default search action
2nd ICDCIT 2005: Bhubaneswar, India
- Goutam Chakraborty:
Distributed Computing and Internet Technology, Second International Conference, ICDCIT 2005, Bhubaneswar, India, December 22-24, 2005, Proceedings. Lecture Notes in Computer Science 3816, Springer 2005, ISBN 3-540-30999-3
Plenary Talk I
- S. Sitharama Iyengar:
The Distributed Sensor Networks - An Emerging Technology. 1
Distributed Computing
- Arunabha Sen:
Distribute Computing Track Chair's Message. 2
Network Protcols
- Sun Ok Yang, SungSuk Kim, Chong-Sun Hwang:
Efficient Binding Lifetime Determination Schemes in HMIPv6. 3-14 - Jia Hou, Moon Ho Lee:
A Fast Search and Advanced Marking Scheme for Network IP Traceback Model. 15-20 - Li-Mei Peng, Young-Chul Kim, Kyoung-Min Yoo, Kyeong-Eun Han, Young-Chon Kim:
Design and Performance Evaluation of Token-Based MAC Protocols in WDM Burst Switched Ring Networks. 21-26
Routing in Mobile Ad Hoc Network
- Smruti Padhy, Diganta Goswami:
Self-stabilizing Energy-Aware Routing Algorithm in Wireless Sensor Network with Limited Mobility. 27-38 - Anand Prakash Ruhil, D. K. Lobiyal, Ivan Stojmenovic:
Position Based Gradient Routing in Mobile Ad Hoc Networks. 39-49 - B. Paul, S. V. Rao:
Distributed Clustering Algorithm for Finding Virtual Backbone in Ad Hoc Networks. 50-55 - Orhan Dagdeviren, Kayhan Erciyes, Deniz Cokuslu:
Merging Clustering Algorithms in Mobile Ad Hoc Networks. 56-61 - Krishnan Murugan, Sethu Shanmugavel:
Performance Study and Implementation of Self Organized Routing Algorithm for Mobile Ad Hoc Network Using GloMoSim. 62-68
Communication and Coverage in Wireless Networks
- Mahesh Arumugam, Sandeep S. Kulkarni:
Self-stabilizing Deterministic TDMA for Sensor Networks. 69-81 - Michihiro Inoue, Noriaki Yoshiura, Yoshikuni Onozato:
Effect of Mobility on Communication Performance in Overloaded One-Dimensional Cellular Networks. 82-92 - Subhasis Bhattacharjee, Nabanita Das:
Distributed Time Slot Assignment in Wireless Ad Hoc Networks for STDMA. 93-104 - Sasanka Roy, Debabrata Bardhan, Sandip Das:
Efficient Algorithm for Placing Base Stations by Avoiding Forbidden Zone. 105-116
Secured Communication in Distributed Systems
- Anshuman Singh, Siddharth Barman, Kaushal K. Shukla:
Secure Two-Party Context Free Language Recognition. 117-124 - Jaydip Sen, Indranil Sengupta:
Autonomous Agent Based Distributed Fault-Tolerant Intrusion Detection System. 125-131 - Paola Flocchini, Amiya Nayak, Arno Schulz:
Cleaning an Arbitrary Regular Network with Mobile Agents. 132-142
Query and Transaction Processing
- Yon Dohn Chung, Ji Yeon Lee:
Multi-attribute Hashing of Wireless Data for Content-Based Queries. 143-153 - B. Nagaprabhanjan, Varsha Apte:
A Tool for Automated Resource Consumption Profiling of Distributed Transactions. 154-165 - JinHo Ahn:
An Efficient Algorithm for Removing Useless Logged Messages in SBML Protocols. 166-171
Theory of Distributed Systems
- Rahul Agarwal, Mahender Bisht, S. N. Maheshwari, Sanjiva Prasad:
Divide and Concur: Employing Chandra and Toueg's Consensus Algorithm in a Multi-level Setting. 172-183 - Chandrashekhara Thejaswi P. S., Ranjeet Kumar Patro:
Distributed Multiple Hypothesis Testing in Sensor Networks Under Bandwidth Constraint. 184-191 - Paritosh Chandrapal, Padam Kumar:
A Scalable Multi-level Distributed System-Level Diagnosis. 192-202 - Punit Chandra, Ajay D. Kshemkalyani:
Analysis of Interval-Based Global State Detection. 203-216
Grid Computing
- Junghee Lee, Dongsoo Han:
A Two-Phase Scheduling Algorithm for Efficient Collective Communications of MPICH-G2. 217-228 - Sarbani Roy, Nandini Mukherjee:
Towards an Agent-Based Framework for Monitoring and Tuning Application Performance in Grid Environment. 229-234 - D. Janakiram, M. Venkateswara Reddy, A. Vijay Srinivas, M. A. Maluk Mohamed, S. Santosh Kumar:
GDP: A Paradigm for Intertask Communication in Grid Computing Through Distributed Pipes. 235-241
Internet Technology
- Sanjay Kumar Madria:
Internet Technology Track Chair's Message. 242
Internet Search and Query
- Huajun Chen:
Rewriting Queries Using View for RDF/RDFS-Based Relational Data Integration. 243-254 - Kil Hong Joo, Jaeho Lee:
An Effective Searching Method Using the Example-Based Query. 255-266 - Rajat Shuvro Roy, Mohammad Sohel Rahman:
On Communicating with Agents on the Network. 267-277
E-Commerce
