Welcome to the proceedings of the ISPA 2005 workshops, held in the city of Nanjing, China. For the first time eight workshops were held in conjunction with the 3rd International Symposium on Parallel and Distributed Processing and Applications (ISPA 2005), to encourage interaction between researchers and practitioners. Workshop topics are, of course, in line with the conference s scientific scope and the workshops provided a forum for groups of researchers and practitioners to meet together more closely, to exchange opinions and advanced ideas, and to share preliminary results on focused…mehr
Welcome to the proceedings of the ISPA 2005 workshops, held in the city of Nanjing, China. For the first time eight workshops were held in conjunction with the 3rd International Symposium on Parallel and Distributed Processing and Applications (ISPA 2005), to encourage interaction between researchers and practitioners. Workshop topics are, of course, in line with the conference s scientific scope and the workshops provided a forum for groups of researchers and practitioners to meet together more closely, to exchange opinions and advanced ideas, and to share preliminary results on focused issues in an atmosphere that fostered interaction and problem solving. The conference hosted eight half-day workshops: The International Workshop on Applications and Economics of Peer-to-Peer Systems organized by Qianni Deng and Zhichen Xu; the International Workshop on Advanced Storage Technology and Autonomic Distributed Data organized by Jiwu Shu and Weimin Zheng; the International Workshop onBioinformatics organized by Mathew Palaka, Jake Chen and Zongben Xu; the International Workshop on Grid Computing in China organized by Hai Jin and Minglu Li; the International Workshop on Information Assurance in Distributed Systems organized by Peng Liu and Meng Yu; the International Workshop on Mobile Ad-hoc and Ubiquitous Sensor Networks organized by Anu Bourgeois and Wei Lou; the International Workshop on Service Grid Computing and Applications organized by Nong Xiao and Yunhao Liu; and the International Workshop on Web Information Systems and Applications organized by Baowen Xu.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
Produktdetails
Theoretical Computer Science and General Issues 3759
Artikelnr. des Verlages: 11576259, 978-3-540-29770-3
2005
Seitenzahl: 692
Erscheinungstermin: 26. Oktober 2005
Englisch
Abmessung: 235mm x 155mm x 37mm
Gewicht: 1031g
ISBN-13: 9783540297703
ISBN-10: 3540297707
Artikelnr.: 21837448
Herstellerkennzeichnung
Die Herstellerinformationen sind derzeit nicht verfügbar.
Autorenporträt
Guihai Chen, Nanjing University, China / Yi Pan, Georgia State University, Atlanta, GA, USA / Minyi Guo, The University of Aizu, Fukushima, Japan / Jian Lu, Nanjing University, China
Inhaltsangabe
Workshop 1: International Workshop on Applications and Economics of Peer-to-Peer Systems (AEPP 2005).- Aurelia: Building Locality-Preserving Overlay Network over Heterogeneous P2P Environments.- On Building and Updating Distributed LSI for P2P Systems.- Performing Efficient Keyword Search by Keyword Grouping in DHT Peer-to-Peer Network.- Characterization of P2P File-Sharing System.- Analysis of GHT in Mobile Ad Hoc Networks.- Attack Vulnerability of Peer-to-Peer Networks and Cost-Effective Immunization.- A P2P Market Place Based on Aggregate Signatures.- Proof of Service in a Hybrid P2P Environment.- Construct Optimal Diameter Network and d-partition Routing Algorithm.- Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System.- Workshop 2: International Workshop on Advanced Storage Technology and Autonomic Distributed Data (ASTD 2005).- VTarget: An Improved Software Target Emulator for SANs.- Design and Implementation of an Efficient Multipath for a SAN Environment.- Research of Hot-Spot Selection Algorithm in Virtual Address Switch.- An Efficient Cache Replacement Policy with Distinguishing Write Blocks from Read Blocks in Disk Arrays.- An NFSv4-Based Security Scheme for NAS.- Using Blocks Correlations to Improve the I/O Performance of Large Network Storage System.