Daniel Grosu
    Performance of the NAS Parallel Benchmarks on Grid Enabled Clusters. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:356-361 [Conf]
  46. Syed Naqvi, Michel Riguidel
    VIPSEC: Virtualized and Pluggable Security Services Infrastructure for Adaptive Grid Computing. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:362-365 [Conf]
  47. SungJin Choi, MaengSoon Baik, Chong-Sun Hwang, Joon-Min Gil, Heon-Chang Yu
    Volunteer Availability based Fault Tolerant Scheduling Mechanism in Desktop Grid Computing Environment. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:366-371 [Conf]
  48. Bei Di Chen, Muthucumaru Maheswaran
    A Fair Synchronization Protocol with Cheat Proofing for Decentralized Online Multiplayer Games. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:372-375 [Conf]
  49. Muthucumaru Maheswaran, Balasubramaneyam Maniymaran, Shah Asaduzzaman, Arindam Mitra
    Towards a Quality of Service Aware Public Computing Utility. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:376-379 [Conf]
  50. Dan Williams, Emin Gün Sirer
    Optimal Parameter Selection for Efficient Memory Integrity Verification Using Merkle Hash Trees. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:383-388 [Conf]
  51. Julian B. Grizzard, Sven Krasser, Henry L. Owen, Gregory J. Conti, Eric R. Dodson
    Towards an Approach for Automatically Repairing Compromised Network Systems. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:389-392 [Conf]
  52. Anthony T. Chronopoulos, F. Balbi, D. Veljkovic, N. Kolani
    Implementation of Distributed Key Generation Algorithms using Secure Sockets. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:393-398 [Conf]
  53. Dimitris Kamenopoulos, Iosif A. Osman, Panayotis Tsanakas
    Distance Measurement in Volunteer Computing Networks: A Completely Decentralized Approach. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:399-404 [Conf]
  54. Muhammad J. Bohio, Ali Miri
    Self-Healing in Group Key Distribution Using Subset Difference Method. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:405-408 [Conf]
  55. Gustavo A. Santana Torrellas
    A Framework for Multi-Agent System Engineering using Ontology Domain Modelling for Security Architecture Risk Assessment in E-Commerce Security Services. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:409-412 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002