000 09007nam a22005415i 4500
001 978-3-540-32429-4
003 DE-He213
005 20160624101926.0
007 cr nn 008mamaa
008 110115s2005 gw | s |||| 0|eng d
020 _a9783540324294
_9978-3-540-32429-4
024 7 _a10.1007/11604655
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM075000
_2bisacsh
082 0 4 _a004.6
_223
245 1 0 _aDistributed Computing and Internet Technology
_h[electronic resource] :
_bSecond International Conference, ICDCIT 2005, Bhubaneswar, India, December 22-24, 2005. Proceedings /
_cedited by Goutam Chakraborty.
260 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2005.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2005.
300 _aXXII, 610 p. 243 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v3816
505 0 _aPlenary Talk I -- The Distributed Sensor Networks – An Emerging Technology -- Distributed Computing -- Distribute Computing Track Chair’s Message -- Network Protcols -- Efficient Binding Lifetime Determination Schemes in HMIPv6 -- A Fast Search and Advanced Marking Scheme for Network IP Traceback Model -- Design and Performance Evaluation of Token-Based MAC Protocols in WDM Burst Switched Ring Networks -- Routing in Mobile Ad Hoc Network -- Self-stabilizing Energy-Aware Routing Algorithm in Wireless Sensor Network with Limited Mobility -- Position Based Gradient Routing in Mobile Ad Hoc Networks -- Distributed Clustering Algorithm for Finding Virtual Backbone in Ad Hoc Networks -- Merging Clustering Algorithms in Mobile Ad Hoc Networks -- Performance Study and Implementation of Self Organized Routing Algorithm for Mobile Ad Hoc Network Using GloMoSim -- Communication and Coverage in Wireless Networks -- Self-stabilizing Deterministic TDMA for Sensor Networks -- Effect of Mobility on Communication Performance in Overloaded One-Dimensional Cellular Networks -- Distributed Time Slot Assignment in Wireless Ad Hoc Networks for STDMA -- Efficient Algorithm for Placing Base Stations by Avoiding Forbidden Zone -- Secured Communication in Distributed Systems -- Secure Two-Party Context Free Language Recognition -- Autonomous Agent Based Distributed Fault-Tolerant Intrusion Detection System -- Cleaning an Arbitrary Regular Network with Mobile Agents -- Query and Transaction Processing -- Multi-attribute Hashing of Wireless Data for Content-Based Queries -- A Tool for Automated Resource Consumption Profiling of Distributed Transactions -- An Efficient Algorithm for Removing Useless Logged Messages in SBML Protocols -- Theory of Distributed Systems -- Divide and Concur: Employing Chandra and Toueg’s Consensus Algorithm in a Multi-level Setting -- Distributed Multiple Hypothesis Testing in Sensor Networks Under Bandwidth Constraint -- A Scalable Multi-level Distributed System-Level Diagnosis -- Analysis of Interval-Based Global State Detection -- Grid Computing -- A Two-Phase Scheduling Algorithm for Efficient Collective Communications of MPICH-G2 -- Towards an Agent-Based Framework for Monitoring and Tuning Application Performance in Grid Environment -- GDP: A Paradigm for Intertask Communication in Grid Computing Through Distributed Pipes -- Internet Technology -- Internet Technology Track Chair’s Message -- Internet Search and Query -- Rewriting Queries Using View for RDF/RDFS-Based Relational Data Integration -- An Effective Searching Method Using the Example-Based Query -- On Communicating with Agents on the Network -- E-Commerce -- Applying Fuzzy Logic to Recommend Consumer Electronics -- Generic XML Schema Definition (XSD) to GUI Translator -- Off-Line Micro-payment System for Content Sharing in P2P Networks -- Browsing and Analysis of Web Elements -- FlexiRank: An Algorithm Offering Flexibility and Accuracy for Ranking the Web Pages -- Adaptable Web Browsing of Images in Mobile Computing Environment: Experiments and Observations -- An Incremental Document Clustering Algorithm Based on a Hierarchical Agglomerative Approach -- Systems Security -- System Security Track Chair’s Message -- Theory of Secured Systems -- A Game Based Model of Security for Key Predistribution Schemes in Wireless Sensor Network -- E-mail Worm Detection Using the Analysis of Behavior -- Verifiably Encrypted