By Topic

Network Computing and Applications, 2009. NCA 2009. Eighth IEEE International Symposium on

Date 9-11 July 2009

Filter Results

Displaying Results 1 - 25 of 64
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (248 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (209 KB) | HTML iconHTML
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (174 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (133 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (165 KB)
    Freely Available from IEEE
  • Message from the NCA 2009 Chairs

    Publication Year: 2009, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (98 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organizers

    Publication Year: 2009, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2009, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (123 KB)
    Freely Available from IEEE
  • Sustainability and the Office of CyberInfrastructure

    Publication Year: 2009, Page(s):1 - 3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (211 KB) | HTML iconHTML

    The National Science Foundationpsilas Office of CyberInfrastructure (OCI) supports a broad set of infrastructure, including hardware, software, and services to enable computational science in a variety of disciplines. Issues of sustainability and reusability in this context have become a priority. This paper addresses several approaches to sustainability, and how they OCIs task forces are addressi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Experimental Study of Diversity with Off-the-Shelf AntiVirus Engines

    Publication Year: 2009, Page(s):4 - 11
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (821 KB) | HTML iconHTML

    Fault tolerance in the form of diverse redundancy is well known to improve the detection rates for both malicious and non-malicious failures. What is of interest to designers of security protection systems are the actual gains in detection rates that they may give. In this paper we provide exploratory analysis of the potential gains in detection capability from using diverse AntiVirus products for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulating Fixed Virtual Nodes for Adapting Wireline Protocols to MANET

    Publication Year: 2009, Page(s):12 - 19
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    The virtual node layer (VNLayer) is a programming abstraction for mobile ad hoc networks (MANETs). It defines simple virtual servers at fixed locations in a network, addressing a central problem for MANETs, which is the absence of fixed infrastructure. Advantages of this abstraction are that persistent state is maintained in each region, even when mobile nodes move or fail, and that simple wirelin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QuoCast: A Resource-Aware Algorithm for Reliable Peer-to-Peer Multicast

    Publication Year: 2009, Page(s):20 - 27
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (506 KB) | HTML iconHTML

    This paper presents QuoCast, a resource-aware protocol for reliable stream diffusion in unreliable environments, where processes may crash and communication links may lose messages. QuoCast is resource-aware in the sense that it takes into account memory, CPU, and bandwidth constraints. Memory constraints are captured by the limited knowledge each process has of its neighborhood. CPU and bandwidth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Seed Scheduling for Peer-to-Peer Networks

    Publication Year: 2009, Page(s):28 - 35
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (717 KB) | HTML iconHTML

    The initial phase in a content distribution (file sharing) scenario is delicate due to the lack of global knowledge and the dynamics of the overlay. An unwise distribution of the pieces in this phase can cause delays in reaching steady state, thus increasing file download times. We devise a scheduling algorithm at the seed (source peer with full content), based on a proportional fair approach, and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proximity-Aware Distributed Mutual Exclusion for Effective Peer-to-Peer Replica Management

    Publication Year: 2009, Page(s):36 - 43
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB) | HTML iconHTML

    A distributed hash table (DHT) with replicated objects enjoys improved performance and fault-tolerance but calls for effective replica management. This paper deals with proximity-aware distributed mutual exclusion (PADME) for P2P replica management on a DHT. Three main components are involved in PADME: (1) a few nodes designated as the sink candidates for collecting and consolidating replica updat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Streamline: An Architecture for Overlay Multicast

    Publication Year: 2009, Page(s):44 - 51
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    We propose Streamline, a two-layered architecture designed for media streaming in overlay networks. The first layer is a generic, customizable and lightweight protocol which is able to construct and maintain different types of meshes, exhibiting different properties. We discuss two types of overlay networks and explain how the first layer protocol builds these networks in a distributed manner. The... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Improved Overlay Simulation Using Realistic Topologies

    Publication Year: 2009, Page(s):52 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (326 KB) | HTML iconHTML

    Simulation of distributed applications and overlay networks is challenging. Often the results generated in simulation do not match experimental results. Distributed testbeds like Planet-Lab help to bridge the gap, but they do not offer enough nodes to do an Internet scale evaluation. In this paper we use a tool called TopDNS for generating realistic topologies for simulations, using the Planet-Lab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Round-Robin Implementations of Processor Sharing, Including Overhead

