The Community for Technology Leaders
Fifth IEEE International Symposium on Network Computing and Applications (NCA'06) (2006)
Cambridge, Massachusetts
July 24, 2006 to July 26, 2006
ISBN: 0-7695-2640-3
TABLE OF CONTENTS
Papers

The +CAL Algorithm Language (PDF)

L. Lamport , Microsoft Res., Mountain View, CA
pp. 5

Application-Aware Reliability and Security: The Trusted ILLIAC Approach (PDF)

R.K. Iyer , University of Illinois at Urbana-Champaign, USA
pp. 6
Introduction
Keynote Speech Abstracts

The +CAL Algorithm Language (PDF)

Leslie Lamport , Microsoft Research, USA
pp. 5
Networking Protocols

A Tree-Turn Model for Irregular Networks (Abstract)

Jiazheng Zhou , National Tsing Hua University, Taiwan
Xuan-Yi Lin , National Tsing Hua University, Taiwan
Yeh-Ching Chung , National Tsing Hua University, Taiwan
pp. 11-18

Multi-Path Multi-Channel Routing Protocol (Abstract)

Bo Yan , National Institute of Standards and Technology, USA
Hamid Gharavi , National Institute of Standards and Technology, USA
pp. 27-31

JetStream: Achieving Predictable Gossip Dissemination by Leveraging Social Network Principles (Abstract)

Jay A. Patel , University of Illinois at Urbana-Champaign, USA
Indranil Gupta , University of Illinois at Urbana-Champaign, USA
Noshir Contractor , University of Illinois at Urbana-Champaign, USA
pp. 32-39

Self* Architecture for Trajectory Tracking in Wireless Sensor Networks (Abstract)

F. Claerhout , IRISA, France
A.K. Datta , University of Nevada Las Vegas, USA
M. Gradinariu , IRISA, France
M. Hurfin , IRISA, France
pp. 40-47

Parallelization of Geant4 Using TOP-C and Marshalgen (Abstract)

Gene Cooperman , Northeastern University, USA
Viet Ha Nguyen , Northeastern University, USA
Igor Malioutov , Northeastern University, USA
pp. 48-55

Software Aging and Rejuvenation in a SOAP-based Server (Abstract)

Luis Silva , University of Coimbra, Portugal
Henrique Madeira , University of Coimbra, Portugal
Jo?o Gabriel Silva , University of Coimbra, Portugal
pp. 56-65

Utilizing Network Processors in Distributed Enterprise Environments (Abstract)

Paul Royal , Georgia Institute of Technology, USA
Mitch Halpin , Georgia Institute of Technology, USA
Ada Gavrilovska , Georgia Institute of Technology, USA
Karsten Schwan , Georgia Institute of Technology, USA
pp. 66-76
Peer-to-Peer and Publish Subscribe Systems

Improved Result Ranking in P2P File-Sharing Systems by Probing for Metadata (Abstract)

Wai Gen Yee , Illinois Institute of Technology, USA
Linh Thai Nguyen , Illinois Institute of Technology, USA
Ophir Frieder , Illinois Institute of Technology, USA
pp. 85-92

Identifying Known and Unknown Peer-to-Peer Traffic (Abstract)

Fivos Constantinou , Massachusetts Institute of Technology (MIT), USA
Panayiotis Mavrommatis , Massachusetts Institute of Technology (MIT), USA
pp. 93-102
Real-Time Scheduling

Video-on-Demand Equipment Allocation (Abstract)

Frederic Thouin , McGill University, Canada
Mark Coates , McGill University, Canada
Dominic Goodwill , Nortel Networks, Canada
pp. 103-110

Slotted Optical Burst Switching (SOBS) Networks (Abstract)

Zhenghao Zhang , State University of New York at Stony Brook, USA
Lin Liu , State University of New York at Stony Brook, USA
Yuanyuan Yang , State University of New York at Stony Brook, USA
pp. 111-117

