Distributed Computing -- IWDC 2004
Springer Berlin (Verlag)
978-3-540-24076-1 (ISBN)
Keynote Talk I.- The Next Chapter in Networking Research: Evolutionary or Revolutionary?.- Session I A: Distributed Algorithms.- Performance of Fair Distributed Mutual Exclusion Algorithms.- A Framework for Automatic Identification of the Best Checkpoint and Recovery Protocol.- Distributed Computation for Swapping a Failing Edge.- Flexible Cycle Synchronized Algorithm in Parallel and Distributed Simulation.- Rule Mining for Dynamic Databases.- Session I B: High Performance Computing.- APPLE: A Novel P2P Based e-Learning Environment.- Heuristic-Based Scheduling to Maximize Throughput of Data-Intensive Grid Applications.- Failure Recovery in Grid Database Systems.- On Design of Cluster and Grid Computing Environment Toolkit for Bioinformatics Applications.- Study of Scheduling Strategies in a Dynamic Data Grid Environment.- Virtual Molecular Computing - Emulating DNA Molecules.- Session II A: Distributed Systems.- Complexity of Compositional Model Checking of Computation Tree Logic on Simple Structures.- A Multi-agent Framework Based on Communication and Concurrency.- Statistical Analysis of a P2P Query Graph Based on Degrees and Their Time-Evolution.- t-UNITY - A Formal Framework for Modeling and Reasoning About Timing Constraints in Real-Time Systems.- Finding Pareto-Optimal Set of Distributed Vectors with Minimum Disclosure.- Lean-DFS: A Distributed Filesystem for Resource Starved Clients.- Session II B: Wireless Networks.- A Fair Medium Access Protocol Using Adaptive Flow-Rate Control Through Cooperative Negotiation Among Contending Flows in Ad Hoc Wireless Network with Directional Antenna.- Analytical-Numerical Study of Mobile IPv6 and Hierarchical Mobile IPv6.- An Adaptive Transmission Power Control Protocol for Mobile Ad Hoc Networks.- A Macro-Mobility Schemefor Reduction in Handover Delay and Signaling Traffic in MIPv6.- QoS Support in TLMM: Three Level Mobility Model for IP-Based Networks.- Path Stability Based Adaptation of MANET Routing Protocols.- A. K. Choudhury Memorial Lecture.- Computational Biology - The New Frontier of Computer Science.- Session III A: Information Security.- Cryptanalysis of "Wavelet Tree Quantization" Watermarking Scheme.- A Multisignature Scheme for Implementing Safe Delivery Rule in Group Communication Systems.- Agent-Based Distributed Intrusion Alert System.- SCIDS: A Soft Computing Intrusion Detection System.- Effect of Data Encryption on Wireless Ad Hoc Network Performance.- Session III B: Network Protocols.- On-Board RSVP: An Extension of RSVP to Support Real-Time Services in On-Board IP Networks.- A Secure PIM-SM Multicast Routing Protocol.- Restoration of Virtual Private Networks with QoS Guarantees in the Pipe Model.- A User Level, Reliable, and Reconfigurable Transport Layer Protocol.- Keynote Talk II.- The Notion of Veto Number for Distributed Agreement Problems.- Session IV A: Reliability and Testing.- Reliability of VLSI Linear Arrays with Redundant Links.- A Technique to Ensure Reliability in a WDM Optical Backbone Network with Contemporary Link Failures.- Formal Proof of Impossibility of Reliability in Crashing Protocols.- Altera Max Plus II Development Environment in Fault Simulation and Test Implementation of Embedded.- Session IV B: Networks: Topology and Routing.- A Distributed Contention Resolution Scheme to Reduce Blocking Probability in Optical Burst Switching Networks.- Polynomial Interpolation on OTIS-Mesh Optoelectronic Computers.- A New Network Topology with Multiple Three-Dimensional Meshes.- Adaptive Fault Tolerant Routing in Star Graph.- Routing and WavelengthAssignment in Wavelength Division Multiplexing Networks.- Session V: Mobile Computing I.- Designing the MDVM-Stub and Memory Estimator.- Improved Algorithm for Minimum Cost Range Assignment Problem for Linear Radio Networks.- Optimal Schemes for Channel Assignment Problem in Wireless Networks Modeled as 2-Dimensional Square Grids.- Session VI: Ad Hoc Networks.- Mobility Tolerant Broadcast in Mobile Ad Hoc Networks.- Distributed Mobility Tracking for Ad Hoc Networks Based on an Autoregressive Model.- Broadcast and Gossiping Algorithms for Mobile Ad Hoc Networks Based on Breadth-First Traversal.- RINGS: Lookup Service for Peer-to-Peer Systems in Mobile Ad-Hoc Networks.- Session VII: Mobile Computing II.- Performance Analysis of Location Caching with Fixed Local Anchor in Wireless Networks.- On the Optimization Trade-Offs of Expanding Ring Search.- Dynamic Location Management with Personalized Location Area for Future PCS Networks.- Improvement of Paging Cost by Updating Using Paging Delay Divergence.- Session VIII: Sensor Networks.- Distributed Power Control in Sensor Networks: A Game Theoretic Approach.- A K-Connected Energy-Saving Topology Control Algorithm for Wireless Sensor Networks.- Locating Objects in a Sensor Grid.- Poster Presentations.- A Novel Remote User Authentication Scheme Through Dynamic Login Identity.- A Probabilistic Admission Control Algorithm in Wireless/Mobile Cellular Networks.- A Rough Neuro Data Mining Approach for Network Intrusion Detection.- An Efficient Implementation of Distance-Based Update Scheme Using Directional Cell Identification Codes.- Application of Formal Methods for Analysis of Authentication Protocols.- BUSTRAP - An Efficient Travel Planner for Metropolitans.- Distributed Evolutionary Algorithm Search for MultiobjectiveSpanning Tree Problem.- MSIP: A Protocol for Efficient Handoffs of Real Time Multimedia Sessions in Mobile Wireless Scenarios.- Network Management System Using Web Server Controlled Mobile Agents.- Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks.- High-Level Grid Execution Patterns.
Erscheint lt. Verlag | 16.12.2004 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XIX, 546 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 840 g |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Mathematik / Informatik ► Informatik ► Theorie / Studium | |
Informatik ► Weitere Themen ► Hardware | |
Schlagworte | algorithm • algorithms • Communication Protocols • Data Security • distributed algorithms • Distributed Computing • Distributed Systems • mobile computing • mobile networks • Network Security • Peer-to-Peer Systems • Routing • security • sensor networks • ubiquitous computing • Web-based computing • wireless networks |
ISBN-10 | 3-540-24076-4 / 3540240764 |
ISBN-13 | 978-3-540-24076-1 / 9783540240761 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich