Distributed Computing and Internet Technology: First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004, Proceedings by R.K. GhoshDistributed Computing and Internet Technology: First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004, Proceedings by R.K. Ghosh

Distributed Computing and Internet Technology: First International Conference, ICDCIT 2004…

byR.K. GhoshEditorHrushikesha Mohanty

Paperback | December 7, 2004

Pricing and Purchase Info

$148.02 online 
$178.50 list price save 17%
Earn 740 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

This book constitutes the refereed proceedings of the First International Conference on Distributed Computing and Internet Technology, ICDCIT 2004, held in Bhubaneswar, India in December 2004. The 47 revised papers presented together with 3 invited papers and 5 abstracts of invited or workshop papers were carefully reviewed and selected from 211 submissions. The papers are organized in topical sections on algorithms and modeling; systems, protocols, and performance; transactions and information dissemination; internet query and retrieval; protocol and replica management; ontologies and services; systems analysis and modeling; tools and techniques; systems security; intrusion detection and access control; networks and security; secured systems design; and security services.
Title:Distributed Computing and Internet Technology: First International Conference, ICDCIT 2004…Format:PaperbackDimensions:474 pages, 23.5 × 15.5 × 0.07 inPublished:December 7, 2004Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3540240756

ISBN - 13:9783540240754

Look for similar items by category:

Reviews

Table of Contents

Plenary Talk - I.- Taming the Dynamics of Disributed Data.- DISTRIBUTED COMPUTING.- Data in Your Space.- Enabling Technologies for Harnessing Information Explosion.- Fair Leader Election by Randomized Voting.- An Efficient Leader Election Algorithm for Mobile Ad Hoc Networks.- Distributed Balanced Tables: A New Approach.- Performance Evaluation of Gigabit Ethernet and SCI in a Linux Cluster.- Performance Evaluation of a Modified-Cyclic-Banyan Based ATM / IP Switching Fabric.- A Scalable and Robust QoS Architecture for WiFi P2P Networks.- NEC: Node Energy Based Clustering Protocol for Wireless Sensor Networks with Guaranteed Connectivity.- Energy Efficient Cache Invalidation in a Disconnected Mobile Environment.- An Efficient Data Dissemination Schemes for Location Dependent Information Services.- A Publish / Subscribe Based Architecture of an Alert Server to Support Prioritized and Persistent Alerts.- A Nested Transaction Model for LDAP Transactions.- Team Transaction: A New Transaction Model for Mobile Ad Hoc Networks.- An Efficient Protocol for Checkpoint-Based Failure Recovery in Distributed Systems.- Cybersecurity: Opportunities and Challenges.- INTERNET TECHNOLOGY.- Vulnerabilities and Threats in Distributed Systems.- A TNATS Approach to Hidden Web Documents.- Querying XML Documents from a Relational Database in the Presence of DTDs.- SAQI: Semantics Aware Query Interface.- Hybrid-Chord: A Peer-to-Peer System Based on Chord.- A Generic and Flexible Model for Replica Consistency Management.- An Efficient Distributed Scheme for Source Routing Protocol in Communication Networks.- The Roles of Ontology and Metadata Registry for Interoperable Databases.- DHL: Semantically Rich Dynamic and Active Hyperlinks.- User-Class Based Service Acceptance Policy Using Cluster Analysis.- SOFTWARE ENGINEERING.- Tools and Techniques for Multi-site Software Development.- Specifying a Mobile Computing Infrastructure and Services.- Generating a Prototype from a UML Model of System Requirements.- A Type System for an Aspect Oriented Programming Language.- Secure Requirements Elicitation Through Triggered Message Sequence Charts.- Framework for Safe Reuse of Software Binaries.- Supporting Partial Component Matching.- A Novel Approach for Dynamic Slicing of Distributed Object-Oriented Programs.- Pattern Semantic Link: A Reusable Pattern Representation in MDA Context.- Compatibility Test and Adapter Generation for Interfaces of Software Components.- A Modern Graphic Flowchart Layout Tool.- SYSTEMS SECURITY.- A Flexible Authorization Framework for E-Commerce.- Efficient Algorithms for Intrusion Detection.- Proxi-Annotated Control Flow Graphs: Deterministic Context-Sensitive Monitoring for Intrusion Detection.- Using Schemas to Simplify Access Control for XML Documents.- Automatic Enforcement of Access Control Policies Among Dynamic Coalitions.- Implementing Consistency Checking in Correlating Attacks.- LSAD: Lightweight SYN Flooding Attack Detector.- UGSP: Secure Key Establishment Protocol for Ad-Hoc Networks.- Tracing Attackers with Deterministic Edge Router Marking (DERM).- Distributing Key Updates in Secure Dynamic Groups.- Succinct and Fast Accessible Data Structures for Database Damage Assessment.- A Secure Checkpointing Protocol for Survivable Server Design.- MobiCoin: Digital Cash for M-Commerce.- Cellular Automata: An Ideal Candidate for a Block Cipher.- NFD Technique for Efficient and Secured Information Hiding in Low Resolution Images.- WORKSHOP ON DATAMINING, SECURITY & APPLICATION.- Improving Feature Selection in Anomaly Intrusion Detection Using Specifications.- Towards Automatic Learning of Valid Services for Honeypots.