000 | 08258nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-3-540-32115-6 | ||
003 | DE-He213 | ||
005 | 20240730185228.0 | ||
007 | cr nn 008mamaa | ||
008 | 100323s2005 gw | s |||| 0|eng d | ||
020 |
_a9783540321156 _9978-3-540-32115-6 |
||
024 | 7 |
_a10.1007/11576259 _2doi |
|
050 | 4 | _aQA76.9.S88 | |
072 | 7 |
_aUYD _2bicssc |
|
072 | 7 |
_aCOM011000 _2bisacsh |
|
072 | 7 |
_aUYD _2thema |
|
082 | 0 | 4 |
_a004.2 _223 |
245 | 1 | 0 |
_aParallel and Distributed Processing and Applications - ISPA 2005 Workshops _h[electronic resource] : _bISPA 2005 International Workshops, AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA, Nanjing, China, November 2-5, 2005, Proceedings / _cedited by Guihai Chen, Yi Pan, Minyi Guo, Jian Lu. |
250 | _a1st ed. 2005. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2005. |
|
300 |
_aXX, 672 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aTheoretical Computer Science and General Issues, _x2512-2029 ; _v3759 |
|
505 | 0 | _aWorkshop 1: International Workshop on Applications and Economics of Peer-to-Peer Systems (AEPP 2005) -- Aurelia: Building Locality-Preserving Overlay Network over Heterogeneous P2P Environments -- On Building and Updating Distributed LSI for P2P Systems -- Performing Efficient Keyword Search by Keyword Grouping in DHT Peer-to-Peer Network -- Characterization of P2P File-Sharing System -- Analysis of GHT in Mobile Ad Hoc Networks -- Attack Vulnerability of Peer-to-Peer Networks and Cost-Effective Immunization -- A P2P Market Place Based on Aggregate Signatures -- Proof of Service in a Hybrid P2P Environment -- Construct Optimal Diameter Network and d-partition Routing Algorithm -- Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System -- Workshop 2: International Workshop on Advanced Storage Technology and Autonomic Distributed Data (ASTD 2005) -- VTarget: An Improved Software Target Emulator for SANs -- Design and Implementation of an Efficient Multipath for a SAN Environment -- Research of Hot-Spot Selection Algorithm in Virtual Address Switch -- An Efficient Cache Replacement Policy with Distinguishing Write Blocks from Read Blocks in Disk Arrays -- An NFSv4-Based Security Scheme for NAS -- Using Blocks Correlations to Improve the I/O Performance of Large Network Storage System -- A Cluster LVM for SAN Environments -- Workshop 3: International Workshop on Bioinformatics (BIOS 2005) -- COMPACT: A Comparative Package for Clustering Assessment -- Fast Sequence Similarity Computing with LCS on LARPBS -- Fast Scalable Algorithm on LARPBS for Sequence Alignment -- Identification, Expansion, and Disambiguation of Acronyms in Biomedical Texts -- A Knowledge-Driven Method to Evaluate Multi-source Clustering -- Understanding Protein Structure Prediction Using SVM_DT -- Various Features with Integrated Strategies for Protein Name Classification -- Workshop 4: International Workshop on Grid Computing in China (GCIC 2005) -- Uniform Authorization Management in ChinaGrid Support Platform -- to ChinaGrid Support Platform -- A Microeconomics-Based Resource Assignment Model for Grid Computing -- The Campus Resource Management Based on Constellation Model in the ChinaGrid -- Grid Computing Methodology for Protein Structure Prediction and Analysis -- Applying Service Composition in Digital Museum Grid -- Grid Supporting Platform for AMS Data Processing -- A CGSP-Based Grid Application for University Digital Museums -- FleMA: A Flexible Measurement Architecture for ChinaGrid -- A Resource Scheduling Strategy for the CFD Application on the Grid -- Workshop 5: International Workshop on Information Assurance in Distributed Systems (IADS 2005) -- A Robust Coalition-Resistant Threshold Signature Scheme with Anonymous Signers -- A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme -- An Efficient Proxy-Protected Signature Scheme Based on Factoring -- Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings -- Encryption Based on Reversible Second-Order Cellular Automata -- ID-Based Proxy Signature Using Bilinear Pairings -- Efficient Fair Certified E-Mail Delivery Based on RSA -- Intrusion Tolerant CA Scheme with Cheaters Detection Ability -- Improvement of Protocol Anomaly Detection Based on Markov Chain and Its Application -- Research and Implementation of Workflow Interoperability Crossing Organizations -- Workshop 6: International Workshop on Mobile Ad-Hoc and Ubiquitous Sensor Networks (MASN 2005) -- LSBE: A Localization Scheme Based on Events for Wireless Sensor and Actor Networks -- Crossing Effects Analysis Between Routing and MAC Protocol in Mobile Ad Hoc Networks -- Low-Latency Routing in Ad Hoc Wireless Networks Using Finite Horizons -- Energy Usage in Biomimetic Models for Massively-Deployed Sensor Networks -- Probabilistic Behavior of Sensor Network Localization -- Hybrid Authentication and Key Management Scheme for WSANs -- Storage-Optimal Key Sharing with Authentication in Sensor Networks -- Workshop 7: International Workshop on Service Grid Computing and Applications (SGCA 2005) -- An Asynchronous Replica Consistency Model in Data Grid -- Distributed Access Control for Grid Environments Using Trust Management Approach -- Research on Database Access and Integration in UDMGrid -- Resource Allocation Based on Pricing for Grid Computing Environments -- CMSA: A Method for Construction and Maintenance of Semantic Annotations -- NDP2PSim: A NS2-Based Platform for Peer-to-Peer Network Simulations -- Resource Scheduling Scheme for Grid Computing and Its Petri Net Model and Analysis -- The Design and Implementation of Service Adapter in ShanghaiGrid Core -- MCRM System: CIM-Based Multiple Clusters Manager -- Workshop 8: International Workshop on Web Information Systems and Applications (WISA 2005) -- to an Agent-Based Grid Workflow Management System -- An XML Query Mechanism with Ontology Integration -- Implementation of Cooperative Cognition Under Web Environment -- Access Authorization Policy for XML Document Security -- OWL2Jess: A Transformational Implementation of the OWL Semantics -- Security Frameworks for Open LBS Based on Web Services Security Mechanism -- Testing and Fault Diagnosis for Web Application Compatibility Based on Combinatorial Method -- A K-Anonymizing Approach for Preventing Link Attacks in Data Publishing -- Transformation-Driven Development of Composite Web Services -- Badness Information Audit Based onImage Character Filtering -- User's Rough Set Based Fuzzy Interest Model in Mining WWW Cache. | |
650 | 0 |
_aComputer systems. _9138426 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aApplication software. _9138427 |
|
650 | 0 |
_aElectronic digital computers _xEvaluation. _921495 |
|
650 | 0 |
_aSoftware engineering. _94138 |
|
650 | 1 | 4 |
_aComputer System Implementation. _938514 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
650 | 2 | 4 |
_aComputer Communication Networks. _9138428 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9138429 |
650 | 2 | 4 |
_aSystem Performance and Evaluation. _932047 |
650 | 2 | 4 |
_aSoftware Engineering. _94138 |
700 | 1 |
_aChen, Guihai. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9138430 |
|
700 | 1 |
_aPan, Yi. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _927271 |
|
700 | 1 |
_aGuo, Minyi. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9138431 |
|
700 | 1 |
_aLu, Jian. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9138432 |
|
710 | 2 |
_aSpringerLink (Online service) _9138433 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783540297703 |
776 | 0 | 8 |
_iPrinted edition: _z9783540817352 |
830 | 0 |
_aTheoretical Computer Science and General Issues, _x2512-2029 ; _v3759 _9138434 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/11576259 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c92713 _d92713 |