The opening ceremony and pre-conference tutorials on various related topics were held on December 21. The technical program started on December 22 and continued for three days. The program was arranged in single track so as to enable participants to attend sessions of di?erent tracks. Papers from the DM, IT, SE, and SS tracks were divided into two sessions, whereas DC track sessions were held on the ?rst two days of the conference. The program also included two plenary talks. The ?rst talk was delivered by S. S. Iyengar from Louisiana State University, USA. The second talk was delivered by He…mehr
The opening ceremony and pre-conference tutorials on various related topics were held on December 21. The technical program started on December 22 and continued for three days. The program was arranged in single track so as to enable participants to attend sessions of di?erent tracks. Papers from the DM, IT, SE, and SS tracks were divided into two sessions, whereas DC track sessions were held on the ?rst two days of the conference. The program also included two plenary talks. The ?rst talk was delivered by S. S. Iyengar from Louisiana State University, USA. The second talk was delivered by He Jifeng from the International Institute for Software Technology (IIST) Macau. Prof. Iyenger's talk on "The Distributed Sensor Networks - An Emerging Technology" was focused on new ideas about the use of distributed systems for emerging technology, while Prof. Jifeng's talk on "Linking Theories of Concurrency by Retraction" dealt with semantics of concurrency. All the conference committee members contributed towards the success of ICDCIT 2005. And it was a pleasant experience for me to work with them. The one name that sticks out is R. K. Ghosh, Steering Committee Chair. He really steered the group with his past experience as Program Chair of ICDCIT 2004.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Artikelnr. des Verlages: 11604655, 978-3-540-30999-4
2005
Seitenzahl: 636
Erscheinungstermin: 9. Dezember 2005
Englisch
Abmessung: 235mm x 155mm x 34mm
Gewicht: 947g
ISBN-13: 9783540309994
ISBN-10: 3540309993
Artikelnr.: 21709996
Herstellerkennzeichnung
Books on Demand GmbH
In de Tarpen 42
22848 Norderstedt
info@bod.de
040 53433511
Autorenporträt
Goutam Chakraborty, Iwate Prefectural University, Takizawa, Japan
Inhaltsangabe
Plenary Talk I.- The Distributed Sensor Networks - An Emerging Technology.- Distributed Computing.- Distribute Computing Track Chair's Message.- Network Protcols.- Efficient Binding Lifetime Determination Schemes in HMIPv6.- A Fast Search and Advanced Marking Scheme for Network IP Traceback Model.- Design and Performance Evaluation of Token-Based MAC Protocols in WDM Burst Switched Ring Networks.- Routing in Mobile Ad Hoc Network.- Self-stabilizing Energy-Aware Routing Algorithm in Wireless Sensor Network with Limited Mobility.- Position Based Gradient Routing in Mobile Ad Hoc Networks.- Distributed Clustering Algorithm for Finding Virtual Backbone in Ad Hoc Networks.- Merging Clustering Algorithms in Mobile Ad Hoc Networks.- Performance Study and Implementation of Self Organized Routing Algorithm for Mobile Ad Hoc Network Using GloMoSim.- Communication and Coverage in Wireless Networks.- Self-stabilizing Deterministic TDMA for Sensor Networks.- Effect of Mobility on Communication Performance in Overloaded One-Dimensional Cellular Networks.- Distributed Time Slot Assignment in Wireless Ad Hoc Networks for STDMA.- Efficient Algorithm for Placing Base Stations by Avoiding Forbidden Zone.- Secured Communication in Distributed Systems.- Secure Two-Party Context Free Language Recognition.- Autonomous Agent Based Distributed Fault-Tolerant Intrusion Detection System.- Cleaning an Arbitrary Regular Network with Mobile Agents.- Query and Transaction Processing.- Multi-attribute Hashing of Wireless Data for Content-Based Queries.- A Tool for Automated Resource Consumption Profiling of Distributed Transactions.