Distributed computing and internet technology: 6th International Conference, ICDCIT 2010, Bhubaneswar, India, February 15-17, 2010, Proceedings
Janowski, Tomasz
Mohanty, Hrushikesha
This book constitutes the proceedings of the 6th International Conference on Distributed Computing and Internet Technology, ICDCIT 2010, held in Bhubaneswar, India, in February 2010. The 26 papers presented consists of 12 long papers, 9 short papers and 5 extended abstracts. They were carefully reviewed and selected from 91 submissions. In addition the volume contains 4 invited talks. The topics covered are networking, grid computing and Web services, internet technology and distributed computing, software engineering of secured systems, and societal applications. conference proceedings INDICE: Section 1 – Invited Papers Transactional Memory Today 1 Maurice Herlihy Maintaining Coherent Views over Dynamic Distributed Data 13 Krithi Ramamritham Malware: From Modelling to Practical Detection . 21 R.K. Shyamasundar, Harshit Shah, and N.V. Narendra Kumar Semantic Frameworks—Meanings in the Architecture . 40 Jim Davies and Jeremy Gibbons Section 2 – Networking Fuzzy-Controlled Source-Initiated Multicasting (FSIM) in Ad Hoc Networks . 55 Anuradha Banerjee and Paramartha Dutta On Optimal Space Tessellation with Deterministic Deployment for Coverage in Three-Dimensional Wireless Sensor Networks . 72 Manas Kumar Mishra and M.M. Gore Seamless Handoff between IEEE 802.11 and GPRS Networks 84 Dhananjay Kotwal, Maushumi Barooah, and Sukumar Nandi A Tool to Determine Strategic Location and Ranges of Nodes for Optimum Deployment of WirelessSensor Network 91 Amrit Kumar, Mukul Kumar, and Kumar Padmanabh An Efficient Hybrid Data-Gathering Scheme in Wireless Sensor Networks . 98 Ayon Chakraborty, Swarup Kumar Mitra, and M.K. Naskar Section 3 – Grid Computing and Web Services Introducing Dynamic Ranking on Web Pages Based on Multiple Ontology Supported Domains . 104 Debajyoti Mukhopadhyay, Anirban Kundu, and Sukanta Sinha Multi-criteria Service Selection with Optimal Stopping in Dynamic Service-Oriented Systems 110 Oliver Skroch XIV Table of Contents Template-Based Process Abstraction for Reusable Interorganizational Applications in RESTful Architecture 122 Cheng Zhu, Hao Yu, Hongming Cai, and Boyi Xu Enhancing the Hierarchical Clustering Mechanism of Storing Resources’ Security Policies in a Grid Authorization System . 134 Mustafa Kaiiali, Rajeev Wankar, C.R. Rao, and Arun Agarwal A Framework for Web-Based Negotiation 140 Hrushikesha Mohanty, Rajesh Kurra, andR.K. Shyamasundar Section 4 – Internet Technology and Distributed Computing Performance Analysis of a Renewal Input Bulk Service Queue with Accessible and Non-accessible Batches 152 Yesuf Obsie Mussa and P. Vijaya Laxmi A DistributedAlgorithm for Pattern Formation by Autonomous Robots, with No Agreement on Coordinate Compass . 157 Swapnil Ghike and Krishnendu Mukhopadhyaya Gathering Asynchronous Transparent Fat Robots 170 Sruti Gan Chaudhuri and Krishnendu Mukhopadhyaya Development of Generalized HPC Simulator . 176 W. Hurst, S. Ramaswamy, R. Lenin, and D. Hoffman Performance Analysis of Finite Buffer Queueing System with Multiple Heterogeneous Servers 180 C. Misra and P.K. Swain Finite Buffer Controllable Single and Batch Service Queues 184 J.R. Mohanty Enhanced Search in Peer-to-Peer Networks Using Fuzzy Logic . 188 Sirish Kumar Balaga, K. Haribabu, and Chittaranjan Hota Section 5 – Software Engineering: Secured Systems UML-Compiler: A Framework for Syntactic and Semantic Verification of UML Diagrams 194 Jayeeta Chanda, Ananya Kanjilal, and Sabnam Sengupta Evolution of Hyperelliptic Curve Cryptosystems . 206 Kakali Chatterjee and Daya Gupta Reliability Improvement Based on Prioritization of Source Code 212 Mitrabinda Ray andDurga Prasad Mohapatra Table of Contents XV Secure Dynamic Identity-Based Remote User Authentication Scheme 224 Sandeep K. Sood, Anil K. Sarje, and Kuldip Singh Theoretical Notes on Regular Graphs as Applied to Optimal Network Design236 Sanket Patil and Srinath Srinivasa Formal Approaches to Location Management in Mobile Communications 243 Juanhua Kang, Qin Li, Huibiao Zhu, and WenjuanWu Automated Test Scenario Selection Based on Levenshtein Distance . 255 Sapna P.G. and Hrushikesha Mohanty Section 6 – Societal Applications Study of Diffusion Models in an Academic Social Network . 267 Vasavi Junapudi, Gauri K. Udgata, and Siba K. Udgata First Advisory and Real-Time Health Surveillance to Reduce Maternal Mortality Using Mobile Technology 279 Satya Swarup Samal, ArunavMishra, Sidheswar Samal, J.K. Pattnaik, and Prachet Bhuyan Author Index 283
- ISBN: 978-3-642-11658-2
- Editorial: Springer
- Encuadernacion: Rústica
- Páginas: 283
- Fecha Publicación: 08/02/2010
- Nº Volúmenes: 1
- Idioma: Inglés