Distributed Computing and Internet Technology Second International Conference, ICDCIT 2005, Bhubaneswar, India, December 22-24, 2005. Proceedings /
The opening ceremony and pre-conference tutorials on various related topics were held on December 21. The technical program started on December 22 and continued for three days. The program was arranged in single track so as to enable participants to attend sessions of di?erent tracks. Papers from th...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2005.
|
Σειρά: | Lecture Notes in Computer Science,
3816 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Plenary Talk I
- The Distributed Sensor Networks – An Emerging Technology
- Distributed Computing
- Distribute Computing Track Chair’s Message
- Network Protcols
- Efficient Binding Lifetime Determination Schemes in HMIPv6
- A Fast Search and Advanced Marking Scheme for Network IP Traceback Model
- Design and Performance Evaluation of Token-Based MAC Protocols in WDM Burst Switched Ring Networks
- Routing in Mobile Ad Hoc Network
- Self-stabilizing Energy-Aware Routing Algorithm in Wireless Sensor Network with Limited Mobility
- Position Based Gradient Routing in Mobile Ad Hoc Networks
- Distributed Clustering Algorithm for Finding Virtual Backbone in Ad Hoc Networks
- Merging Clustering Algorithms in Mobile Ad Hoc Networks
- Performance Study and Implementation of Self Organized Routing Algorithm for Mobile Ad Hoc Network Using GloMoSim
- Communication and Coverage in Wireless Networks
- Self-stabilizing Deterministic TDMA for Sensor Networks
- Effect of Mobility on Communication Performance in Overloaded One-Dimensional Cellular Networks
- Distributed Time Slot Assignment in Wireless Ad Hoc Networks for STDMA
- Efficient Algorithm for Placing Base Stations by Avoiding Forbidden Zone
- Secured Communication in Distributed Systems
- Secure Two-Party Context Free Language Recognition
- Autonomous Agent Based Distributed Fault-Tolerant Intrusion Detection System
- Cleaning an Arbitrary Regular Network with Mobile Agents
- Query and Transaction Processing
- Multi-attribute Hashing of Wireless Data for Content-Based Queries
- A Tool for Automated Resource Consumption Profiling of Distributed Transactions
- An Efficient Algorithm for Removing Useless Logged Messages in SBML Protocols
- Theory of Distributed Systems
- Divide and Concur: Employing Chandra and Toueg’s Consensus Algorithm in a Multi-level Setting
- Distributed Multiple Hypothesis Testing in Sensor Networks Under Bandwidth Constraint
- A Scalable Multi-level Distributed System-Level Diagnosis
- Analysis of Interval-Based Global State Detection
- Grid Computing
- A Two-Phase Scheduling Algorithm for Efficient Collective Communications of MPICH-G2
- Towards an Agent-Based Framework for Monitoring and Tuning Application Performance in Grid Environment
- GDP: A Paradigm for Intertask Communication in Grid Computing Through Distributed Pipes
- Internet Technology
- Internet Technology Track Chair’s Message
- Internet Search and Query
- Rewriting Queries Using View for RDF/RDFS-Based Relational Data Integration
- An Effective Searching Method Using the Example-Based Query
- On Communicating with Agents on the Network
- E-Commerce
- Applying Fuzzy Logic to Recommend Consumer Electronics
- Generic XML Schema Definition (XSD) to GUI Translator
- Off-Line Micro-payment System for Content Sharing in P2P Networks
- Browsing and Analysis of Web Elements
- FlexiRank: An Algorithm Offering Flexibility and Accuracy for Ranking the Web Pages
- Adaptable Web Browsing of Images in Mobile Computing Environment: Experiments and Observations
- An Incremental Document Clustering Algorithm Based on a Hierarchical Agglomerative Approach
- Systems Security
- System Security Track Chair’s Message
- Theory of Secured Systems
- A Game Based Model of Security for Key Predistribution Schemes in Wireless Sensor Network
- E-mail Worm Detection Using the Analysis of Behavior
- Verifiably Encrypted Signature Scheme Without Random Oracles
- Intrusion Detection and Ad Hoc Network Security
- An Improved Intrusion Detection Technique for Mobile Adhoc Networks
- User Revocation in Secure Adhoc Networks
- A Hybrid Method to Intrusion Detection Systems Using HMM
- Secured Systems Techniques
- Enhanced Network Traffic Anomaly Detector
- Statistically Secure Extension of Anti-collusion Code Fingerprinting
- An Improvement of Auto-Correlation Based Video Watermarking Scheme Using Perceptual Masking for Motion
- Validation of Policy Integration Using Alloy
- Plenary Talk II
- Linking Theories of Concurrency by Retraction
- Software Engineering
- Software Engineering Track Chair’s Message
- Software Architecture
- Integrating Architecture Description Languages: A Semantics-Based Approach
- Automated Runtime Validation of Software Architecture Design
- Software Optimization and Reliability
- Analyzing Loop Paths for Execution Time Estimation
- A Technique for Early Software Reliability Prediction
- Formal Methods
- Executable Requirements Specifications Using Triggered Message Sequence Charts
- Efficient Symmetry Reduction for an Actor-Based Model
- Validated Code Generation for Activity Diagrams
- Data Mining
- Data Mining Track Chair’s Message
- Data Clustering Techniques
- An Approach to Find Embedded Clusters Using Density Based Techniques
- Using Sub-sequence Information with kNN for Classification of Sequential Data
- Distance-Based Outliers in Sequences
- Capturing Market Intelligence from Customer Feedback E-mails Using Self-enhancing Bolzmann Machine-Based Network of Knowledge Maps
- Multidimensional Data Mining
- Algorithm for Fuzzy Clustering of Mixed Data with Numeric and Categorical Attributes
- Dissemination of Multidimensional Data Using Broadcast Clusters
- Multidimensional Frequent Pattern Mining Using Association Rule Based Constraints
- A Classification Based Approach for Root Unknown Phylogenetic Networks Under Constrained Recombination
- Erratum
- Using Sub-sequence Information with kNN for Classification of Sequential Data
- Capturing Market Intelligence from Customer Feedback E-mails Using Self-enhancing Boltzmann Machine-Based Network of Knowledge Maps.