Distributed Computing and Internet Technology: First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004, ProceedingsR.K. Ghosh, Hrushikesha Mohanty Springer, 2004. gada 29. nov. - 474 lappuses This book constitutes the refereed proceedings of the First International Conference on Distributed Computing and Internet Technology, ICDCIT 2004, held in Bhubaneswar, India in December 2004. The 47 revised papers presented together with 3 invited papers and 5 abstracts of invited or workshop papers were carefully reviewed and selected from 211 submissions. The papers are organized in topical sections on algorithms and modeling; systems, protocols, and performance; transactions and information dissemination; internet query and retrieval; protocol and replica management; ontologies and services; systems analysis and modeling; tools and techniques; systems security; intrusion detection and access control; networks and security; secured systems design; and security services. |
Saturs
1 | |
21 | |
32 | |
A New Approach | 42 |
Systems Protocols and Performance | 50 |
Performance Evaluation of a ModifiedCyclicBanyan Based ATMIP | 60 |
Node Energy Based Clustering Protocol for Wireless Sensor | 75 |
Transaction and Information Dissemination | 96 |
Generating a Prototype from a UML Model of System Requirements | 255 |
Secure Requirements Elicitation Through Triggered Message Sequence | 273 |
Tools and Techniques | 294 |
A Reusable Pattern Representation in | 310 |
A Modern Graphic Flowchart Layout Tool | 329 |
Intrusion Detection and Access Control | 346 |
Deterministic ContextSensitive | 353 |
Automatic Enforcement of Access Control Policies Among Dynamic | 369 |
A Nested Transaction Model for LDAP Transactions | 117 |
An Efficient Protocol for CheckpointBased Failure Recovery | 135 |
Query and Retrieval | 158 |
Documents from a Relational Database in the Presence | 168 |
Protocol and Replica Management | 194 |
An Efficient Distributed Scheme for Source Routing Protocol | 210 |
Semantically Rich Dynamic and Active Hyperlinks | 227 |
SOFTWARE ENGINEERING | 243 |
Lightweight SYN Flooding Attack Detector | 385 |
Tracing Attackers with Deterministic Edge Router Marking DERM | 400 |
Succinct and Fast Accessible Data Structures for Database Damage | 420 |
Security Services | 441 |
NFD Technique for Efficient and Secured Information Hiding in | 458 |
WORKSHOP ON DATAMINING SECURITY | 468 |
Citi izdevumi - Skatīt visu
Distributed Computing and Internet Technology: First International ... R.K. Ghosh Ierobežota priekšskatīšana - 2004 |
Distributed Computing and Internet Technology: First International ... R.K. Ghosh,Hrushikesha Mohanty Priekšskatījums nav pieejams - 2004 |
Bieži izmantoti vārdi un frāzes
Abstract access control Alert Server algorithm analysis application approach architecture attack bandwidth Berlin Heidelberg 2004 binary broadcast cache checkpoint ckpt client cluster coalition component concept conceptual graph data items data objects database defined digital cash digital wallet distributed Distributed Computing dynamic element environment function Ghosh and H Gigabit Ethernet graph group controller hash ICDCIT identifier IEEE implementation InfoSpace input interface LDAP leader election LNCS lookup mapping metadata registry MobiCoin mobile module multicast ontology operation packets paper parameters performance policies priority queue proposed protocol prototype query queue R.K. Ghosh request retrieved routing scheme segment semantic semantic web specification Springer-Verlag Berlin Heidelberg static stored structure SYN flooding techniques text segment TMSC transaction tree update user-object variables vulnerabilities web service wireless XML documents XML schema