My Account Log in

1 option

Distributed Computing -- IWDC 2004 : 6th International Workshop, Kolkata, India, December 27-30, 2004, Proceedings / edited by Nabanita Das, Arunabha Sen, Sajal K. Das, Bhabani P. Sinha.

LIBRA Q341 .P7 2004
Loading location information...

Available from offsite location This item is stored in our repository but can be checked out.

Log in to request item
Format:
Book
Contributor:
Das, Nabanita, editor.
Sen, Arunabha, editor.
Das, Sajal K., editor.
Sinha, Bhabani P., 1952- editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
Lecture notes in computer science 0302-9743 ; 3326.
Lecture Notes in Computer Science, 0302-9743 ; 3326
Language:
English
Subjects (All):
Computer engineering.
Computers.
Computer networks.
Computer programming.
Software engineering.
Operating systems (Computers).
Computer Engineering.
Theory of Computation.
Computer Communication Networks.
Programming Techniques.
Software Engineering.
Operating Systems.
Local Subjects:
Computer Engineering.
Theory of Computation.
Computer Communication Networks.
Programming Techniques.
Software Engineering.
Operating Systems.
Physical Description:
1 online resource (XIX, 546 pages).
Edition:
First edition 2005.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2005.
System Details:
text file PDF
Summary:
Last, but not least, thanks to all the participants and authors. We hope that they enjoyed the workshop as much as the wonderful and culturally vibrant city of Kolkata! Bhabani P. Sinha Indian Statistical Institute, Kolkata, India December 2004 Sajal K. Das University of Texas, Arlington, USA December 2004 Program Chairs' Message On behalf of the Technical Program Committee of the 6th International Wo- shop on Distributed Computing, IWDC 2004, it was our great pleasure to w- come the attendees to Kolkata, India. Over the last few years, IWDC has emerged as an internationally renowned forum for interaction among researchers from academia and industries around the world. A clear indicator of this fact is the large number of high-quality submissions of technical papers received by the workshop this year. The workshop program consisted of 12 technical sessions with 54 contributed papers, two keynote addresses, four tutorials, a panel, a poster session and the Prof.A.K.ChoudhuryMemorialLecture.TheIWDCProgramCommittee,c- prising 38 distinguished members, worked hard to organize the technical p- gram. Following a rigorous review process, out of 157 submissions only 54 - pers were accepted for presentation in the technical sessions; 27 of the accepted papers were classi?ed as regular papers and the remaining 27 as short papers. Another 11 papers were accepted for presentation in the poster session, each with a one-page abstract appearing in the proceedings.
Contents:
Keynote Talk I
The Next Chapter in Networking Research: Evolutionary or Revolutionary?
Session I A: Distributed Algorithms
Performance of Fair Distributed Mutual Exclusion Algorithms
A Framework for Automatic Identification of the Best Checkpoint and Recovery Protocol
Distributed Computation for Swapping a Failing Edge
Flexible Cycle Synchronized Algorithm in Parallel and Distributed Simulation
Rule Mining for Dynamic Databases
Session I B: High Performance Computing
APPLE: A Novel P2P Based e-Learning Environment
Heuristic-Based Scheduling to Maximize Throughput of Data-Intensive Grid Applications
Failure Recovery in Grid Database Systems
On Design of Cluster and Grid Computing Environment Toolkit for Bioinformatics Applications
Study of Scheduling Strategies in a Dynamic Data Grid Environment
Virtual Molecular Computing - Emulating DNA Molecules
Session II A: Distributed Systems
Complexity of Compositional Model Checking of Computation Tree Logic on Simple Structures
A Multi-agent Framework Based on Communication and Concurrency
Statistical Analysis of a P2P Query Graph Based on Degrees and Their Time-Evolution
t-UNITY - A Formal Framework for Modeling and Reasoning About Timing Constraints in Real-Time Systems
Finding Pareto-Optimal Set of Distributed Vectors with Minimum Disclosure
Lean-DFS: A Distributed Filesystem for Resource Starved Clients
Session II B: Wireless Networks
A Fair Medium Access Protocol Using Adaptive Flow-Rate Control Through Cooperative Negotiation Among Contending Flows in Ad Hoc Wireless Network with Directional Antenna
