Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1845878guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
ICDCS '10: Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems
2010 Proceeding
Publisher:
  • IEEE Computer Society
  • 1730 Massachusetts Ave., NW Washington, DC
  • United States
Conference:
June 21 - 25, 2010
ISBN:
978-0-7695-4059-7
Published:
21 June 2010

Reflects downloads up to 04 Sep 2024Bibliometrics
Abstract

No abstract available.

Article
Cover Art
Article
Article
Article
Article
Reviewers
Article
"Ethernet on AIR': Scalable Routing in very Large Ethernet-Based Networks

Networks based on Ethernet bridging scale poorly as bridges flood the entire network repeatedly, and several schemes have been proposed to mitigate this flooding problem, however, none have managed to eliminate flooding completely. We present Automatic ...

Article
Deployment of a Reinforcement Backbone Network with Constraints of Connection and Resources

In recent years, we have seen a surge of interest in enabling communications over meshed wireless networks. Particularly, supporting peer-to-peer communications over a multi-hop wireless network has a big potential in enabling ubiquitous computing. ...

Article
Phase Plane Analysis of Congestion Control in Data Center Ethernet Networks

Ethernet has some attractive properties for network consolidation in the data center, but needs further enhancement to satisfy the additional requirements of unified network fabrics. Congestion management is introduced in Ethernet networks to avoid ...

Article
3DLoc: Three Dimensional Wireless Localization Toolkit

In this paper, we present 3DLoc: an integrated system of hardware and software toolkits for locating an 802.11-compliant mobile device in a three dimensional (3D) space. 3DLoc features two specialized antennas: an azimuth antenna and an elevation ...

Article
Design and Analysis of a New GPS Algorithm

In this paper, we propose and analyze a new GPS positioning algorithm. Our algorithm uses the direct linearization technique to reduce the computation time overhead. We invoke the general least squares method in order to achieve optimality in the ...

Article
ASAP: Scalable Identification and Counting for Contactless RFID Systems

The growing importance of operations such as identification, location sensing and object tracking has led to increasing interests in contact less Radio Frequency Identification (RFID) systems. Enjoying the low cost of RFID tags, modern RFID systems tend ...

Article
Mistral: Dynamically Managing Power, Performance, and Adaptation Cost in Cloud Infrastructures

Server consolidation based on virtualization is an important technique for improving power efficiency and resource utilization in cloud infrastructures. However, to ensure satisfactory performance on shared resources under changing application workloads,...

Article
Nefeli: Hint-Based Execution of Workloads in Clouds

Virtualization of computer systems has made feasible the provision of entire distributed infrastructures in the form of services. Such services do not expose the internal operational and physical characteristics of the underlying machinery to either ...

Article
ARiA: A Protocol for Dynamic Fully Distributed Grid Meta-scheduling

Critical to the successful deployment of grid systems is their ability to guarantee efficient meta-scheduling, namely optimal allocation of jobs across a pool of sites with diverse local scheduling policies. The centralized nature of current meta-...

Article
Stochastic Steepest-Descent Optimization of Multiple-Objective Mobile Sensor Coverage

We propose a steepest descent method to compute optimal control parameters for balancing between multiple performance objectives in stateless stochastic scheduling, wherein the scheduling decision is effected by a simple constant-time coin toss ...

Article
Distributed Coverage in Wireless Ad Hoc and Sensor Networks by Topological Graph Approaches

Coverage problem is a fundamental issue in wireless ad hoc and sensor networks. Previous techniques for coverage scheduling often require accurate location information or range measurements, which cannot be easily obtained in resource-limited ad hoc and ...

Article
Link-Centric Probabilistic Coverage Model for Transceiver-Free Object Detection in Wireless Networks

Sensing coverage is essential for most applications in wireless networks. In traditional coverage problem study, the disk coverage model has been widely applied because of its simplicity. Though notable recent works point out that the disk model has ...

Article
StreamCloud: A Large Scale Data Streaming System

Data streaming has become an important paradigm for the real-time processing of continuous data flows in domains such as finance, telecommunications, networking, Some applications in these domains require to process massive data flows that current ...

Article
A Hybrid Approach to High Availability in Stream Processing Systems

Stream processing is widely used by today’s applications such as financial data analysis and disaster response. In distributed stream processing systems, machine fail-stop events are handled by either active standby or passive standby. However, existing ...

Article
Efficient and Progressive Algorithms for Distributed Skyline Queries over Uncertain Data

The skyline operator has received considerable attention from the database community, due to its importance in many applications including multi-criteria decision making, preference answering, and so forth. In many applications where uncertain data are ...

Article
Reliability Calculus: A Theoretical Framework to Analyze Communication Reliability

Communication reliability is one of the most important concerns and fundamental issues in network systems, such as cyber-physical systems, where network components, sensors, actuators, controllers are interconnected with each other. These systems are ...

Article
Resource Allocation in Distributed Mixed-Criticality Cyber-Physical Systems

Large-scale distributed cyber-physical systems will have many sensors/actuators (each with local micro-controllers), and a distributed communication/computing backbone with multiple processors. Many cyber-physical applications will be safety critical ...

Article
Optimizing the Spatio-temporal Distribution of Cyber-Physical Systems for Environment Abstraction

Cyber-physical systems (CPS) bridge the virtual cyber world with the real physical world. For representing a physical environment in cyber, CPS devices / nodes are assigned to collect data in a region of interest. In practice, the nodes seldom fully ...

Article
CONTRACT: Incorporating Coordination into the IP Network Control Plane

This paper presents the CONTRACT framework to address a fundamental deficiency of the IP network control plane, namely the lack of coordination between an IGP and other control functions involved in achieving a high level objective. For example, an IGP’...

Article
Does Link Scheduling Matter on Long Paths?

We seek to provide an analytical answer whether the impact of the selection of link scheduling algorithms diminishes on long network paths. The answer is provided through a detailed multi-node delay analysis, which is applicable to a broad class of ...

Article
CacheCast: Eliminating Redundant Link Traffic for Single Source Multiple Destination Transfers

Due to the lack of multicast services in the Internet, applications based on single source multiple destinations transfers such as video conferencing, IP radio, IPTV must use unicast or application layer multicast. This in turn has several well-known ...

Article
Guaranteeing BGP Stability with a Few Extra Paths

Policy autonomy exercised by Autonomous Systems (ASes) on the Internet can result in persistent oscillations in Border Gateway Protocol, the Internet's inter-domain routing protocol. Current solutions either rely on globally consistent policy ...

Article
ESCUDO: A Fine-Grained Protection Model for Web Browsers

Web applications are no longer simple hyperlinked documents. They have progressively evolved to become highly complex—web pages combine content from several sources (with varying levels of trustworthiness), and incorporate significant portions of client-...

Index terms have been assigned to the content through auto-classification.

Recommendations