Signature Scheme Without Random Oracles -- Intrusion Detection and Ad Hoc Network Security -- An Improved Intrusion Detection Technique for Mobile Adhoc Networks -- User Revocation in Secure Adhoc Networks -- A Hybrid Method to Intrusion Detection Systems Using HMM -- Secured Systems Techniques -- Enhanced Network Traffic Anomaly Detector -- Statistically Secure Extension of Anti-collusion Code Fingerprinting -- An Improvement of Auto-Correlation Based Video Watermarking Scheme Using Perceptual Masking for Motion -- Validation of Policy Integration Using Alloy -- Plenary Talk II -- Linking Theories of Concurrency by Retraction -- Software Engineering -- Software Engineering Track Chair’s Message -- Software Architecture -- Integrating Architecture Description Languages: A Semantics-Based Approach -- Automated Runtime Validation of Software Architecture Design -- Software Optimization and Reliability -- Analyzing Loop Paths for Execution Time Estimation -- A Technique for Early Software Reliability Prediction -- Formal Methods -- Executable Requirements Specifications Using Triggered Message Sequence Charts -- Efficient Symmetry Reduction for an Actor-Based Model -- Validated Code Generation for Activity Diagrams -- Data Mining -- Data Mining Track Chair’s Message -- Data Clustering Techniques -- An Approach to Find Embedded Clusters Using Density Based Techniques -- Using Sub-sequence Information with kNN for Classification of Sequential Data -- Distance-Based Outliers in Sequences -- Capturing Market Intelligence from Customer Feedback E-mails Using Self-enhancing Bolzmann Machine-Based Network of Knowledge Maps -- Multidimensional Data Mining -- Algorithm for Fuzzy Clustering of Mixed Data with Numeric and Categorical Attributes -- Dissemination of Multidimensional Data Using Broadcast Clusters -- Multidimensional Frequent Pattern Mining Using Association Rule Based Constraints -- A Classification Based Approach for Root Unknown Phylogenetic Networks Under Constrained Recombination -- Erratum -- Using Sub-sequence Information with kNN for Classification of Sequential Data -- Capturing Market Intelligence from Customer Feedback E-mails Using Self-enhancing Boltzmann Machine-Based Network of Knowledge Maps.
520 _aThe opening ceremony and pre-conference tutorials on various related topics were held on December 21. The technical program started on December 22 and continued for three days. The program was arranged in single track so as to enable participants to attend sessions of di?erent tracks. Papers from the DM, IT, SE, and SS tracks were divided into two sessions, whereas DC track sessions were held on the ?rst two days of the conference. The program also included two plenary talks. The ?rst talk was delivered by S. S. Iyengar from Louisiana State University, USA. The second talk was delivered by He Jifeng from the International Institute for Software Technology (IIST) Macau. Prof. Iyenger’s talk on “The Distributed Sensor Networks — An Emerging Technology” was focused on new ideas about the use of distributed systems for emerging technology, while Prof. Jifeng’s talk on “Linking Theories of Concurrency by Retraction” dealt with semantics of concurrency. All the conference committee members contributed towards the success of ICDCIT 2005. And it was a pleasant experience for me to work with them. The one name that sticks out is R. K. Ghosh, Steering Committee Chair. He really steered the group with his past experience as Program Chair of ICDCIT 2004.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 0 _aSoftware engineering.
650 0 _aComputer software.
650 1 4 _aComputer Science.
650 2 4 _aComputer Communication Networks.
650 2 4 _aCommunication Studies.
650 2 4 _aProgramming Techniques.
650 2 4 _aSoftware Engineering.
650 2 4 _aAlgorithm Analysis and Problem Complexity.
650 2 4 _aInformation Systems Applications (incl. Internet).
700 1 _aChakraborty, Goutam.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783540309994
786 _dSpringer
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v3816
856 4 0 _uhttp://dx.doi.org/10.1007/11604655
942 _2EBK3977
_cEBK
999 _c33271
_d33271