Distributed Computing and Networking: 8th International Conference, ICDCN 2006, Guwahati, India, December 27-30, 2006, Proceedings / Edition 1

Paperback (Print)
Buy New
Buy New from BN.com
$101.58
Used and New from Other Sellers
Used and New from Other Sellers
from $50.00
Usually ships in 1-2 business days
(Save 66%)
Other sellers (Paperback)
  • All (8) from $50.00   
  • New (7) from $50.00   
  • Used (1) from $176.40   

Overview

This book constitutes the refereed proceedings of the 8th International Conference on Distributed Computing and Networking, ICDCN 2006, held in Guwahati, India in December 2006. Coverage in this volume includes ad hoc networks, distributed computing and algorithms, security, grid and P2P computing, performance evaluation, internetworking prools and applications, optical networks and multimedia, sensor networks, and wireless networks.

Read More Show Less

Product Details

Table of Contents

Keynote Talk I.- Distributed Security Algorithms by Mobile Agents.- Session I A: Ad Hoc Networks I.- A Real-Time Guarantee Scheme Based on the Runtime Message Scheduling and Error Control for the Dual Wireless Ad Hoc Sensor Network.- ADIAN: A Distributed Intelligent Ad-Hoc Network.- A Mobility Tolerant Cluster Management Prool with Dynamic Surrogate Cluster-Heads for a Large Ad Hoc Network.- Prediction Based QoS Routing in MANETs.- MCDS Based Multicasting in Mobile Adhoc Networks.- Session I B: Distributed Computing and Algorithms I.- Programmer-Centric Conditions for Itanium Memory Consistency.- A Group Quorum System of Degree .- An Efficient Non-intrusive Checkpointing Algorithm for Distributed Database Systems.- Adaptive Connected Dominating Set – An Exercise in Distributed Output Switching.- An Efficient and Scalable Checkpointing and Recovery Algorithm for Distributed Systems.- Keynote Talk II.- On Distributed Verification.- Session II A: Security.- The Price of Defense and Fractional Matchings.- Construction of Adaptive IDS Through IREP++ and ARM.- Proving Optimality of DWS(Distance-Weighted Sampling) Probability Function for FMS IP Trace-Back Technique.- A Mechanism for Detection and Prevention of Distributed Denial of Service Attacks.- Session II B: Grid and P2P Computing.- Auction Based Resource Allocation in Grids.- MLBLM: A Multi-level Load Balancing Mechanism in Agent-Based Grid.- Data Management for a Distributed Hash Table.- DRWT: An Efficient Random Walk Algorithm for Unstructured P2P Networks.- A.K. Choudhury Memorial Lecture.- Shastic Models of IEEE802.11e Wireless Networks with Multimedia Applications.- Keynote Talk III.- Maintaining Information About Nearby Processors in a Mobile Environment.- Session III A: Ad Hoc Networks II.- Energy Aware Topology Management in Ad Hoc Wireless Networks.- On Maximizing Network Lifetime of Broadcast in WANETs Under an Overhearing Cost Model.- On Maximizing Residual Energy of Actors in Wireless Sensor and Actor Networks.- Locant: A Nature Inspired Location Service for Ad Hoc Networks.- Session III B: Performance Evaluation I.- An Analytical Model for Capacity Evaluation of VoIP on HCCA and TCP File Transfers over EDCA in an IEEE 802.11e WLAN.- Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks.- Design and Implementation of a Network Processor Based 10Gbps Network Traffic Generator.- Shastic Spectral Density Analysis on Network Traffic Characterization.- Negotiating Monitoring Task Allocation for Orbiters.- Keynote Talk IV.- Primality Tests Based on Fermat’s Little Theorem.- Session IV: Distributed Computing and Algorithms II.- Efficient Distributed Handshake Using Mobile Agents.- Improved Distributed Exploration of Anonymous Networks.- The Complexity of Updating Multi-writer Snapshot Objects.- Simultaneous Consensus Tasks: A Tighter Characterization of Set-Consensus.- Database Summarization and Publishing in Wireless Environments.- Keynote Talk V.- Read-Write Reductions.- Session V A: Internetworking Prools and Applications.- Large Scale Voice over IP Experiences on High Performance Intranets.- Z!Stream: An Application Streaming System by Copy-on-Reference Block of Executable Files.- Supervised Grid-of-Tries: A Novel Framework for Classifier Management.- BGPSep_S: An Algorithm for Constructing IBGP Configurations with Complete Visibility.- Performance Enhancement in REM Using Adaptive Drop Policy for Protective and Best-Effort Traffic.- A New Precomputation Scheme for MPLS Traffic Engineering Routing.- Session V B: Ad Hoc Networks III.- A Mobility Aware Technique for Clustering on Mobile Ad-Hoc Networks.- Design and Analysis of Rate Aware Ad Hoc 802.11 Networks.- Tightly Packed IP Address Configuration (TPIA) Prool in Small-Scale MANET.- TransMAN: A Group Communication System for MANETs.- Session VI A: Performance Evaluation II.- On Fault Tolerance of Two-Dimensional Mesh Networks.- Feedback Control with Prediction for Thread Allocation in Pipeline Architecture Web Server.- Variants of Priority Scheduling Algorithms for Reducing Context-Switches in Real-Time Systems.- Session VI B: Optical Networks and Multimedia.- Dynamic Path Shared Protection for Survivable Differentiated Reliable WDM Optical Networks.- A Time Model for Distributed Multimedia Applications.- Destination Initiated Multi-wavelength Reservation Prool (DIMRP) in WDM Optical Networks: Finding the Optimal Selectivity for Wavelength Assignment.- A Hybrid Transformation Technique for Video Coding.- Session VII A: Sensor Networks.- Location Verification Based Defense Against Sybil Attack in Sensor Networks.- A New Scheme for Establishing Pairwise Keys for Wireless Sensor Networks.- Distributed Location and Lifetime Biased Clustering for Large Scale Wireless Sensor Network.- Power Aware Duty Scheduling in Wireless Sensor Networks.- Data Forwarding Prool for Reliable Delivery Service in Wireless Sensor Networks.- Session VII B: Wireless Networks.- Synchronous and Asynchronous Auction Models for Dynamic Spectrum Access.- A One-Pass Method of MIP Registration by WLAN Host Through GPRS Network.- An Idea Bag Strategy to Discourage Selfish Behavior Under Random Token MAC Prools for Wireless LANs.- A Signalling Technique for Disseminating Neighbouring AP Channel Information to Mobile Stations.- A Predictive Location Management Scheme by Extracting the Unique Sub-patterns from the Mobility Logs.

Read More Show Less

Customer Reviews

Average Rating 5
( 1 )
Rating Distribution

5 Star

(1)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Posted June 13, 2013

    I¿m loving McDonalds for fast food... MyDeals247 for the best de

    I’m loving McDonalds for fast food... MyDeals247 for the best deals;))

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)