24th International Conference on Distributed Computing Systems Workshops

Overview

Papers from seven workshops at a March 2004 conference examine emerging areas in multimedia network systems and applications, distributed auto-adaptive and reconfigurable systems, smart appliances and wearable computing, assurance in distributed systems and networks, mobile distributed computing, embedded computing, and wireless ad hoc networking. Specific topics include hierarchical network architecture for layered video streaming, high probability impulsive noise removal for corrupted images, motion retrieval ...
See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (1) from $47.77   
  • New (1) from $47.77   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$47.77
Seller since 2007

Feedback rating:

(660)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
{NEW} Paperback.

Ships from: Luzerne, MI

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

Papers from seven workshops at a March 2004 conference examine emerging areas in multimedia network systems and applications, distributed auto-adaptive and reconfigurable systems, smart appliances and wearable computing, assurance in distributed systems and networks, mobile distributed computing, embedded computing, and wireless ad hoc networking. Specific topics include hierarchical network architecture for layered video streaming, high probability impulsive noise removal for corrupted images, motion retrieval and its application to motion synthesis, and a multimedia environment for supporting the teaching of robotics systems. Other topics include an extensible browser architecture for mobile terminals, log-structured storage for efficient weakly-connected replication, and content-based routing with on-demand multicast. There is no subject index. Annotation ©2004 Book News, Inc., Portland, OR
Read More Show Less

Product Details

  • ISBN-13: 9780769520872
  • Publisher: Wiley, John & Sons, Incorporated
  • Publication date: 1/1/2004
  • Pages: 940

