Paper Presentation & Review ScheduleIAD 2003, Fall This Table shows the
approximate paper presentation schedule. The time may change. However, the
order of presentation will be maintained. Approximately, each day we will
have two presentations of 30 minutes duration.
|
|
|
CONTENT SERVICES NETWORKING [3]: |
CSN-1A CSN-1B |
WATSON1 |
CSN-1A: Evaluation
of Edge Caching/Offloading for Dynamic Content Delivery, Chun Yuan, Yu
Chen, Zheng Zhang, PR-2: Consistency and Replication,
, WWW2003. [Local]
[WATSON1] CSN-1B: Engineering
and Hosting Adaptive Freshness-sensitive Web Applications on Data Centers,
Wen-Syan Li, Oliver Po, Wang-Pin Hsiung, K. Selcuk Candan, Divyakant Agrawal, SD-6: Dynamic Services and Analysis, WWW2003. [Local] |
CSN-2 |
SANDEEP1 |
CSN-2: Acceleration
of Web Service Workflow Execution through Edge Computing, Junichi Tatemura, Wang-Pin Hsiung,Wen-Syan Li, WS-1: Collaboration, Composition, and
Workflow, WWW2003. [Local]
[SANDEEP1] |
CSN-31 CSN-3B |
THONG1 |
CSN-3A: Delivering
Semantic Web Services, Massimo Paolucci,Katia Sycara, Takahiro
Kawamura, WS-3:Discovery and Semantics, WWW2003. [Local] CSN-3B: SemTag and Seeker: Bootstrapping the semantic web via
automated semantic annotation, Stephen Dill, Nadav
Eiron, David Gibson, Daniel Gruhl,
Ramanathan Guha, Anant Jhingran, Tapas Kanungo, Sridhar Rajagopalan, Andrew Tomkins,
John Tomlin, Jason Zien, SW-2:
Establishing the Semantic Web I, WWW2003. [Local]
[THONG1] |
|
|
EXTRA |
CSN-4 |
|
CSN-4: Quality
Driven Web Services Composition, Liangzhao Zeng, Boualem Benatallah, Marlon Dumas, Jayant
Kalagnanam, Quan Z. Sheng, WE-1: Web Engineering, WWW2003. [Local] |
CSN-5 |
|
CSN-5: Conversation
Specification: A New Approach to Design and Analysis of E-Service Composition,
Jianwen Su, Richard Hull, Tevfik
Bultan,Xiang Fu,WE-1: Web Engineering, WWW2003. [Local] |
|
|
|
|
|
PEER TO PEER COMPUTING: [3] |
P2P-1 |
DAVE2 |
P2P-1A:
YAPPERS: A
Peer-to-Peer Lookup Service over Arbitrary Topology , Prasanna
Ganesan, Qixiang Sun,
Hector Garcia-Molina ( P2P-1B:
ZIGZAG: An
Efficient Peer-to-Peer Scheme for Media Streaming , Duc
Tran, Kien Hua, Tai Do ( |
P2P-2A P2P-2B |
XU1 |
P2P-2A: Efficient Content
Location Using Interest-Based Locality in Peer-to-Peer Systems,Kunwadee Sripanidkulchai,
Bruce Maggs, Hui Zhang
(Carnegie Mellon University), INFOCOM2003. [Local] [XU1] P2P-2B:
Giggle: A Framework for Constructing Sclable
Replica Location Services. A. Chervenak, E. Deelman, I. Foster, L. Guy, W. Hoschek,