Implementing the Advanced Switching Minimum Bandwidth Egress Link Scheduler (Abstract)

Raul Martinez , University of Castilla-La Mancha, Spain
Francisco J. Alfaro , University of Castilla-La Mancha, Spain
Jose L. Sanchez , University of Castilla-La Mancha, Spain
pp. 118-125

ContagAlert: Using Contagion Theory for Adaptive, Distributed Alert Propagation (Abstract)

Michael Treaster , Google, Inc, USA
William Conner , University of Illinois at Urbana-Champaign, USA
Indranil Gupta , University of Illinois at Urbana-Champaign, USA
Klara Nahrstedt , University of Illinois at Urbana-Champaign, USA
pp. 126-136
Security and Trust

A Proxy Network Topology and Reconfiguration Algorithm for Resistance to DoS Attacks (Abstract)

Stephen Frechette , Riverside Research Institute, USA
D.R. Avresky , Northeastern University, USA
pp. 137-144
Middleware

Providing e-Transaction Guarantees in Asynchronous Systems with Inaccurate Failure Detection (Abstract)

Paolo Romano , Universita di Roma "La Sapienza", Italy
Francesco Quaglia , Universita di Roma "La Sapienza", Italy
pp. 155-162
Distributed Storage

Optimizing Cauchy Reed-Solomon Codes for Fault-Tolerant Network Storage Applications (Abstract)

James S. Plank , University of Tennessee, USA
Lihao Xu , Wayne State University, USA
pp. 173-180

Network-Aware Adaptation Techniques for Mobile File Systems (Abstract)

Benjamin Atkin , NEC Laboratories America, USA
Kenneth P. Birman , Cornell University, USA
pp. 181-188

Congestion Control for Distributed Hash Tables (Abstract)

Fabius Klemm , Ecole Polytechnique Federale de Lausanne (EPFL), Switzerland
Jean-Yves Le Boudec , Ecole Polytechnique Federale de Lausanne (EPFL), Switzerland
Karl Aberer , Ecole Polytechnique Federale de Lausanne (EPFL), Switzerland
pp. 189-195

Comparison of Redundancy Schemes for Distributed Storage Systems (Abstract)

Peter Sobe , University of Lubeck, Germany
Kathrin Peter , Konrad-Zuse-Zentrum fur Informationstechnik, Germany
pp. 196-203

A Primary-Backup Protocol for In-Memory Database Replication (Abstract)

Lasaro Camargos , Universidade Estadual de Campinas (Unicamp), Brazil
Fernando Pedone , University of Lugano (USI), Switzerland
Rodrigo Schmidt , Ecole Polytechnique Federale de Lausanne (EPFL), Switzerland
pp. 204-211

A Flexible Replication Mechanism with Extended Database Connection Layers (Abstract)

Nobutatsu Nakamura , NEC Corporation, Japan
Ken?ichiro Fujiyama , NEC Corporation, Japan
Eiji Kawai , Nara Institute of Science and Technology, Japan
Hideki Sunahara , Nara Institute of Science and Technology, Japan
pp. 212-222
Short Papers

Analysis Models for Blind Search in Unstructured Overlays (Abstract)

Bin Wu , Univ. of Illinois at Chicago, USA
Ajay D. Kshemkalyani , Univ. of Illinois at Chicago, USA
pp. 223-226

A Novel Decision Strategy of Vertical Handoff in Overlay Wireless Networks (Abstract)

Wei Shen , University of Cincinnati, USA
Qing-An Zeng , University of Cincinnati, USA
pp. 227-230

A System for Secure IP Telephone Conferences (Abstract)

Axel Tre?el , T-Systems Enterprise Services GmbH, Germany
Jorg Keller , FernUniversitat in Hagen, Germany
pp. 231-234

A Distributed Architecture for Gracefully Degradable Web-Based Services (Abstract)

