| 000 | 05222nam a22005775i 4500 | ||
|---|---|---|---|
| 001 | 978-3-642-11659-9 | ||
| 003 | DE-He213 | ||
| 005 | 20140220084531.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 100715s2010 gw | s |||| 0|eng d | ||
| 020 |
_a9783642116599 _9978-3-642-11659-9 |
||
| 024 | 7 |
_a10.1007/978-3-642-11659-9 _2doi |
|
| 050 | 4 | _aTK5105.5-5105.9 | |
| 072 | 7 |
_aUKN _2bicssc |
|
| 072 | 7 |
_aCOM075000 _2bisacsh |
|
| 082 | 0 | 4 |
_a004.6 _223 |
| 100 | 1 |
_aJanowski, Tomasz. _eeditor. |
|
| 245 | 1 | 0 |
_aDistributed Computing and Internet Technology _h[electronic resource] : _b6th International Conference, ICDCIT 2010, Bhubaneswar, India, February 15-17, 2010. Proceedings / _cedited by Tomasz Janowski, Hrushikesha Mohanty. |
| 264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2010. |
|
| 300 |
_aXV, 283p. 80 illus. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v5966 |
|
| 505 | 0 | _aSection 1 – Invited Papers -- Transactional Memory Today -- Maintaining Coherent Views over Dynamic Distributed Data -- Malware: From Modelling to Practical Detection -- Semantic Frameworks—Meanings in the Architecture -- Section 2 – Networking -- Fuzzy-Controlled Source-Initiated Multicasting (FSIM) in Ad Hoc Networks -- On Optimal Space Tessellation with Deterministic Deployment for Coverage in Three-Dimensional Wireless Sensor Networks -- Seamless Handoff between IEEE 802.11 and GPRS Networks -- A Tool to Determine Strategic Location and Ranges of Nodes for Optimum Deployment of Wireless Sensor Network -- An Efficient Hybrid Data-Gathering Scheme in Wireless Sensor Networks -- Section 3 – Grid Computing and Web Services -- Introducing Dynamic Ranking on Web Pages Based on Multiple Ontology Supported Domains -- Multi-criteria Service Selection with Optimal Stopping in Dynamic Service-Oriented Systems -- Template-Based Process Abstraction for Reusable Inter-organizational Applications in RESTful Architecture -- Enhancing the Hierarchical Clustering Mechanism of Storing Resources’ Security Policies in a Grid Authorization System -- A Framework for Web-Based Negotiation -- Section 4 – Internet Technology and Distributed Computing -- Performance Analysis of a Renewal Input Bulk Service Queue with Accessible and Non-accessible Batches -- A Distributed Algorithm for Pattern Formation by Autonomous Robots, with No Agreement on Coordinate Compass -- Gathering Asynchronous Transparent Fat Robots -- Development of Generalized HPC Simulator -- Performance Analysis of Finite Buffer Queueing System with Multiple Heterogeneous Servers -- Finite Buffer Controllable Single and Batch Service Queues -- Enhanced Search in Peer-to-Peer Networks Using Fuzzy Logic -- Section 5 – Software Engineering: Secured Systems -- UML-Compiler: A Framework for Syntactic and Semantic Verification of UML Diagrams -- Evolution of Hyperelliptic Curve Cryptosystems -- Reliability Improvement Based on Prioritization of Source Code -- Secure Dynamic Identity-Based Remote User Authentication Scheme -- Theoretical Notes on Regular Graphs as Applied to Optimal Network Design -- Formal Approaches to Location Management in Mobile Communications -- Automated Test Scenario Selection Based on Levenshtein Distance -- Section 6 – Societal Applications -- Study of Diffusion Models in an Academic Social Network -- First Advisory and Real-Time Health Surveillance to Reduce Maternal Mortality Using Mobile Technology. | |
| 520 | _aThis book constitutes the proceedings of the 6th International Conference on Distributed Computing and Internet Technology, ICDCIT 2010, held in Bhubaneswar, India, in February 2010. The 26 papers presented consists of 12 long papers, 9 short papers and 5 extended abstracts. They were carefully reviewed and selected from 91 submissions. In addition the volume contains 4 invited talks. The topics covered are networking, grid computing and Web services, internet technology and distributed computing, software engineering of secured systems, and societal applications. | ||
| 650 | 0 | _aComputer science. | |
| 650 | 0 | _aComputer Communication Networks. | |
| 650 | 0 | _aSoftware engineering. | |
| 650 | 0 | _aLogic design. | |
| 650 | 0 | _aInformation storage and retrieval systems. | |
| 650 | 0 | _aInformation systems. | |
| 650 | 0 | _aMultimedia systems. | |
| 650 | 1 | 4 | _aComputer Science. |
| 650 | 2 | 4 | _aComputer Communication Networks. |
| 650 | 2 | 4 | _aMultimedia Information Systems. |
| 650 | 2 | 4 | _aInformation Systems Applications (incl.Internet). |
| 650 | 2 | 4 | _aSoftware Engineering. |
| 650 | 2 | 4 | _aInformation Storage and Retrieval. |
| 650 | 2 | 4 | _aLogics and Meanings of Programs. |
| 700 | 1 |
_aMohanty, Hrushikesha. _eeditor. |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9783642116582 |
| 830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v5966 |
|
| 856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-11659-9 |
| 912 | _aZDB-2-SCS | ||
| 912 | _aZDB-2-LNC | ||
| 999 |
_c111899 _d111899 |
||