A. Iamnitchi, C. Kesselman,
P. Kunst, M. Ripeanu, B, Schwartzkopf, H, Stockinger, K.
Stockinger, B. Tierney. Proceedings of Supercomputing 2002 (SC2002), November 2002. |
P2P-3A P2P-3B |
BINAMRA2 |
P2P-3A: YouServ: A Web-Hosting and Content Sharing Tool for the
Masses [P84],
Roberto J. Bayardo Jr., Rakesh
Agrawal, Daniel Gruhl,Amit
Somani, [Presentation],
WWW2002. [Local] P2P-3B:
Make
it Fresh, Make it Quick --- Searching a Network of
Personal Webservers, Mayank
Bawa, Roberto J. Bayardo
Jr., Sridhar Rajagopalan, Eugene J. Shekita, SD-6: Dynamic Services and Analysis, WWW2003. [Local]
[KAMESH1] |
GRID-1A GRID-1B |
KAMESH1 |
GRID-1A:
Towards
Efficent Resource on Demand in Grid Computing8,
Kun Yang, Xin Guo, Alex Galis, Bo Yang, Dayou , ACM SIGOPS Operating Systems Review, Volume 37 , Issue 2 (April 2003), Pages:
37 – 43 [Local] GRID-1B:Combining Active and Passive
Network Measurements to Build Scalable Monitoring Systems on the Grid, Bruce
B. Lowekamp, ACM
SIGMETRICS Performance Evaluation, Pages: 19 – 26,2003 [Local] |
|
|
EXTRA: |
P2P-4 |
|
P2P-4:
On
the Bursty Evolution of Blogspace, |
P2P-5 |
|
P2P-5: Law-Governed
Peer-to-Peer Auctions [P398], Marcus Fontoura, Mihail Ionescu, Naftaly Minsky, [Presentation],
WWW2002. [Local] |
|
|
|
|
|
MULTIMEDIA: [3] |
MM-1 |
KEN1 |
MM1: Architecture
of a Quality Based Intelligent Proxy (QBIX) for MPEG-4 Videos, Peter Schojer, Laszlo Böszörmenyi,
Hermann Hellwagner, Bernhard Benz, Stefan Podlipnig, MM-1: Multimedia,
WWW2003. [Local]
[KEN1] |
MM-2 |
MA1 |
MM2: Multimedia Meets Computer
Graphics in SMIL2.0: A Time Model for the Web [P382] Patrick Schmitz, WWW2002.
[Local]
[MA1] |
MM-3A |
OLALEYE1 |
MM-3A: Adaptive Joint Playout Buffer and FEC Adjustment for Internet Telephony,
Catherine Boutremans, Jean-Yves Le Boudec, INFOCOMM 2003. [Local] |
MM-3B |
|
MM-3B: Path Diversity with
Forward Error Correction (PDF) System for Delay Sensitive Applications over
the Internet , Thinh
Nguyen, INFOCOM 2003. [Local]
[OLELEYA1] |
|
|
|
|
|
COMPUTER FORENSIC: [3] |
|
|
SEC INTRO: A Taxonomy of Computer Program Security Flaws , Carl E. Landwehr, Alan R. Bull, John P. McDermott, William S. Choi, September 1994, pdf(3.81 MB), ACM Computing Surveys (CSUR),
Volume 26 Issue 3 . [download from ACM] |
|
|
INTRO:
Abstracting Application-Level
Web Security [P48] , Best Paper Finalist and
Winner!, David Scott, Richard Sharp, [Presentation],
WWW2002. [Local] |
|
|
|
TRC-1A TRC-1B |
MANYU1 |
TRACE-1A:A
Recursive Session Token Protocol for use in Computer Forensics and TCP Traceback Brian Carrier, Clay Shields, INFOCOMM 2002.
[Local] TRACK-1B:SAVE:
Source Address Validity Enforcement Protocol Jun Li ( |
DOS-2A DOS-2B DOS-2C |
ZAKYA1 |
DOS-2A: Detecting SYN Flooding
Attacks Haining Wang, Danlu
Zhang, Kang G. Shin, INFOCOMM 2002. [Local]
[ZAKIYA] DOS-2B:
Flash Crowds and Denial of
Service Attacks: Characterization and Implications for CDNs
and Web Sites [P342], Jaeyeon Jung, Balachander
Krishnamurthy, Michael Rabinovich, [Presentation],
www2002. [Local] DOS-2C:
Protecting Electronic
Commerce From Distributed Denial-of-Service Attacks [P528], José Carlos Brustolon,
WWW2002. [Local] |
INT-3A INT-3B |
DAVE1 |
INTRUSION-3A:Detecting Network
Intrusions via Sampling: A Game Theoretic Approach,Murari Kodialam,
T. V. Lakshman ( MONITOR-3B:Web
Application Security Assessment by Fault Injection and Behavior Monitoring,
Yao-Wen Huang, Shih-Kun Huang, Tsung-Po
Lin, Chung-Hung Tsai, www2003. [Local] |
|
|
|
|
|
COMPUTER VIROLOGY [3] |
|
|
