Cantitate/Preț
Produs

Distributed Computing and Internet Technology: First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004, Proceedings: Lecture Notes in Computer Science, cartea 3347

Editat de R.K. Ghosh, Hrushikesha Mohanty
en Limba Engleză Paperback – 7 dec 2004

Din seria Lecture Notes in Computer Science

Preț: 34228 lei

Preț vechi: 42785 lei
-20% Nou

Puncte Express: 513

Preț estimativ în valută:
6550 6813$ 5408£

Carte tipărită la comandă

Livrare economică 14-28 aprilie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783540240754
ISBN-10: 3540240756
Pagini: 492
Ilustrații: XX, 474 p.
Dimensiuni: 155 x 235 x 26 mm
Greutate: 0.69 kg
Ediția:2005
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Plenary Talk – I.- Taming the Dynamics of Disributed Data.- DISTRIBUTED COMPUTING.- Data in Your Space.- Enabling Technologies for Harnessing Information Explosion.- Fair Leader Election by Randomized Voting.- An Efficient Leader Election Algorithm for Mobile Ad Hoc Networks.- Distributed Balanced Tables: A New Approach.- Performance Evaluation of Gigabit Ethernet and SCI in a Linux Cluster.- Performance Evaluation of a Modified-Cyclic-Banyan Based ATM / IP Switching Fabric.- A Scalable and Robust QoS Architecture for WiFi P2P Networks.- NEC: Node Energy Based Clustering Protocol for Wireless Sensor Networks with Guaranteed Connectivity.- Energy Efficient Cache Invalidation in a Disconnected Mobile Environment.- An Efficient Data Dissemination Schemes for Location Dependent Information Services.- A Publish / Subscribe Based Architecture of an Alert Server to Support Prioritized and Persistent Alerts.- A Nested Transaction Model for LDAP Transactions.- Team Transaction: A New Transaction Model for Mobile Ad Hoc Networks.- An Efficient Protocol for Checkpoint-Based Failure Recovery in Distributed Systems.- Cybersecurity: Opportunities and Challenges.- INTERNET TECHNOLOGY.- Vulnerabilities and Threats in Distributed Systems.- A TNATS Approach to Hidden Web Documents.- Querying XML Documents from a Relational Database in the Presence of DTDs.- SAQI: Semantics Aware Query Interface.- Hybrid-Chord: A Peer-to-Peer System Based on Chord.- A Generic and Flexible Model for Replica Consistency Management.- An Efficient Distributed Scheme for Source Routing Protocol in Communication Networks.- The Roles of Ontology and Metadata Registry for Interoperable Databases.- DHL: Semantically Rich Dynamic and Active Hyperlinks.- User-Class Based Service Acceptance Policy Using ClusterAnalysis.- SOFTWARE ENGINEERING.- Tools and Techniques for Multi-site Software Development.- Specifying a Mobile Computing Infrastructure and Services.- Generating a Prototype from a UML Model of System Requirements.- A Type System for an Aspect Oriented Programming Language.- Secure Requirements Elicitation Through Triggered Message Sequence Charts.- Framework for Safe Reuse of Software Binaries.- Supporting Partial Component Matching.- A Novel Approach for Dynamic Slicing of Distributed Object-Oriented Programs.- Pattern Semantic Link: A Reusable Pattern Representation in MDA Context.- Compatibility Test and Adapter Generation for Interfaces of Software Components.- A Modern Graphic Flowchart Layout Tool.- SYSTEMS SECURITY.- A Flexible Authorization Framework for E-Commerce.- Efficient Algorithms for Intrusion Detection.- Proxi-Annotated Control Flow Graphs: Deterministic Context-Sensitive Monitoring for Intrusion Detection.- Using Schemas to Simplify Access Control for XML Documents.- Automatic Enforcement of Access Control Policies Among Dynamic Coalitions.- Implementing Consistency Checking in Correlating Attacks.- LSAD: Lightweight SYN Flooding Attack Detector.- UGSP: Secure Key Establishment Protocol for Ad-Hoc Networks.- Tracing Attackers with Deterministic Edge Router Marking (DERM).- Distributing Key Updates in Secure Dynamic Groups.- Succinct and Fast Accessible Data Structures for Database Damage Assessment.- A Secure Checkpointing Protocol for Survivable Server Design.- MobiCoin: Digital Cash for M-Commerce.- Cellular Automata: An Ideal Candidate for a Block Cipher.- NFD Technique for Efficient and Secured Information Hiding in Low Resolution Images.- WORKSHOP ON DATAMINING, SECURITY & APPLICATION.- Improving Feature Selection in Anomaly Intrusion Detection Using Specifications.- Towards Automatic Learning of Valid Services for Honeypots.