2013 Conference on Networked Systems

11-15 March 2013

Filter Results

Displaying Results 1 - 25 of 32
  • [Front cover]

    Publication Year: 2013, Page(s): C4
    Request permission for commercial reuse | |PDF file iconPDF (1034 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2013, Page(s): i
    Request permission for commercial reuse | |PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2013, Page(s): iii
    Request permission for commercial reuse | |PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2013, Page(s): iv
    Request permission for commercial reuse | |PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):v - vii
    Request permission for commercial reuse | |PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • Netsys 2013: Message from Conference Chairs

    Publication Year: 2013, Page(s): viii
    Request permission for commercial reuse | |PDF file iconPDF (110 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2013, Page(s): ix
    Request permission for commercial reuse | |PDF file iconPDF (261 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2013, Page(s): x
    Request permission for commercial reuse | |PDF file iconPDF (107 KB)
    Freely Available from IEEE
  • NetSys 2013 Conference history

    Publication Year: 2013, Page(s): xi
    Request permission for commercial reuse | |PDF file iconPDF (310 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2013, Page(s): xii
    Request permission for commercial reuse | |PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Conference roadmap [schedule]

    Publication Year: 2013, Page(s):xiii - xvii
    Request permission for commercial reuse | |PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • [Keynote talks - 3 abstracts]

    Publication Year: 2013, Page(s):xviii - xxi
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (341 KB)

    Provides an abstract for each of the 3 keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating the Impact on Application-Related Metrics for Sensor Data with Concurrent Voice Transmission in Mobile Wireless Mesh Scenarios

    Publication Year: 2013, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (391 KB) | HTML iconHTML

    The transmission of sensor data over wireless mesh networks in mobile scenarios is a strongly emerging application in the field of tactical and mission critical networking. In these scenarios, sensor data from the deployed units like GPSposition, vital and environmental data is transported over a wireless mesh network to a centralized command point. The inherently imprecise sensor measurements are... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable Multipath Exploration in Ad-Hoc Networks

    Publication Year: 2013, Page(s):9 - 18
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (319 KB) | HTML iconHTML

    Multipath routing allows for a reliable communication in ad-hoc networks, e.g., to transport VoIP calls in disaster scenarios. Due to the usage of different paths in conjunction with Forward Error Correction, failures can be tolerated without interrupting real-time transmissions. However, current multipath algorithms either depend on global topology information, perform an excessive message floodi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Component System for Spontaneous Virtual Networks

    Publication Year: 2013, Page(s):19 - 26
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (533 KB) | HTML iconHTML

    In this paper, we propose a framework and a component system, which can be used to dynamically create modularized network services. A composer can automatically compose such services from a library of available components, taking into account dependencies among components and the possibility of sharing components by different services. In addition to group communication and publish/subscribe funct... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ca-Re-Chord: A Churn Resistant Self-Stabilizing Chord Overlay Network

    Publication Year: 2013, Page(s):27 - 34
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (281 KB) | HTML iconHTML

    Self-stabilization is the property of a system to transfer itself regardless of the initial state into a legitimate state. Chord as a simple, decentralized and scalable distributed hash table is an ideal showcase to introduce self-stabilization for p2p overlays. In this paper, we present Re-Chord, a self-stabilizing version of Chord. We show, that the stabilization process is functional, but prone... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adding Capacity-Aware Storage Indirection to Homogeneous Distributed Hash Tables

    Publication Year: 2013, Page(s):35 - 42
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (250 KB) | HTML iconHTML

    Distributed hash tables are very versatile to use, as distributed storage is a desirable feature for various applications. Typical structured overlays like Chord, Pastry or Kademlia consider only homogeneous nodes with equal capacities, which does not resemble reality. In a practical use case, nodes might get overloaded by storing popular data. In this paper, we present a general approach to enabl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Greedy Embedding, Routing and Content Addressing for Darknets

    Publication Year: 2013, Page(s):43 - 50
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (401 KB) | HTML iconHTML

    To achieve anonymous and censorship-resistant overlay communication, darknets restrict overlay links to trusted parties. Efficient data retrieval in such a restricted topology requires a decentralized addressing scheme. We propose a greedy embedding algorithm, which is used to realize efficient routing and content addressing for darknets. The embedding guarantees success of greedy routing using co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Analysis of Anonymity Side Effects in the Internet of Services

    Publication Year: 2013, Page(s):51 - 58
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (224 KB) | HTML iconHTML

    The Internet of Services will facilitate cross-organizational collaboration by allowing companies to utilize services from external providers. Even though standard security mechanisms such as message encryption may be in place, attackers could create detailed profiles of service consumers, providers, and marketplaces by monitoring communication endpoints. This threatens the security objective of r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Long-Lived Self-Healing Group Key Distribution Scheme with Backward Secrecy

    Publication Year: 2013, Page(s):59 - 65
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (218 KB) | HTML iconHTML

    Self-healing group key distribution schemes allow for the establishment of a secure multicast communication between a group manager and group members through an unreliable broadcast channel. They can be used in multicast networks with centralized management, such as machine-to-machine systems, embedded and sensor networks, cellular networks and wireless networks. Constructions based on the exponen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bounds for the Security of the Vivaldi Network Coordinate System

    Publication Year: 2013, Page(s):66 - 75
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (813 KB) | HTML iconHTML

    Network coordinate systems have gained much attention as they allow for an elegant estimation of distances between nodes in distributed systems. Their most prominent representative is Vivaldi, which is using a mass-spring-damper system to embed peers into a two-dimensional Euclidean coordinate space with an additional height coordinate. In unimpaired overlay networks this simple method leads to a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Face the Enemy: Attack Detection for Planar Graph Routing

    Publication Year: 2013, Page(s):76 - 83
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (232 KB) | HTML iconHTML

    Localized geographic forwarding on planar graphs has been proposed for making routing scalable and efficient in large-scale wireless multihop networks. This approach, which is also known as face routing or perimeter routing, scales almost independently of the network size and is, hence, a promising scheme for the given class of networks. Existing work on this kind of routing focuses on the forward... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Jadex WfMS: Distributed Workflow Management for Private Clouds

    Publication Year: 2013, Page(s):84 - 91
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (227 KB) | HTML iconHTML

    Structuring an organization around its business processes has many benefits for both the processes themselves as well as the workflow and business process management within an organization in general. However, there are many challenges that make such a transition from a classical hierarchic to a state-of-the-art process organization difficult. In particular, traditional departments often resist lo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Access Policy Consolidation for Event Processing Systems

    Publication Year: 2013, Page(s):92 - 101
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (275 KB) | HTML iconHTML

    Current event processing systems lack methods to preserve privacy constraints of incoming event streams in a chain of subsequently applied stream operations. This is a problem in large-scale distributed applications like a logistic chain where event processing operators may be spread over multiple security domains. An adversary can infer from legally received outgoing event streams confidential in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-Aware Prediction of QoS and QoE Properties for Web Services

    Publication Year: 2013, Page(s):102 - 109
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (267 KB) | HTML iconHTML

    Web Services are commonly used for integrating applications between partners over the Internet. Since services with the same functionality are advertised with different Quality of Service (QoS) levels and are assessed with different Quality of Experience (QoE), choosing the right service may be quite challenging. It is essential for a user to predict QoS and QoE values as accurately as possible in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.