Paper Presentation & Review Schedule

IAD 2003, Fall

This Table shows the approximate paper presentation schedule. The time may change. However, the order of presentation will be maintained. Approximately, each day we will have two presentations of 30 minutes duration.
 

  • Plan to end your presentation within 20 minutes ( 20 slides max).
  • See me 2 weeks ahead to plan the presentation.
  • See me a week earlier with your presentation material (a must step).


Email the final version of PowePoint  slide and the 5 questions atleast 2 days before

 

 

 

CONTENT SERVICES NETWORKING [3]:

CSN-1A

CSN-1B

WATSON1

CSN-1A: Evaluation of Edge Caching/Offloading for Dynamic Content Delivery, Chun Yuan, Yu Chen, Zheng Zhang, PR-2: Consistency and Replication, , WWW2003. [Local] [WATSON1]

CSN-1B: Engineering and Hosting Adaptive Freshness-sensitive Web Applications on Data Centers, Wen-Syan Li, Oliver Po, Wang-Pin Hsiung, K. Selcuk Candan, Divyakant Agrawal, SD-6: Dynamic Services and Analysis, WWW2003. [Local]

CSN-2

SANDEEP1

CSN-2: Acceleration of Web Service Workflow Execution through Edge Computing, Junichi Tatemura, Wang-Pin Hsiung,Wen-Syan Li, WS-1: Collaboration, Composition, and Workflow, WWW2003. [Local] [SANDEEP1]

CSN-31

CSN-3B

THONG1

CSN-3A: Delivering Semantic Web Services, Massimo Paolucci,Katia Sycara, Takahiro Kawamura, WS-3:Discovery and Semantics, WWW2003. [Local]

CSN-3B: SemTag and Seeker: Bootstrapping the semantic web via automated semantic annotation, Stephen Dill, Nadav Eiron, David Gibson, Daniel Gruhl, Ramanathan Guha, Anant Jhingran, Tapas Kanungo, Sridhar Rajagopalan, Andrew Tomkins, John Tomlin, Jason Zien, SW-2: Establishing the Semantic Web I, WWW2003. [Local] [THONG1]

 

 

EXTRA

CSN-4

 

CSN-4: Quality Driven Web Services Composition, Liangzhao Zeng, Boualem Benatallah, Marlon Dumas, Jayant Kalagnanam, Quan Z. Sheng, WE-1: Web Engineering, WWW2003. [Local]

CSN-5

 

CSN-5: Conversation Specification: A New Approach to Design and Analysis of E-Service Composition, Jianwen Su, Richard Hull, Tevfik Bultan,Xiang Fu,WE-1: Web Engineering, WWW2003. [Local]

 

 

 

 

 

PEER TO PEER COMPUTING: [3]

P2P-1

DAVE2

P2P-1A: YAPPERS: A Peer-to-Peer Lookup Service over Arbitrary Topology , Prasanna Ganesan, Qixiang Sun, Hector Garcia-Molina (Stanford University), INFOCOMM2003. [Local] [DAVE2]

P2P-1B: ZIGZAG: An Efficient Peer-to-Peer Scheme for Media Streaming , Duc Tran, Kien Hua, Tai Do (University of Central Florida) INFOCOM2003. [Local]

P2P-2A

P2P-2B

XU1

P2P-2A: Efficient Content Location Using Interest-Based Locality in Peer-to-Peer Systems,Kunwadee Sripanidkulchai, Bruce Maggs, Hui Zhang (Carnegie Mellon University), INFOCOM2003. [Local] [XU1]

P2P-2B: Giggle: A Framework for Constructing Sclable Replica Location Services. A. Chervenak, E. Deelman, I. Foster, L. Guy, W. Hoschek, A. Iamnitchi, C. Kesselman, P. Kunst, M. Ripeanu, B, Schwartzkopf, H, Stockinger, K. Stockinger, B. Tierney. Proceedings of Supercomputing 2002 (SC2002), November 2002.
[Citation,PDF

] [local]

P2P-3A

P2P-3B

 

BINAMRA2

P2P-3A: YouServ: A Web-Hosting and Content Sharing Tool for the Masses [P84], Roberto J. Bayardo Jr., Rakesh Agrawal, Daniel Gruhl,Amit Somani, [Presentation], WWW2002. [Local]

P2P-3B: Make it Fresh, Make it Quick --- Searching a Network of Personal Webservers, Mayank Bawa, Roberto J. Bayardo Jr., Sridhar Rajagopalan, Eugene J. Shekita, SD-6: Dynamic Services and Analysis, WWW2003. [Local] [KAMESH1]

