By Topic

2013 IEEE 12th International Symposium on Network Computing and Applications

22-24 Aug. 2013

Filter Results

Displaying Results 1 - 25 of 52
  • [Front cover]

    Publication Year: 2013, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (335 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2013, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • [Title page ii]

    Publication Year: 2013, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (148 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2013, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (156 KB)
    Freely Available from IEEE
  • Message from the Steering Committee Chair

    Publication Year: 2013, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (99 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Technical Program Chairs

    Publication Year: 2013, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (91 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2013, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (90 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2013, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Keynote abstract

    Publication Year: 2013, Page(s): xiv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (86 KB)

    Summary form only given. In this talk I will sketch some challenges in improving Web-site or Web-application performance from the perspective of the CDN. To motivate the problem I will provide some summary statistics describing the constitution of a modern Web site, and approximate timing data on the network-layer operations needed to deliver that content to an end-user. To establish background I'... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Mobile Sensors to Enhance Coverage in Linear Wireless Sensor Networks

    Publication Year: 2013, Page(s):1 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (261 KB) | HTML iconHTML

    One of the main challenges of using Linear Wireless Sensor Networks (LSN) is the reliability of the connections among the nodes. Faults in a few contiguous nodes may cause the creation of holes which will result in dividing the network into multiple disconnected segments. As a result, sensor nodes that are located between holes may not be able to deliver their sensed information which negativity a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hierarchical Distributed Loop Self-Scheduling Scheme for Cloud Systems

    Publication Year: 2013, Page(s):7 - 10
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (167 KB) | HTML iconHTML

    Cloud systems have demonstrated the powerful computation and storage capability in many scientific applications. In this paper, we propose a hierarchical distributed loop self-scheduling scheme to achieve good load balancing by applying weighted self-scheduling scheme on a heterogeneous cloud system. This scheme also considers the distribution of the output data, which can help reduce communicatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability Analysis of Linear Wireless Sensor Networks

    Publication Year: 2013, Page(s):11 - 16
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (203 KB) | HTML iconHTML

    Linear Wireless Sensor networks (LSN) are used to monitor long linear critical structures such as pipelines, rivers, railroads, international borders, and high power transmission cables. Due to the importance of these structures, the LSN must be designed with high reliability considerations. However, one of the main challenges of LSN design is the connection reliability among the nodes. Unlike in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rollerchain: A DHT for Efficient Replication

    Publication Year: 2013, Page(s):17 - 24
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (895 KB) | HTML iconHTML

    In this paper we present Roller chain, a novel Distributed Hash Table that offers efficient data storage through the combination of gossip-based and structured overlay networks. The unstructured component maintains clusters of fully connected nodes, where each cluster acts as a virtual node in the structured component. This architecture simplifies the management of data replication and balances th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sketch *-Metric: Comparing Data Streams via Sketching

    Publication Year: 2013, Page(s):25 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    In this paper, we consider the problem of estimating the distance between any two large data streams in small-space constraint. This problem is of utmost importance in data intensive monitoring applications where input streams are generated rapidly. These streams need to be processed on the fly and accurately to quickly determine any deviance from nominal behavior. We present a new metric, the Ske... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flocks: Evaluation of a QoS- and Content-Aware Overlay

    Publication Year: 2013, Page(s):33 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1332 KB) | HTML iconHTML

    Dynamic, large social events with concurrent activities, in which participants view, but also provide high-quality content to other visitors, pose one of many challenges to multimedia delivery. Distributing content in such a situation is difficult, and requires strong support from the underlying network, in order to quickly respond to changes in supply and demand. A Flock is a flexible overlay bui... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Media Streams Planning with Transcoding

    Publication Year: 2013, Page(s):41 - 48
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (683 KB) | HTML iconHTML

    High-quality video, both uncompressed and compressed with relatively low compression ratio, is used in interactive environments, where minimum end-to-end latency is required. The media streams planning solves multi-point data routing for such applications even when bit rate of streams is comparable to capacity of network links. Recent advances in acceleration of high-throughput low-latency video p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Partitioning for Video-on-Demand Services

    Publication Year: 2013, Page(s):49 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    Streaming video over the Internet has become a popular service that is projected to outstrip demand over most other real-time streaming services. Thus, it is essential to provide scalable server storage and services without which video-on-demand services will not be able to provide good performance in the face of increasing demand. In this paper, we study algorithms, and propose one, for simple pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed and Dynamic Map-less Self-reconfiguration for Microrobot Networks

    Publication Year: 2013, Page(s):55 - 60
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (203 KB) | HTML iconHTML

    MEMS micro robots are low-power and low memory capacity devices that can sense and act. One of the most challenges in MEMS micro robot applications is the self-reconfiguration, especially when the efficiency and the scalability of the algorithm are required. In the literature, if we want a self-reconfiguration of micro robots to a target shape consisting of P positions, each micro robot should hav... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Introducing an Intelligent MapReduce Framework for Distributed Data Processing in Clouds

    Publication Year: 2013, Page(s):61 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    The world of big data is in need of high levels of scalability and the question, how to effectively process large-scale data sets is becoming increasingly relevant. Furthermore the existing data management schemes do not work well when data is partitioned among numerous available nodes dynamically. Approaches towards parallel data processing in cloud, which offer greater portability, manageability... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enabling Distributed Key-Value Stores with Low Latency-Impact Snapshot Support

    Publication Year: 2013, Page(s):65 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (239 KB) | HTML iconHTML

    Current distributed key-value stores generally provide greater scalability at the expense of weaker consistency and isolation. However, additional isolation support is becoming increasingly important in the environments in which these stores are deployed, where different kinds of applications with different needs are executed, from transactional workloads to data analytics. While fully-fledged ACI... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Real Time Adaptive Intrusion Detection Alert Classifier for High Speed Networks

    Publication Year: 2013, Page(s):73 - 80
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (931 KB) | HTML iconHTML

    With the emergence of High Speed Network (HSN), the manual intrusion alert detection become an extremely laborious and time-consuming task since it requires an experienced skilled staff in security fields and need a deep analysis. In addition, the batch model of alert management is no longer adequate given that labeling is a continuous time process since incoming intrusion alerts are often collect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-healing Performance Anomalies in Web-based Applications

    Publication Year: 2013, Page(s):81 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (881 KB) | HTML iconHTML

    In this paper, we describe the SHõWA framework and evaluate its ability to recover from performance anomalies in Web-based applications. SHõWA is meant to automatically detect and recover from performance anomalies, without calling for human intervention. It does not require manual changes to the application source code or previous knowledge about its implementation details. The ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Delay-Tolerant Network Routing Algorithm Based on Column Generation

    Publication Year: 2013, Page(s):89 - 96
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    Delay-Tolerant Networks (DTN) model systems that are characterized by intermittent connectivity and frequent partitioning. Routing in DTNs has drawn much research effort recently. Since very different kinds of networks fall in the DTN category, many routing approaches have been proposed. In particular, the routing layer in some DTNs have information about the schedules of contacts between nodes an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NaaS: QoS-aware Cloud Networking Services

    Publication Year: 2013, Page(s):97 - 100
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB) | HTML iconHTML

    Network as a Service (NaaS) is recently becoming increasingly relevant, as it will enable cloud providers to select on-demand network services according to application needs. Currently, the lack of QoS control over cloud networking services may significantly impact the application performance. Therefore, two important issues should be addressed by the NaaS providers: (i) determining the QoS to be ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.