Distributed Computing - IWDC 2004 6th International Workshop, Kolkata, India, December 27-30, 2004. Proceedings /

Last, but not least, thanks to all the participants and authors. We hope that they enjoyed the workshop as much as the wonderful and culturally vibrant city of Kolkata! Bhabani P. Sinha Indian Statistical Institute, Kolkata, India December 2004 Sajal K. Das University of Texas, Arlington, USA Decemb...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Sen, Arunabha (Επιμελητής έκδοσης), Das, Nabanita (Επιμελητής έκδοσης), Das, Sajal K. (Επιμελητής έκδοσης), Sinha, Bhabani P. (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2005.
Σειρά:Lecture Notes in Computer Science, 3326
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 09357nam a22006015i 4500
001 978-3-540-30536-1
003 DE-He213
005 20151204153904.0
007 cr nn 008mamaa
008 100402s2005 gw | s |||| 0|eng d
020 |a 9783540305361  |9 978-3-540-30536-1 
024 7 |a 10.1007/b104419  |2 doi 
040 |d GrThAP 
050 4 |a TK7885-7895 
072 7 |a UY  |2 bicssc 
072 7 |a COM059000  |2 bisacsh 
082 0 4 |a 621.39  |2 23 
245 1 0 |a Distributed Computing - IWDC 2004  |h [electronic resource] :  |b 6th International Workshop, Kolkata, India, December 27-30, 2004. Proceedings /  |c edited by Arunabha Sen, Nabanita Das, Sajal K. Das, Bhabani P. Sinha. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg,  |c 2005. 
300 |a XIX, 546 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 3326 
505 0 |a Keynote Talk I -- The Next Chapter in Networking Research: Evolutionary or Revolutionary? -- Session I A: Distributed Algorithms -- Performance of Fair Distributed Mutual Exclusion Algorithms -- A Framework for Automatic Identification of the Best Checkpoint and Recovery Protocol -- Distributed Computation for Swapping a Failing Edge -- Flexible Cycle Synchronized Algorithm in Parallel and Distributed Simulation -- Rule Mining for Dynamic Databases -- Session I B: High Performance Computing -- APPLE: A Novel P2P Based e-Learning Environment -- Heuristic-Based Scheduling to Maximize Throughput of Data-Intensive Grid Applications -- Failure Recovery in Grid Database Systems -- On Design of Cluster and Grid Computing Environment Toolkit for Bioinformatics Applications -- Study of Scheduling Strategies in a Dynamic Data Grid Environment -- Virtual Molecular Computing – Emulating DNA Molecules -- Session II A: Distributed Systems -- Complexity of Compositional Model Checking of Computation Tree Logic on Simple Structures -- A Multi-agent Framework Based on Communication and Concurrency -- Statistical Analysis of a P2P Query Graph Based on Degrees and Their Time-Evolution -- t-UNITY – A Formal Framework for Modeling and Reasoning About Timing Constraints in Real-Time Systems -- Finding Pareto-Optimal Set of Distributed Vectors with Minimum Disclosure -- Lean-DFS: A Distributed Filesystem for Resource Starved Clients -- Session II B: Wireless Networks -- A Fair Medium Access Protocol Using Adaptive Flow-Rate Control Through Cooperative Negotiation Among Contending Flows in Ad Hoc Wireless Network with Directional Antenna -- Analytical-Numerical Study of Mobile IPv6 and Hierarchical Mobile IPv6 -- An Adaptive Transmission Power Control Protocol for Mobile Ad Hoc Networks -- A Macro-Mobility Scheme for Reduction in Handover Delay and Signaling Traffic in MIPv6 -- QoS Support in TLMM: Three Level Mobility Model for IP-Based Networks -- Path Stability Based Adaptation of MANET Routing Protocols -- A. K. Choudhury Memorial Lecture -- Computational Biology – The New Frontier of Computer Science -- Session III A: Information Security -- Cryptanalysis of “Wavelet Tree Quantization” Watermarking Scheme -- A Multisignature Scheme for Implementing Safe Delivery Rule in Group Communication Systems -- Agent-Based Distributed Intrusion Alert System -- SCIDS: A Soft Computing Intrusion Detection System -- Effect of Data Encryption on Wireless Ad Hoc Network Performance -- Session III B: Network Protocols -- On-Board RSVP: An Extension of RSVP to Support Real-Time Services in On-Board IP Networks -- A Secure PIM-SM Multicast Routing Protocol -- Restoration of Virtual Private Networks with QoS Guarantees in the Pipe Model -- A User Level, Reliable, and Reconfigurable Transport Layer Protocol -- Keynote Talk II -- The Notion of Veto Number for Distributed Agreement Problems -- Session IV A: Reliability and Testing -- Reliability of VLSI Linear Arrays with Redundant Links -- A Technique to Ensure Reliability in a WDM Optical Backbone Network with Contemporary Link Failures -- Formal Proof of Impossibility of Reliability in Crashing Protocols -- Altera Max Plus II Development Environment in Fault Simulation and Test Implementation of Embedded -- Session IV B: Networks: