


default search action
33rd ICDCS 2013: Philadelphia, PA, USA - Workshops
- 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), Philadelphia, PA, USA, 8-11 July, 2013. IEEE Computer Society 2013, ISBN 978-0-7695-5023-7

The Second International Workshop on Network Forensics, Security, and Privacy (NFSP 2013)
Session I : Malware Detection and Prevention
- Joshua Saxe, David Mentis, Christopher Greamo:

Mining Web Technical Discussions to Identify Malware Capabilities. 1-5 - Kristina Blokhin, Joshua Saxe, David Mentis:

Malware Similarity Identification Using Call Graph Based System Call Subsequence Features. 6-10 - Sami Zhioua

:
The Middle East under Malware Attack Dissecting Cyber Weapons. 11-16
Session II: Network Security
- Longxiang Gao, Ming Li, Wanlei Zhou

, Wen Shi:
Anonymous Data Forwarding in Human Associated Delay Tolerant Networks. 17-21 - Emmanuel Alphonce Massawe, Suguo Du, Haojin Zhu

:
A Scalable and Privacy-Preserving Named Data Networking Architecture Based on Bloom Filters. 22-26 - Xiaomei Zhang, Xiaolei Dong, Jie Wu, Xiuqi Li, Naixue Xiong:

Fault-Aware Flow Control and Multi-Path Routing in Wireless Sensor Networks. 27-32 - Muhammad Aliyu Sulaiman, Sami Zhioua

:
Attacking Tor through Unpopular Ports. 33-38 - Jian Zhang, Xiao Fu, Xiaojiang Du, Bin Luo, Zhihong Zhao:

A Method to Automatically Filter Log Evidences for Intrusion Forensics. 39-44 - Yang Zhang, Junliang Chen:

Data-Centric Access Control with Confidentiality for Collaborating Smart Grid Services Based on Publish/Subscribe Paradigm. 45-50
Session III : Security, Privacy and Anomaly Detection
- Lorenz Schwittmann, Christopher Boelmann, Matthäus Wander, Torben Weis

:
SoNet - Privacy and Replication in Federated Online Social Networks. 51-57 - Weibo Chu, Xiaohong Guan, John C. S. Lui, Zhongmin Cai, Xiaohong Shi:

Secure Cache Provision: Provable DDOS Prevention for Randomly Partitioned Services with Replication. 58-63 - Azade Nazi, Donggang Liu, Sajal K. Das

:
Privacy Preserving Query Answering in Peer Data Management Systems. 64-69 - Mohamed Nassar

, Abdelkarim Erradi, Qutaibah M. Malluhi:
Practical and Secure Outsourcing of Matrix Computations to the Cloud. 70-75 - Zahra Jadidi

, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan, Mansour Sheikhan
:
Flow-Based Anomaly Detection Using Neural Network Optimized with GSA Algorithm. 76-81
The First International Workshop on Resource Management of Cloud Computing (CCRM 2013)
Session 1: Data Center Network Management
- Yang Gao, Yibo Xue, Jun Li:

Utilization-Aware Allocation for Multi-Tenant Datacenters. 82-87 - Rongdong Hu, Jingfei Jiang, Guangming Liu, Lixin Wang:

CPU Load Prediction Using Support Vector Regression and Kalman Smoother for Cloud. 88-92 - Qingjia Huang, Sen Su, Siyuan Xu, Jian Li, Peng Xu, Kai Shuang:

Migration-Based Elastic Consolidation Scheduling in Cloud Data Center. 93-97
Session 2: Theory
- Leander Jehl

, Hein Meling:
Towards Fast and Efficient Failure Handling for Paxos State Machines. 98-102
Session 3: System
- Gabriel Loewen, Michael Galloway, Susan V. Vrbsky:

Designing a Middleware API for Building Private IaaS Cloud Architectures. 103-107 - Fung Po Tso

, David Robert White, Simon Jouet, Jeremy Singer
, Dimitrios P. Pezaros
:
The Glasgow Raspberry Pi Cloud: A Scale Model for Cloud Computing Infrastructures. 108-112 - Peng Zhang, Hongbo Wang, Junbo Li, Jiankang Dong, Yangyang Li, Shiduan Cheng:

SmartShuffle: Managing Online Virtual Machine Shuffle in Virtualized Data Centers. 113-118 - Matthew Sladescu, Alan D. Fekete, Kevin Lee, Anna Liu:

A Polymorphic Model for Event Associated Workload Bursts. 119-125
Session 4: Privacy, VM management and Simulation
- Zachary A. Kissel

, Jie Wang:
Verifiable Phrase Search over Encrypted Data Secure against a Semi-Honest-but-Curious Adversary. 126-131 - Ruitao Xie

