Notice
There is currently an issue with the citation download feature. Learn more

2008 Seventh IEEE International Symposium on Network Computing and Applications

10-12 July 2008

Filter Results

Displaying Results 1 - 25 of 62
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (13 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (181 KB)
    Freely Available from IEEE
  • Message from the Program Committee

    Publication Year: 2008, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (25 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organizers

    Publication Year: 2008, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2008, Page(s):xii - xiv
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • External reviewers

    Publication Year: 2008, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (20 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2008, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (58 KB)
    Freely Available from IEEE
  • Invited Keynotes

    Publication Year: 2008, Page(s):xvii - xviii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (28 KB) | HTML iconHTML

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • APART: Low Cost Active Replication for Multi-tier Data Acquisition Systems

    Publication Year: 2008, Page(s):1 - 8
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (209 KB) | HTML iconHTML

    This paper proposes APART (a posteriori active replication), a novel active replication protocol specifically tailored for multi-tier data acquisition systems. Unlike existing active replication solutions, APART does not rely on a-priori coordination schemes determining a same schedule of events across all the replicas, but it ensures replicas consistency by means of an a-posteriori reconciliation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quicksilver Scalable Multicast (QSM)

    Publication Year: 2008, Page(s):9 - 18
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1154 KB) | HTML iconHTML

    QSM is a multicast engine designed to support a style of distributed programming in which application objects are replicated among clients and updated via multicast. The model requires platforms that scale in dimensions previously unexplored; in particular, to large numbers of multicast groups. Prior systems werenpsilat optimized for such scenarios and canpsilat take advantage of regular group ove... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FOSeL: Filtering by Helping an Overlay Security Layer to Mitigate DoS Attacks

    Publication Year: 2008, Page(s):19 - 28
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (325 KB) | HTML iconHTML

    Denial of service (DoS) attacks are major threat against availability in the Internet. A large number of countermeasure techniques try to detect attack and then filter out DoS attack packets. Unfortunately these techniques that filter DoS traffic by looking at known attack patterns or statistical anomalies in the traffic patterns can be defeated by changing the attack patterns and masking the anom... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Execution Patterns in Automatic Malware and Human-Centric Attacks

    Publication Year: 2008, Page(s):29 - 36
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (401 KB) | HTML iconHTML

    With the massive surges of new malware, the intuitive detection techniques currently used in most security tools deem ineffective. Consequently, we urgently need better solutions that are established on solid theoretical basis. It becomes, thus, necessary to search for more efficient techniques and algorithms as well as taxonomies and models for attacks and malware. We present, in this paper, the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finite Memory: A Vulnerability of Intrusion-Tolerant Systems

    Publication Year: 2008, Page(s):37 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    In environments like the Internet, faults follow unusual patterns, dictated by the combination of malicious attacks with accidental faults such as long communication delays caused by temporary network partitions. In this scenario, attackers can force buffer overflows in order to leave the system in an inconsistent state or to prevent it from doing progress, causing a denial of service. This paper ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FaSReD: Fast and Scalable Resource Discovery in Support of Multiple Resource Range Requirements for Computational Grids

    Publication Year: 2008, Page(s):45 - 51
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (379 KB) | HTML iconHTML

    Distributed grid resource discovery (ReD) systems lack the ability to adapt efficiently to an increase in the number of attributes. The main contribution of this paper is a fast and scalable ReD mechanism, dubbed FaSReD, which composes a resource key via bit string encoding. We establish close-to-optimal FaSReD and a lower bound on the mean number of search hops under FaSReD. Through extensive sim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fast and Robust Content-based Publish/Subscribe Architecture

    Publication Year: 2008, Page(s):52 - 59
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (363 KB) | HTML iconHTML

    We present cluster-based publish/subscribe, a novel architecture that is not only resilient to event broker failures but also provides load balancing and fast event dissemination service. Our proposed approach achieves fault tolerance by organizing event brokers in clusters. Multiple inter-cluster links provide continuous availability of dissemination service in presence of broker failure without ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network Planning Optimization for Multimedia Networks

    Publication Year: 2008, Page(s):60 - 67
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (329 KB) | HTML iconHTML

    This work presents a planning methodology for multimedia networks based on a hybrid traffic model and an evolutionary optimization procedure. The methodology intends to optimize the sizing of network elements to comply with two QoS simultaneous network parameters as well as to promote network stability and cost efficiency. The hybrid traffic model deals with the multimedia network traffic as a com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User Profile-Based Authorization Policies for Network QoS Services

    Publication Year: 2008, Page(s):68 - 75
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    Recent papers propose QoS solutions allowing the users to explicitly specify the quality level they request during a so-called explicit QoS service invocation that includes dynamic QoS offering and new mechanisms for authentication, authorization and accounting. In particular, organizations should be able to control their network services and authorize QoS services based on service parameters, as ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multicoordinated Agreement Protocols for Higher Availabilty

    Publication Year: 2008, Page(s):76 - 84
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    Adaptability and graceful degradation are important features in distributed systems. Yet, consensus and other agreement protocols, basic building blocks of reliable distributed systems, lack these features and must perform expensive reconfiguration even in face of single failures. In this paper we describe multicoordinated mode of execution for agreement protocols that has improved availability an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Minimum Density RAID-6 Code with a Word Size of Eight

    Publication Year: 2008, Page(s):85 - 92
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    RAID-6 storage systems protect k disks of data with twoparity disks so that the system of k+2 disks may toleratethe failure of any two disks. Coding techniques for RAID-6 systems are varied, but an important class of techniquesare those with minimum density, featuring an optimalcombination of encoding, decoding and modificationcomplexity. The word size of a code impacts both how thecode is laid ou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generalizing RDP Codes Using the Combinatorial Method

    Publication Year: 2008, Page(s):93 - 100
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB) | HTML iconHTML

    In this paper, we present PDH Latin - a new class of 2-erasure horizontal codes with dependent parity symbols based on column-Hamiltonian Latin squares (CHLS). We prove that PDH Latin codes are MDS codes. We also present a new class of 2-erasure parity independent mixed codes based on CHLS - PIMLatin. We show that the performance of the new codes is comparable to or better than other codes of this... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flexible Parameterization of XOR based Codes for Distributed Storage

    Publication Year: 2008, Page(s):101 - 110
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    Distributed storage systems apply erasure-tolerant codes to guarantee reliable access to data despite failures of storage resources. While many codes can be mapped to XOR operations and efficiently implemented on common microprocessors, only a certain number of codes are usually implemented in a certain system (out of a wide variety of different codes). The ability to include new codes easily, to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting Concurrent Task Deployment Wireless Sensor Networks

    Publication Year: 2008, Page(s):111 - 118
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (503 KB) | HTML iconHTML

    Deploying large-scale sensor networks involves the programming of many devices based on a desired mission. Techniques for reprogramming devices in situ have been investigated to mitigate the effort required when program updates are required or when the mission of the system changes. We consider a technique that is intended to support multiple concurrent missions by the system by exploiting availab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.