000 | 05688nam a22006015i 4500 | ||
---|---|---|---|
001 | 978-3-540-68380-3 | ||
003 | DE-He213 | ||
005 | 20160624102048.0 | ||
007 | cr nn 008mamaa | ||
008 | 100301s2006 gw | s |||| 0|eng d | ||
020 |
_a9783540683803 _9978-3-540-68380-3 |
||
024 | 7 |
_a10.1007/11951957 _2doi |
|
050 | 4 | _aQA76.6-76.66 | |
072 | 7 |
_aUM _2bicssc |
|
072 | 7 |
_aCOM051000 _2bisacsh |
|
082 | 0 | 4 |
_a005.11 _223 |
245 | 1 | 0 |
_aDistributed Computing and Internet Technology _h[electronic resource] : _bThird International Conference, ICDCIT 2006, Bhubaneswar, India, December 20-23, 2006. Proceedings / _cedited by Sanjay K. Madria, Kajal T. Claypool, Rajgopal Kannan, Prem Uppuluri, Manoj Madhava Gore. |
260 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2006. |
|
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2006. |
|
300 |
_aXX, 468 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v4317 |
|
505 | 0 | _aThe Role of Programming Languages in Future Data-Centric and Net-Centric Applications -- The Role of Programming Languages in Future Data-Centric and Net-Centric Applications -- Wireless Sensor Network I – Routing and Power Control -- Net-Centric Computing: The Future of Computers and Networking -- Optimisation Problems Based on the Maximal Breach Path Measure for Wireless Sensor Network Coverage -- Energy-Aware Improved Directed Diffusion Algorithm for Area Event Monitoring in Wireless Sensor Network -- Distributed Node-Based Transmission Power Control for Wireless Ad Hoc Networks -- Wireless Sensor Network II – Localization and Coverage -- Ticket-Based Binding Update Protocol for Mobile IPv6 -- Data Rate Adaptive Route Optimization for Sink Mobility Support in Wireless Sensor Networks -- Localization Control to Locate Mobile Sensors -- Static and Dynamic Allocation Algorithms in Mesh Structured Networks -- Mobile AdHoc Networks - Security and Reliability -- A Key Management Scheme with Encoding and Improved Security for Wireless Sensor Networks -- Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks -- Anonymous Agreed Order Multicast: Performance and Free Riding -- On Reliability Analysis of Forward Loop Forward Hop Networks -- Quality of Service I -- A Dynamic Paging Scheme for Minimizing Signaling Costs in Hierarchical Mobile IPv6 Networks -- QoS-Aware Routing Based on Local Information for Mobile Ad Hoc Networks -- Kalman Filter Based H.264 Motion Vector Recovery for Error Resilient Video Service over Mobile GRID -- Quality of Service II -- Throughput and Delay Analysis Considering Packet Arrival in IEEE 802.11 -- A Routing Optimization Algorithm for BGP Egress Selection -- Enhanced OTIS k-Ary n-Cube Networks -- Multimedia Traffic Distribution Using Capacitated Multicast Tree -- Grid and Distributed Computing -- Application-Level Checkpointing Techniques for Parallel Programs -- A Generalized Linear Programming Based Approach to Optimal Divisible Load Scheduling -- Improving the Deployability of Existing Windows-Based Client/Server Business Information Systems Using ActiveX -- Web Services and E-Commerce -- An Automatic Approach to Displaying Web Applications as Portlets -- Allocating QOS-Constrained Applications in a Web Service-Oriented Grid -- Multicontext-Aware Recommendation for Ubiquitous Commerce -- An Improved E-Commerce Protocol for Fair Exchange -- Requirements-Driven Modeling of the Web Service Execution and Adaptation Lifecycle -- Modified Raymond’s Algorithm for Priority (MRA-P) Based Mutual Exclusion in Distributed Systems -- Efficient Remote User Authentication and Key Establishment for Multi-server Environment -- Web Databases -- Materialized View Tuning Mechanism and Usability Enhancement -- Research into Verifying Semistructured Data -- An Empirical Study on a Web Server Queueing System and Traffic Generation by Simulation -- Dynamic Primary Copy with Piggy-Backing Mechanism for Replicated UDDI Registry -- Data Mining -- Mining Images of Material Nanostructure Data -- Mining Sequential Support Affinity Patterns with Weight Constraints -- Lossless Data Hiding for High Embedding Capacity -- Spatio-temporal Databases -- Extension of R-Tree for Spatio-temporal OLAP Operations -- Multimedia Data Hiding in Spatial and Transformed Domain -- Indexing and Retrieval of Document Images by Spatial Reasoning. | |
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer Communication Networks. | |
650 | 0 | _aSoftware engineering. | |
650 | 0 | _aComputer software. | |
650 | 0 | _aData mining. | |
650 | 0 | _aInformation systems. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aProgramming Techniques. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aSoftware Engineering. |
650 | 2 | 4 | _aAlgorithm Analysis and Problem Complexity. |
650 | 2 | 4 | _aInformation Systems Applications (incl.Internet). |
650 | 2 | 4 | _aData Mining and Knowledge Discovery. |
700 | 1 |
_aMadria, Sanjay K. _eeditor. |
|
700 | 1 |
_aClaypool, Kajal T. _eeditor. |
|
700 | 1 |
_aKannan, Rajgopal. _eeditor. |
|
700 | 1 |
_aUppuluri, Prem. _eeditor. |
|
700 | 1 |
_aGore, Manoj Madhava. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783540683797 |
786 | _dSpringer | ||
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v4317 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/11951957 |
942 |
_2EBK6975 _cEBK |
||
999 |
_c36269 _d36269 |