The Community for Technology Leaders
2013 IEEE 12th International Symposium on Network Computing and Applications (2004)
Boston, Massachusetts
Aug. 30, 2004 to Sept. 1, 2004
ISBN: 0-7695-2242-4
TABLE OF CONTENTS
Session 1: Overlay Networks

Araneola: A Scalable Reliable Multicast System for Dynamic Environments (Abstract)

Roie Melamed , CS Department, Technion
Idit Keidar , EE Department, Technion
pp. 5-14

PCoord: Network Position Estimation Using Peer-to-Peer Measurements (Abstract)

Steven Lerman , Massachusetts Institute of Technology, Cambridge, MA
Li-wei Lehman , Massachusetts Institute of Technology, Cambridge, MA
pp. 15-24

HyperTree for Self-Stabilizing Peer-to-Peer Systems (Abstract)

Ronen I. Kat , Ben-Gurion University, Israel
Shlomi Dolev , Ben-Gurion University, Israel
pp. 25-32
Session 2: Keynote Speaker

Intrusion Tolerance for Internet Applications (PDF)

Yves Deswarte , LAAS-CNRS, France
David Powell , LAAS-CNRS, France
pp. 35-36
Session 3: Overlap Networks

GeoPeer: A Location-Aware Peer-to-Peer System (Abstract)

Lu? Rodrigues , Universidade de Lisboa
Filipe Ara? , Universidade de Lisboa
pp. 39-46

WonGoo: A Pure Peer-to-Peer Full Text Information Retrieval System Based On Semantic Overlay Networks (Abstract)

Xueqi Cheng , Institute of Computing Technology Chinese Academy of Sciences Beijing, China
Jianming Lv , Institute of Computing Technology Chinese Academy of Sciences Beijing, China
pp. 47-54
Session 4: Keynote Speaker
Session 5: Web Protocols

Objective-Greedy Algorithms for Long-Term Web Prefetching (Abstract)

Ajay D. Kshemkalyani , Univ. of Illinois at Chicago
Bin Wu , Univ. of Illinois at Chicago
pp. 61-68

A Protocol for Improved User Perceived QoS in Web Transactional Applications (Abstract)

Paolo Romano , Universit? di Roma "La Sapienza", Italy
Francesco Quaglia , Universit? di Roma "La Sapienza", Italy
Bruno Ciciani , Universit? di Roma "La Sapienza", Italy
pp. 69-76

WALTy: A User Behavior Tailored Tool for Evaluating Web Application Performance (Abstract)

M. Sereno , Universit? degli Studi di Torino, Italy
R. Schifanella , Universit? degli Studi di Torino, Italy
G. Ruffo , Universit? degli Studi di Torino, Italy
R. Politi , CSP Sc.a.r.l. c/o Villa Gualino, Italy
pp. 77-86
Session 6: Grid Computing

Downloading Replicated, Wide-Area Files - A Framework and Empirical Evaluation (Abstract)

Rebecca L. Collins , University of Tennessee, Knoxville, TN
James S. Plank , University of Tennessee, Knoxville, TN
pp. 89-96

Non-Uniform Information Dissemination for Dynamic Grid Resource Discovery (Abstract)

Michael J. Lewis , State University of New York at Binghamton
Nael B. Abu-Ghazaleh , State University of New York at Binghamton
Sameer Tilak , State University of New York at Binghamton
Vishal Iyengar , State University of New York at Binghamton
pp. 97-106
Session 7: Keynote Speaker

Group Communication: Where Are We Today and Future Challenges (Abstract)

Andr? Schiper , Ecole Polytechnique F?d?rale de Lausanne (EPFL)
pp. 109-117
Session 8: Protocols and Verification

Compiling IOA without Global Synchronization (Abstract)

Nancy A. Lynch , MIT Computer Science and Artificial Intelligence Laboratory
Joshua A. Tauber , MIT Computer Science and Artificial Intelligence Laboratory
Michael J. Tsai , MIT Computer Science and Artificial Intelligence Laboratory
pp. 121-130

