By Topic

Distributed Computing Systems, 2008. ICDCS '08. The 28th International Conference on

Date 17-20 June 2008

Filter Results

Displaying Results 1 - 25 of 117
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (65 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (26 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (55 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - xiv
    Request permission for commercial reuse | PDF file iconPDF (191 KB)
    Freely Available from IEEE
  • Welcome Message from the Conference Chairs

    Publication Year: 2008, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (189 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome Message from the Program Chairs

    Publication Year: 2008, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (30 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2008, Page(s):xvii - xviii
    Request permission for commercial reuse | PDF file iconPDF (175 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2008, Page(s):xix - xxx
    Request permission for commercial reuse | PDF file iconPDF (222 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2008, Page(s):xxxi - xxxiii
    Request permission for commercial reuse | PDF file iconPDF (150 KB)
    Freely Available from IEEE
  • Computer Science as a Lens on the Sciences

    Publication Year: 2008, Page(s):1 - 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (138 KB) | HTML iconHTML

    Summary form only given. This article trace the growing influence of fundamental ideas from computer science on the nature of research in a number of scientific fields. There is a growing awareness that information processing lies at the heart of the processes studied in fields as diverse as quantum mechanics, statistical physics, nanotechnology, neuroscience, linguistics, economics and sociology.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-Time Detection of Clone Attacks in Wireless Sensor Networks

    Publication Year: 2008, Page(s):3 - 10
    Cited by:  Papers (28)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attacks by replicating the compromised node, distributing the clones throughout the network, and starting a variety of insider attacks. Previous works against clone attacks suffer from either a high communication/storage overh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control

    Publication Year: 2008, Page(s):11 - 18
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (278 KB) | HTML iconHTML

    While symmetric-key schemes are efficient in processing time for sensor networks, they generally require complicated key management, which may introduce large memory and communication overhead. On the contrary, public-key based schemes have simple and clean key management, but cost more computational time. The recent progress of elliptic curve cryptography (ECC) implementation on sensors motivates... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing Wireless Data Networks against Eavesdropping using Smart Antennas

    Publication Year: 2008, Page(s):19 - 27
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (690 KB) | HTML iconHTML

    In this paper, we focus on securing communication over wireless data networks from malicious eavesdroppers, using smart antennas. While conventional cryptography based approaches focus on hiding the meaning of the information being communicated from the eavesdropper, we consider a complimentary class of strategies that limit knowledge of the existence of the information from the eavesdropper. We p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Security Vulnerabilities of Null Data Frames in IEEE 802.11 Based WLANs

    Publication Year: 2008, Page(s):28 - 35
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (342 KB) | HTML iconHTML

    Null data frames are a special but important type of frames in IEEE 802.11 based wireless local area networks (e.g., 802.11 WLANs). They are widely used for power management, channel scanning and association keeping alive. The wide applications of null data frames come from their salient features such as lightweight frame format and implementation flexibility. However, such features can be taken a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying Frequent Items in P2P Systems

    Publication Year: 2008, Page(s):36 - 44
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (339 KB) | HTML iconHTML

    As peer-to-peer (P2P) systems receive growing acceptance, the need of identifying 'frequent items' in such systems appears in a variety of applications. In this paper, we define the problem of identifying frequent items (IFI) and propose an efficient in-network processing technique, called in-network filtering (netFilter), to address this important fundamental problem. netFilter operates in two ph... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Impact of Mobile Hosts in Peer-to-Peer Data Networks

    Publication Year: 2008, Page(s):45 - 52
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (386 KB) | HTML iconHTML

    Peer-to-peer (P2P) data networks dominate Internet traffic. In this work, we study the problems that arise when mobile hosts participate in P2P networks. We primarily focus on the performance issues as experienced by the mobile host, but also study the impact on other fixed peers. Using Bit Torrent as a key example, we identify several unique problems that arise due to the design aspects of P2P ne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Is Random Scheduling Sufficient in P2P Video Streaming?

    Publication Year: 2008, Page(s):53 - 60
    Cited by:  Papers (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (354 KB) | HTML iconHTML

    Peer-to-peer (P2P) has recently been employed to deliver large scale video multicast services on the Internet. Considerable efforts have been made by both academia and industry on P2P streaming design. While academia mostly focus on exploring design space to approach the theoretical performance bounds, our recent measurement study on several commercial P2P streaming systems indicates that they are... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Circumventing Server Bottlenecks: Indirect Large-Scale P2P Data Collection

    Publication Year: 2008, Page(s):61 - 68
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (494 KB) | HTML iconHTML

    In most large-scale peer-to-peer (P2P) applications, it is necessary to collect vital statistics data - sometimes referred to as logs - from up to millions of peers. Traditional solutions involve sending large volumes of such data to centralized logging servers, which are not scalable. In addition, they may not be able to retrieve statistics data from departed peers in dynamic peer-to-peer systems... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Strong WORM

    Publication Year: 2008, Page(s):69 - 76
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (278 KB) | HTML iconHTML

    We introduce a Write-Once Read-Many (WORM) storage system providing strong assurances of data retention and compliant migration, by leveraging trusted secure hardware in close data proximity. This is important because existing compliance storage products and research prototypes are fundamentally vulnerable to faulty or malicious behavior, as they rely on simple enforcement primitives ill-suited fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting Click Fraud in Pay-Per-Click Streams of Online Advertising Networks

    Publication Year: 2008, Page(s):77 - 84
    Cited by:  Papers (8)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (259 KB) | HTML iconHTML

    With the rapid growth of the Internet, online advertisement plays a more and more important role in the advertising market. One of the current and widely used revenue models for online advertising involves charging for each click based on the popularity of keywords and the number of competing advertisers. This pay-per-click model leaves room for individuals or rival companies to generate false cli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring Anti-Spam Models in Large Scale VoIP Systems

    Publication Year: 2008, Page(s):85 - 92
    Cited by:  Papers (7)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (487 KB) | HTML iconHTML

    Although the problem of spam detection in email is well understood and has been extensively researched, a significant portion of emails today are spam. A most widely used method to detect spam involves content filtering, where the spam detector scans the received email for keywords. However, the same approach cannot be applied to detect Voice over IP (VoIP) spam, since a call has to be categorized... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Divide-and-Conquer Techniques for Effective DDoS Attack Defenses

    Publication Year: 2008, Page(s):93 - 102
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (590 KB) | HTML iconHTML

    Distributed Denial-of-Service (DDoS) attacks have emerged as a popular means of causing mass targeted service disruptions, often for extended periods of time. The relative ease and low costs of launching such attacks, supplemented by the current woeful state of any viable defense mechanism, have made them one of the top threats to the Internet community today. While distributed packet logging and/... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobility-Assisted Spatiotemporal Detection in Wireless Sensor Networks

    Publication Year: 2008, Page(s):103 - 110
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    Wireless sensor networks (WSNs) deployed for mission-critical applications face the fundamental challenge of meeting stringent spatiotemporal performance requirements using nodes with limited sensing capacity. Although advance network planning and dense node deployment may initially achieve the required performance, they often fail to adapt to the unpredictability of physical reality. This paper e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Analysis of Group Based Detection for Sparse Sensor Networks

    Publication Year: 2008, Page(s):111 - 122
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (442 KB) | HTML iconHTML

    In this paper, we analyze the performance of group based detection in sparse sensor networks, when the system level detection decision is made based on the detection reports generated from multiple sensing periods. Sparse deployment is essential for reducing cost of large scale sensor networks, which cover thousands of square miles. In a sparse deployment, the sensor field is only partially covere... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.