Sold Out
Book Categories |
Opening address | 1 | |
Resilience for the scalability of dependability | 5 | |
Effectiveness of traffic camouflaging over computer networks | 7 | |
New generation scalable and dependable servers | 8 | |
Challenges in mobile networking and information assurance | 9 | |
An adaptive reputation-based trust framework for peer-to-peer applications | 13 | |
LAWN : a protocol for remote authentication over wireless networks | 21 | |
pMIX : untraceability for small hiding groups | 29 | |
Decentralized schemes for size estimation in large and dynamic groups | 41 | |
Method for task migration in grid environments | 49 | |
A probabilistic approach for achieving fair bandwidth allocations in CSFQ | 59 | |
Supporting rate-based control in DiffServ networks | 67 | |
TCP new vegas : improving the performance of TCP vegas over high latency links | 73 | |
A concentric multi-ring overlay for highly reliable P2P networks | 83 | |
Dynamic quorums for DHT-based P2P networks | 91 | |
Scalable QoS-based event routing in publish-subscribe systems | 101 | |
Self-organization in cooperative content distribution networks | 109 | |
Providing hard real-time guarantees in context-aware applications : challenges and requirements | 119 | |
Using residual times to meet deadlines in M/G/C queues | 128 | |
Architectural issues of JMS compliant group communication | 139 | |
Developing a consistent domain-oriented distributed object service | 149 | |
A wide area network simulation of single-round group membership algorithms | 159 | |
C-CORE : using communication cores for high performance network services | 171 | |
Fundamental network processor performance bounds | 179 | |
Reducing the communication cost via chain pattern scheduling | 186 | |
Hopcount in application layer multicast schemes | 197 | |
Slingshot : time-critical multicast for clustered applications | 205 | |
On the effectiveness of continuous-time mixes under flow-correlation based anonymity attacks | 215 | |
Networking aspects in the DPASA survivability architecture : an experience report | 219 | |
A formal framework (expression + analysis) for network security mechanisms configuration | 223 | |
Smart tunnel union for NAT traversal | 227 | |
Block migration in broadcast-based multiprocessor architectures | 231 | |
Leveraging the multiprocessing capabilities of modern network processors for cryptographic acceleration | 235 | |
Multicast in fat-tree-based InfiniBand networks | 239 | |
Protocol composition frameworks : a header-driven model | 243 | |
SFS-KNOPPIX | 247 | |
Improving transaction server performance under heavy loads with differentiated service and active network interfaces | 251 | |
A policy-based management framework for pervasive systems using axiomatized rule-actions | 255 | |
Experimental evaluation of a QoS-aware application server | 259 | |
SLA based profit optimization in multi-tier systems | 263 | |
Controlling the coverage of grid information dissemination protocols | 267 | |
Cooperative mobile agents to gather global information | 271 | |
Coverage by randomly deployed wireless sensor networks | 275 | |
Location-based publish/subscribe | 279 | |
Performance evaluation of a PC-based active router and analysis of an active secure FTP application | 283 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionProceedings, Forth IEEE International Symposium on Network Computing and Applications
X
This Item is in Your InventoryProceedings, Forth IEEE International Symposium on Network Computing and Applications
X
You must be logged in to review the productsX
X
X
Add Proceedings, Forth IEEE International Symposium on Network Computing and Applications, The proceedings of the July 2005 symposium consists of 22 regular papers and 18 short papers on networking protocols, security and trust, grid scheduling, publish-subscribe systems, and middleware for dependable computing. The researchers explore the perf, Proceedings, Forth IEEE International Symposium on Network Computing and Applications to the inventory that you are selling on WonderClubX
X
Add Proceedings, Forth IEEE International Symposium on Network Computing and Applications, The proceedings of the July 2005 symposium consists of 22 regular papers and 18 short papers on networking protocols, security and trust, grid scheduling, publish-subscribe systems, and middleware for dependable computing. The researchers explore the perf, Proceedings, Forth IEEE International Symposium on Network Computing and Applications to your collection on WonderClub |