E-Book, Englisch, Band 3347, 474 Seiten, eBook
Ghosh / Mohanty Distributed Computing and Internet Technology
Erscheinungsjahr 2004
ISBN: 978-3-540-30555-2
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004, Proceedings
E-Book, Englisch, Band 3347, 474 Seiten, eBook
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-540-30555-2
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Plenary Talk – I.- Taming the Dynamics of Disributed Data.- DISTRIBUTED COMPUTING.- Data in Your Space.- Enabling Technologies for Harnessing Information Explosion.- Fair Leader Election by Randomized Voting.- An Efficient Leader Election Algorithm for Mobile Ad Hoc Networks.- Distributed Balanced Tables: A New Approach.- Performance Evaluation of Gigabit Ethernet and SCI in a Linux Cluster.- Performance Evaluation of a Modified-Cyclic-Banyan Based ATM / IP Switching Fabric.- A Scalable and Robust QoS Architecture for WiFi P2P Networks.- NEC: Node Energy Based Clustering Protocol for Wireless Sensor Networks with Guaranteed Connectivity.- Energy Efficient Cache Invalidation in a Disconnected Mobile Environment.- An Efficient Data Dissemination Schemes for Location Dependent Information Services.- A Publish / Subscribe Based Architecture of an Alert Server to Support Prioritized and Persistent Alerts.- A Nested Transaction Model for LDAP Transactions.- Team Transaction: A New Transaction Model for Mobile Ad Hoc Networks.- An Efficient Protocol for Checkpoint-Based Failure Recovery in Distributed Systems.- Cybersecurity: Opportunities and Challenges.- INTERNET TECHNOLOGY.- Vulnerabilities and Threats in Distributed Systems.- A TNATS Approach to Hidden Web Documents.- Querying XML Documents from a Relational Database in the Presence of DTDs.- SAQI: Semantics Aware Query Interface.- Hybrid-Chord: A Peer-to-Peer System Based on Chord.- A Generic and Flexible Model for Replica Consistency Management.- An Efficient Distributed Scheme for Source Routing Protocol in Communication Networks.- The Roles of Ontology and Metadata Registry for Interoperable Databases.- DHL: Semantically Rich Dynamic and Active Hyperlinks.- User-Class Based Service Acceptance Policy Using ClusterAnalysis.- SOFTWARE ENGINEERING.- Tools and Techniques for Multi-site Software Development.- Specifying a Mobile Computing Infrastructure and Services.- Generating a Prototype from a UML Model of System Requirements.- A Type System for an Aspect Oriented Programming Language.- Secure Requirements Elicitation Through Triggered Message Sequence Charts.- Framework for Safe Reuse of Software Binaries.- Supporting Partial Component Matching.- A Novel Approach for Dynamic Slicing of Distributed Object-Oriented Programs.- Pattern Semantic Link: A Reusable Pattern Representation in MDA Context.- Compatibility Test and Adapter Generation for Interfaces of Software Components.- A Modern Graphic Flowchart Layout Tool.- SYSTEMS SECURITY.- A Flexible Authorization Framework for E-Commerce.- Efficient Algorithms for Intrusion Detection.- Proxi-Annotated Control Flow Graphs: Deterministic Context-Sensitive Monitoring for Intrusion Detection.- Using Schemas to Simplify Access Control for XML Documents.- Automatic Enforcement of Access Control Policies Among Dynamic Coalitions.- Implementing Consistency Checking in Correlating Attacks.- LSAD: Lightweight SYN Flooding Attack Detector.- UGSP: Secure Key Establishment Protocol for Ad-Hoc Networks.- Tracing Attackers with Deterministic Edge Router Marking (DERM).- Distributing Key Updates in Secure Dynamic Groups.- Succinct and Fast Accessible Data Structures for Database Damage Assessment.- A Secure Checkpointing Protocol for Survivable Server Design.- MobiCoin: Digital Cash for M-Commerce.- Cellular Automata: An Ideal Candidate for a Block Cipher.- NFD Technique for Efficient and Secured Information Hiding in Low Resolution Images.- WORKSHOP ON DATAMINING, SECURITY & APPLICATION.- Improving Feature Selection in Anomaly Intrusion Detection Using Specifications.- Towards Automatic Learning of Valid Services for Honeypots.