|
VIR-1A VIR-1B |
BINAMRA1 |
VIR-1A: Modeling Malware Spreading Dynamics, Michele Garetto, Weibo Gong, Don Towsley, INFOCOMM 2003. [Local] [ZAKIYA] VIR-1B: Modeling the Spread
of Active Worms, Zesheng Chen, Lixin Gao, Kevin Kwiat, INFOCOMM 2003. [Local] |
VIR-2 |
MA2 |
VIR-2: String barcoding: uncovering optimal
virus signatures , Sam Rash, Dan Gusfield ,
April 2002,Proceedings
of the sixth annual international conference on Computational biology, [Local] |
TRC-3B TRC-3A |
ZAKYA2 |
TRACE-3B:MET: an experimental system for Malicious Email Tracking ,
Manasi Bhattacharyya, S. Hershkop,
E. Eskin, September 2002, Proceedings of the 2002
workshop on New security paradigms, [Local] TRACE-3A:Predators: Good Will Mobile Codes Combat Against Computer
Viruses , Hiroshi Toyoizumi, Atsuhi Kara, September 2002, Proceedings of the 2002
workshop on New security paradigms. [Local] |
|
|
|
|
|
|
MC-7A MC-7B |
|
MC-7A: Internet Quarantine:
Requirements for Containing Self-Propagating Code, David Moore, Colleen
Shannon, Geoffrey Voelker, Stefan Savage, INFOCOMM
2003. [Local] MC-7B: Compilation and Run-Time Systems: DELI: a New Run-time Control
Point, Giuseppe Desoli, N. Mateev,
E. Duesterwald, P. Faraboschi,
J. A. Fisher, November 2002, Proceedings of the 35th annual, ACM/IEEE international
symposium on Microarchitecture, [Local] |
|
|
|
|
|
MOBILITY &
WIRELESS: [3] |
|
|
MW INTRO: Capacity, Delay and
Mobility in Wireless Ad-Hoc Networks ,
Nikhil Bansal, Zhen
Liu, INFOCOMM 2003. |
MW-1 |
WATSON2 |
MW-1: User-Level
Performance of Channel-Aware Scheduling Algorithms in Wireless Data Networks
, Sem Borst, INFOCOMM
2003. [Local] |
MW-2 |
OLALEYE2 |
MW-2: S-MIP: A Seamless
Handoff Architecture for Mobile IP, Robert Hsieh, Zhe Guang Zhou, Aruna Seneviratne, INFOCOMM 2003. [Local] |
MW-3A MW-3B |
KEN2 |
MW-3A: Integration of
802.11 and Third-Generation Wireless Data Networks, Milind
Buddhikot, Girish Chandranmenon, Seung-Jae Han, Yui-Wah Lee, Scott Miller, Luca Salgarelli,
INFOCOMM 2003. [Local] MW-3B: Optimizing the
Topology of Bluetooth Wireless Personal Area Networks Marco Ajmone Marsan, Carla-Fabiana Chiasserini, A. Nucci, G. Carello, L. D.
Giovanni, INFOCOMM 2002 [Local] |
MW-4 |
KAMESH2 |
MW-4: Integration of Mobile Wireless Devices into
Computation Grids, Thomas Phan, Lloyd
Huang, Chris Dulan, International
Conference on Mobile Computing and Networking, Pages: 271 -
278 , Year of Publication: 2002 [Local] |
|
|
MOBILE & UBIQUITOUS APPLICATIONS [3] |
|
|
UA INTRO: Web
Browsing Performance of Wireless Thin-Client Computing, S. Jae Yang, Jason Nieh,Shilpa Krishnappa, Aparna Mohla, Mahdi Sajjadpour, MW-1: Mobility & Wireless Access, WWW2003
[Local] |
UA-1 |
XU2 |
UA-1: Dynamic Service
Reconfiguration for Wireless Web Access, Siu-Nam
Chuang, Alvin T.S. Chan, Ronnie Cheung, Jiannong Cao, MW-1: Mobility & Wireless Access, WWW2003. [Local] |
UA-2 |
THONG2 |
UA-2: Detecting
Web Page Structure for Adaptive Viewing on Small Form Factor Devices, Yu
Chen, Wei-Ying Ma, Hong-Jiang
Zhang, BU-1: Adapting Content to Mobile Devices, WWW2003 [Local] |
|
|
EXTRA |
UA-3A UA-3B |
|
UA-3A: Sensor-enhanced
Mobile Web Clients: an XForms Approach, John
Barton, Tim Kindberg, Hui
Dai, Bodhi Priyantha, Fahd Al-bin-ali, MW-1: Mobility
& Wireless Access, WWW2003, [no perf analysis]
[Local] UA-3B:
Personalized Pocket
Directories for Mobile Devices [P92], - Doron Cohen, Michael Herscovici,Yael Petruschka, Yoëlle S. Maarek,Aya Soffer, Dave Newbold WWW2002.
[no perf analysis] [Local] |