Topology and Routing -- A Distributed Contention Resolution Scheme to Reduce Blocking Probability in Optical Burst Switching Networks -- Polynomial Interpolation on OTIS-Mesh Optoelectronic Computers -- A New Network Topology with Multiple Three-Dimensional Meshes -- Adaptive Fault Tolerant Routing in Star Graph -- Routing and Wavelength Assignment in Wavelength Division Multiplexing Networks -- Session V: Mobile Computing I -- Designing the MDVM-Stub and Memory Estimator -- Improved Algorithm for Minimum Cost Range Assignment Problem for Linear Radio Networks -- Optimal Schemes for Channel Assignment Problem in Wireless Networks Modeled as 2-Dimensional Square Grids -- Session VI: Ad Hoc Networks -- Mobility Tolerant Broadcast in Mobile Ad Hoc Networks -- Distributed Mobility Tracking for Ad Hoc Networks Based on an Autoregressive Model -- Broadcast and Gossiping Algorithms for Mobile Ad Hoc Networks Based on Breadth-First Traversal -- RINGS: Lookup Service for Peer-to-Peer Systems in Mobile Ad-Hoc Networks -- Session VII: Mobile Computing II -- Performance Analysis of Location Caching with Fixed Local Anchor in Wireless Networks -- On the Optimization Trade-Offs of Expanding Ring Search -- Dynamic Location Management with Personalized Location Area for Future PCS Networks -- Improvement of Paging Cost by Updating Using Paging Delay Divergence -- Session VIII: Sensor Networks -- Distributed Power Control in Sensor Networks: A Game Theoretic Approach -- A K-Connected Energy-Saving Topology Control Algorithm for Wireless Sensor Networks -- Locating Objects in a Sensor Grid -- Poster Presentations -- A Novel Remote User Authentication Scheme Through Dynamic Login Identity -- A Probabilistic Admission Control Algorithm in Wireless/Mobile Cellular Networks -- A Rough Neuro Data Mining Approach for Network Intrusion Detection -- An Efficient Implementation of Distance-Based Update Scheme Using Directional Cell Identification Codes -- Application of Formal Methods for Analysis of Authentication Protocols -- BUSTRAP – An Efficient Travel Planner for Metropolitans -- Distributed Evolutionary Algorithm Search for Multiobjective Spanning Tree Problem -- MSIP: A Protocol for Efficient Handoffs of Real Time Multimedia Sessions in Mobile Wireless Scenarios -- Network Management System Using Web Server Controlled Mobile Agents -- Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks -- High-Level Grid Execution Patterns. 
520 |a Last, but not least, thanks to all the participants and authors. We hope that they enjoyed the workshop as much as the wonderful and culturally vibrant city of Kolkata! Bhabani P. Sinha Indian Statistical Institute, Kolkata, India December 2004 Sajal K. Das University of Texas, Arlington, USA December 2004 Program Chairs’ Message On behalf of the Technical Program Committee of the 6th International Wo- shop on Distributed Computing, IWDC 2004, it was our great pleasure to w- come the attendees to Kolkata, India. Over the last few years, IWDC has emerged as an internationally renowned forum for interaction among researchers from academia and industries around the world. A clear indicator of this fact is the large number of high-quality submissions of technical papers received by the workshop this year. The workshop program consisted of 12 technical sessions with 54 contributed papers, two keynote addresses, four tutorials, a panel, a poster session and the Prof.A.K.ChoudhuryMemorialLecture.TheIWDCProgramCommittee,c- prising 38 distinguished members, worked hard to organize the technical p- gram. Following a rigorous review process, out of 157 submissions only 54 - pers were accepted for presentation in the technical sessions; 27 of the accepted papers were classi?ed as regular papers and the remaining 27 as short papers. Another 11 papers were accepted for presentation in the poster session, each with a one-page abstract appearing in the proceedings. 
650 0 |a Computer science. 
650 0 |a Computer communication systems. 
650 0 |a Computer programming. 
650 0 |a Software engineering. 
650 0 |a Operating systems (Computers). 
650 0 |a Computers. 
650 0 |a Computer engineering. 
650 1 4 |a Computer Science. 
650 2 4 |a Computer Engineering. 
650 2 4 |a Theory of Computation. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Programming Techniques. 
650 2 4 |a Software Engineering. 
650 2 4 |a Operating Systems. 
700 1 |a Sen, Arunabha.  |e editor. 
700 1 |a Das, Nabanita.  |e editor. 
700 1 |a Das, Sajal K.  |e editor. 
700 1 |a Sinha, Bhabani P.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783540240761 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 3326 
856 4 0 |u http://dx.doi.org/10.1007/b104419  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (Springer-11645)