- An Efficient Algorithm for Removing Useless Logged Messages in SBML Protocols.- Theory of Distributed Systems.- Divide and Concur: Employing Chandra and Toueg'sConsensus Algorithm in a Multi-level Setting.- Distributed Multiple Hypothesis Testing in Sensor Networks Under Bandwidth Constraint.- A Scalable Multi-level Distributed System-Level Diagnosis.- Analysis of Interval-Based Global State Detection.- Grid Computing.- A Two-Phase Scheduling Algorithm for Efficient Collective Communications of MPICH-G2.- Towards an Agent-Based Framework for Monitoring and Tuning Application Performance in Grid Environment.- GDP: A Paradigm for Intertask Communication in Grid Computing Through Distributed Pipes.- Internet Technology.- Internet Technology Track Chair's Message.- Internet Search and Query.- Rewriting Queries Using View for RDF/RDFS-Based Relational Data Integration.- An Effective Searching Method Using the Example-Based Query.- On Communicating with Agents on the Network.- E-Commerce.- Applying Fuzzy Logic to Recommend Consumer Electronics.- Generic XML Schema Definition (XSD) to GUI Translator.- Off-Line Micro-payment System for Content Sharing in P2P Networks.- Browsing and Analysis of Web Elements.- FlexiRank: An Algorithm Offering Flexibility and Accuracy for Ranking the Web Pages.- Adaptable Web Browsing of Images in Mobile Computing Environment: Experiments and Observations.- An Incremental Document Clustering Algorithm Based on a Hierarchical Agglomerative Approach.- Systems Security.- System Security Track Chair's Message.- Theory of Secured Systems.- A Game Based Model of Security for Key Predistribution Schemes in Wireless Sensor Network.- E-mail Worm Detection Using the Analysis of Behavior.- Verifiably Encrypted Signature Scheme Without Random Oracles.- Intrusion Detection and Ad Hoc Network Security.- An Improved Intrusion Detection Technique for Mobile Adhoc Networks.- User Revocation in Secure AdhocNetworks.- A Hybrid Method to Intrusion Detection Systems Using HMM.- Secured Systems Techniques.- Enhanced Network Traffic Anomaly Detector.- Statistically Secure Extension of Anti-collusion Code Fingerprinting.- An Improvement of Auto-Correlation Based Video Watermarking Scheme Using Perceptual Masking for Motion.- Validation of Policy Integration Using Alloy.- Plenary Talk II.- Linking Theories of Concurrency by Retraction.- Software Engineering.- Software Engineering Track Chair's Message.- Software Architecture.- Integrating Architecture Description Languages: A Semantics-Based Approach.- Automated Runtime Validation of Software Architecture Design.- Software Optimization and Reliability.- Analyzing Loop Paths for Execution Time Estimation.- A Technique for Early Software Reliability Prediction.- Formal Methods.- Executable Requirements Specifications Using Triggered Message Sequence Charts.- Efficient Symmetry Reduction for an Actor-Based Model.- Validated Code Generation for Activity Diagrams.- Data Mining.- Data Mining Track Chair's Message.- Data Clustering Techniques.- An Approach to Find Embedded Clusters Using Density Based Techniques.- Using Sub-sequence Information with kNN for Classification of Sequential Data.- Distance-Based Outliers in Sequences.- Capturing Market Intelligence from Customer Feedback E-mails Using Self-enhancing Bolzmann Machine-Based Network of Knowledge Maps.- Multidimensional Data Mining.- Algorithm for Fuzzy Clustering of Mixed Data with Numeric and Categorical Attributes.- Dissemination of Multidimensional Data Using Broadcast Clusters.- Multidimensional Frequent Pattern Mining Using Association Rule Based Constraints.- A Classification Based Approach for Root Unknown Phylogenetic Networks Under Constrained Recombination.-Erratum.- Using Sub-sequence Information with kNN for Classification of Sequential Data.- Capturing Market Intelligence from Customer Feedback E-mails Using Self-enhancing Boltzmann Machine-Based Network of Knowledge Maps.