Mauro Andreolini , University of Modena and Reggio Emilia, Italy
Sara Casolari , University of Modena and Reggio Emilia, Italy
Michele Colajanni , University of Modena and Reggio Emilia, Italy
pp. 235-238

Full QoS Support with 2 VCs for Single-chip Switches (Abstract)

Alejandro Martinez , Univ. Castilla-La Mancha, Spain
Francisco J. Alfaro , Univ. Castilla-La Mancha, Spain
Jose L. Sanchez , Univ. Castilla-La Mancha, Spain
Jose Duato , Univ. Politecnica Valencia, Spain
pp. 239-242

A Flexible Cross Connect LCAS for Bandwidth Maximization in 2.5G EoS (Abstract)

Hou-Cheng Tzeng , National Tsing Hua University, Taiwan, ROC
Ching-Te Chiu , National Tsing Hua University, Taiwan, ROC
pp. 243-246

Decentralized Load Balancing on Unstructured Peer-2-Peer Computing Grids (Abstract)

Jie Hu , University of California, Irvine, USA
Raymond Klefstad , University of California, Irvine, USA
pp. 247-250

Finding Shared Fragments in Large Collections of Web Pages for Fragment-Based Web Caching (Abstract)

Junchang Ma , Beijing Institute of Technology, China
Zhimin Gu , Beijing Institute of Technology, China
pp. 251-254

Lossy Node Identification in Wireless Sensor Network (Abstract)

Yongjun Li , Northwestern Polytechnical University, China
Wandong Cai , Northwestern Polytechnical University, China
Wei Wang , Northwestern Polytechnical University, China
Guangli Tian , Northwestern Polytechnical University, China
pp. 255-258

IntranetWeb: a Peer-to-Peer Based Scalable Web Caching System (Abstract)

Huifang Cheng , Beijing Institute of Technology, China
Zhimin Gu , Beijing Institute of Technology, China
pp. 259-262

A Novel Probability Evaluation Method for Selective Forwarding Routing in Wireless Sensor Network (Abstract)

Li-jia Chen , Wuhan University
Jing Wu , Wuhan University
Pu-liu Yan , Wuhan University
Jian-guo Zhou , Wuhan University
Hao Jiang , Wuhan University
pp. 263-268
Adaptive Grid Computing Workshop

A Multipolicy Authorization Framework for Grid Security (Abstract)

Bo Lang , Argonne National Laboratory, USA
Ian Foster , Argonne National Laboratory, USA
Frank Siebenlist , Argonne National Laboratory, USA
Rachana Ananthakrishnan , Argonne National Laboratory, USA
Tim Freeman , Argonne National Laboratory, USA
pp. 269-272

An Adaptive Quality of Service Based Scheduling Algorithm for Wide Area Large Scale Problems (Abstract)

Wilson Lozano , University of Puerto Rico at Mayag?ez, Puerto Rico, USA
Wilson Rivera , University of Puerto Rico at Mayag?ez, Puerto Rico, USA
pp. 273-276

Design and Implementation of a Plain Grid Monitoring and Information Service (Abstract)

Weibin Pei , China Agricultural University, China
Zhongliang Chen , China Agricultural University, China
Chunhao Feng , Renmin University of China, China
Zhi Wang , Renmin University of China, China
pp. 277-284
Trustworthy Network Computing Workshop

Trust Assessment from Observed Behavior: Toward and Essential Service for Trusted Network Computing (Abstract)

Partha Pal , BBN Technologies, USA
Franklin Webber , BBN Technologies, USA
Michael Atighetchi , BBN Technologies, USA
Nate Combs , BBN Technologies, USA
pp. 285-292

An Improved Test Derivation Technique (Abstract)

Harry Gros-Desormeaux , Universite des Antilles et de la Guyane, France
Hacene Fouchal , Universite des Antilles et de la Guyane, France
Philippe Hunel , Universite des Antilles et de la Guyane, France
pp. 293-300
Author Index

Author Index (PDF)

pp. 301-302
85 ms
(Ver 3.3 (11022016))