- A Cluster LVM for SAN Environments.- Workshop 3: International Workshop on Bioinformatics (BIOS 2005).- COMPACT: A Comparative Package for Clustering Assessment.- Fast Sequence Similarity Computing with LCS on LARPBS.- Fast Scalable Algorithm on LARPBS for Sequence Alignment.- Identification, Expansion, and Disambiguation of Acronyms in Biomedical Texts.- A Knowledge-Driven Method to Evaluate Multi-source Clustering.- Understanding Protein Structure Prediction Using SVM_DT.- Various Features with Integrated Strategies for Protein Name Classification.- Workshop 4: International Workshop on Grid Computing in China (GCIC 2005).- Uniform Authorization Management in ChinaGrid Support Platform.- to ChinaGrid Support Platform.- A Microeconomics-Based Resource Assignment Model for Grid Computing.- The Campus Resource Management Based on Constellation Model in the ChinaGrid.- Grid Computing Methodology for Protein Structure Prediction and Analysis.- Applying Service Composition in Digital Museum Grid.- Grid Supporting Platform for AMS Data Processing.- A CGSP-Based Grid Application for University Digital Museums.- FleMA: A Flexible Measurement Architecture for ChinaGrid.- A Resource Scheduling Strategy for the CFD Application on the Grid.- Workshop 5: International Workshop on Information Assurance in Distributed Systems (IADS 2005).- A Robust Coalition-Resistant Threshold Signature Scheme with Anonymous Signers.- A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme.- An Efficient Proxy-Protected Signature Scheme Based on Factoring.- Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings.- Encryption Based on Reversible Second-Order Cellular Automata.- ID-Based Proxy Signature Using Bilinear Pairings.- Efficient Fair Certified E-Mail Delivery Based on RSA.- Intrusion Tolerant CA Scheme with Cheaters Detection Ability.- Improvement of Protocol Anomaly Detection Based on Markov Chain and Its Application.- Research and Implementation of Workflow Interoperability Crossing Organizations.- Workshop 6: International Workshop on Mobile Ad-Hoc and Ubiquitous Sensor Networks (MASN 2005).- LSBE: A Localization Scheme Based on Events for Wireless Sensor and Actor Networks.- Crossing Effects Analysis Between Routing and MAC Protocol in Mobile Ad Hoc Networks.- Low-Latency Routing in Ad Hoc Wireless Networks Using Finite Horizons.- Energy Usage in Biomimetic Models for Massively-Deployed Sensor Networks.- Probabilistic Behavior of Sensor Network Localization.- Hybrid Authentication and Key Management Scheme for WSANs.- Storage-Optimal Key Sharing with Authentication in Sensor Networks.- Workshop 7: International Workshop on Service Grid Computing and Applications (SGCA 2005).- An Asynchronous Replica Consistency Model in Data Grid.- Distributed Access Control for Grid Environments Using Trust Management Approach.- Research on Database Access and Integration in UDMGrid.- Resource Allocation Based on Pricing for Grid Computing Environments.- CMSA: A Method for Construction and Maintenance of Semantic Annotations.- NDP2PSim: A NS2-Based Platform for Peer-to-Peer Network Simulations.- Resource Scheduling Scheme for Grid Computing and Its Petri Net Model and Analysis.- The Design and Implementation of Service Adapter in ShanghaiGrid Core.- MCRM System: CIM-Based Multiple Clusters Manager.- Workshop 8: International Workshop on Web Information Systems and Applications (WISA 2005).- to an Agent-Based Grid Workflow Management System.- An XML Query Mechanism with Ontology Integration.- Implementation of Cooperative Cognition Under Web Environment.- Access Authorization Policy for XML Document Security.- OWL2Jess: A Transformational Implementation of the OWL Semantics.- Security Frameworks for Open LBS Based on Web Services Security Mechanism.- Testing and Fault Diagnosis for Web Application Compatibility Based on Combinatorial Method.- A K-Anonymizing Approach for Preventing Link Attacks in Data Publishing.- Transformation-Driven Development of Composite Web Services.- Badness Information Audit Based onImage Character Filtering.- User's Rough Set Based Fuzzy Interest Model in Mining WWW Cache.
