Sold Out
Book Categories |
The distributed sensor networks - an emerging technology | 1 | |
Distributed computing track chair's message | 2 | |
Efficient binding lifetime determination schemes in HMIPv6 | 3 | |
A fast search and advanced marking scheme for network IP traceback model | 15 | |
Design and performance evaluation of token-based MAC protocols in WDM burst switched ring networks | 21 | |
Self-stabilizing energy-aware routing algorithm in wireless sensor network with limited mobility | 27 | |
Position based gradient routing in mobile ad hoc networks | 39 | |
Distributed clustering algorithm for finding virtual backbone in ad hoc networks | 50 | |
Merging clustering algorithms in mobile ad hoc networks | 58 | |
Performance study and implementation of self organized routing algorithm for mobile ad hoc network using GloMoSim | 62 | |
Self-stabilizing deterministic TDMA for sensor networks | 69 | |
Effect of mobility on communication performance in overloaded one-dimensional cellular networks | 82 | |
Distributed time slot assignment in wireless ad hoc networks for STDMA | 93 | |
Efficient algorithm for placing base stations by avoiding forbidden zone | 105 | |
Secure two-party context free language recognition | 117 | |
Autonomous agent based distributed fault-tolerant intrusion detection system | 125 | |
Cleaning an arbitrary regular network with mobile agents | 132 | |
Multi-attribute hashing of wireless data for content-based queries | 143 | |
A tool for automated resource consumption profiling of distributed transactions | 154 | |
An efficient algorithm for removing useless logged messages in SBML protocols | 166 | |
Divide and concur : employing Chandra and Toueg's Consensus algorithm in a multi-level setting | 172 | |
Distributed multiple hypothesis testing in sensor networks under bandwidth constraint | 184 | |
A scalable multi-level distributed system-level diagnosis | 192 | |
Analysis of interval-based global state detection | 203 | |
A two-phase scheduling algorithm for efficient collective communications of MPICH-G2 | 217 | |
Towards an agent-based framework for monitoring and tuning application performance in grid environment | 229 | |
GDP : a paradigm for intertask communication in grid computing through distributed pipes | 235 | |
Internet technology track chair's message | 242 | |
Rewriting queries using view for RDF/RDFS-based relational data integration | 243 | |
An effective searching method using the example-based query | 255 | |
On communicating with agents on the network | 267 | |
Applying fuzzy logic to recommend consumer electronics | 278 | |
Generic XML schema definition (XSD) to GUI translator | 290 | |
Off-line micro-payment system for content sharing in P2P networks | 297 | |
FlexiRank : an algorithm offering flexibility and accuracy for ranking the Web pages | 308 | |
Adaptable Web browsing of images in mobile computing environment : experiments and observations | 314 | |
An incremental document clustering algorithm based on a hierarchical agglomerative approach | 321 | |
System security track chair's message | 333 | |
A game based model of security for key predistribution schemes in wireless sensor network | 334 | |
E-mail worm detection using the analysis of behavior | 348 | |
Verifiably encrypted signature scheme without random oracles | 357 | |
An improved intrusion detection technique for mobile adhoc networks | 364 | |
User revocation in secure adhoc networks | 377 | |
A hybrid method to intrusion detection systems using HMM | 389 | |
Enhanced network traffic anomaly detector | 397 | |
Statistically secure extension of anti-collusion code fingerprinting | 404 | |
An improvement of auto-correlation based video watermarking scheme using perceptual masking for motion | 410 | |
Validation of policy integration using alloy | 420 | |
Linking theories of concurrency by retraction | 432 | |
Software engineering track chair's message | 433 | |
Integrating architecture description languages : a semantics-based approach | 434 | |
Automated runtime validation of software architecture design | 446 | |
Analyzing loop paths for execution time estimation | 458 | |
A technique for early software reliability prediction | 470 | |
Executable requirements specifications using triggered message sequence charts | 482 | |
Efficient symmetry reduction for an actor-based model | 494 | |
Validated code generation for activity diagrams | 508 | |
Data mining track chair's message | 522 | |
An approach to find embedded clusters using density based techniques | 523 | |
Using sub-sequence information with kNN for classification of sequential data | 536 | |
Distance-based outliers in sequences | 547 | |
Capturing market intelligence from customer feedback E-mails using self-enhancing Bolztmann machine-based network of knowledge maps | 553 | |
Algorithm for fuzzy clustering of mixed data with numeric and categorical attributes | 561 | |
Dissemination of multidimensional data using broadcast clusters | 573 | |
Multidimensional frequent pattern mining using association rule based constraints | 585 | |
A classification based approach for root unknown phylogenetic networks under constrained recombination | 592 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionDistributed Computing And Internet Technology Second International Conference, Icdcit 2005, ...
X
This Item is in Your InventoryDistributed Computing And Internet Technology Second International Conference, Icdcit 2005, ...
X
You must be logged in to review the productsX
X
X
Add Distributed Computing And Internet Technology Second International Conference, Icdcit 2005, ..., This book constitutes the refereed proceedings of the Second International Conference on Distributed Computing and Internet Technology, ICDCIT 2005, held in Bhubaneswar, India in December 2005. The 40 revised full papers and 19 revised short papers pre, Distributed Computing And Internet Technology Second International Conference, Icdcit 2005, ... to the inventory that you are selling on WonderClubX
X
Add Distributed Computing And Internet Technology Second International Conference, Icdcit 2005, ..., This book constitutes the refereed proceedings of the Second International Conference on Distributed Computing and Internet Technology, ICDCIT 2005, held in Bhubaneswar, India in December 2005. The 40 revised full papers and 19 revised short papers pre, Distributed Computing And Internet Technology Second International Conference, Icdcit 2005, ... to your collection on WonderClub |