


default search action
33rd ICDCS 2013: Philadelphia, Pennsylvania, USA
- IEEE 33rd International Conference on Distributed Computing Systems, ICDCS 2013, 8-11 July, 2013, Philadelphia, Pennsylvania, USA. IEEE Computer Society 2013, ISBN 978-0-7695-5000-8

- Shicong Meng, Arun Iyengar, Isabelle Rouvellou, Ling Liu:

Volley: Violation Likelihood Based State Monitoring for Datacenters. 1-10 - Ahsan Arefin, Vishal K. Singh, Guofei Jiang, Yueping Zhang, Cristian Lumezanu:

Diagnosing Data Center Behavior Flow by Flow. 11-20 - Hiep Nguyen, Zhiming Shen, Yongmin Tan, Xiaohui Gu:

FChain: Toward Black-Box Online Fault Localization for Cloud Systems. 21-30 - Qingyang Wang, Yasuhiko Kanemasa, Jack Li, Deepal Jayasinghe, Toshihiro Shimizu, Masazumi Matsubara, Motoyuki Kawaba, Calton Pu:

Detecting Transient Bottlenecks in n-Tier Applications through Fine-Grained Analysis. 31-40 - Gergely Ács, Mauro Conti

, Paolo Gasti, Cesar Ghali, Gene Tsudik:
Cache Privacy in Named-Data Networking. 41-51 - Fang Zheng, Chitra Venkatramani, Rohit Wagle, Karsten Schwan:

Cache Topology Aware Mapping of Stream Processing Applications onto CMPs. 52-61 - Yanhua Li, Haiyong Xie, Yonggang Wen, Zhi-Li Zhang:

Coordinating In-Network Caching in Content-Centric Networks: Model and Analysis. 62-72 - Shen Li, Shiguang Wang, Fan Yang, Shaohan Hu, Fatemeh Saremi, Tarek F. Abdelzaher:

Proteus: Power Proportional Memory Cache Cluster in Data Centers. 73-82 - Zichen Xu, Yi-Cheng Tu, Xiaorui Wang:

Dynamic Energy Estimation of Query Plans in Database Systems. 83-92 - Sobir Bazarbayev, Matti A. Hiltunen, Kaustubh R. Joshi, William H. Sanders, Richard D. Schlichting:

Content-Based Scheduling of Virtual Machines (VMs) in the Cloud. 93-101 - Bikash Sharma, Timothy Wood, Chita R. Das:

HybridMR: A Hierarchical MapReduce Scheduler for Hybrid Data Centers. 102-111 - Zhaoyan Xu, Jialong Zhang, Guofei Gu, Zhiqiang Lin:

AUTOVAC: Automatically Extracting System Resource Constraints and Generating Vaccines for Malware Immunization. 112-123 - Boyang Wang, Sherman S. M. Chow

, Ming Li, Hui Li:
Storing Shared Data on the Cloud via Security-Mediator. 124-133 - Amir Yahyavi, Kévin Huguenin

, Julien Gascon-Samson, Jörg Kienzle, Bettina Kemme:
Watchmen: Scalable Cheat-Resistant Support for Distributed Multi-player Online Games. 134-144 - Palden Lama, Yan Li, Ashwin M. Aji, Pavan Balaji, James Dinan, Shucai Xiao, Yunquan Zhang, Wu-chun Feng, Rajeev Thakur

, Xiaobo Zhou:
pVOCL: Power-Aware Dynamic Placement and Migration in Virtualized GPU Environments. 145-154 - Wenjie Hu, Guohong Cao, Srikanth V. Krishnamurthy, Prasant Mohapatra:

Mobility-Assisted Energy-Aware User Contact Detection in Mobile Social Networks. 155-164 - Bo Zhao, Qiang Zheng, Guohong Cao, Sateesh Addepalli:

Energy-Aware Web Browsing in 3G Based Smartphones. 165-175 - Rui Wang, Nagarajan Kandasamy, Chika Nwankpa, David R. Kaeli:

Datacenters as Controllable Load Resources in the Electricity Market. 176-185 - Andrei Deftu, Jan Griebsch:

A Scalable Conflict-Free Replicated Set Data Type. 186-195 - Tyler Crain, Vincent Gramoli, Michel Raynal:

No Hot Spot Non-blocking Skip List. 196-205 - Yujie Liu, Victor Luchangco, Michael F. Spear

:
Mindicators: A Scalable Approach to Quiescence. 206-215 - Niloufar Shafiei:

Non-blocking Patricia Tries with Replace Operations. 216-225 - Wei Sun, Junliang Liu, Chenshu Wu, Zheng Yang, Xinglin Zhang, Yunhao Liu:

MoLoc: On Distinguishing Fingerprint Twins. 226-235 - Jiang Xiao, Kaishun Wu

, Youwen Yi, Lu Wang
, Lionel M. Ni:
Pilot: Passive Device-Free Indoor Localization Using Channel State Information. 236-245 - Wan Du, Mo Li

:
Harnessing Mobile Multiple Access Efficiency with Location Input. 246-255 - Sheng Liu, Haojin Zhu

, Rong Du, Cailian Chen, Xinping Guan:
Location Privacy Preserving Dynamic Spectrum Auction in Cognitive Radio Network. 256-265 - Nuno Santos, André Schiper:

Achieving High-Throughput State Machine Replication in Multi-core Systems. 266-275 - Oksana Denysyuk, Luís E. T. Rodrigues:

Order-Preserving Renaming in Synchronous Systems with Byzantine Faults. 276-285 - Tadeusz Kobus

