Distributed Computing and Internet Technology First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004, Proceedings /
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2005.
|
Edición: | 1st ed. 2005. |
Colección: | Lecture Notes in Computer Science,
3347 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Plenary Talk - I
- Taming the Dynamics of Disributed Data
- DISTRIBUTED COMPUTING
- Data in Your Space
- Enabling Technologies for Harnessing Information Explosion
- Fair Leader Election by Randomized Voting
- An Efficient Leader Election Algorithm for Mobile Ad Hoc Networks
- Distributed Balanced Tables: A New Approach
- Performance Evaluation of Gigabit Ethernet and SCI in a Linux Cluster
- Performance Evaluation of a Modified-Cyclic-Banyan Based ATM / IP Switching Fabric
- A Scalable and Robust QoS Architecture for WiFi P2P Networks
- NEC: Node Energy Based Clustering Protocol for Wireless Sensor Networks with Guaranteed Connectivity
- Energy Efficient Cache Invalidation in a Disconnected Mobile Environment
- An Efficient Data Dissemination Schemes for Location Dependent Information Services
- A Publish / Subscribe Based Architecture of an Alert Server to Support Prioritized and Persistent Alerts
- A Nested Transaction Model for LDAP Transactions
- Team Transaction: A New Transaction Model for Mobile Ad Hoc Networks
- An Efficient Protocol for Checkpoint-Based Failure Recovery in Distributed Systems
- Cybersecurity: Opportunities and Challenges
- INTERNET TECHNOLOGY
- Vulnerabilities and Threats in Distributed Systems
- A TNATS Approach to Hidden Web Documents
- Querying XML Documents from a Relational Database in the Presence of DTDs
- SAQI: Semantics Aware Query Interface
- Hybrid-Chord: A Peer-to-Peer System Based on Chord
- A Generic and Flexible Model for Replica Consistency Management
- An Efficient Distributed Scheme for Source Routing Protocol in Communication Networks
- The Roles of Ontology and Metadata Registry for Interoperable Databases
- DHL: Semantically Rich Dynamic and Active Hyperlinks
- User-Class Based Service Acceptance Policy Using Cluster Analysis
- SOFTWARE ENGINEERING
- Tools and Techniques for Multi-site Software Development
- Specifying a Mobile Computing Infrastructure and Services
- Generating a Prototype from a UML Model of System Requirements
- A Type System for an Aspect Oriented Programming Language
- Secure Requirements Elicitation Through Triggered Message Sequence Charts
- Framework for Safe Reuse of Software Binaries
- Supporting Partial Component Matching
- A Novel Approach for Dynamic Slicing of Distributed Object-Oriented Programs
- Pattern Semantic Link: A Reusable Pattern Representation in MDA Context
- Compatibility Test and Adapter Generation for Interfaces of Software Components
- A Modern Graphic Flowchart Layout Tool
- SYSTEMS SECURITY
- A Flexible Authorization Framework for E-Commerce
- Efficient Algorithms for Intrusion Detection
- Proxi-Annotated Control Flow Graphs: Deterministic Context-Sensitive Monitoring for Intrusion Detection
- Using Schemas to Simplify Access Control for XML Documents
- Automatic Enforcement of Access Control Policies Among Dynamic Coalitions
- Implementing Consistency Checking in Correlating Attacks
- LSAD: Lightweight SYN Flooding Attack Detector
- UGSP: Secure Key Establishment Protocol for Ad-Hoc Networks
- Tracing Attackers with Deterministic Edge Router Marking (DERM)
- Distributing Key Updates in Secure Dynamic Groups
- Succinct and Fast Accessible Data Structures for Database Damage Assessment
- A Secure Checkpointing Protocol for Survivable Server Design
- MobiCoin: Digital Cash for M-Commerce
- Cellular Automata: An Ideal Candidate for a Block Cipher
- NFD Technique for Efficient and Secured Information Hiding in Low Resolution Images
- WORKSHOP ON DATAMINING, SECURITY & APPLICATION
- Improving Feature Selection in Anomaly Intrusion Detection Using Specifications
- Towards Automatic Learning of Valid Services for Honeypots.