Table of Contents

Autonomic group protocol for distributed systems 4
A new scheduler for AF and EF in a DS node 10
Extended video stream by media transcoding functions 16
A new media access control protocol for single hop WDM networks 24
Using metadata in SLA negotiation over premium IP networks 30
Performance improvement of TCP vegas over heterogeneous networks 36
Searching restricted documents in a cooperative search engine 44
Construction of the traditional crafting search engine using Kansei information processing 50
Distributed index updating method for intranet information retrieval 56
Application level rate adaptive of motion-JPEG transmission for medical collaboration systems 64
Heterogeneous groups to causally ordered delivery 70
Improving content replication and QoS in distributed peer-to-peer appliances 78
TOMSCOP - a synchronous P2P collaboration platform over JXTA 85
Proxy-assisted periodic broadcast with multiple servers 91
Delayed-duplicated ACK (DDA) algorithm for TCP performance enhancement to overcome packet sequence disruption in east-handoff of mobile IPv6 98
Interference on multipath QoS routing for ad hoc wireless network 104
Kansei retrieval method using the quantitative feature of traditional Japanese crafting object 112
A study of shape-based image retrieval 118
Video scene determination using audiovisual data analysis 124
Efficient indexing and retrieval scheme for VRML database 130
On the effect of the handover mechanisms in QoS performance in wireless multimedia networks 138
A timing-based bandwidth allocation protocol for QoS provisioning in multimedia wireless networks 144
Multimedia wireless interactive and collaborative telecom services 150
On-line advancement of transmission plans in video-on demand 158
Hierarchical network architecture for layered video streaming 164
Phantom sources for separation of listening and viewing positions of multipresent avatars in narrowcasting collaborative virtual environments 170
A maximum a posteriori identification criterion for wavelet domain watermarking 178
DCT and DWT-based image watermarking by using subsampling 184
High probability impulsive noise removal for corrupted images 190
Audio streaming over bluetooth : an adaptive ARQ timeout approach 196
MPML-FLASH : a multimodal presentation markup language with character agent control in flash medium 202
A gaze and speech multimodal interface 208
Quality driven web services in mobile computing 216
A mobile negotiation agent embedded hybrid online purchasing system 222
An agent-based consumer recommendation mechanism 228
Probabilistic multi-lateral security model for ubiquitous multimedia services 236
Exploiting spatiality, motility and interactivity : a relationship-centric flash retrieval model 242
Significant scene extraction method using situation importance 248
Motion retrieval and its application to motion synthesis 254
A cognition assessment authoring system for e-learning 262
Using VR technology to support e-learning : the 3D virtual radiopharmacy laboratory 268
Pocket SCORM 274
A multimedia environment for supporting the teaching of robotics systems 280
Dynamic service adaptation 290
The GRAVA self-adaptive architecture : history; design; applications; and challenges 298
Towards a context-driven development framework for ambient intelligence 304
System imposed and application compliant adaptations 310
Supporting adaptable distributed systems with FORMAware 320
A framework for evolutionary, dynamically updatable, component-based systems 326
Perimorph : run-time composition and state management for adaptive systems 332
Performance analysis of adaptive consensus protocols based on slowness oracles 340
Adapting distributed voting algorithms for secure real-time embedded systems 347
Timeliness in auto-adaptive distributed systems 354
Design, implementation and validation of a generic and reconfigurable protocol stack framework for mobile terminals 362
A framework for dynamically adaptive applications in a self-organized mobile network environment 368
A re-configurable component model for programmable nodes 375
System design of event space information support utilizing CoBITs 384
DigitClip : activating physical documents 388
An extensible browser architecture for mobile terminals 394
Aware-mail : an event-driven mail system for wearable computing environments 402
Eventcasting with a wearable computer 408
Developing a GIS using a mobile phone equipped with a camera and a GPS, and its exhibitions 414
A message proliferation system using short-range wireless devices 418
Experiences with building distributed middleware for home computing on commodity software 424
Gaia mobility : extending active space boundaries to everyday devices 430
Middleware providing group communication facility based on multi-way synchronization for cellular phone applications 434
Utilizing XML-RPC or SOAP on an embedded system 438
A general architecture for wireless sensor networks : first steps 442
Experiences with building sentient materials using various sensors 445
Modular sensor architecture for unobtrusive routine clinical diagnosis
Log-structured storage for efficient weakly-connected republication 458
Designing a video data management system for monitoring cameras with intuitive interface 464
Indexing continual range queries with covering tiles for fast locating of moving objects 470
An efficient scheduling method for query-set-based broadcasting in mobile environments 478
Using lock-based checking protocol for efficient data broadcast in mobile environments 484
Correct execution of continuous monitoring queries in wireless sensor systems 490
A system architecture for seamless navigation 498
A multi-channel MAC protocol using maximal matching for ad hoc networks 505
Price-based channel time allocation in wireless LANs 511
A light-weight component model for peer-to-peer applications 520
Peer-to-peer cooperative caching in mobile environments 528
Jelly : a dynamic hierarchical P2P overlay network with load balance and locality 534
MobileScope : a programming language with objective mobility 542
A reliable and secure connection migration mechanism for mobile agents 548
Decomposition of fundamental problems for cooperative autonomous mobile systems 554
A method for selecting output data from ubiquitous terminals in a ubiquitous computing environment 562
A metadata-based approach to personalized mobile resource sharing 568
Large-scale location estimation over GSM networks : the gear approach 574
Trust- and clustering-based authentication services in mobile ad hoc networks 582
Ant-based adaptive trust evidence distribution in MANET 588
Performance study of node placement in sensor networks 598
TDMA service for sensor networks 604
An adaptive automobile control system using scheduling by imprecise computation and multiagent-based traffic information exchange and its experimental evaluation 610
A fault-injection attack on Fiat-Shamir cryptosystems 618
Deductive verification of probabilistic real-time systems 622
Finding a recovery line in uncoordinated checkpointing 628
Heterogeneous building automation and IP networks management 636
Diffusion-type autonomous decentralized flow control for open networks 642
Improvements on block size control method for adaptive parallel downloading 648
Agent-based rating oriented information provision and reallocation for high-assurance in open and dynamic environments 656
Autonomous distributed service system implementation 662
Autonomous and proactive adjustment of update allowance in autonomous decentralized database system 668
Evaluations of a directional MAC protocol for ad hoc networks 678
Evaluation of packet latency and fluctuation during UDP packet exchange in ad hoc wireless groups 684
Enhanced routing-aware adaptive MAC with traffic differentiation and smoothed contention window in wireless ad-hoc networks 690
AODV routing protocol implementation design 698
OLSR performance measurement in a military mobile ad-hoc network 704
Position-based routing for heterogeneous wireless ad hoc networks 710
Construction of power efficient routing tree for ad hoc wireless networks using directional antenna 718
Power-aware on-demand routing protocol for MANET 723
Energy consumption speed-based routing for mobile ad hoc networks 729
Mobile internet access in BAS 736
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)