|
|
|
|
LEADER |
09357nam a22006015i 4500 |
001 |
978-3-540-30536-1 |
003 |
DE-He213 |
005 |
20151204153904.0 |
007 |
cr nn 008mamaa |
008 |
100402s2005 gw | s |||| 0|eng d |
020 |
|
|
|a 9783540305361
|9 978-3-540-30536-1
|
024 |
7 |
|
|a 10.1007/b104419
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a TK7885-7895
|
072 |
|
7 |
|a UY
|2 bicssc
|
072 |
|
7 |
|a COM059000
|2 bisacsh
|
082 |
0 |
4 |
|a 621.39
|2 23
|
245 |
1 |
0 |
|a Distributed Computing - IWDC 2004
|h [electronic resource] :
|b 6th International Workshop, Kolkata, India, December 27-30, 2004. Proceedings /
|c edited by Arunabha Sen, Nabanita Das, Sajal K. Das, Bhabani P. Sinha.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg,
|c 2005.
|
300 |
|
|
|a XIX, 546 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 3326
|
505 |
0 |
|
|a Keynote Talk I -- The Next Chapter in Networking Research: Evolutionary or Revolutionary? -- Session I A: Distributed Algorithms -- Performance of Fair Distributed Mutual Exclusion Algorithms -- A Framework for Automatic Identification of the Best Checkpoint and Recovery Protocol -- Distributed Computation for Swapping a Failing Edge -- Flexible Cycle Synchronized Algorithm in Parallel and Distributed Simulation -- Rule Mining for Dynamic Databases -- Session I B: High Performance Computing -- APPLE: A Novel P2P Based e-Learning Environment -- Heuristic-Based Scheduling to Maximize Throughput of Data-Intensive Grid Applications -- Failure Recovery in Grid Database Systems -- On Design of Cluster and Grid Computing Environment Toolkit for Bioinformatics Applications -- Study of Scheduling Strategies in a Dynamic Data Grid Environment -- Virtual Molecular Computing – Emulating DNA Molecules -- Session II A: Distributed Systems -- Complexity of Compositional Model Checking of Computation Tree Logic on Simple Structures -- A Multi-agent Framework Based on Communication and Concurrency -- Statistical Analysis of a P2P Query Graph Based on Degrees and Their Time-Evolution -- t-UNITY – A Formal Framework for Modeling and Reasoning About Timing Constraints in Real-Time Systems -- Finding Pareto-Optimal Set of Distributed Vectors with Minimum Disclosure -- Lean-DFS: A Distributed Filesystem for Resource Starved Clients -- Session II B: Wireless Networks -- A Fair Medium Access Protocol Using Adaptive Flow-Rate Control Through Cooperative Negotiation Among Contending Flows in Ad Hoc Wireless Network with Directional Antenna -- Analytical-Numerical Study of Mobile IPv6 and Hierarchical Mobile IPv6 -- An Adaptive Transmission Power Control Protocol for Mobile Ad Hoc Networks -- A Macro-Mobility Scheme for Reduction in Handover Delay and Signaling Traffic in MIPv6 -- QoS Support in TLMM: Three Level Mobility Model for IP-Based Networks -- Path Stability Based Adaptation of MANET Routing Protocols -- A. K. Choudhury Memorial Lecture -- Computational Biology – The New Frontier of Computer Science -- Session III A: Information Security -- Cryptanalysis of “Wavelet Tree Quantization” Watermarking Scheme -- A Multisignature Scheme for Implementing Safe Delivery Rule in Group Communication Systems -- Agent-Based Distributed Intrusion Alert System -- SCIDS: A Soft Computing Intrusion Detection System -- Effect of Data Encryption on Wireless Ad Hoc Network Performance -- Session III B: Network Protocols -- On-Board RSVP: An Extension of RSVP to Support Real-Time Services in On-Board IP Networks -- A Secure PIM-SM Multicast Routing Protocol -- Restoration of Virtual Private Networks with QoS Guarantees in the Pipe Model -- A User Level, Reliable, and Reconfigurable Transport Layer Protocol -- Keynote Talk II -- The Notion of Veto Number for Distributed Agreement Problems -- Session IV A: Reliability and Testing -- Reliability of VLSI Linear Arrays with Redundant Links -- A Technique to Ensure Reliability in a WDM Optical Backbone Network with Contemporary Link Failures -- Formal Proof of Impossibility of Reliability in Crashing Protocols -- Altera Max Plus II Development Environment in Fault Simulation and Test Implementation of Embedded -- Session IV B: Networks: Topology and Routing -- A Distributed Contention Resolution Scheme to Reduce Blocking Probability in Optical Burst Switching Networks -- Polynomial Interpolation on OTIS-Mesh Optoelectronic Computers -- A New Network Topology with Multiple Three-Dimensional Meshes -- Adaptive Fault Tolerant Routing in Star Graph -- Routing and Wavelength Assignment in Wavelength