000 | 07333nam a22006615i 4500 | ||
---|---|---|---|
001 | 978-3-642-11322-2 | ||
003 | DE-He213 | ||
005 | 20240730193907.0 | ||
007 | cr nn 008mamaa | ||
008 | 100715s2010 gw | s |||| 0|eng d | ||
020 |
_a9783642113222 _9978-3-642-11322-2 |
||
024 | 7 |
_a10.1007/978-3-642-11322-2 _2doi |
|
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM043000 _2bisacsh |
|
072 | 7 |
_aUKN _2thema |
|
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aDistributed Computing and Networking _h[electronic resource] : _b11th International Conference, ICDCN 2010, Kolkata, India, January 3-6, 2010, Proceedings / _cedited by Krishna Kant, Sriram V. Pemmaraju, Krishna M. Sivalingam, Jie Wu. |
250 | _a1st ed. 2010. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2010. |
|
300 |
_aXIX, 522 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aTheoretical Computer Science and General Issues, _x2512-2029 ; _v5935 |
|
505 | 0 | _aKeynotes -- An Intelligent IT Infrastructure for the Future -- Heavy Tails and Models for the Web and Social Networks -- Data Structures and Algorithms for Packet Forwarding and Classification: Prof. A.K. Choudhury Memorial Lecture -- Spoken Web: A Parallel Web for the Masses: Industry Keynote -- India's Mobile Revolution and the Unfinished Tasks: Invited Lecture -- Network Protocols and Applications -- Scheduling in Multi-Channel Wireless Networks -- Email Shape Analysis -- Maintaining Safety in Interdomain Routing with Hierarchical Path-Categories -- Fault-tolerance and Security -- On Communication Complexity of Secure Message Transmission in Directed Networks -- On Composability of Reliable Unicast and Broadcast -- A Leader-Free Byzantine Consensus Algorithm -- Authenticated Byzantine Generals in Dual Failure Model -- Sensor Networks -- Mission-Oriented k-Coverage in Mobile Wireless Sensor Networks -- Lessons from the Sparse Sensor Network Deployment in Rural India -- A New Architecture for Hierarchical Sensor Networks with Mobile Data Collectors -- Stability Analysis of Multi-hop Routing in Sensor Networks with Mobile Sinks -- Distributed Algorithms and Optimization -- Optimizing Distributed Computing Workflows in Heterogeneous Network Environments -- Radio Network Distributed Algorithms in the Unknown Neighborhood Model -- Probabilistic Self-stabilizing Vertex Coloring in Unidirectional Anonymous Networks -- A Token-Based Solution to the Group Mutual l-Exclusion Problem in Message Passing Distributed Systems -- Peer-to-Peer Networks and Network Tracing -- The Weak Network Tracing Problem -- Poisoning the Kad Network -- Credit Reputation Propagation: A Strategy to Curb Free-Riding in a Large BitTorrent Swarm -- Formal Understanding of the Emergence of Superpeer Networks: A Complex NetworkApproach -- Parallel and Distributed Systems -- Parallelization of the Lanczos Algorithm on Multi-core Platforms -- Supporting Malleability in Parallel Architectures with Dynamic CPUSETsMapping and Dynamic MPI -- Impact of Object Operations and Relationships on Concurrency Control in DOOS -- Causal Cycle Based Communication Pattern Matching -- Wireless Networks -- Channel Assignment in Virtual Cut-through Switching Based Wireless Mesh Networks -- Efficient Multi-hop Broadcasting in Wireless Networks Using k-Shortest Path Pruning -- Bandwidth Provisioning in Infrastructure-Based Wireless Networks Employing Directional Antennas -- ROTIO+: A Modified ROTIO for Nested Network Mobility -- Applications of Distributed Systems -- VirtualConnection: Opportunistic Networking for Web on Demand -- Video Surveillance with PTZ Cameras: The Problem of Maximizing Effective Monitoring Time -- DisClus: A Distributed Clustering Technique over High Resolution Satellite Data -- Performance Evaluation of a Wormhole-Routed Algorithm for Irregular Mesh NoC Interconnect -- Optical, Cellular and Mobile Ad Hoc Networks -- Dynamic Multipath Bandwidth Provisioning with Jitter, Throughput, SLA Constraints in MPLS over WDM Network -- Path Protection in Translucent WDM Optical Networks -- Post Deployment Planning of 3G Cellular Networks through Dual Homing of NodeBs -- K-Directory Community: Reliable Service Discovery in MANET -- Theory of Distributed Systems -- An Online, Derivative-Free Optimization Approach to Auto-tuning of Computing Systems -- Consistency-Driven Probabilistic Quorum System Construction for Improving Operation Availability -- Hamiltonicity of a General OTIS Network -- Specifying Fault-Tolerance Using Split Precondition Logic -- Network Protocols -- Fast BGP Convergence Following Link/Router Failure -- On Using Network Tomography for Overlay Availability -- QoSBR: A Quality Based Routing Protocol for Wireless Mesh Networks -- An ACO Based Approach for Detection of an Optimal Attack Path in a Dynamic Environment. | |
520 | _aThis book constitutes the refereed proceedings of the 11th International Conference on Distributed Computing and Networking, ICDCN 2010, held in Kolkata, India, during January 3-6, 2010. There were 169 submissions, 96 to the networking track and 73 to the distributed computing track. After review the committee selected 23 papers for the networking and 21 for the distributed computing track. The topics addressed are network protocol and applications, fault-tolerance and security, sensor networks, distributed algorithms and optimization, peer-to-peer networks and network tracing, parallel and distributed systems, wireless networks, applications and distributed systems, optical, cellular and mobile ad hoc networks, and theory of distributed systems. | ||
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aComputer engineering. _910164 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aElectronic digital computers _xEvaluation. _921495 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 1 | 4 |
_aComputer Communication Networks. _9154902 |
650 | 2 | 4 |
_aComputer Engineering and Networks. _9154903 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aSystem Performance and Evaluation. _932047 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
700 | 1 |
_aKant, Krishna. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9154904 |
|
700 | 1 |
_aPemmaraju, Sriram V. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9154905 |
|
700 | 1 |
_aSivalingam, Krishna M. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9154906 |
|
700 | 1 |
_aWu, Jie. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9154907 |
|
710 | 2 |
_aSpringerLink (Online service) _9154908 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642113215 |
776 | 0 | 8 |
_iPrinted edition: _z9783642113239 |
830 | 0 |
_aTheoretical Computer Science and General Issues, _x2512-2029 ; _v5935 _9154909 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-11322-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c94918 _d94918 |