//]]>
Item type Location Call Number Status Date Due
E-Book E-Book AUM Main Library 004.6 (Browse Shelf) Not for loan

Section 1 – Invited Papers -- Transactional Memory Today -- Maintaining Coherent Views over Dynamic Distributed Data -- Malware: From Modelling to Practical Detection -- Semantic Frameworks—Meanings in the Architecture -- Section 2 – Networking -- Fuzzy-Controlled Source-Initiated Multicasting (FSIM) in Ad Hoc Networks -- On Optimal Space Tessellation with Deterministic Deployment for Coverage in Three-Dimensional Wireless Sensor Networks -- Seamless Handoff between IEEE 802.11 and GPRS Networks -- A Tool to Determine Strategic Location and Ranges of Nodes for Optimum Deployment of Wireless Sensor Network -- An Efficient Hybrid Data-Gathering Scheme in Wireless Sensor Networks -- Section 3 – Grid Computing and Web Services -- Introducing Dynamic Ranking on Web Pages Based on Multiple Ontology Supported Domains -- Multi-criteria Service Selection with Optimal Stopping in Dynamic Service-Oriented Systems -- Template-Based Process Abstraction for Reusable Inter-organizational Applications in RESTful Architecture -- Enhancing the Hierarchical Clustering Mechanism of Storing Resources’ Security Policies in a Grid Authorization System -- A Framework for Web-Based Negotiation -- Section 4 – Internet Technology and Distributed Computing -- Performance Analysis of a Renewal Input Bulk Service Queue with Accessible and Non-accessible Batches -- A Distributed Algorithm for Pattern Formation by Autonomous Robots, with No Agreement on Coordinate Compass -- Gathering Asynchronous Transparent Fat Robots -- Development of Generalized HPC Simulator -- Performance Analysis of Finite Buffer Queueing System with Multiple Heterogeneous Servers -- Finite Buffer Controllable Single and Batch Service Queues -- Enhanced Search in Peer-to-Peer Networks Using Fuzzy Logic -- Section 5 – Software Engineering: Secured Systems -- UML-Compiler: A Framework for Syntactic and Semantic Verification of UML Diagrams -- Evolution of Hyperelliptic Curve Cryptosystems -- Reliability Improvement Based on Prioritization of Source Code -- Secure Dynamic Identity-Based Remote User Authentication Scheme -- Theoretical Notes on Regular Graphs as Applied to Optimal Network Design -- Formal Approaches to Location Management in Mobile Communications -- Automated Test Scenario Selection Based on Levenshtein Distance -- Section 6 – Societal Applications -- Study of Diffusion Models in an Academic Social Network -- First Advisory and Real-Time Health Surveillance to Reduce Maternal Mortality Using Mobile Technology.

This book constitutes the proceedings of the 6th International Conference on Distributed Computing and Internet Technology, ICDCIT 2010, held in Bhubaneswar, India, in February 2010. The 26 papers presented consists of 12 long papers, 9 short papers and 5 extended abstracts. They were carefully reviewed and selected from 91 submissions. In addition the volume contains 4 invited talks. The topics covered are networking, grid computing and Web services, internet technology and distributed computing, software engineering of secured systems, and societal applications.

There are no comments for this item.

Log in to your account to post a comment.

Languages: 
English |
العربية