Distributed Computing and Internet Technology: First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004, Proceedings

Pirmais vāks
Springer Science & Business Media, 2004. gada 7. dec. - 472 lappuses
Kansas City) and Ashok Srivastava (NASA Ames Research Center, USA). The tutorials were on security issues in distributed systems and enterprise resource planning. Wetake this opportunity to thank various peopleand organizations who c- tributed to make this conference a grand success. Our heartfelt thanks to the track chairs whose full cooperation and technical assessments were crucial to achieve this high level of quality even in the rst edition of the conference. The full participation of the program committee members and the reviewers made it possible to complete the peer-review process in time. We are extremely thankful to them. We would like to thank our advisors and general chair for having c- ?dence in us. Our special thanks go to A. Samanta and P. K. Mishra of KIIT for their support and encouragement in organizing this conference. We gratefully acknowledge the ?nancial and logistic support extended by KIIT in hosting this conference. TheAllIndiaCouncilofTechnicalEducation(AICTE), Government ofIndia, NewDelhiprovided agenerousgrant-in-aid fororganizingICDCIT. We thankfully acknowledge AICTE's support. We are thankful to Springer for its cooperation in publishing the proceedings in such a short time. We are also thankful to our parent departments, Department of Computer Science and - gineering, IIT Kanpur and Department of Computer and Information Sciences, University of Hyderabad, for providing infrastructural support to carry out the editorial work. We thank Krithi Ramamritham and Pradeep Khosla for agr- ing to deliver the lectures in the plenary sessions.

No grāmatas satura

Lietotāju komentāri - Rakstīt atsauksmi

Ierastajās vietās neesam atraduši nevienu atsauksmi.

Saturs

Plenary Talk I
1
Invited Talk I
21
An Efficient Leader Election Algorithm for Mobile Ad Hoc Networks
32
A New Approach
42
Systems Protocols and Performance
50
Performance Evaluation of a ModifiedCyclicBanyan Based ATMIP
60
Node Energy Based Clustering Protocol for Wireless Sensor
75
Transaction and Information Dissemination
96
Generating a Prototype from a UML Model of System Requirements
255
Secure Requirements Elicitation Through Triggered Message Sequence
273
Tools and Techniques
294
A Reusable Pattern Representation in
310
A Modern Graphic Flowchart Layout Tool
329
Intrusion Detection and Access Control
346
Deterministic ContextSensitive
353
Automatic Enforcement of Access Control Policies Among Dynamic
369

A Nested Transaction Model for LDAP Transactions
117
An Efficient Protocol for CheckpointBased Failure Recovery
135
Query and Retrieval
158
Documents from a Relational Database in the Presence
168
Protocol and Replica Management
194
An Efficient Distributed Scheme for Source Routing Protocol
210
Semantically Rich Dynamic and Active Hyperlinks
227
SOFTWARE ENGINEERING
243
Lightweight SYN Flooding Attack Detector
385
Tracing Attackers with Deterministic Edge Router Marking DERM
400
Succinct and Fast Accessible Data Structures for Database Damage
420
Security Services
441
NFD Technique for Efficient and Secured Information Hiding in
458
WORKSHOP ON DATAMINING SECURITY
468
Autortiesības

Citi izdevumi - Skatīt visu

Bieži izmantoti vārdi un frāzes

Bibliogrāfiskā informācija