Table of Contents
|
Networked Services and Applications - Engineering, Control and Management Finn Aagesen, Svein Johan Knapskog |
Front Matter |
Admission Control and Networking
|
On the Performance of Grooming Strategies for Offloading IP Flows onto Lightpaths in Hybrid Networks Rudolf Biesbroek, Tiago Fioreze, Lisandro Zambenedetti Granville, Aiko Pras |
1-10 |
MBAC: Impact of the Measurement Error on Key Performance Issues Anne Nevin, Peder J. Emstad, Yuming Jiang |
11-20 |
An Algorithm for Automatic Base Station Placement in Cellular Network Deployment István Törős, Péter Fazekas |
21-30 |
An Energy-Efficient FPGA-Based Packet Processing Framework Daniel Horvath, Imre Bertalan, Istvan Moldován, Tuan Anh Trinh |
31-40 |
Service Mobility
|
Service Migration Protocol for NFC Links Anders Nickelsen, Miquel Martin, Hans-Peter Schwefel |
41-50 |
Swarm Intelligence Heuristics for Component Deployment Máté J. Csorba, Poul E. Heegaard |
51-64 |
Peer-to-Peer and Virtualization
|
On Force-Based Placement of Distributed Services within a Substrate Network Laurie Lallemand, Andreas Reifert |
65-75 |
Enabling P2P Gaming with Network Coding Balázs Lajtha, Gergely Biczók, Róbert Szabó |
76-86 |
A Virtual File System Interface for Computational Grids Abdulrahman Azab, Hein Meling |
87-96 |
Security
|
Labeled VoIP Data-set for Intrusion Detection Evaluation Mohamed Nassar, State Radu, Olivier Festor |
97-106 |
Document Provenance in the Cloud: Constraints and Challenges Mohamed Amin Sakka, Bruno Defude, Jorge Tellez |
107-117 |
Wireless Handoff Optimization: A Comparison of IEEE 802.11r and HOKEY Kashif Nizam Khan, Jinat Rehana |
118-131 |
Introducing Perfect Forward Secrecy for AN.ON Benedikt Westermann, Dogan Kesdogan |
132-142 |
Congestion Control
|
Mobility-Aware Drop Precedence Scheme in DiffServ-Enabled Mobile Network Systems Bongkyo Moon |
143-154 |
Theoretical Analysis of an Ideal Startup Scheme in Multihomed SCTP Johan Eklund, Karl-Johan Grinnemo, Anna Brunstrom |
155-166 |
Monitoring and Filtering
|
The Network Data Handling War: MySQL vs. NfDump Rick Hofstede, Anna Sperotto, Tiago Fioreze, Aiko Pras |
167-176 |
Processing of Flow Accounting Data in Java: Framework Design and Performance Evaluation Jochen Kögel, Sebastian Scholz |
177-187 |
Fighting Spam on the Sender Side: A Lightweight Approach Wouter Willem Vries, Giovane Cesar Moreira Moura, Aiko Pras |
188-197 |
Dependability
|
Degradation Model for Erbium-Doped Fiber Amplifiers to Reduce Network Downtime Christian Merkle |
198-208 |
A Token Based Approach Detecting Downtime in Distributed Application Servers or Network Elements Sune Jakobsson |
209-216 |
Distributed Resource Reservation for Beacon Based MAC Protocols Frank Leipold, Jörg Eberspächer |
217-225 |
Adaptation and Reconfiguration
|
On Runtime Adaptation of Application-Layer Multicast Protocol Parameters Christian Hübsch, Christoph P. Mayer, Oliver P. Waldhorst |
226-235 |
A Framework with Proactive Nodes for Scheduling and Optimizing Distributed Embedded Systems Adrián Noguero, Isidro Calvo |
236-245 |
Resource Adaptive Distributed Information Sharing Hans Vatne Hansen, Vera Goebel, Thomas Plagemann, Matti Siekkinen |
246-255 |
Poster Session
|
Performance Impacts of Node Failures on a Chord-Based Hierarchical Peer-to-Peer Network Quirin Hofstätter |
256-258 |
A Low-Power Scheme for Localization in Wireless Sensor Networks Jorge Juan Robles, Sebastian Tromer, Monica Quiroga, Ralf Lehnert |
259-262 |
Flow Aggregation Using Dynamic Packet State Addisu Eshete, Yuming Jiang |
263-265 |
Evaluating MDC with Incentives in P2PTV Systems Alberto J. Gonzalez, Andre Rios, Guillermo Enero, Antoni Oller, Jesus Alcober |
266-269 |
Translation from UML to SPN Model: A Performance Modeling Framework Razib Hayat Khan, Poul E. Heegaard |
270-271 |
An Open and Extensible Service Discovery for Ubiquitous Communication Systems Nor Shahniza Kamal Bashah, Ivar Jørstad, Do Thanh |
272-273 |