Distributed Computing - IWDC 2004 6th International Workshop, Kolkata, India, December 27-30, 2004. Proceedings /

Last, but not least, thanks to all the participants and authors. We hope that they enjoyed the workshop as much as the wonderful and culturally vibrant city of Kolkata! Bhabani P. Sinha Indian Statistical Institute, Kolkata, India December 2004 Sajal K. Das University of Texas, Arlington, USA Decemb...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Sen, Arunabha (Επιμελητής έκδοσης), Das, Nabanita (Επιμελητής έκδοσης), Das, Sajal K. (Επιμελητής έκδοσης), Sinha, Bhabani P. (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2005.
Σειρά:Lecture Notes in Computer Science, 3326
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Keynote Talk I
  • The Next Chapter in Networking Research: Evolutionary or Revolutionary?
  • Session I A: Distributed Algorithms
  • Performance of Fair Distributed Mutual Exclusion Algorithms
  • A Framework for Automatic Identification of the Best Checkpoint and Recovery Protocol
  • Distributed Computation for Swapping a Failing Edge
  • Flexible Cycle Synchronized Algorithm in Parallel and Distributed Simulation
  • Rule Mining for Dynamic Databases
  • Session I B: High Performance Computing
  • APPLE: A Novel P2P Based e-Learning Environment
  • Heuristic-Based Scheduling to Maximize Throughput of Data-Intensive Grid Applications
  • Failure Recovery in Grid Database Systems
  • On Design of Cluster and Grid Computing Environment Toolkit for Bioinformatics Applications
  • Study of Scheduling Strategies in a Dynamic Data Grid Environment
  • Virtual Molecular Computing – Emulating DNA Molecules
  • Session II A: Distributed Systems
  • Complexity of Compositional Model Checking of Computation Tree Logic on Simple Structures
  • A Multi-agent Framework Based on Communication and Concurrency
  • Statistical Analysis of a P2P Query Graph Based on Degrees and Their Time-Evolution
  • t-UNITY – A Formal Framework for Modeling and Reasoning About Timing Constraints in Real-Time Systems
  • Finding Pareto-Optimal Set of Distributed Vectors with Minimum Disclosure
  • Lean-DFS: A Distributed Filesystem for Resource Starved Clients
  • Session II B: Wireless Networks
  • A Fair Medium Access Protocol Using Adaptive Flow-Rate Control Through Cooperative Negotiation Among Contending Flows in Ad Hoc Wireless Network with Directional Antenna
  • Analytical-Numerical Study of Mobile IPv6 and Hierarchical Mobile IPv6
  • An Adaptive Transmission Power Control Protocol for Mobile Ad Hoc Networks
  • A Macro-Mobility Scheme for Reduction in Handover Delay and Signaling Traffic in MIPv6
  • QoS Support in TLMM: Three Level Mobility Model for IP-Based Networks
  • Path Stability Based Adaptation of MANET Routing Protocols
  • A. K. Choudhury Memorial Lecture
  • Computational Biology – The New Frontier of Computer Science
  • Session III A: Information Security
  • Cryptanalysis of “Wavelet Tree Quantization” Watermarking Scheme
  • A Multisignature Scheme for Implementing Safe Delivery Rule in Group Communication Systems
  • Agent-Based Distributed Intrusion Alert System
  • SCIDS: A Soft Computing Intrusion Detection System
  • Effect of Data Encryption on Wireless Ad Hoc Network Performance
  • Session III B: Network Protocols
  • On-Board RSVP: An Extension of RSVP to Support Real-Time Services in On-Board IP Networks
  • A Secure PIM-SM Multicast Routing Protocol
  • Restoration of Virtual Private Networks with QoS Guarantees in the Pipe Model
  • A User Level, Reliable, and Reconfigurable Transport Layer Protocol
  • Keynote Talk II
  • The Notion of Veto Number for Distributed Agreement Problems
  • Session IV A: Reliability and Testing
  • Reliability of VLSI Linear Arrays with Redundant Links
  • A Technique to Ensure Reliability in a WDM Optical Backbone Network with Contemporary Link Failures
  • Formal Proof of Impossibility of Reliability in Crashing Protocols
  • Altera Max Plus II Development Environment in Fault Simulation and Test Implementation of Embedded
  • Session IV B: Networks: Topology and Routing
  • A Distributed Contention Resolution Scheme to Reduce Blocking Probability in Optical Burst Switching Networks
  • Polynomial Interpolation on OTIS-Mesh Optoelectronic Computers
  • A New Network Topology with Multiple Three-Dimensional Meshes
  • Adaptive Fault Tolerant Routing in Star Graph
  • Routing and Wavelength Assignment in Wavelength Division Multiplexing Networks
  • Session V: Mobile Computing I
  • Designing the MDVM-Stub and Memory Estimator
  • Improved Algorithm for Minimum Cost Range Assignment Problem for Linear Radio Networks
  • Optimal Schemes for Channel Assignment Problem in Wireless Networks Modeled as 2-Dimensional Square Grids
  • Session VI: Ad Hoc Networks
  • Mobility Tolerant Broadcast in Mobile Ad Hoc Networks
  • Distributed Mobility Tracking for Ad Hoc Networks Based on an Autoregressive Model
  • Broadcast and Gossiping Algorithms for Mobile Ad Hoc Networks Based on Breadth-First Traversal
  • RINGS: Lookup Service for Peer-to-Peer Systems in Mobile Ad-Hoc Networks
  • Session VII: Mobile Computing II
  • Performance Analysis of Location Caching with Fixed Local Anchor in Wireless Networks
  • On the Optimization Trade-Offs of Expanding Ring Search
  • Dynamic Location Management with Personalized Location Area for Future PCS Networks
  • Improvement of Paging Cost by Updating Using Paging Delay Divergence
  • Session VIII: Sensor Networks
  • Distributed Power Control in Sensor Networks: A Game Theoretic Approach
  • A K-Connected Energy-Saving Topology Control Algorithm for Wireless Sensor Networks
  • Locating Objects in a Sensor Grid
  • Poster Presentations
  • A Novel Remote User Authentication Scheme Through Dynamic Login Identity
  • A Probabilistic Admission Control Algorithm in Wireless/Mobile Cellular Networks
  • A Rough Neuro Data Mining Approach for Network Intrusion Detection
  • An Efficient Implementation of Distance-Based Update Scheme Using Directional Cell Identification Codes
  • Application of Formal Methods for Analysis of Authentication Protocols
  • BUSTRAP – An Efficient Travel Planner for Metropolitans
  • Distributed Evolutionary Algorithm Search for Multiobjective Spanning Tree Problem
  • MSIP: A Protocol for Efficient Handoffs of Real Time Multimedia Sessions in Mobile Wireless Scenarios
  • Network Management System Using Web Server Controlled Mobile Agents
  • Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks
  • High-Level Grid Execution Patterns.