000 07743nam a22006375i 4500
001 978-3-540-92295-7
003 DE-He213
005 20240730194336.0
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 _a9783540922957
_9978-3-540-92295-7
024 7 _a10.1007/978-3-540-92295-7
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM043000
_2bisacsh
072 7 _aUKN
_2thema
082 0 4 _a004.6
_223
245 1 0 _aDistributed Computing and Networking
_h[electronic resource] :
_b10th International Conference, ICDCN 2009, Hyderabad, India, January 3-6, 2009, Proceedings /
_cedited by Vijay Garg, Roger Wattenhofer, Kishore Kothapalli.
250 _a1st ed. 2009.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2009.
300 _aXVIII, 476 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aTheoretical Computer Science and General Issues,
_x2512-2029 ;
_v5408
505 0 _aA.K. Choudhury Memorial Lecture -- Tracking Dynamics Using Sensor Networks: Some Recurring Themes -- Keynote Talks -- Distributed Computing and the Multicore Revolution -- The Rise of People-Centric Sensing -- Temporal Considerations in Wireless Networks and Cyberphysical Systems -- Sensor Networks 1 -- Finding Facilities Fast -- Large-Scale Networked Systems: From Anarchy to Geometric Self-structuring -- Cheapest Paths in Multi-interface Networks -- Concept-Based Routing in Ad-Hoc Networks -- Heuristics for Minimizing Interference in Sensor Networks -- Multi-core and Shared Memory -- Non-blocking Array-Based Algorithms for Stacks and Queues -- Provable STM Properties: Leveraging Clock and Locks to Favor Commit and Early Abort -- Aspectising Concurrency for the RTSJ -- An Asymptotic Performance/Energy Analysis and Optimization of Multi-core Architectures -- A Cost-Optimal Algorithm for Guard Zone Problem -- Peer-to-Peer Computing -- Underlay Aware Resiliency in P2P Overlays -- HPC5: An Efficient Topology Generation Mechanism for Gnutella Networks -- Representation of Complex Concepts for Semantic Routed Network -- Guaranteeing Eventual Coherency across Data Copies, in a Highly Available Peer-to-Peer Distributed File System -- Reliability and Security -- On Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous Networks -- Response-Time Modeling of Controller Area Network (CAN) -- A Threat-Aware Anomaly-Based Intrusion-Detection Approach for Obtaining Network-Specific Useful Alarms -- Traffic Engineering Based Attack Detection in Active Networks -- Security against Sybil Attack in Wireless Sensor Network through Location Verification -- Distributed Computing -- Incentives to Tight the Runtime Estimates of EASY Backfilling -- An Index-Based Mobile Checkpointing and Recovery Algorithm -- A Formal Framework and a Tool for the Specification and Analysis of G-Nets Models Based on Graph Transformation -- Fair Resource Allocation in Distributed Combinatorial Auctioning Systems -- Network Algorithms -- Compact Routing Schemes for Dynamic Trees in the Fixed Port Model -- An Analytical Model of Information Dissemination for a Gossip-Based Protocol -- A Distributed O(/E/) Algorithm for Optimal Link-Reversal -- Fault Tolerance and Models -- Two Consensus Algorithms with Atomic Registers and Failure Detector ? -- Self-similar Functions and Population Protocols: A Characterization and a Comparison -- Byzantine-Resilient Convergence in Oblivious Robot Networks -- Snap-Stabilization in Message-Passing Systems -- A Novel Performance Index for Characterizing Stochastic Faulty Patterns in Mesh-Based Networks -- Sensor Networks 2 -- Optimizing Multi-hop Queries in ZigBee Based Multi-sink Sensor Networks -- QDMAC: An Energy Efficient Low Latency MAC Protocol for Query Based Wireless Sensor Networks -- Field Sensing and Target Tracking Using Mobile Sensors -- Q-Coverage Problem in Wireless Sensor Networks -- On Providing Reliability and Maximizing Network Lifetime in Multi-Sink Wireless Sensor Networks -- Fault-Tolerance and Replication -- Fault-Tolerant Implementations of Regular Registers by Safe Registers with Applications to Networks -- A General Approach to Analyzing Quorum-Based Heterogeneous Dynamic Data Replication Schemes -- Tree-Based Dynamic Primary Copy Algorithms for Replicated Databases -- FTRepMI: Fault-Tolerant, Sequentially-Consistent Object Replication for Grid Applications -- Wireless Networks -- Effective Layer-3 Protocols for Integrating Mobile Ad Hoc Network and the Internet -- Performance Analysis of a UMTS Cell with Underlying Tunnel-WLANs -- PerformanceComparison of Orthogonal Gold and Walsh Hadamard Codes for Quasi-Synchronous CDMA Communication -- Analysis of Optimum Interleaver for Receivers in IDMA Systems -- Enhancement of QoS in 802.11e for Different Traffics -- Sensor Networks 3 -- Flooding-Assisted Threshold Assignment for Aggregate Monitoring in Sensor Networks -- A Mechanism to Structure Mission-Aware Interaction in Mobile Sensor Networks -- Balancing Energy Dissipation in Data Gathering Wireless Sensor Networks Using Ant Colony Optimization -- Rate Adaptive Channel MAC -- Grid and Cluster Computing -- Efficient Load Balancing on a Cluster for Large Scale Online Video Surveillance -- Cluster Performance Forecasting Using Predictive Modeling for Virtual Beowulf Clusters -- A Hierarchical Approach to Handle Group Mutual Exclusion Problem in Distributed Systems -- Virtual Time Fair Queuing Algorithm for a Computational Grid.
520 _aThis book constitutes the refereed proceedings of the 10th International Conference on Distributed Computing and Networking, ICDCN 2009, held in Hyderabad, India, during January 3-6, 2009. The 20 papers and 32 short presentations presented together with 3 keynote talks and a memorial lecture on A.K. Choudhury were carefully reviewed and selected from 179 submissions. The topics addressed are sensor networks, multi-core and shared memory, peer-to-peer-computing, reliability and security, distributed computing, network algorithms, fault tolerance and models, fault tolerance and replication, wireless networks, and grid and cluster computing.
650 0 _aComputer networks .
_931572
650 0 _aComputer programming.
_94169
650 0 _aSoftware engineering.
_94138
650 0 _aData protection.
_97245
650 0 _aAlgorithms.
_93390
650 0 _aApplication software.
_9156681
650 1 4 _aComputer Communication Networks.
_9156682
650 2 4 _aProgramming Techniques.
_9156683
650 2 4 _aSoftware Engineering.
_94138
650 2 4 _aData and Information Security.
_931990
650 2 4 _aAlgorithms.
_93390
650 2 4 _aComputer and Information Systems Applications.
_9156684
700 1 _aGarg, Vijay.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9156685
700 1 _aWattenhofer, Roger.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9156686
700 1 _aKothapalli, Kishore.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9156687
710 2 _aSpringerLink (Online service)
_9156688
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540922940
776 0 8 _iPrinted edition:
_z9783540922964
830 0 _aTheoretical Computer Science and General Issues,
_x2512-2029 ;
_v5408
_9156689
856 4 0 _uhttps://doi.org/10.1007/978-3-540-92295-7
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c95148
_d95148