Analytical-Numerical Study of Mobile IPv6 and Hierarchical Mobile IPv6
An Adaptive Transmission Power Control Protocol for Mobile Ad Hoc Networks
A Macro-Mobility Scheme for Reduction in Handover Delay and Signaling Traffic in MIPv6
QoS Support in TLMM: Three Level Mobility Model for IP-Based Networks
Path Stability Based Adaptation of MANET Routing Protocols
A. K. Choudhury Memorial Lecture
Computational Biology - The New Frontier of Computer Science
Session III A: Information Security
Cryptanalysis of "Wavelet Tree Quantization" Watermarking Scheme
A Multisignature Scheme for Implementing Safe Delivery Rule in Group Communication Systems
Agent-Based Distributed Intrusion Alert System
SCIDS: A Soft Computing Intrusion Detection System
Effect of Data Encryption on Wireless Ad Hoc Network Performance
Session III B: Network Protocols
On-Board RSVP: An Extension of RSVP to Support Real-Time Services in On-Board IP Networks
A Secure PIM-SM Multicast Routing Protocol
Restoration of Virtual Private Networks with QoS Guarantees in the Pipe Model
A User Level, Reliable, and Reconfigurable Transport Layer Protocol
Keynote Talk II
The Notion of Veto Number for Distributed Agreement Problems
Session IV A: Reliability and Testing
Reliability of VLSI Linear Arrays with Redundant Links
A Technique to Ensure Reliability in a WDM Optical Backbone Network with Contemporary Link Failures
Formal Proof of Impossibility of Reliability in Crashing Protocols
Altera Max Plus II Development Environment in Fault Simulation and Test Implementation of Embedded
Session IV B: Networks: Topology and Routing
A Distributed Contention Resolution Scheme to Reduce Blocking Probability in Optical Burst Switching Networks
Polynomial Interpolation on OTIS-Mesh Optoelectronic Computers
A New Network Topology with Multiple Three-Dimensional Meshes
Adaptive Fault Tolerant Routing in Star Graph
Routing and Wavelength Assignment in Wavelength Division Multiplexing Networks
Session V: Mobile Computing I
Designing the MDVM-Stub and Memory Estimator
Improved Algorithm for Minimum Cost Range Assignment Problem for Linear Radio Networks
Optimal Schemes for Channel Assignment Problem in Wireless Networks Modeled as 2-Dimensional Square Grids
Session VI: Ad Hoc Networks
Mobility Tolerant Broadcast in Mobile Ad Hoc Networks
Distributed Mobility Tracking for Ad Hoc Networks Based on an Autoregressive Model
Broadcast and Gossiping Algorithms for Mobile Ad Hoc Networks Based on Breadth-First Traversal
RINGS: Lookup Service for Peer-to-Peer Systems in Mobile Ad-Hoc Networks
Session VII: Mobile Computing II
Performance Analysis of Location Caching with Fixed Local Anchor in Wireless Networks
On the Optimization Trade-Offs of Expanding Ring Search
Dynamic Location Management with Personalized Location Area for Future PCS Networks
Improvement of Paging Cost by Updating Using Paging Delay Divergence
Session VIII: Sensor Networks
Distributed Power Control in Sensor Networks: A Game Theoretic Approach
A K-Connected Energy-Saving Topology Control Algorithm for Wireless Sensor Networks
Locating Objects in a Sensor Grid
Poster Presentations
A Novel Remote User Authentication Scheme Through Dynamic Login Identity
A Probabilistic Admission Control Algorithm in Wireless/Mobile Cellular Networks
A Rough Neuro Data Mining Approach for Network Intrusion Detection
An Efficient Implementation of Distance-Based Update Scheme Using Directional Cell Identification Codes
Application of Formal Methods for Analysis of Authentication Protocols
BUSTRAP - An Efficient Travel Planner for Metropolitans
Distributed Evolutionary Algorithm Search for Multiobjective Spanning Tree Problem
MSIP: A Protocol for Efficient Handoffs of Real Time Multimedia Sessions in Mobile Wireless Scenarios
Network Management System Using Web Server Controlled Mobile Agents
Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks
High-Level Grid Execution Patterns.
Other Format:
Printed edition:
ISBN:
978-3-540-30536-1
9783540305361
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

We want your feedback!

Thanks for using the Penn Libraries new search tool. We encourage you to submit feedback as we continue to improve the site.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account