, Xiaohua Jia
, Kan Yang
, Bo Zhang:
Energy Saving Virtual Machine Allocation in Cloud Computing. 132-137 - Cuong Manh Pham, Qingkun Li, Zachary Estrada, Zbigniew Kalbarczyk, Ravishankar K. Iyer:

A Simulation Framework to Evaluate Virtual CPU Scheduling Algorithms. 138-143
Session 5: Miscellaneous
- Chunyang Lu, Zhixiong Jiang, Jinping Yu, Gan Zhang, Wei Liang, Jingping Bi:

Towards Seamless Cross-Vendor Inter-Datacenter Network Policy Migration. 144-149
The Fifth International Workshop on Hot Topics in Peer-to-Peer Computing and Online Social Networking (HotPOST 2013)
Session 2
- Nashid Shahriar

, Shihabur Rahman Chowdhury
, Mahfuza Sharmin, Reaz Ahmed, Raouf Boutaba, Bertrand Mathieu:
Ensuring Beta-Availability in P2P Social Networks. 150-155 - Jaime Ballesteros, Bogdan Carbunar, Mahmudur Rahman, Naphtali Rishe

:
Yelp Events: Making Bricks Without Clay? 156-161 - Raj Kumar Nepali, Yong Wang:

SONET: A SOcial NETwork Model for Privacy Monitoring and Ranking. 162-166
Session 3
- Rafae Bhatti, Camille Gaspard, Cristina Nita-Rotaru:

Access Control in Social Enterprise Applications: An Empirical Evaluation. 167-171 - Hani Salah, Thorsten Strufe:

Capturing Connectivity Graphs of a Large-Scale P2P Overlay Network. 172-177 - D. M. Rasanjalee Himali, Shamkant B. Navathe, Sushil K. Prasad

:
SAS: Semantics Aware Search in P2P Networks. 178-183
Session 4
- H. Asthana, Ingemar J. Cox

:
A Framework for Peer-to-Peer Micro-Blogging. 184-189 - Bo Zhang, Jinchuan Wang, Lei Zhang:

A Tweet-Centric Algorithm for News Ranking. 190-195 - Simon Forsyth, Khuzaima Daudjee:

Update Management in Decentralized Social Networks. 196-201
The Third International Workshop on Data Center Performance (DCPerf 2013)
Session 1: DC Network and Storage
- Jaimie Kelley, Christopher Stewart

:
Balanced and Predictable Networked Storage. 202-207 - Fabio Pianese:

Information Centric Networks for Parallel Processing in the Datacenter. 208-213 - Yang Liu, Jogesh K. Muppala

:
DCNSim: A Data Center Network Simulator. 214-219 - Di Wang, Anand Sivasubramaniam, Bhuvan Urgaonkar:

A Case for Heterogeneous Flash in the Datacenter. 220-225
Session 2: DC Resource Management
- Ning Liu, Ziqian Dong

, Roberto Rojas-Cessa:
Task Scheduling and Server Provisioning for Energy-Efficient Cloud-Computing Data Centers. 226-231 - Hamzeh Khazaei

, Jelena V. Misic, Vojislav B. Misic, Nasim Beigi Mohammadi:
Modeling the Performance of Heterogeneous IaaS Cloud Centers. 232-237 - Jiankang Dong, Hongbo Wang, Xing Jin, Yangyang Li, Peng Zhang, Shiduan Cheng:

Virtual Machine Placement for Improving Energy Efficiency and Network Performance in IaaS Cloud. 238-243 - Wei Wang

, Ben Liang
, Baochun Li:
On Fairness-Efficiency Tradeoffs for Multi-resource Packet Processing. 244-249
The Tenth International Workshop on Wireless Ad Hoc and Sensor Networking (WWASN 2013)
Session 1: Fundamentals
- Hyung-Sin Kim

, Jae-Seok Bang, Yong-Hwan Lee:
Distributed Multi-hop Network Association in Large-Scale Wireless Sensor Networks. 250-255 - Bo Zhang, Xiaohua Jia

, Kan Yang
, Ruitao Xie
:
Multi-path Routing and Stream Scheduling with Spatial Multiplexing and Interference Cancellation in MIMO Networks. 256-261 - Hamidreza Tavakoli

, Jelena V. Misic, Majid Naderi, Vojislav B. Misic:
Energy-Efficient Clustering in IEEE 802.15.4 Wireless Sensor Networks. 262-267 - Qian Zhao, Yukikazu Nakamoto, Zulfazli Hussin:

Energy-Efficient Protocol for Extending Battery Life in Wireless Sensor Networks. 268-273
Session 2: Applications
- Zhefeng Sun, Huan Li:

