000 08258nam a22006375i 4500
001 978-3-540-32115-6
003 DE-He213
005 20240730185228.0
007 cr nn 008mamaa
008 100323s2005 gw | s |||| 0|eng d
020 _a9783540321156
_9978-3-540-32115-6
024 7 _a10.1007/11576259
_2doi
050 4 _aQA76.9.S88
072 7 _aUYD
_2bicssc
072 7 _aCOM011000
_2bisacsh
072 7 _aUYD
_2thema
082 0 4 _a004.2
_223
245 1 0 _aParallel and Distributed Processing and Applications - ISPA 2005 Workshops
_h[electronic resource] :
_bISPA 2005 International Workshops, AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA, Nanjing, China, November 2-5, 2005, Proceedings /
_cedited by Guihai Chen, Yi Pan, Minyi Guo, Jian Lu.
250 _a1st ed. 2005.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2005.
300 _aXX, 672 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aTheoretical Computer Science and General Issues,
_x2512-2029 ;
_v3759
505 0 _aWorkshop 1: International Workshop on Applications and Economics of Peer-to-Peer Systems (AEPP 2005) -- Aurelia: Building Locality-Preserving Overlay Network over Heterogeneous P2P Environments -- On Building and Updating Distributed LSI for P2P Systems -- Performing Efficient Keyword Search by Keyword Grouping in DHT Peer-to-Peer Network -- Characterization of P2P File-Sharing System -- Analysis of GHT in Mobile Ad Hoc Networks -- Attack Vulnerability of Peer-to-Peer Networks and Cost-Effective Immunization -- A P2P Market Place Based on Aggregate Signatures -- Proof of Service in a Hybrid P2P Environment -- Construct Optimal Diameter Network and d-partition Routing Algorithm -- Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System -- Workshop 2: International Workshop on Advanced Storage Technology and Autonomic Distributed Data (ASTD 2005) -- VTarget: An Improved Software Target Emulator for SANs -- Design and Implementation of an Efficient Multipath for a SAN Environment -- Research of Hot-Spot Selection Algorithm in Virtual Address Switch -- An Efficient Cache Replacement Policy with Distinguishing Write Blocks from Read Blocks in Disk Arrays -- An NFSv4-Based Security Scheme for NAS -- Using Blocks Correlations to Improve the I/O Performance of Large Network Storage System -- A Cluster LVM for SAN Environments -- Workshop 3: International Workshop on Bioinformatics (BIOS 2005) -- COMPACT: A Comparative Package for Clustering Assessment -- Fast Sequence Similarity Computing with LCS on LARPBS -- Fast Scalable Algorithm on LARPBS for Sequence Alignment -- Identification, Expansion, and Disambiguation of Acronyms in Biomedical Texts -- A Knowledge-Driven Method to Evaluate Multi-source Clustering -- Understanding Protein Structure Prediction Using SVM_DT -- Various Features with Integrated Strategies for Protein Name Classification -- Workshop 4: International Workshop on Grid Computing in China (GCIC 2005) -- Uniform Authorization Management in ChinaGrid Support Platform -- to ChinaGrid Support Platform -- A Microeconomics-Based Resource Assignment Model for Grid Computing -- The Campus Resource Management Based on Constellation Model in the ChinaGrid -- Grid Computing Methodology for Protein Structure Prediction and Analysis -- Applying Service Composition in Digital Museum Grid -- Grid Supporting Platform for AMS Data Processing -- A CGSP-Based Grid Application for University Digital Museums -- FleMA: A Flexible Measurement Architecture for ChinaGrid -- A Resource Scheduling Strategy for the CFD Application on the Grid -- Workshop 5: International Workshop on Information Assurance in Distributed Systems (IADS 2005) -- A Robust Coalition-Resistant Threshold Signature Scheme with Anonymous Signers -- A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme -- An Efficient Proxy-Protected Signature Scheme Based on Factoring -- Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings -- Encryption Based on Reversible Second-Order Cellular Automata -- ID-Based Proxy Signature Using Bilinear Pairings -- Efficient Fair Certified E-Mail Delivery Based on RSA -- Intrusion Tolerant CA Scheme with Cheaters Detection Ability -- Improvement of Protocol Anomaly Detection Based on Markov Chain and Its Application -- Research and Implementation of Workflow Interoperability Crossing Organizations -- Workshop 6: International Workshop on Mobile Ad-Hoc and Ubiquitous Sensor Networks (MASN 2005) -- LSBE: A Localization Scheme Based on Events for Wireless Sensor and Actor Networks -- Crossing Effects Analysis Between Routing and MAC Protocol in Mobile Ad Hoc Networks -- Low-Latency Routing in Ad Hoc Wireless Networks Using Finite Horizons -- Energy Usage in Biomimetic Models for Massively-Deployed Sensor Networks -- Probabilistic Behavior of Sensor Network Localization -- Hybrid Authentication and Key Management Scheme for WSANs -- Storage-Optimal Key Sharing with Authentication in Sensor Networks -- Workshop 7: International Workshop on Service Grid Computing and Applications (SGCA 2005) -- An Asynchronous Replica Consistency Model in Data Grid -- Distributed Access Control for Grid Environments Using Trust Management Approach -- Research on Database Access and Integration in UDMGrid -- Resource Allocation Based on Pricing for Grid Computing Environments -- CMSA: A Method for Construction and Maintenance of Semantic Annotations -- NDP2PSim: A NS2-Based Platform for Peer-to-Peer Network Simulations -- Resource Scheduling Scheme for Grid Computing and Its Petri Net Model and Analysis -- The Design and Implementation of Service Adapter in ShanghaiGrid Core -- MCRM System: CIM-Based Multiple Clusters Manager -- Workshop 8: International Workshop on Web Information Systems and Applications (WISA 2005) -- to an Agent-Based Grid Workflow Management System -- An XML Query Mechanism with Ontology Integration -- Implementation of Cooperative Cognition Under Web Environment -- Access Authorization Policy for XML Document Security -- OWL2Jess: A Transformational Implementation of the OWL Semantics -- Security Frameworks for Open LBS Based on Web Services Security Mechanism -- Testing and Fault Diagnosis for Web Application Compatibility Based on Combinatorial Method -- A K-Anonymizing Approach for Preventing Link Attacks in Data Publishing -- Transformation-Driven Development of Composite Web Services -- Badness Information Audit Based onImage Character Filtering -- User's Rough Set Based Fuzzy Interest Model in Mining WWW Cache.
650 0 _aComputer systems.
_9138426
650 0 _aAlgorithms.
_93390
650 0 _aComputer networks .
_931572
650 0 _aApplication software.
_9138427
650 0 _aElectronic digital computers
_xEvaluation.
_921495
650 0 _aSoftware engineering.
_94138
650 1 4 _aComputer System Implementation.
_938514
650 2 4 _aAlgorithms.
_93390
650 2 4 _aComputer Communication Networks.
_9138428
650 2 4 _aComputer and Information Systems Applications.
_9138429
650 2 4 _aSystem Performance and Evaluation.
_932047
650 2 4 _aSoftware Engineering.
_94138
700 1 _aChen, Guihai.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9138430
700 1 _aPan, Yi.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_927271
700 1 _aGuo, Minyi.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9138431
700 1 _aLu, Jian.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9138432
710 2 _aSpringerLink (Online service)
_9138433
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540297703
776 0 8 _iPrinted edition:
_z9783540817352
830 0 _aTheoretical Computer Science and General Issues,
_x2512-2029 ;
_v3759
_9138434
856 4 0 _uhttps://doi.org/10.1007/11576259
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c92713
_d92713