Distributed Computing and Internet Technology: First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004, Proceedings

Pirmais vāks
R.K. Ghosh, Hrushikesha Mohanty
Springer, 2004. gada 29. nov. - 474 lappuses
This book constitutes the refereed proceedings of the First International Conference on Distributed Computing and Internet Technology, ICDCIT 2004, held in Bhubaneswar, India in December 2004. The 47 revised papers presented together with 3 invited papers and 5 abstracts of invited or workshop papers were carefully reviewed and selected from 211 submissions. The papers are organized in topical sections on algorithms and modeling; systems, protocols, and performance; transactions and information dissemination; internet query and retrieval; protocol and replica management; ontologies and services; systems analysis and modeling; tools and techniques; systems security; intrusion detection and access control; networks and security; secured systems design; and security services.

No grāmatas satura

Atlasītās lappuses

Saturs

Plenary Talk I
1
Invited Talk I
21
An Efficient Leader Election Algorithm for Mobile Ad Hoc Networks
32
A New Approach
42
Systems Protocols and Performance
50
Performance Evaluation of a ModifiedCyclicBanyan Based ATMIP
60
Node Energy Based Clustering Protocol for Wireless Sensor
75
Transaction and Information Dissemination
96
Generating a Prototype from a UML Model of System Requirements
255
Secure Requirements Elicitation Through Triggered Message Sequence
273
Tools and Techniques
294
A Reusable Pattern Representation in
310
A Modern Graphic Flowchart Layout Tool
329
Intrusion Detection and Access Control
346
Deterministic ContextSensitive
353
Automatic Enforcement of Access Control Policies Among Dynamic
369

A Nested Transaction Model for LDAP Transactions
117
An Efficient Protocol for CheckpointBased Failure Recovery
135
Query and Retrieval
158
Documents from a Relational Database in the Presence
168
Protocol and Replica Management
194
An Efficient Distributed Scheme for Source Routing Protocol
210
Semantically Rich Dynamic and Active Hyperlinks
227
SOFTWARE ENGINEERING
243
Lightweight SYN Flooding Attack Detector
385
Tracing Attackers with Deterministic Edge Router Marking DERM
400
Succinct and Fast Accessible Data Structures for Database Damage
420
Security Services
441
NFD Technique for Efficient and Secured Information Hiding in
458
WORKSHOP ON DATAMINING SECURITY
468
Autortiesības

Citi izdevumi - Skatīt visu

Bieži izmantoti vārdi un frāzes

Bibliogrāfiskā informācija