GRID-1A

GRID-1B

KAMESH1

GRID-1A: Towards Efficent Resource on Demand in Grid Computing8, Kun Yang, Xin Guo, Alex Galis, Bo Yang, Dayou , ACM SIGOPS Operating Systems Review, Volume 37 ,  Issue 2  (April 2003), Pages: 37 – 43 [Local]

GRID-1B:Combining Active and Passive Network Measurements to Build Scalable Monitoring Systems on the Grid, Bruce B. Lowekamp, ACM SIGMETRICS Performance Evaluation, Pages: 19 – 26,2003 [Local]

 

 

EXTRA:

P2P-4

 

P2P-4: On the Bursty Evolution of Blogspace, Ravi Kumar, Jasmine Novak, Prabhakar Raghavan, Andrew Tomkins, SD-6: Dynamic Services and Analysis, WWW2003. [Local]

P2P-5

 

P2P-5: Law-Governed Peer-to-Peer Auctions [P398], Marcus Fontoura, Mihail Ionescu, Naftaly Minsky, [Presentation], WWW2002. [Local]

 

 

 

 

 

MULTIMEDIA: [3]

MM-1

KEN1

MM1: Architecture of a Quality Based Intelligent Proxy (QBIX) for MPEG-4 Videos, Peter Schojer, Laszlo Böszörmenyi, Hermann Hellwagner, Bernhard Benz, Stefan Podlipnig, MM-1: Multimedia, WWW2003. [Local] [KEN1]

MM-2

MA1

MM2: Multimedia Meets Computer Graphics in SMIL2.0: A Time Model for the Web [P382] Patrick Schmitz, WWW2002. [Local] [MA1]

MM-3A

OLALEYE1

MM-3A: Adaptive Joint Playout Buffer and FEC Adjustment for Internet Telephony, Catherine Boutremans, Jean-Yves Le Boudec, INFOCOMM 2003. [Local]

MM-3B

 

MM-3B: Path Diversity with Forward Error Correction (PDF) System for Delay Sensitive Applications over the Internet , Thinh Nguyen, INFOCOM 2003. [Local]  [OLELEYA1]

 

 

 

 

 

COMPUTER FORENSIC: [3]

 

 

SEC INTRO: A Taxonomy of Computer Program Security Flaws , Carl E. Landwehr, Alan R. Bull, John P. McDermott, William S. Choi, September 1994, pdf(3.81 MB), ACM Computing Surveys (CSUR),  Volume 26 Issue 3 . [download from ACM]

 

 

INTRO: Abstracting Application-Level Web Security [P48] , Best Paper Finalist and Winner!, David Scott, Richard Sharp, [Presentation], WWW2002. [Local]

 

 

 

TRC-1A

TRC-1B

MANYU1

TRACE-1A:A Recursive Session Token Protocol for use in Computer Forensics and TCP Traceback Brian Carrier, Clay Shields, INFOCOMM 2002. [Local]

TRACK-1B:SAVE: Source Address Validity Enforcement Protocol Jun Li (University of California at Los Angeles), Jelena Mirkovic, Mengqiu Wang, Peter Reiher, Lixia Zhang, INFOCOMM 2002. [Local]

DOS-2A

DOS-2B

DOS-2C

ZAKYA1

DOS-2A: Detecting SYN Flooding Attacks Haining Wang, Danlu Zhang, Kang G. Shin, INFOCOMM 2002. [Local] [ZAKIYA]

DOS-2B: Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites [P342], Jaeyeon Jung, Balachander Krishnamurthy, Michael Rabinovich, [Presentation], www2002. [Local]

DOS-2C: Protecting Electronic Commerce From Distributed Denial-of-Service Attacks [P528], José Carlos Brustolon, WWW2002. [Local]

INT-3A

INT-3B

DAVE1

INTRUSION-3A:Detecting Network Intrusions via Sampling: A Game Theoretic Approach,Murari Kodialam, T. V. Lakshman (Bell Labs,Lucent Technologies) [Local] [DAVE1]

MONITOR-3B:Web Application Security Assessment by Fault Injection and Behavior Monitoring, Yao-Wen Huang, Shih-Kun Huang, Tsung-Po Lin, Chung-Hung Tsai, www2003. [Local]

 

 

 

 

 

COMPUTER VIROLOGY [3]

 

 

 

VIR-1A

VIR-1B

BINAMRA1

VIR-1A: Modeling Malware Spreading Dynamics, Michele Garetto, Weibo Gong, Don Towsley, INFOCOMM 2003. [Local]  [ZAKIYA]

