Distributed Computing and Internet Technology: First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004, ProceedingsSpringer Science & Business Media, 2004. gada 7. dec. - 472 lappuses Kansas City) and Ashok Srivastava (NASA Ames Research Center, USA). The tutorials were on security issues in distributed systems and enterprise resource planning. Wetake this opportunity to thank various peopleand organizations who c- tributed to make this conference a grand success. Our heartfelt thanks to the track chairs whose full cooperation and technical assessments were crucial to achieve this high level of quality even in the rst edition of the conference. The full participation of the program committee members and the reviewers made it possible to complete the peer-review process in time. We are extremely thankful to them. We would like to thank our advisors and general chair for having c- ?dence in us. Our special thanks go to A. Samanta and P. K. Mishra of KIIT for their support and encouragement in organizing this conference. We gratefully acknowledge the ?nancial and logistic support extended by KIIT in hosting this conference. TheAllIndiaCouncilofTechnicalEducation(AICTE), Government ofIndia, NewDelhiprovided agenerousgrant-in-aid fororganizingICDCIT. We thankfully acknowledge AICTE's support. We are thankful to Springer for its cooperation in publishing the proceedings in such a short time. We are also thankful to our parent departments, Department of Computer Science and - gineering, IIT Kanpur and Department of Computer and Information Sciences, University of Hyderabad, for providing infrastructural support to carry out the editorial work. We thank Krithi Ramamritham and Pradeep Khosla for agr- ing to deliver the lectures in the plenary sessions. |
No grāmatas satura
1.–5. rezultāts no 67.
vi. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
viii. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
xvi. lappuse
... Environment Narottam Chand, Ramesh Joshi, Manoj Misra ..................... 85 Transaction and Information Dissemination An Efficient Data Dissemination Schemes for Location Dependent Information Services KwangJin Park, Moon Bae Song ...
... Environment Narottam Chand, Ramesh Joshi, Manoj Misra ..................... 85 Transaction and Information Dissemination An Efficient Data Dissemination Schemes for Location Dependent Information Services KwangJin Park, Moon Bae Song ...
7. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
11. lappuse
Atvainojiet, šīs lappuses saturs ir ierobežots..
Atvainojiet, šīs lappuses saturs ir ierobežots..
Saturs
Plenary Talk I | 1 |
Invited Talk I | 21 |
An Efficient Leader Election Algorithm for Mobile Ad Hoc Networks | 32 |
A New Approach | 42 |
Systems Protocols and Performance | 50 |
Performance Evaluation of a ModifiedCyclicBanyan Based ATMIP | 60 |
Node Energy Based Clustering Protocol for Wireless Sensor | 75 |
Transaction and Information Dissemination | 96 |
Analysis and Modelling | 244 |
Generating a Prototype from a UML Model of System Requirements | 255 |
Secure Requirements Elicitation Through Triggered Message Sequence | 273 |
Tools and Techniques | 294 |
A Reusable Pattern Representation in | 310 |
A Modern Graphic Flowchart Layout Tool | 329 |
Intrusion Detection and Access Control | 346 |
Deterministic ContextSensitive | 353 |
A Nested Transaction Model for LDAP Transactions | 117 |
An Efficient Protocol for CheckpointBased Failure Recovery | 135 |
Query and Retrieval | 158 |
Documents from a Relational Database in the Presence | 168 |
Protocol and Replica Management | 194 |
A Generic and Flexible Model for Replica Consistency Management | 204 |
Semantically Rich Dynamic and Active Hyperlinks | 227 |
UserClass Based Service Acceptance Policy Using Cluster Analysis | 237 |
Automatic Enforcement of Access Control Policies Among Dynamic | 369 |
Lightweight SYN Flooding Attack Detector | 385 |
Tracing Attackers with Deterministic Edge Router Marking DERM | 400 |
Succinct and Fast Accessible Data Structures for Database Damage | 420 |
Security Services | 441 |
NFD Technique for Efficient and Secured Information Hiding in | 458 |
Improving Feature Selection in Anomaly Intrusion Detection Using | 468 |
Citi izdevumi - Skatīt visu
Distributed Computing and Internet Technology: First International ... R.K. Ghosh Ierobežota priekšskatīšana - 2004 |
Distributed Computing and Internet Technology: First International ... R.K. Ghosh,Hrushikesha Mohanty Ierobežota priekšskatīšana - 2004 |
Distributed Computing and Internet Technology: First International ... R.K. Ghosh,Hrushikesha Mohanty Priekšskatījums nav pieejams - 2004 |
Bieži izmantoti vārdi un frāzes
Abstract access control Alert Server algorithm analysis application approach architecture attack bandwidth Berlin Heidelberg 2004 broadcast cache checkpoint client cluster coalition component concept conceptual graph data items data objects data type database defined digital cash digital wallet distributed Distributed Computing distribution algorithm dynamic element environment function Ghosh and H Gigabit Ethernet graph hash ICDCIT identifier IEEE implementation InfoSpace input interface LDAP leader election LNCS lookup mapping metadata registry MobiCoin mobile module multicast ontology operation packets paper parameters performance priority queue proposed protocol prototype query queue R.K. Ghosh request retrieved routing scheme segment semantic semantic web specification static stored structure super-peer SYN flooding techniques Technology templates text segment TMSC transaction tree update variables vulnerabilities web service wireless XML documents XML schema