Division Multiplexing Networks -- Session V: Mobile Computing I -- Designing the MDVM-Stub and Memory Estimator -- Improved Algorithm for Minimum Cost Range Assignment Problem for Linear Radio Networks -- Optimal Schemes for Channel Assignment Problem in Wireless Networks Modeled as 2-Dimensional Square Grids -- Session VI: Ad Hoc Networks -- Mobility Tolerant Broadcast in Mobile Ad Hoc Networks -- Distributed Mobility Tracking for Ad Hoc Networks Based on an Autoregressive Model -- Broadcast and Gossiping Algorithms for Mobile Ad Hoc Networks Based on Breadth-First Traversal -- RINGS: Lookup Service for Peer-to-Peer Systems in Mobile Ad-Hoc Networks -- Session VII: Mobile Computing II -- Performance Analysis of Location Caching with Fixed Local Anchor in Wireless Networks -- On the Optimization Trade-Offs of Expanding Ring Search -- Dynamic Location Management with Personalized Location Area for Future PCS Networks -- Improvement of Paging Cost by Updating Using Paging Delay Divergence -- Session VIII: Sensor Networks -- Distributed Power Control in Sensor Networks: A Game Theoretic Approach -- A K-Connected Energy-Saving Topology Control Algorithm for Wireless Sensor Networks -- Locating Objects in a Sensor Grid -- Poster Presentations -- A Novel Remote User Authentication Scheme Through Dynamic Login Identity -- A Probabilistic Admission Control Algorithm in Wireless/Mobile Cellular Networks -- A Rough Neuro Data Mining Approach for Network Intrusion Detection -- An Efficient Implementation of Distance-Based Update Scheme Using Directional Cell Identification Codes -- Application of Formal Methods for Analysis of Authentication Protocols -- BUSTRAP – An Efficient Travel Planner for Metropolitans -- Distributed Evolutionary Algorithm Search for Multiobjective Spanning Tree Problem -- MSIP: A Protocol for Efficient Handoffs of Real Time Multimedia Sessions in Mobile Wireless Scenarios -- Network Management System Using Web Server Controlled Mobile Agents -- Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks -- High-Level Grid Execution Patterns.
|
520 |
|
|
|a Last, but not least, thanks to all the participants and authors. We hope that they enjoyed the workshop as much as the wonderful and culturally vibrant city of Kolkata! Bhabani P. Sinha Indian Statistical Institute, Kolkata, India December 2004 Sajal K. Das University of Texas, Arlington, USA December 2004 Program Chairs’ Message On behalf of the Technical Program Committee of the 6th International Wo- shop on Distributed Computing, IWDC 2004, it was our great pleasure to w- come the attendees to Kolkata, India. Over the last few years, IWDC has emerged as an internationally renowned forum for interaction among researchers from academia and industries around the world. A clear indicator of this fact is the large number of high-quality submissions of technical papers received by the workshop this year. The workshop program consisted of 12 technical sessions with 54 contributed papers, two keynote addresses, four tutorials, a panel, a poster session and the Prof.A.K.ChoudhuryMemorialLecture.TheIWDCProgramCommittee,c- prising 38 distinguished members, worked hard to organize the technical p- gram. Following a rigorous review process, out of 157 submissions only 54 - pers were accepted for presentation in the technical sessions; 27 of the accepted papers were classi?ed as regular papers and the remaining 27 as short papers. Another 11 papers were accepted for presentation in the poster session, each with a one-page abstract appearing in the proceedings.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computer programming.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Operating systems (Computers).
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Computer engineering.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Computer Engineering.
|
650 |
2 |
4 |
|a Theory of Computation.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Programming Techniques.
|
650 |
2 |
4 |
|a Software Engineering.
|
650 |
2 |
4 |
|a Operating Systems.
|
700 |
1 |
|
|a Sen, Arunabha.
|e editor.
|
700 |
1 |
|
|a Das, Nabanita.
|e editor.
|
700 |
1 |
|
|a Das, Sajal K.
|e editor.
|
700 |
1 |
|
|a Sinha, Bhabani P.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783540240761
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 3326
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/b104419
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|