Cargando…

Distributed Computing and Internet Technology First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004, Proceedings /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Ghosh, R.K (Editor ), Mohanty, Hrushikesha (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2005.
Edición:1st ed. 2005.
Colección:Lecture Notes in Computer Science, 3347
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Plenary Talk - I
  • Taming the Dynamics of Disributed Data
  • DISTRIBUTED COMPUTING
  • Data in Your Space
  • Enabling Technologies for Harnessing Information Explosion
  • Fair Leader Election by Randomized Voting
  • An Efficient Leader Election Algorithm for Mobile Ad Hoc Networks
  • Distributed Balanced Tables: A New Approach
  • Performance Evaluation of Gigabit Ethernet and SCI in a Linux Cluster
  • Performance Evaluation of a Modified-Cyclic-Banyan Based ATM / IP Switching Fabric
  • A Scalable and Robust QoS Architecture for WiFi P2P Networks
  • NEC: Node Energy Based Clustering Protocol for Wireless Sensor Networks with Guaranteed Connectivity
  • Energy Efficient Cache Invalidation in a Disconnected Mobile Environment
  • An Efficient Data Dissemination Schemes for Location Dependent Information Services
  • A Publish / Subscribe Based Architecture of an Alert Server to Support Prioritized and Persistent Alerts
  • A Nested Transaction Model for LDAP Transactions
  • Team Transaction: A New Transaction Model for Mobile Ad Hoc Networks
  • An Efficient Protocol for Checkpoint-Based Failure Recovery in Distributed Systems
  • Cybersecurity: Opportunities and Challenges
  • INTERNET TECHNOLOGY
  • Vulnerabilities and Threats in Distributed Systems
  • A TNATS Approach to Hidden Web Documents
  • Querying XML Documents from a Relational Database in the Presence of DTDs
  • SAQI: Semantics Aware Query Interface
  • Hybrid-Chord: A Peer-to-Peer System Based on Chord
  • A Generic and Flexible Model for Replica Consistency Management
  • An Efficient Distributed Scheme for Source Routing Protocol in Communication Networks
  • The Roles of Ontology and Metadata Registry for Interoperable Databases
  • DHL: Semantically Rich Dynamic and Active Hyperlinks
  • User-Class Based Service Acceptance Policy Using Cluster Analysis
  • SOFTWARE ENGINEERING
  • Tools and Techniques for Multi-site Software Development
  • Specifying a Mobile Computing Infrastructure and Services
  • Generating a Prototype from a UML Model of System Requirements
  • A Type System for an Aspect Oriented Programming Language
  • Secure Requirements Elicitation Through Triggered Message Sequence Charts
  • Framework for Safe Reuse of Software Binaries
  • Supporting Partial Component Matching
  • A Novel Approach for Dynamic Slicing of Distributed Object-Oriented Programs
  • Pattern Semantic Link: A Reusable Pattern Representation in MDA Context
  • Compatibility Test and Adapter Generation for Interfaces of Software Components
  • A Modern Graphic Flowchart Layout Tool
  • SYSTEMS SECURITY
  • A Flexible Authorization Framework for E-Commerce
  • Efficient Algorithms for Intrusion Detection
  • Proxi-Annotated Control Flow Graphs: Deterministic Context-Sensitive Monitoring for Intrusion Detection
  • Using Schemas to Simplify Access Control for XML Documents
  • Automatic Enforcement of Access Control Policies Among Dynamic Coalitions
  • Implementing Consistency Checking in Correlating Attacks
  • LSAD: Lightweight SYN Flooding Attack Detector
  • UGSP: Secure Key Establishment Protocol for Ad-Hoc Networks
  • Tracing Attackers with Deterministic Edge Router Marking (DERM)
  • Distributing Key Updates in Secure Dynamic Groups
  • Succinct and Fast Accessible Data Structures for Database Damage Assessment
  • A Secure Checkpointing Protocol for Survivable Server Design
  • MobiCoin: Digital Cash for M-Commerce
  • Cellular Automata: An Ideal Candidate for a Block Cipher
  • NFD Technique for Efficient and Secured Information Hiding in Low Resolution Images
  • WORKSHOP ON DATAMINING, SECURITY & APPLICATION
  • Improving Feature Selection in Anomaly Intrusion Detection Using Specifications
  • Towards Automatic Learning of Valid Services for Honeypots.