Towards JMS Compliant Group Communication - A Semantic Mapping (Abstract)

Arnas Kupsys , ?cole Polytechnique F?d?rale de Lausanne (EPFL), Switzerland
Andr? Schiper , ?cole Polytechnique F?d?rale de Lausanne (EPFL), Switzerland
Stefan Pleisch , ?cole Polytechnique F?d?rale de Lausanne (EPFL), Switzerland
Matthias Wiesmann , ?cole Polytechnique F?d?rale de Lausanne (EPFL), Switzerland
pp. 131-140

A Methodological Construction of an Efficient Sequential Consistency Protocol (Abstract)

Michel Raynal , IRISA, Universit? de Rennes, France
Vicent Cholvi , Universidad Jaume I, Spain
Antonio Fern?ndez , Universidad Rey Juan Carlos, Spain
Ernesto Jim?nez , EUI, Universidad Polit?cnica de Madrid, Spain
pp. 141-148
Session 9: Keynote Speaker

The Response to IT Complexity: Autonomic Computing (Abstract)

John W. Sweitzer , IBM Corporation
Alan G. Ganek , IBM Corporation
Cristiane P. Hilkner , IBM Corporation
Joseph L. Hellerstein , IBM Corporation
Brent Miller , IBM Corporation
pp. 151-157
Session 10: Network Security

Frequent Episode Rules for Internet Anomaly Detection (Abstract)

Kai Hwang , University of Southern California, Los Angeles, CA
Min Qin , University of Southern California, Los Angeles, CA
pp. 161-168

Performance Analysis of Cryptographic Protocols on Handheld Devices (Abstract)

Patroklos G. Argyroudis , University of Dublin, Trinity College
Donal O'Mahony , University of Dublin, Trinity College
Raja Verma , University of Dublin, Trinity College
Hitesh Tewari , University of Dublin, Trinity College
pp. 169-174
Session 11: System Area Networks/InfiniBand

The LC Assignment Policy for Cluster-Based Servers (Abstract)

Victoria Ungureanu , Rutgers University, Newark, NJ
Michael Katehakis , Rutgers University, Newark, NJ
Benjamin Melamed , Rutgers University, Piscataway, NJ
pp. 177-184

ViSMI: Software Distributed Shared Memory for InfiniBand Clusters (Abstract)

Martin Mairandres , Technische Universit?t M?nchen, Germany
Carsten Trinitis , Technische Universit?t M?nchen, Germany
Jie Tao , Universit?t Karlsruhe, Germany
Chistian Osendorfer , Technische Universit?t M?nchen, Germany
pp. 185-191

Dynamic Key Messaging for Cluster Computing (Abstract)

Ming Zhu , Drexel University, Philadelphia, PA
Yang Wang , University of Alberta, Edmonton
Meng Ding , University of Alberta, Edmonton
Constantine Katsinis , Drexel University, Philadelphia, PA
pp. 192-199
Session 12: Keynote Speaker
Session 13: Network Processors and Switching Architectures

A Novel Switch Architecture for High-Performance Computing and Signal Processing Networks (Abstract)

Warren Rosen , Drexel University, Philadelphia, PA
Diana Hecht , Rydal Research and Development, Rydal, PA
Satyen Sukhtankar , Rydal Research and Development, Rydal, PA
pp. 215-222

An Iterative Switching Algorithm With (Possibly) One Iteration (Abstract)

Saad Mneimneh , Southern Methodist University, Dallas, TX
pp. 223-231
Session 14: Performance Modeling and Analysis

On the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic (Abstract)

Imad Antonios , Southern Connecticut State University, New Haven, CT
Lester Lipsky , University of Connecticut, Storrs, CT
pp. 235-242

An Adaptive Admission Control Algorithm for Bandwidth Brokers (Abstract)

K. Stamos , Univ. of Patras, Greece
Ch. Bouras , Univ. of Patras, Greece
pp. 243-250
Session 15: Mobile Ad-Hoc and Sensors Networks

Context-Based Access Control Management in Ubiquitous Environments (Abstract)