- Yukun Cao, Yunfeng Li, Xiaofeng Liao:
Applying Fuzzy Logic to Recommend Consumer Electronics. 278-289 - V. Radha, S. Ramakrishna, N. Pradeep Kumar:
Generic XML Schema Definition (XSD) to GUI Translator. 290-296 - Xiaoling Dai, John C. Grundy:
Off-Line Micro-payment System for Content Sharing in P2P Networks. 297-307
Browsing and Analysis of Web Elements
- Debajyoti Mukhopadhyay, Pradipta Biswas:
FlexiRank: An Algorithm Offering Flexibility and Accuracy for Ranking the Web Pages. 308-313 - Atul Kumar, Anjali Bhargava, Bharat K. Bhargava, Sanjay Madria:
Adaptable Web Browsing of Images in Mobile Computing Environment: Experiments and Observations. 314-320 - Kil Hong Joo, Soojung Lee:
An Incremental Document Clustering Algorithm Based on a Hierarchical Agglomerative Approach. 321-332
Systems Security
- Indrajit Ray:
System Security Track Chair's Message. 333
Theory of Secured Systems
- Debapriyay Mukhopadhyay, Suman Roy:
A Game Based Model of Security for Key Predistribution Schemes in Wireless Sensor Network. 334-347 - Tao Jiang, Wonil Kim, Kyung-suk Lhee, Manpyo Hong:
E-mail Worm Detection Using the Analysis of Behavior. 348-356 - M. Choudary Gorantla, Ashutosh Saxena:
Verifiably Encrypted Signature Scheme Without Random Oracles. 357-363
Intrusion Detection and Ad Hoc Network Security
- S. Prasanna, V. Vetri Selvi:
An Improved Intrusion Detection Technique for Mobile Adhoc Networks. 364-376 - Bezawada Bruhadeshwar, Sandeep S. Kulkarni:
User Revocation in Secure Adhoc Networks. 377-388 - C. V. Raman, Atul Negi:
A Hybrid Method to Intrusion Detection Systems Using HMM. 389-396
Secured Systems Techniques
- Suresh Reddy, Sukumar Nandi:
Enhanced Network Traffic Anomaly Detector. 397-403 - Jae-Min Seol, Seong-Whan Kim:
Statistically Secure Extension of Anti-collusion Code Fingerprinting. 404-409 - Hyun-Seong Sung, Seong-Whan Kim:
An Improvement of Auto-Correlation Based Video Watermarking Scheme Using Perceptual Masking for Motion. 410-419 - Manachai Toahchoodee, Indrakshi Ray:
Validation of Policy Integration Using Alloy. 420-431
Plenary Talk II
- Jifeng He:
Linking Theories of Concurrency by Retraction. 432
Software Engineering
- Gopal Gupta:
Software Engineering Track Chair's Message. 433
Software Architecture
- Qian Wang:
Integrating Architecture Description Languages: A Semantics-Based Approach. 434-445 - Zhijiang Dong, Yujian Fu, Yue Fu, Xudong He:
Automated Runtime Validation of Software Architecture Design. 446-457
Software Optimization and Reliability
- Abhik Roychoudhury, Tulika Mitra, Hemendra Singh Negi:
Analyzing Loop Paths for Execution Time Estimation. 458-469 - Rakesh Tripathi, Rajib Mall:
A Technique for Early Software Reliability Prediction. 470-481
Formal Methods
- Bikram Sengupta, Rance Cleaveland:
Executable Requirements Specifications Using Triggered Message Sequence Charts. 482-493 - Mohammad Mahdi Jaghoori, Marjan Sirjani, Mohammad Reza Mousavi, Ali Movaghar:
Efficient Symmetry Reduction for an Actor-Based Model. 494-507 - A. K. Bhattacharjee, R. K. Shyamasundar:
Validated Code Generation for Activity Diagrams. 508-521
Data Mining
- Mukesh K. Mohania:
Data Mining Track Chair's Message. 522
Data Clustering Techniques
- Swarup Roy, D. K. Bhattacharyya:
An Approach to Find Embedded Clusters Using Density Based Techniques. 523-535 - Pradeep Kumar, M. Venkateswara Rao, P. Radha Krishna, Raju S. Bapi:
Using Sub-sequence Information with kNN for Classification of Sequential Data. 536-546 - Girish Keshav Palshikar:
Distance-Based Outliers in Sequences. 547-552 - Pradeep Kumar, Tapati Bandopadhyay:
Capturing Market Intelligence from Customer Feedback E-mails Using Self-enhancing Bolzmann Machine-Based Network of Knowledge Maps. 553-560
Multidimensional Data Mining
- Amir Ahmad, Lipika Dey:
Algorithm for Fuzzy Clustering of Mixed Data with Numeric and Categorical Attributes. 561-572 - Ilias Michalarias, Hans-Joachim Lenz:
Dissemination of Multidimensional Data Using Broadcast Clusters. 573-584 - S. Vijayalakshmi, S. Suresh Raja:
Multidimensional Frequent Pattern Mining Using Association Rule Based Constraints. 585-591 - M. A. H. Zahid, Ankush Mittal, Ramesh Chandra Joshi:
A Classification Based Approach for Root Unknown Phylogenetic Networks Under Constrained Recombination. 592-603
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.