Using Directional Antenna for Continuous Moving Object Tracking in WSN with Uncovered Holes. 274-279 - Jonathan Jao, Bo Sun, Kui Wu:

A Prototype Wireless Sensor Network for Precision Agriculture. 280-285 - Reza Malekian

, Aleksandar Karadimce
, Abdul Hanan Abdullah:
AODV and OLSR Routing Protocols in MANET. 286-289 - Bhanu Kaushik, Honggang Zhang, Xinwen Fu

, Benyuan Liu, Jie Wang:
SmartParcel: A Collaborative Data Sharing Framework for Mobile Operating Systems. 290-295
The Third International Workshop on Cyber-Physical Networking Systems (CPNS 2013)
Session 1: Frameworks, Instrument, and Engine
- Tilman Wolf, Michael Zink

, Anna Nagurney:
The Cyber-Physical Marketplace: A Framework for Large-Scale Horizontal Integration in Distributed Cyber-Physical Systems. 296-302 - Min Ding, Haifeng Chen, Abhishek B. Sharma, Kenji Yoshihira, Guofei Jiang:

A Data Analytic Engine Towards Self-Management of Cyber-Physical Systems. 303-308 - Kirak Hong, Marco Völz, Venu Govindaraju, Bharat Jayaraman, Umakishore Ramachandran:

A Distributed Framework for Spatio-Temporal Analysis on Large-Scale Camera Networks. 309-314 - Yue Tao, Xiang-Yang Li, Cheng Bo:

Performance of Coexisted WiFi and ZigBee Networks. 315-320
Session 2: Protocols and Security
- Timo Kiravuo, Mikko Särelä, Jukka Manner

:
Weapons against Cyber-Physical Targets. 321-326 - Lan Yao, Xiangyang Li, Ge Yu:

Pattern Regulator: Protecting Temporal Usage Privacy for Wireless Body Area Sensor Networks. 327-332 - Li-Ling Hung, Yung-Jeng Luo:

A Protocol for Efficient Transmissions in UASNs. 333-338 - Cheng Bo, Xiang-Yang Li, Yue Tao, Fouad Teymour, Paul Anderson, ShangPing Ren:

SA-MAC: Self-Stabilizing Adaptive MAC Protocol for Wireless Sensor Networks. 339-344
The Twelfth International Workshop on Assurance in Distributed Systems and Networks (ADSN 2013)
Session 1: Assurance in Wireless Networks
- Ryo Hamamoto

, Chisa Takano, Kenji Ishida, Masaki Aida:
Guaranteeing Asymptotic Stability of Clustering for MANET by Autonomous Decentralized Structure Formation Mechanism Based on Local Interaction. 345-350 - Zulfazli Hussin, Yukikazu Nakamoto:

Assuring Location Estimation Accuracy of Anchor-Free Mobile Localization in Wireless Sensor Networks. 351-356 - Noriaki Tanabe, Eitaro Kohno, Yoshiaki Kakuda:

A Path Authenticating Method Using Bloom Filters against Impersonation Attacks on Relaying Nodes for Wireless Sensor Networks. 357-361
Session 2: Assurance in Data Processing
- Mohamed A. Sharaf, Jie Huang, Chin-Tser Huang:

Using Bytecode Instrumentation to Secure Information Flow in Multithreaded Java Applications. 362-367 - Xing Xie, Indrakshi Ray, Waruna Ranasinghe, Philips A. Gilbert, Pramod Shashidhara, Anoop Yadav:

Distributed Multilevel Secure Data Stream Processing. 368-373 - Manuel Peralta, Supratik Mukhopadhyay, Ramesh Bharadwaj:

A Type-Theoretic Framework for Automated Synthesis of Workflows in Service-Oriented Computing. 374-379 - Junichi Funasaka, Jun Katsube, Kenji Ishida:

Timeout Reduction Method for Multistream Segmented Download Using PR-SCTP. 380-385
The First International Workshop on Mobile Cloud and Social Computing (MCSC 2013)
- Roozbeh Nia, Fredrik Erlandsson

, Henric Johnson, Shyhtsun Felix Wu:
Leveraging Social Interactions to Suggest Friends. 386-391 - Young Choh, Kai Song, Yan Bai, Kyle Levy:

Design and Implementation of a Cloud-Based Cross-Platform Mobile Health System with HTTP 2.0. 392-397 - Yingguang Zhang, Sen Su, Weifeng Chen, Yulong Wang, Peng Xu, Fangchun Yang:

Privacy-Assured Similarity Query over Graph-Structured Data in Mobile Cloud. 398-403 - Brian Krupp

, Nigamanth Sridhar, Wenbing Zhao:
A Framework for Enhancing Security and Privacy on Unmodified Mobile Operating Systems. 404-409

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














