Distributed Computing and Internet Technology: First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004, ProceedingsSpringer Science & Business Media, 2004. gada 7. dec. - 472 lappuses Kansas City) and Ashok Srivastava (NASA Ames Research Center, USA). The tutorials were on security issues in distributed systems and enterprise resource planning. Wetake this opportunity to thank various peopleand organizations who c- tributed to make this conference a grand success. Our heartfelt thanks to the track chairs whose full cooperation and technical assessments were crucial to achieve this high level of quality even in the rst edition of the conference. The full participation of the program committee members and the reviewers made it possible to complete the peer-review process in time. We are extremely thankful to them. We would like to thank our advisors and general chair for having c- ?dence in us. Our special thanks go to A. Samanta and P. K. Mishra of KIIT for their support and encouragement in organizing this conference. We gratefully acknowledge the ?nancial and logistic support extended by KIIT in hosting this conference. TheAllIndiaCouncilofTechnicalEducation(AICTE), Government ofIndia, NewDelhiprovided agenerousgrant-in-aid fororganizingICDCIT. We thankfully acknowledge AICTE's support. We are thankful to Springer for its cooperation in publishing the proceedings in such a short time. We are also thankful to our parent departments, Department of Computer Science and - gineering, IIT Kanpur and Department of Computer and Information Sciences, University of Hyderabad, for providing infrastructural support to carry out the editorial work. We thank Krithi Ramamritham and Pradeep Khosla for agr- ing to deliver the lectures in the plenary sessions. |
No grāmatas satura
1.5. rezultāts no 9.
xix. lappuse
... Coalitions Vijayalakshmi Atluri, Janice Warner ............................. 369. Network. and. Security. Implementing Consistency Checking in Correlating Attacks Kaushal Sarda, Duminda Wijesekera, Sushil Jajodia ................ 379 LSAD ...
... Coalitions Vijayalakshmi Atluri, Janice Warner ............................. 369. Network. and. Security. Implementing Consistency Checking in Correlating Attacks Kaushal Sarda, Duminda Wijesekera, Sushil Jajodia ................ 379 LSAD ...
365. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
370. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
371. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
372. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
Saturs
Plenary Talk I | 1 |
Invited Talk I | 21 |
An Efficient Leader Election Algorithm for Mobile Ad Hoc Networks | 32 |
A New Approach | 42 |
Systems Protocols and Performance | 50 |
Performance Evaluation of a ModifiedCyclicBanyan Based ATMIP | 60 |
Node Energy Based Clustering Protocol for Wireless Sensor | 75 |
Transaction and Information Dissemination | 96 |
Generating a Prototype from a UML Model of System Requirements | 255 |
Secure Requirements Elicitation Through Triggered Message Sequence | 273 |
Tools and Techniques | 294 |
A Reusable Pattern Representation in | 310 |
A Modern Graphic Flowchart Layout Tool | 329 |
Intrusion Detection and Access Control | 346 |
Deterministic ContextSensitive | 353 |
Automatic Enforcement of Access Control Policies Among Dynamic | 369 |
A Nested Transaction Model for LDAP Transactions | 117 |
An Efficient Protocol for CheckpointBased Failure Recovery | 135 |
Query and Retrieval | 158 |
Documents from a Relational Database in the Presence | 168 |
Protocol and Replica Management | 194 |
An Efficient Distributed Scheme for Source Routing Protocol | 210 |
Semantically Rich Dynamic and Active Hyperlinks | 227 |
SOFTWARE ENGINEERING | 243 |
Lightweight SYN Flooding Attack Detector | 385 |
Tracing Attackers with Deterministic Edge Router Marking DERM | 400 |
Succinct and Fast Accessible Data Structures for Database Damage | 420 |
Security Services | 441 |
NFD Technique for Efficient and Secured Information Hiding in | 458 |
WORKSHOP ON DATAMINING SECURITY | 468 |
Citi izdevumi - Skatīt visu
Distributed Computing and Internet Technology: First International ... R.K. Ghosh Ierobežota priekšskatīšana - 2004 |
Distributed Computing and Internet Technology: First International ... R.K. Ghosh,Hrushikesha Mohanty Ierobežota priekšskatīšana - 2004 |
Distributed Computing and Internet Technology: First International ... R.K. Ghosh,Hrushikesha Mohanty Priekšskatījums nav pieejams - 2004 |
Bieži izmantoti vārdi un frāzes
Abstract actions active alert algorithm analysis application approach assume attack broadcast cache called client cluster coalition communication component Computer concept conceptual graph consider consists consumer contains corresponding created database dependent describe detection developed distributed document dynamic element environment example execution existing Figure formal function given graph identify implementation initiator instance interface leader mapping method mobile node object ontology operation packets path pattern performance policies present problem procedure properties proposed protocol query received References relational represents request round routing scheme segment selection semantic sends server shows specification specify step stored structure techniques transaction tree University update variables wireless