Daniela Tibaldi , Universit? di Bologna, Italy
Antonio Corradi , Universit? di Bologna, Italy
Rebecca Montanari , Universit? di Bologna, Italy
pp. 253-260

Location-Triggered Routing Protocol in Mobile Ad Hoc Networks (Abstract)

Zhengming Shen , Dollar Thrifty Automotive Group Inc, Tulsa, OK
Johnson Thomas , Oklahoma State University, Tulsa, OK
pp. 261-268

Using a Task-Specific QoS for Controlling Sensing Requests and Scheduling (Abstract)

Yong Xun , Northeastern University, Boston, MA
Kenneth Baclawski , Northeastern University, Boston, MA
Mieczyslaw M. Kokar , Northeastern University, Boston, MA
pp. 269-276
Session 1: Protocols and Programming for Distributed Systems

Towards Flexible Finite-State-Machine-Based Protocol Composition (Abstract)

Andr? Schiper , ?cole Polytechnique F?d?rale de Lausanne (EPFL), Swizterland
Stefan Pleisch , ?cole Polytechnique F?d?rale de Lausanne (EPFL), Swizterland
Sergio Mena , ?cole Polytechnique F?d?rale de Lausanne (EPFL), Swizterland
Richard Ekwall , ?cole Polytechnique F?d?rale de Lausanne (EPFL), Swizterland
pp. 281-286

Infopipes: The ISL/ISG Implementation Evaluation (Abstract)

Wenchang Yan , Georgia Institute of Technology
Calton Pu , Georgia Institute of Technology
Jonathan Walpole , OGI School of Science and Engineering, OHSU, Beaverton, OR
Koichi Moriyama , Sony Corporation, Tokyo, Japan
Younggyun Koh , Georgia Institute of Technology
Charles Consel , INRIA/LaBRI/ENSEIRB, Bordeaux, France
Ling Liu , Georgia Institute of Technology
Galen Swint , Georgia Institute of Technology
pp. 293-296

A Multi-Policy, Cooperative Playback Control Protocol (Abstract)

Giancarlo Fortino , DEIS - University of Calabria, Italy
Carlo Mastroianni , ICAR - Italian National Research Council, Italy
Wilma Russo , DEIS - University of Calabria, Italy
pp. 297-302

FIONA: A Fault Injector for Dependability Evaluation of Java-Based Network Applications (Abstract)

Taisy Silva Weber , Universidade Federal do Rio Grande do Sul, Brazil
Gabriela Jacques-Silva , Universidade Federal do Rio Grande do Sul, Brazil
J? Gerchman , Universidade Federal do Rio Grande do Sul, Brazil
Roberto Jung Drebes , Universidade Federal do Rio Grande do Sul, Brazil
pp. 303-308
Session 2: System Area Networks

Request Distribution-Aware Caching in Cluster-Based Web Servers (Abstract)

Walter F. Tichy , Karlsruhe University, Germany
Vlad Olaru , Karlsruhe University, Germany
pp. 311-316

A Fast Polling I/O Implementation with Real-time Signals (Abstract)

Suguru Yamaguchi , Nara Institute of Science and Technology, Japan
Youki Kadobayashi , Nara Institute of Science and Technology, Japan
Eiji Kawai , Nara Institute of Science and Technology, Japan
pp. 317-322

Myrinet Networks: A Performance Study (Abstract)

Ying Qian , Queen's University, Kingston, ON, Canada
Ahmad Afsahi , Queen's University, Kingston, ON, Canada
Reza Zamani , Queen's University, Kingston, ON, Canada
pp. 323-328

Traveling Token for Dynamic Load Balancing (Abstract)

K. Vairavan , U. of Wisconsin-Milwaukee
Tariq Omari , Carleton University, Ottawa, Canada
Seyed H. Hosseini , U. of Wisconsin-Milwaukee
pp. 329-332

Shared Protection for Time Slotted Optical Networks (Abstract)

Abdelilah Maach , University of Ottawa Canada
Gregor v. Bochmann , University of Ottawa Canada
Hussein Mouftah , University of Ottawa Canada
pp. 333-336
Session 3: Routing and Security in MANET

