000 | 07743nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-3-540-92295-7 | ||
003 | DE-He213 | ||
005 | 20240730194336.0 | ||
007 | cr nn 008mamaa | ||
008 | 100301s2009 gw | s |||| 0|eng d | ||
020 |
_a9783540922957 _9978-3-540-92295-7 |
||
024 | 7 |
_a10.1007/978-3-540-92295-7 _2doi |
|
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM043000 _2bisacsh |
|
072 | 7 |
_aUKN _2thema |
|
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aDistributed Computing and Networking _h[electronic resource] : _b10th International Conference, ICDCN 2009, Hyderabad, India, January 3-6, 2009, Proceedings / _cedited by Vijay Garg, Roger Wattenhofer, Kishore Kothapalli. |
250 | _a1st ed. 2009. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2009. |
|
300 |
_aXVIII, 476 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aTheoretical Computer Science and General Issues, _x2512-2029 ; _v5408 |
|
505 | 0 | _aA.K. Choudhury Memorial Lecture -- Tracking Dynamics Using Sensor Networks: Some Recurring Themes -- Keynote Talks -- Distributed Computing and the Multicore Revolution -- The Rise of People-Centric Sensing -- Temporal Considerations in Wireless Networks and Cyberphysical Systems -- Sensor Networks 1 -- Finding Facilities Fast -- Large-Scale Networked Systems: From Anarchy to Geometric Self-structuring -- Cheapest Paths in Multi-interface Networks -- Concept-Based Routing in Ad-Hoc Networks -- Heuristics for Minimizing Interference in Sensor Networks -- Multi-core and Shared Memory -- Non-blocking Array-Based Algorithms for Stacks and Queues -- Provable STM Properties: Leveraging Clock and Locks to Favor Commit and Early Abort -- Aspectising Concurrency for the RTSJ -- An Asymptotic Performance/Energy Analysis and Optimization of Multi-core Architectures -- A Cost-Optimal Algorithm for Guard Zone Problem -- Peer-to-Peer Computing -- Underlay Aware Resiliency in P2P Overlays -- HPC5: An Efficient Topology Generation Mechanism for Gnutella Networks -- Representation of Complex Concepts for Semantic Routed Network -- Guaranteeing Eventual Coherency across Data Copies, in a Highly Available Peer-to-Peer Distributed File System -- Reliability and Security -- On Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous Networks -- Response-Time Modeling of Controller Area Network (CAN) -- A Threat-Aware Anomaly-Based Intrusion-Detection Approach for Obtaining Network-Specific Useful Alarms -- Traffic Engineering Based Attack Detection in Active Networks -- Security against Sybil Attack in Wireless Sensor Network through Location Verification -- Distributed Computing -- Incentives to Tight the Runtime Estimates of EASY Backfilling -- An Index-Based Mobile Checkpointing and Recovery Algorithm -- A Formal Framework and a Tool for the Specification and Analysis of G-Nets Models Based on Graph Transformation -- Fair Resource Allocation in Distributed Combinatorial Auctioning Systems -- Network Algorithms -- Compact Routing Schemes for Dynamic Trees in the Fixed Port Model -- An Analytical Model of Information Dissemination for a Gossip-Based Protocol -- A Distributed O(/E/) Algorithm for Optimal Link-Reversal -- Fault Tolerance and Models -- Two Consensus Algorithms with Atomic Registers and Failure Detector ? -- Self-similar Functions and Population Protocols: A Characterization and a Comparison -- Byzantine-Resilient Convergence in Oblivious Robot Networks -- Snap-Stabilization in Message-Passing Systems -- A Novel Performance Index for Characterizing Stochastic Faulty Patterns in Mesh-Based Networks -- Sensor Networks 2 -- Optimizing Multi-hop Queries in ZigBee Based Multi-sink Sensor Networks -- QDMAC: An Energy Efficient Low Latency MAC Protocol for Query Based Wireless Sensor Networks -- Field Sensing and Target Tracking Using Mobile Sensors -- Q-Coverage Problem in Wireless Sensor Networks -- On Providing Reliability and Maximizing Network Lifetime in Multi-Sink Wireless Sensor Networks -- Fault-Tolerance and Replication -- Fault-Tolerant Implementations of Regular Registers by Safe Registers with Applications to Networks -- A General Approach to Analyzing Quorum-Based Heterogeneous Dynamic Data Replication Schemes -- Tree-Based Dynamic Primary Copy Algorithms for Replicated Databases -- FTRepMI: Fault-Tolerant, Sequentially-Consistent Object Replication for Grid Applications -- Wireless Networks -- Effective Layer-3 Protocols for Integrating Mobile Ad Hoc Network and the Internet -- Performance Analysis of a UMTS Cell with Underlying Tunnel-WLANs -- PerformanceComparison of Orthogonal Gold and Walsh Hadamard Codes for Quasi-Synchronous CDMA Communication -- Analysis of Optimum Interleaver for Receivers in IDMA Systems -- Enhancement of QoS in 802.11e for Different Traffics -- Sensor Networks 3 -- Flooding-Assisted Threshold Assignment for Aggregate Monitoring in Sensor Networks -- A Mechanism to Structure Mission-Aware Interaction in Mobile Sensor Networks -- Balancing Energy Dissipation in Data Gathering Wireless Sensor Networks Using Ant Colony Optimization -- Rate Adaptive Channel MAC -- Grid and Cluster Computing -- Efficient Load Balancing on a Cluster for Large Scale Online Video Surveillance -- Cluster Performance Forecasting Using Predictive Modeling for Virtual Beowulf Clusters -- A Hierarchical Approach to Handle Group Mutual Exclusion Problem in Distributed Systems -- Virtual Time Fair Queuing Algorithm for a Computational Grid. | |
520 | _aThis book constitutes the refereed proceedings of the 10th International Conference on Distributed Computing and Networking, ICDCN 2009, held in Hyderabad, India, during January 3-6, 2009. The 20 papers and 32 short presentations presented together with 3 keynote talks and a memorial lecture on A.K. Choudhury were carefully reviewed and selected from 179 submissions. The topics addressed are sensor networks, multi-core and shared memory, peer-to-peer-computing, reliability and security, distributed computing, network algorithms, fault tolerance and models, fault tolerance and replication, wireless networks, and grid and cluster computing. | ||
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aComputer programming. _94169 |
|
650 | 0 |
_aSoftware engineering. _94138 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 0 |
_aApplication software. _9156681 |
|
650 | 1 | 4 |
_aComputer Communication Networks. _9156682 |
650 | 2 | 4 |
_aProgramming Techniques. _9156683 |
650 | 2 | 4 |
_aSoftware Engineering. _94138 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9156684 |
700 | 1 |
_aGarg, Vijay. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9156685 |
|
700 | 1 |
_aWattenhofer, Roger. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9156686 |
|
700 | 1 |
_aKothapalli, Kishore. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9156687 |
|
710 | 2 |
_aSpringerLink (Online service) _9156688 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783540922940 |
776 | 0 | 8 |
_iPrinted edition: _z9783540922964 |
830 | 0 |
_aTheoretical Computer Science and General Issues, _x2512-2029 ; _v5408 _9156689 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-540-92295-7 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c95148 _d95148 |