VIR-1B: Modeling the Spread of Active Worms,   Zesheng Chen, Lixin Gao, Kevin Kwiat, INFOCOMM 2003. [Local]

VIR-2

MA2

VIR-2: String barcoding: uncovering optimal virus signatures , Sam Rash, Dan Gusfield , April 2002,Proceedings of the sixth annual international conference on Computational biology, [Local]

TRC-3B

TRC-3A

ZAKYA2

TRACE-3B:MET: an experimental system for Malicious Email Tracking , Manasi Bhattacharyya, S. Hershkop, E. Eskin, September 2002, Proceedings of the 2002 workshop on New security paradigms,  [Local]

TRACE-3A:Predators: Good Will Mobile Codes Combat Against Computer Viruses , Hiroshi Toyoizumi, Atsuhi Kara, September 2002, Proceedings of the 2002 workshop on New security paradigms. [Local]

 

 

 

 

 

 

MC-7A

MC-7B

 

MC-7A: Internet Quarantine: Requirements for Containing Self-Propagating Code, David Moore, Colleen Shannon, Geoffrey Voelker, Stefan Savage, INFOCOMM 2003. [Local]

MC-7B: Compilation and Run-Time Systems: DELI: a New Run-time Control Point, Giuseppe Desoli, N. Mateev, E. Duesterwald, P. Faraboschi, J. A. Fisher, November 2002, Proceedings of the 35th annual, ACM/IEEE international symposium on Microarchitecture, [Local]

 

 

 

 

 

MOBILITY & WIRELESS: [3]

 

 

MW INTRO: Capacity, Delay and Mobility in Wireless Ad-Hoc Networks  ,  Nikhil Bansal, Zhen Liu, INFOCOMM 2003.

MW-1

WATSON2

MW-1: User-Level Performance of Channel-Aware Scheduling Algorithms in Wireless Data Networks , Sem Borst, INFOCOMM 2003. [Local]

MW-2

OLALEYE2

MW-2: S-MIP: A Seamless Handoff Architecture for Mobile IP,   Robert Hsieh, Zhe Guang Zhou, Aruna Seneviratne, INFOCOMM 2003. [Local]

MW-3A

MW-3B

KEN2

MW-3A: Integration of 802.11 and Third-Generation Wireless Data Networks, Milind Buddhikot, Girish Chandranmenon, Seung-Jae Han, Yui-Wah Lee, Scott Miller, Luca Salgarelli, INFOCOMM 2003. [Local]

MW-3B: Optimizing the Topology of Bluetooth Wireless Personal Area Networks Marco Ajmone Marsan, Carla-Fabiana Chiasserini, A. Nucci, G. Carello, L. D. Giovanni, INFOCOMM 2002 [Local]

MW-4

KAMESH2

MW-4: Integration of Mobile Wireless Devices into Computation Grids, Thomas Phan, Lloyd Huang, Chris Dulan, International Conference on Mobile Computing and Networking, Pages: 271 - 278   , Year of Publication: 2002 [Local]

 

 

MOBILE & UBIQUITOUS APPLICATIONS [3]

 

 

UA INTRO: Web Browsing Performance of Wireless Thin-Client Computing, S. Jae Yang, Jason Nieh,Shilpa Krishnappa, Aparna Mohla, Mahdi Sajjadpour, MW-1: Mobility & Wireless Access, WWW2003 [Local]

UA-1

XU2

UA-1: Dynamic Service Reconfiguration for Wireless Web Access, Siu-Nam Chuang, Alvin T.S. Chan, Ronnie Cheung, Jiannong Cao, MW-1: Mobility & Wireless Access, WWW2003. [Local]

UA-2

THONG2

UA-2: Detecting Web Page Structure for Adaptive Viewing on Small Form Factor Devices, Yu Chen, Wei-Ying Ma, Hong-Jiang Zhang, BU-1: Adapting Content to Mobile Devices, WWW2003 [Local]

 

 

EXTRA

UA-3A

UA-3B

 

UA-3A: Sensor-enhanced Mobile Web Clients: an XForms Approach, John Barton, Tim Kindberg, Hui Dai, Bodhi Priyantha, Fahd Al-bin-ali, MW-1: Mobility & Wireless Access, WWW2003, [no perf analysis] [Local]

UA-3B: Personalized Pocket Directories for Mobile Devices [P92], - Doron Cohen, Michael Herscovici,Yael Petruschka, Yoëlle S. Maarek,Aya Soffer, Dave Newbold WWW2002. [no perf analysis] [Local]