, Maciej Kokocinski
, Pawel T. Wojciechowski
:
Hybrid Replication: State-Machine-Based and Deferred-Update Replication Schemes Combined. 286-296 - Pierre-Louis Aublin, Sonia Ben Mokhtar

, Vivien Quéma:
RBFT: Redundant Byzantine Fault Tolerance. 297-306 - Feng Wang

, Haiyan Wang
, Kuai Xu
, Jianhong Wu, Xiaohua Jia
:
Characterizing Information Diffusion in Online Social Networks with Linear Diffusive Model. 307-316 - Huiyuan Zhang, Thang N. Dinh

, My T. Thai:
Maximizing the Spread of Positive Influence in Online Social Networks. 317-326 - Lan Zhang, Xiang-Yang Li, Yunhao Liu:

Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks. 327-336 - Zohir Bouzid, Shantanu Das

, Sébastien Tixeuil:
Gathering of Mobile Robots Tolerating Multiple Crash Faults. 337-346 - Ajoy Kumar Datta, Anissa Lamani, Lawrence L. Larmore, Franck Petit

:
Ring Exploration by Oblivious Agents with Local Vision. 347-356 - Shusuke Takatsu, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa:

Zigzag: Local-Information-Based Self-Optimizing Routing in Virtual Grid Networks. 357-368 - Kaiwen Zhang, Mohammad Sadoghi

, Vinod Muthusamy, Hans-Arno Jacobsen:
Distributed Ranked Data Dissemination in Social Networks. 369-379 - Carlos Eduardo Benevides Bezerra, Fernando Pedone

, Benoît Garbinato, Cláudio F. R. Geyer:
Optimistic Atomic Multicast. 380-389 - Deepak Jeswani, Akshat Verma, Praveen Jayachandran, Kamal Bhattacharya

:
ImageElves: Rapid and Reliable System Updates in the Cloud. 390-399 - Wei Wang

, Di Niu, Baochun Li, Ben Liang
:
Dynamic Cloud Resource Reservation via Cloud Brokerage. 400-409 - Peijian Wang, Yong Qi, Dou Hui, Lei Rao, Xue Liu:

Present or Future: Optimal Pricing for Spot Instances. 410-419 - Wei Deng, Fangming Liu, Hai Jin, Chuan Wu

:
SmartDPSS: Cost-Minimizing Multi-source Power Supply for Datacenters with Arbitrary Demand. 420-429 - Fung Po Tso

, Gregg Hamilton, Rene Weber, Colin Perkins
, Dimitrios P. Pezaros
:
Longer Is Better: Exploiting Path Diversity in Data Center Networks. 430-439 - Chenfei Gao, Jian Tang, Xiang Sheng, Weiyi Zhang, Chonggang Wang:

Signal-Aware Green Wireless Relay Network Design. 440-449 - Wen Chen, Peng Cheng, Fengyuan Ren, Ran Shu, Chuang Lin:

Ease the Queue Oscillation: Analysis and Enhancement of DCTCP. 450-459 - Mike Spreitzer, Malgorzata Steinder, Ian Whalley:

Ripple: Improved Architecture and Programming Model for Bulk Synchronous Parallel Style of Analytics. 460-469 - Chamikara Jayalath, Patrick Eugster:

Efficient Geo-distributed Data Processing with Rout. 470-480 - Sukanta Pramanik, David Taylor, Bernard Wong:

Towards an Efficient Online Causal-Event-Pattern-Matching Framework. 481-490 - Chaoqun Yue, Guangtao Xue, Hongzi Zhu, Jiadi Yu, Minglu Li:

S3: Characterizing Sociality for User-Friendly Steady Load Balancing in Enterprise WLANs. 491-499 - Hanying Zheng, Xueyan Tang:

On Server Provisioning for Distributed Interactive Applications. 500-509 - Qi Zhang, Mohamed Faten Zhani

, Raouf Boutaba, Joseph L. Hellerstein:
Harmony: Dynamic Heterogeneity-Aware Resource Provisioning in the Cloud. 510-519 - Sonia Ben Mokhtar

, Gautier Berthou, Amadou Diarra, Vivien Quéma, Ali Shoker
:
RAC: A Freerider-Resilient, Scalable, Anonymous Communication Protocol. 520-529 - Dong Wang, Tarek F. Abdelzaher, Lance M. Kaplan, Charu C. Aggarwal:

Recursive Fact-Finding: A Streaming Approach to Truth Estimation in Crowdsourcing Applications. 530-539 - Lidan Fan, Zaixin Lu, Weili Wu, Bhavani Thuraisingham, Huan Ma, Yuanjun Bi:

Least Cost Rumor Blocking in Social Networks. 540-549 - Yang Song, Arun Venkataramani, Lixin Gao:

Identifying and Addressing Protocol Manipulation Attacks in "Secure" BGP. 550-559 - Mohammad Ashiqur Rahman

, Ehab Al-Shaer:
A Formal Framework for Network Security Design Synthesis. 560-570 - Max Schuchard, Christopher Thompson, Nicholas Hopper, Yongdae Kim

:
Peer Pressure: Exerting Malicious Influence on Routers at a Distance. 571-580 - Liang Ma, Ting He, Kin K. Leung, Don Towsley

, Ananthram Swami:
Efficient Identification of Additive Link Metrics via Network Tomography. 581-590 - Wojciech M. Golab, Jeremy Hurwitz, Xiaozhou Li:

On the k-Atomicity-Verification Problem. 591-600 - Hagit Attiya

, Sandeep Hans, Petr Kuznetsov, Srivatsan Ravi:
Safety of Deferred Update in Transactional Memory. 601-610 - Zohir Bouzid, Corentin Travers:

Parallel Consensus is Harder than Set Agreement in Message Passing. 611-620

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