Context-Awareness for Impromptu Collaboration in MANETs (Abstract)

Dario Bottazzi , University of Bologna, Italy
Rebecca Montanari , University of Bologna, Italy
Antonio Corradi , University of Bologna, Italy
pp. 339-342

Intrusion Detection in Sensor Networks: A Non-Cooperative Game Approach (Abstract)

Mehran Asadi , University of Texas at Arlington
Afrand Agah , University of Texas at Arlington
Kalyan Basu , University of Texas at Arlington
Sajal K. Das , University of Texas at Arlington
pp. 343-346
Adaptive Grid Computing Workshop

Resilient Peer-to-Peer Multicast from the Ground Up (Abstract)

Stefan Birrer , Northwestern University, Evanston, IL
Fabian E. Bustamante , Northwestern University, Evanston, IL
pp. 351-355

Performance of the NAS Parallel Benchmarks on Grid Enabled Clusters (Abstract)

Philip J. Sokolowski , Wayne State University, Detroit, MI
Daniel Grosu , Wayne State University, Detroit, MI
pp. 356-361

VIPSEC: Virtualized and Pluggable Security Services Infrastructure for Adaptive Grid Computing (Abstract)

Michel Riguidel , Graduate School of Telecommunications - Paris
Syed Naqvi , Graduate School of Telecommunications - Paris
pp. 362-365

Volunteer Availability based Fault Tolerant Scheduling Mechanism in Desktop Grid Computing Environment (Abstract)

HeonChang Yu , Korea University
ChongSun Hwang , Korea University
MaengSoon Baik , Korea University
SungJin Choi , Korea University
JoonMin Gil , Korea Institute of Science and Technology Information(KISTI)
pp. 366-371

A Fair Synchronization Protocol with Cheat Proofing for Decentralized Online Multiplayer Games (Abstract)

Muthucumaru Maheswaran , McGill University, Montreal, Canada
Bei Di Chen , McGill University, Montreal, Canada
pp. 372-375

Towards a Quality of Service Aware Public Computing Utility (Abstract)

Balasubramaneyam Maniymaran , McGill University, Montreal, QC, Canada
Muthucumaru Maheswaran , McGill University, Montreal, QC, Canada
Shah Asaduzzaman , McGill University, Montreal, QC, Canada
Arindam Mitra , McGill University, Montreal, QC, Canada
pp. 376-379
Trustworthy Network Computing Workshop

Optimal Parameter Selection for Efficient Memory Integrity Verification Using Merkle Hash Trees (Abstract)

Dan Williams , Cornell University, Ithaca, NY
Emin G? Sirer , Cornell University, Ithaca, NY
pp. 383-388

Towards an Approach for Automatically Repairing Compromised Network Systems (Abstract)

Henry L. Owen , Georgia Institute of Technology, Atlanta
Julian B. Grizzard , Georgia Institute of Technology, Atlanta
Eric R. Dodson , Georgia Institute of Technology, Atlanta
Sven Krasser , Georgia Institute of Technology, Atlanta
Gregory J. Conti , Georgia Institute of Technology, Atlanta
pp. 389-392

Implementation of Distributed Key Generation Algorithms using Secure Sockets (Abstract)

N. Kolani , University of Texas at San Antonio
A. T. Chronopoulos , University of Texas at San Antonio
F. Balbi , University of Texas at San Antonio
D. Veljkovic , University of Texas at San Antonio
pp. 393-398

Distance Measurement in Volunteer Computing Networks: A Completely Decentralized Approach (Abstract)

Dimitris Kamenopoulos , National Technical University of Athens, Greece
Iosif A. Osman , National Technical University of Athens, Greece
Panayotis Tsanakas , National Technical University of Athens, Greece
pp. 399-404

Self-Healing in Group Key Distribution Using Subset Difference Method (Abstract)

Ali Miri , University of Ottawa, Canada
Muhammad J. Bohio , University of Ottawa, Canada
pp. 405-408

Author Index (PDF)

pp. 413-414
97 ms
(Ver )