    Publication Year: 2009, Page(s):60 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (221 KB) | HTML iconHTML

    It has been observed in recent years that in many applications service time demands are highly variable. Without foreknowledge of exact service times of individual jobs, processor sharing is an effective theoretical strategy for handling such demands. In practice, however, processor sharing must be implemented by time-slicing with a round-robin discipline. In this paper, we investigate how round-r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of Price-Based Static and Dynamic Job Allocation Schemes for Grid Computing Systems

    Publication Year: 2009, Page(s):66 - 73
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (529 KB) | HTML iconHTML

    Grid computing systems are a cost-effective alternative to traditional high-performance computing systems. However, the computing resources of a grid are usually far apart and connected by Wide Area Networks resulting in considerable communication delays. Hence, efficient allocation of jobs to computing resources for load balancing is essential in these grid systems. In this paper, two price-based... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Rule Based Co-operative Approach for Cell Selection in High Speed Cellular Networks

    Publication Year: 2009, Page(s):74 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (249 KB) | HTML iconHTML

    In this era of perpetual connectivity, with the introduction of new data-intensive real-time applications such as video-conferencing, video-on-demand, and interactive gaming, the need for doing more with limited network resources has become more than ever before. The continuous drive toward the notion of pervasive computing and communication requires a shift toward more adaptive and collaborative ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sharing Private Information Across Distributed Databases

    Publication Year: 2009, Page(s):82 - 89
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB) | HTML iconHTML

    In industries such as healthcare, there is a need to electronically share privacy-sensitive data across distinct organizations. We show how this can be done while allowing organizations to keep their legacy databases and maintain ownership of the data that they currently store. Without sending or mirroring data to any trusted, centralized entity, we demonstrate how queries can be answered in a dis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy-Aware Prefetching for Parallel Disk Systems: Algorithms, Models, and Evaluation

    Publication Year: 2009, Page(s):90 - 97
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (373 KB) | HTML iconHTML

    Parallel disk systems consume a significant amount of energy due to the large number of disks. To design economically attractive and environmentally friendly parallel disk systems, in this paper we design and evaluate an energy-aware prefetching strategy for parallel disk systems consisting of a small number of buffer disks and large number of data disks. Using buffer disks to temporarily handle r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From Auto-adaptive to Survivable and Self-Regenerative Systems Successes, Challenges, and Future

    Publication Year: 2009, Page(s):98 - 101
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (231 KB) | HTML iconHTML

    This paper charts the course of adaptive behavior in intrusion tolerance, starting from pre-programmed and user-controlled reactive adaptation to highly sophisticated autonomic and cognitively driven adaptation. The goal of intrusion-tolerance is to provide mission continuity even under conditions of sustained cyber attacks. We describe key themes of our previous work in adaptive cyber defense and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generic Danger Detection for Mission Continuity

    Publication Year: 2009, Page(s):102 - 107
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    Mobile ad-hoc networks (MANETs) have become the environment of choice for providing edge connectivity to mobile forces. In particular, next-generation military systems leverage MANET technology to provide information assets to troops. However, MANETs face a number of serious security exposures, which are a superset of traditional networks. In prior work, we have described BITSI, the Biologically-I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Survivability through Run-Time Software Evolution

    Publication Year: 2009, Page(s):108 - 113
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    In this paper we present an architectural framework designed to increase the survivability of software agent nodes in a distributed system. A multi-layered model replaces the original node software. Original computational requirements of the node are retained in the lowest level. The upper layers of the model provide protective and supportive services. Model components are mutated to create behavi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automating Intrusion Response via Virtualization for Realizing Uninterruptible Web Services

    Publication Year: 2009, Page(s):114 - 117
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    We present a virtualization-based Web server system, a prototype, and experimental results for providing uninterrupted Web services in the presence of intrusion attacks and software faults. The proposed system utilizes replicated virtual servers managed by a closed-loop feedback controller. Using anomaly and intrusion sensor outputs, the controller calculates cost-weighted actions against threats ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.