Workshop 1: International Workshop on Applications and Economics of Peer-to-Peer Systems (AEPP 2005).- Aurelia: Building Locality-Preserving Overlay Network over Heterogeneous P2P Environments.- On Building and Updating Distributed LSI for P2P Systems.- Performing Efficient Keyword Search by Keyword Grouping in DHT Peer-to-Peer Network.- Characterization of P2P File-Sharing System.- Analysis of GHT in Mobile Ad Hoc Networks.- Attack Vulnerability of Peer-to-Peer Networks and Cost-Effective Immunization.- A P2P Market Place Based on Aggregate Signatures.- Proof of Service in a Hybrid P2P Environment.- Construct Optimal Diameter Network and d-partition Routing Algorithm.- Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System.- Workshop 2: International Workshop on Advanced Storage Technology and Autonomic Distributed Data (ASTD 2005).- VTarget: An Improved Software Target Emulator for SANs.- Design and Implementation of an Efficient Multipath for a SAN Environment.- Research of Hot-Spot Selection Algorithm in Virtual Address Switch.- An Efficient Cache Replacement Policy with Distinguishing Write Blocks from Read Blocks in Disk Arrays.- An NFSv4-Based Security Scheme for NAS.- Using Blocks Correlations to Improve the I/O Performance of Large Network Storage System.- A Cluster LVM for SAN Environments.- Workshop 3: International Workshop on Bioinformatics (BIOS 2005).- COMPACT: A Comparative Package for Clustering Assessment.- Fast Sequence Similarity Computing with LCS on LARPBS.- Fast Scalable Algorithm on LARPBS for Sequence Alignment.- Identification, Expansion, and Disambiguation of Acronyms in Biomedical Texts.- A Knowledge-Driven Method to Evaluate Multi-source Clustering.- Understanding Protein Structure Prediction Using SVM_DT.- Various Features with Integrated Strategies for Protein Name Classification.- Workshop 4: International Workshop on Grid Computing in China (GCIC 2005).- Uniform Authorization Management in ChinaGrid Support Platform.- to ChinaGrid Support Platform.- A Microeconomics-Based Resource Assignment Model for Grid Computing.- The Campus Resource Management Based on Constellation Model in the ChinaGrid.- Grid Computing Methodology for Protein Structure Prediction and Analysis.- Applying Service Composition in Digital Museum Grid.- Grid Supporting Platform for AMS Data Processing.- A CGSP-Based Grid Application for University Digital Museums.- FleMA: A Flexible Measurement Architecture for ChinaGrid.- A Resource Scheduling Strategy for the CFD Application on the Grid.- Workshop 5: International Workshop on Information Assurance in Distributed Systems (IADS 2005).- A Robust Coalition-Resistant Threshold Signature Scheme with Anonymous Signers.- A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme.- An Efficient Proxy-Protected Signature Scheme Based on Factoring.- Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings.- Encryption Based on Reversible Second-Order Cellular Automata.- ID-Based Proxy Signature Using Bilinear Pairings.- Efficient Fair Certified E-Mail Delivery Based on RSA.- Intrusion Tolerant CA Scheme with Cheaters Detection Ability.- Improvement of Protocol Anomaly Detection Based on Markov Chain and Its Application.- Research and Implementation of Workflow Interoperability Crossing Organizations.- Workshop 6: International Workshop on Mobile Ad-Hoc and Ubiquitous Sensor Networks (MASN 2005).- LSBE: A Localization Scheme Based on Events for Wireless Sensor and Actor Networks.- Crossing Effects Analysis Between Routing and MAC Protocol in Mobile Ad Hoc Networks.- Low-Latency Routing in Ad Hoc Wireless Networks Using Finite Horizons.- Energy Usage in Biomimetic Models for Massively-Deployed Sensor Networks.- Probabilistic Behavior of Sensor Network Localization.- Hybrid Authentication and Key Management Scheme for WSANs.- Storage-Optimal Key Sharing with Authentication in Sensor Networks.- Workshop 7: International Workshop on Service Grid Computing and Applications (SGCA 2005).- An Asynchronous Replica Consistency Model in Data Grid.- Distributed Access Control for Grid Environments Using Trust Management Approach.- Research on Database Access and Integration in UDMGrid.- Resource Allocation Based on Pricing for Grid Computing Environments.- CMSA: A Method for Construction and Maintenance of Semantic Annotations.- NDP2PSim: A NS2-Based Platform for Peer-to-Peer Network Simulations.- Resource Scheduling Scheme for Grid Computing and Its Petri Net Model and Analysis.- The Design and Implementation of Service Adapter in ShanghaiGrid Core.- MCRM System: CIM-Based Multiple Clusters Manager.- Workshop 8: International Workshop on Web Information Systems and Applications (WISA 2005).- to an Agent-Based Grid Workflow Management System.- An XML Query Mechanism with Ontology Integration.- Implementation of Cooperative Cognition Under Web Environment.- Access Authorization Policy for XML Document Security.- OWL2Jess: A Transformational Implementation of the OWL Semantics.- Security Frameworks for Open LBS Based on Web Services Security Mechanism.- Testing and Fault Diagnosis for Web Application Compatibility Based on Combinatorial Method.- A K-Anonymizing Approach for Preventing Link Attacks in Data Publishing.- Transformation-Driven Development of Composite Web Services.- Badness Information Audit Based onImage Character Filtering.- User's Rough Set Based Fuzzy Interest Model in Mining WWW Cache.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826