Distributed Computing and Internet Technology
Editat de Goutam Chakrabortyen Limba Engleză Paperback – 9 dec 2005
Preț: 639.10 lei
Preț vechi: 798.88 lei
-20% Nou
Puncte Express: 959
Preț estimativ în valută:
113.07€ • 131.73$ • 98.74£
113.07€ • 131.73$ • 98.74£
Carte tipărită la comandă
Livrare economică 17-31 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540309994
ISBN-10: 3540309993
Pagini: 636
Ilustrații: XXII, 610 p. 243 illus.
Dimensiuni: 155 x 235 x 34 mm
Greutate: 0.95 kg
Ediția:2005
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540309993
Pagini: 636
Ilustrații: XXII, 610 p. 243 illus.
Dimensiuni: 155 x 235 x 34 mm
Greutate: 0.95 kg
Ediția:2005
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Plenary Talk I.- The Distributed Sensor Networks – An Emerging Technology.- Distributed Computing.- Distribute Computing Track Chair’s Message.- Network Protcols.- Efficient Binding Lifetime Determination Schemes in HMIPv6.- A Fast Search and Advanced Marking Scheme for Network IP Traceback Model.- Design and Performance Evaluation of Token-Based MAC Protocols in WDM Burst Switched Ring Networks.- Routing in Mobile Ad Hoc Network.- Self-stabilizing Energy-Aware Routing Algorithm in Wireless Sensor Network with Limited Mobility.- Position Based Gradient Routing in Mobile Ad Hoc Networks.- Distributed Clustering Algorithm for Finding Virtual Backbone in Ad Hoc Networks.- Merging Clustering Algorithms in Mobile Ad Hoc Networks.- Performance Study and Implementation of Self Organized Routing Algorithm for Mobile Ad Hoc Network Using GloMoSim.- Communication and Coverage in Wireless Networks.- Self-stabilizing Deterministic TDMA for Sensor Networks.- Effect of Mobility on Communication Performance in Overloaded One-Dimensional Cellular Networks.- Distributed Time Slot Assignment in Wireless Ad Hoc Networks for STDMA.- Efficient Algorithm for Placing Base Stations by Avoiding Forbidden Zone.- Secured Communication in Distributed Systems.- Secure Two-Party Context Free Language Recognition.- Autonomous Agent Based Distributed Fault-Tolerant Intrusion Detection System.- Cleaning an Arbitrary Regular Network with Mobile Agents.- Query and Transaction Processing.- Multi-attribute Hashing of Wireless Data for Content-Based Queries.- A Tool for Automated Resource Consumption Profiling of Distributed Transactions.- An Efficient Algorithm for Removing Useless Logged Messages in SBML Protocols.- Theory of Distributed Systems.- Divide and Concur: Employing Chandra and Toueg’sConsensus Algorithm in a Multi-level Setting.- Distributed Multiple Hypothesis Testing in Sensor Networks Under Bandwidth Constraint.- A Scalable Multi-level Distributed System-Level Diagnosis.- Analysis of Interval-Based Global State Detection.- Grid Computing.- A Two-Phase Scheduling Algorithm for Efficient Collective Communications of MPICH-G2.- Towards an Agent-Based Framework for Monitoring and Tuning Application Performance in Grid Environment.- GDP: A Paradigm for Intertask Communication in Grid Computing Through Distributed Pipes.- Internet Technology.- Internet Technology Track Chair’s Message.- Internet Search and Query.- Rewriting Queries Using View for RDF/RDFS-Based Relational Data Integration.- An Effective Searching Method Using the Example-Based Query.- On Communicating with Agents on the Network.- E-Commerce.- Applying Fuzzy Logic to Recommend Consumer Electronics.- Generic XML Schema Definition (XSD) to GUI Translator.- Off-Line Micro-payment System for Content Sharing in P2P Networks.- Browsing and Analysis of Web Elements.- FlexiRank: An Algorithm Offering Flexibility and Accuracy for Ranking the Web Pages.- Adaptable Web Browsing of Images in Mobile Computing Environment: Experiments and Observations.- An Incremental Document Clustering Algorithm Based on a Hierarchical Agglomerative Approach.- Systems Security.- System Security Track Chair’s Message.- Theory of Secured Systems.- A Game Based Model of Security for Key Predistribution Schemes in Wireless Sensor Network.- E-mail Worm Detection Using the Analysis of Behavior.- Verifiably Encrypted Signature Scheme Without Random Oracles.- Intrusion Detection and Ad Hoc Network Security.- An Improved Intrusion Detection Technique for Mobile Adhoc Networks.- User Revocation in Secure AdhocNetworks.- A Hybrid Method to Intrusion Detection Systems Using HMM.- Secured Systems Techniques.- Enhanced Network Traffic Anomaly Detector.- Statistically Secure Extension of Anti-collusion Code Fingerprinting.- An Improvement of Auto-Correlation Based Video Watermarking Scheme Using Perceptual Masking for Motion.- Validation of Policy Integration Using Alloy.- Plenary Talk II.- Linking Theories of Concurrency by Retraction.- Software Engineering.- Software Engineering Track Chair’s Message.- Software Architecture.- Integrating Architecture Description Languages: A Semantics-Based Approach.- Automated Runtime Validation of Software Architecture Design.- Software Optimization and Reliability.- Analyzing Loop Paths for Execution Time Estimation.- A Technique for Early Software Reliability Prediction.- Formal Methods.- Executable Requirements Specifications Using Triggered Message Sequence Charts.- Efficient Symmetry Reduction for an Actor-Based Model.- Validated Code Generation for Activity Diagrams.- Data Mining.- Data Mining Track Chair’s Message.- Data Clustering Techniques.- An Approach to Find Embedded Clusters Using Density Based Techniques.- Using Sub-sequence Information with kNN for Classification of Sequential Data.- Distance-Based Outliers in Sequences.- Capturing Market Intelligence from Customer Feedback E-mails Using Self-enhancing Bolzmann Machine-Based Network of Knowledge Maps.- Multidimensional Data Mining.- Algorithm for Fuzzy Clustering of Mixed Data with Numeric and Categorical Attributes.- Dissemination of Multidimensional Data Using Broadcast Clusters.- Multidimensional Frequent Pattern Mining Using Association Rule Based Constraints.- A Classification Based Approach for Root Unknown Phylogenetic Networks Under Constrained Recombination.-Erratum.- Using Sub-sequence Information with kNN for Classification of Sequential Data.- Capturing Market Intelligence from Customer Feedback E-mails Using Self-enhancing Boltzmann Machine-Based Network of Knowledge Maps.