Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Distributed Computing -- IWDC 2004 -

Distributed Computing -- IWDC 2004

6th International Workshop, Kolkata, India, December 27-30, 2004, Proceedings
Buch | Softcover
XIX, 546 Seiten
2004
Springer Berlin (Verlag)
9783540240761 (ISBN)
CHF 74,85 inkl. MwSt
Last, but not least, thanks to all the participants and authors. We hope that they enjoyed the workshop as much as the wonderful and culturally vibrant city of Kolkata! Bhabani P. Sinha Indian Statistical Institute, Kolkata, India December 2004 Sajal K. Das University of Texas, Arlington, USA December 2004 Program Chairs' Message On behalf of the Technical Program Committee of the 6th International Wo- shop on Distributed Computing, IWDC 2004, it was our great pleasure to w- come the attendees to Kolkata, India. Over the last few years, IWDC has emerged as an internationally renowned forum for interaction among researchers from academia and industries around the world. A clear indicator of this fact is the large number of high-quality submissions of technical papers received by the workshop this year. The workshop program consisted of 12 technical sessions with 54 contributed papers, two keynote addresses, four tutorials, a panel, a poster session and the Prof.A.K.ChoudhuryMemorialLecture.TheIWDCProgramCommittee,c- prising 38 distinguished members, worked hard to organize the technical p- gram. Following a rigorous review process, out of 157 submissions only 54 - pers were accepted for presentation in the technical sessions; 27 of the accepted papers were classi?ed as regular papers and the remaining 27 as short papers. Another 11 papers were accepted for presentation in the poster session, each with a one-page abstract appearing in the proceedings.

Keynote Talk I.- The Next Chapter in Networking Research: Evolutionary or Revolutionary?.- Session I A: Distributed Algorithms.- Performance of Fair Distributed Mutual Exclusion Algorithms.- A Framework for Automatic Identification of the Best Checkpoint and Recovery Protocol.- Distributed Computation for Swapping a Failing Edge.- Flexible Cycle Synchronized Algorithm in Parallel and Distributed Simulation.- Rule Mining for Dynamic Databases.- Session I B: High Performance Computing.- APPLE: A Novel P2P Based e-Learning Environment.- Heuristic-Based Scheduling to Maximize Throughput of Data-Intensive Grid Applications.- Failure Recovery in Grid Database Systems.- On Design of Cluster and Grid Computing Environment Toolkit for Bioinformatics Applications.- Study of Scheduling Strategies in a Dynamic Data Grid Environment.- Virtual Molecular Computing - Emulating DNA Molecules.- Session II A: Distributed Systems.- Complexity of Compositional Model Checking of Computation Tree Logic on Simple Structures.- A Multi-agent Framework Based on Communication and Concurrency.- Statistical Analysis of a P2P Query Graph Based on Degrees and Their Time-Evolution.- t-UNITY - A Formal Framework for Modeling and Reasoning About Timing Constraints in Real-Time Systems.- Finding Pareto-Optimal Set of Distributed Vectors with Minimum Disclosure.- Lean-DFS: A Distributed Filesystem for Resource Starved Clients.- Session II B: Wireless Networks.- A Fair Medium Access Protocol Using Adaptive Flow-Rate Control Through Cooperative Negotiation Among Contending Flows in Ad Hoc Wireless Network with Directional Antenna.- Analytical-Numerical Study of Mobile IPv6 and Hierarchical Mobile IPv6.- An Adaptive Transmission Power Control Protocol for Mobile Ad Hoc Networks.- A Macro-Mobility Schemefor Reduction in Handover Delay and Signaling Traffic in MIPv6.- QoS Support in TLMM: Three Level Mobility Model for IP-Based Networks.- Path Stability Based Adaptation of MANET Routing Protocols.- A. K. Choudhury Memorial Lecture.- Computational Biology - The New Frontier of Computer Science.- Session III A: Information Security.- Cryptanalysis of "Wavelet Tree Quantization" Watermarking Scheme.- A Multisignature Scheme for Implementing Safe Delivery Rule in Group Communication Systems.- Agent-Based Distributed Intrusion Alert System.- SCIDS: A Soft Computing Intrusion Detection System.- Effect of Data Encryption on Wireless Ad Hoc Network Performance.- Session III B: Network Protocols.- On-Board RSVP: An Extension of RSVP to Support Real-Time Services in On-Board IP Networks.- A Secure PIM-SM Multicast Routing Protocol.- Restoration of Virtual Private Networks with QoS Guarantees in the Pipe Model.- A User Level, Reliable, and Reconfigurable Transport Layer Protocol.- Keynote Talk II.- The Notion of Veto Number for Distributed Agreement Problems.- Session IV A: Reliability and Testing.- Reliability of VLSI Linear Arrays with Redundant Links.- A Technique to Ensure Reliability in a WDM Optical Backbone Network with Contemporary Link Failures.- Formal Proof of Impossibility of Reliability in Crashing Protocols.- Altera Max Plus II Development Environment in Fault Simulation and Test Implementation of Embedded.- Session IV B: Networks: Topology and Routing.- A Distributed Contention Resolution Scheme to Reduce Blocking Probability in Optical Burst Switching Networks.- Polynomial Interpolation on OTIS-Mesh Optoelectronic Computers.- A New Network Topology with Multiple Three-Dimensional Meshes.- Adaptive Fault Tolerant Routing in Star Graph.- Routing and WavelengthAssignment in Wavelength Division Multiplexing Networks.- Session V: Mobile Computing I.- Designing the MDVM-Stub and Memory Estimator.- Improved Algorithm for Minimum Cost Range Assignment Problem for Linear Radio Networks.- Optimal Schemes for Channel Assignment Problem in Wireless Networks Modeled as 2-Dimensional Square Grids.- Session VI: Ad Hoc Networks.- Mobility Tolerant Broadcast in Mobile Ad Hoc Netw

Erscheint lt. Verlag 16.12.2004
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo XIX, 546 p.
Verlagsort Berlin
Sprache englisch
Maße 155 x 235 mm
Gewicht 840 g
Themenwelt Mathematik / Informatik Informatik Netzwerke
Mathematik / Informatik Informatik Theorie / Studium
Informatik Weitere Themen Hardware
Schlagworte algorithm • algorithms • Communication Protocols • Data Security • distributed algorithms • Distributed Computing • Distributed Systems • mobile computing • mobile networks • Network Security • Peer-to-Peer Systems • Routing • security • sensor networks • ubiquitous computing • Web-based computing • wireless networks
ISBN-13 9783540240761 / 9783540240761
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
ein Streifzug durch das Innenleben eines Computers

von Jürgen Nehmer

Buch | Softcover (2023)
Springer (Verlag)
CHF 39,15