Plenary Talk I.- The Distributed Sensor Networks - An Emerging Technology.- Distributed Computing.- Distribute Computing Track Chair's Message.- Network Protcols.- Efficient Binding Lifetime Determination Schemes in HMIPv6.- A Fast Search and Advanced Marking Scheme for Network IP Traceback Model.- Design and Performance Evaluation of Token-Based MAC Protocols in WDM Burst Switched Ring Networks.- Routing in Mobile Ad Hoc Network.- Self-stabilizing Energy-Aware Routing Algorithm in Wireless Sensor Network with Limited Mobility.- Position Based Gradient Routing in Mobile Ad Hoc Networks.- Distributed Clustering Algorithm for Finding Virtual Backbone in Ad Hoc Networks.- Merging Clustering Algorithms in Mobile Ad Hoc Networks.- Performance Study and Implementation of Self Organized Routing Algorithm for Mobile Ad Hoc Network Using GloMoSim.- Communication and Coverage in Wireless Networks.- Self-stabilizing Deterministic TDMA for Sensor Networks.- Effect of Mobility on Communication Performance in Overloaded One-Dimensional Cellular Networks.- Distributed Time Slot Assignment in Wireless Ad Hoc Networks for STDMA.- Efficient Algorithm for Placing Base Stations by Avoiding Forbidden Zone.- Secured Communication in Distributed Systems.- Secure Two-Party Context Free Language Recognition.- Autonomous Agent Based Distributed Fault-Tolerant Intrusion Detection System.- Cleaning an Arbitrary Regular Network with Mobile Agents.- Query and Transaction Processing.- Multi-attribute Hashing of Wireless Data for Content-Based Queries.- A Tool for Automated Resource Consumption Profiling of Distributed Transactions.- An Efficient Algorithm for Removing Useless Logged Messages in SBML Protocols.- Theory of Distributed Systems.- Divide and Concur: Employing Chandra and Toueg'sConsensus Algorithm in a Multi-level Setting.- Distributed Multiple Hypothesis Testing in Sensor Networks Under Bandwidth Constraint.- A Scalable Multi-level Distributed System-Level Diagnosis.- Analysis of Interval-Based Global State Detection.- Grid Computing.- A Two-Phase Scheduling Algorithm for Efficient Collective Communications of MPICH-G2.- Towards an Agent-Based Framework for Monitoring and Tuning Application Performance in Grid Environment.- GDP: A Paradigm for Intertask Communication in Grid Computing Through Distributed Pipes.- Internet Technology.- Internet Technology Track Chair's Message.- Internet Search and Query.- Rewriting Queries Using View for RDF/RDFS-Based Relational Data Integration.- An Effective Searching Method Using the Example-Based Query.- On Communicating with Agents on the Network.- E-Commerce.- Applying Fuzzy Logic to Recommend Consumer Electronics.- Generic XML Schema Definition (XSD) to GUI Translator.- Off-Line Micro-payment System for Content Sharing in P2P Networks.- Browsing and Analysis of Web Elements.- FlexiRank: An Algorithm Offering Flexibility and Accuracy for Ranking the Web Pages.- Adaptable Web Browsing of Images in Mobile Computing Environment: Experiments and Observations.- An Incremental Document Clustering Algorithm Based on a Hierarchical Agglomerative Approach.- Systems Security.- System Security Track Chair's Message.- Theory of Secured Systems.- A Game Based Model of Security for Key Predistribution Schemes in Wireless Sensor Network.- E-mail Worm Detection Using the Analysis of Behavior.- Verifiably Encrypted Signature Scheme Without Random Oracles.- Intrusion Detection and Ad Hoc Network Security.- An Improved Intrusion Detection Technique for Mobile Adhoc Networks.- User Revocation in Secure AdhocNetworks.- A Hybrid Method to Intrusion Detection Systems Using HMM.- Secured Systems Techniques.- Enhanced Network Traffic Anomaly Detector.- Statistically Secure Extension of Anti-collusion Code Fingerprinting.- An Improvement of Auto-Correlation Based Video Watermarking Scheme Using Perceptual Masking for Motion.- Validation of Policy Integration Using Alloy.- Plenary Talk II.- Linking Theories of Concurrency by Retraction.- Software Engineering.- Software Engineering Track Chair's Message.- Software Architecture.- Integrating Architecture Description Languages: A Semantics-Based Approach.- Automated Runtime Validation of Software Architecture Design.- Software Optimization and Reliability.- Analyzing Loop Paths for Execution Time Estimation.- A Technique for Early Software Reliability Prediction.- Formal Methods.- Executable Requirements Specifications Using Triggered Message Sequence Charts.- Efficient Symmetry Reduction for an Actor-Based Model.- Validated Code Generation for Activity Diagrams.- Data Mining.- Data Mining Track Chair's Message.- Data Clustering Techniques.- An Approach to Find Embedded Clusters Using Density Based Techniques.- Using Sub-sequence Information with kNN for Classification of Sequential Data.- Distance-Based Outliers in Sequences.- Capturing Market Intelligence from Customer Feedback E-mails Using Self-enhancing Bolzmann Machine-Based Network of Knowledge Maps.- Multidimensional Data Mining.- Algorithm for Fuzzy Clustering of Mixed Data with Numeric and Categorical Attributes.- Dissemination of Multidimensional Data Using Broadcast Clusters.- Multidimensional Frequent Pattern Mining Using Association Rule Based Constraints.- A Classification Based Approach for Root Unknown Phylogenetic Networks Under Constrained Recombination.-Erratum.- Using Sub-sequence Information with kNN for Classification of Sequential Data.- Capturing Market Intelligence from Customer Feedback E-mails Using Self-enhancing Boltzmann Machine-Based Network of Knowledge Maps.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826