Distributed Computing -- IWDC 2004: 6th International Workshop, Kolkata, India, December 27-30, 2004, Proceedings / Edition 1

Paperback (Print)
Buy New
Buy New from BN.com
Used and New from Other Sellers
Used and New from Other Sellers
from $7.06
Usually ships in 1-2 business days
(Save 94%)
Other sellers (Paperback)
  • All (10) from $7.06   
  • New (6) from $100.63   
  • Used (4) from $7.06   


This book constitutes the refereed proceedings of the 6th International Workshop on Distributed Computing, IWDC 2004, held in Kolkata, India in December 2004.

The 27 revised full papers and 27 revised short papers presented together with 3 invited contributions and abstracts of 11 reviewed workshop papers were carefully reviewed and selected from 157 submissions. The papers are organized in topical sections on distributed algorithms, high-performance computing, distributed systems, wireless networks, information security, network prools, reliability and testing, network topology and routing, mobile computing, ad-hoc networks, and sensor networks.

Read More Show Less

Product Details

  • ISBN-13: 9783540240761
  • Publisher: Springer Berlin Heidelberg
  • Publication date: 2/14/2005
  • Series: Lecture Notes in Computer Science Series, #3326
  • Edition description: 2005
  • Edition number: 1
  • Pages: 546
  • Product dimensions: 9.21 (w) x 6.14 (h) x 1.17 (d)

Table of Contents

Keynote Talk I.- The Next Chapter in Networking Research: Evolutionary or Revolutionary?.- Session I A: Distributed Algorithms.- Performance of Fair Distributed Mutual Exclusion Algorithms.- A Framework for Automatic Identification of the Best Checkpoint and Recovery Prool.- Distributed Computation for Swapping a Failing Edge.- Flexible Cycle Synchronized Algorithm in Parallel and Distributed Simulation.- Rule Mining for Dynamic Databases.- Session I B: High Performance Computing.- APPLE: A Novel P2P Based e-Learning Environment.- Heuristic-Based Scheduling to Maximize Throughput of Data-Intensive Grid Applications.- Failure Recovery in Grid Database Systems.- On Design of Cluster and Grid Computing Environment Toolkit for Bioinformatics Applications.- Study of Scheduling Strategies in a Dynamic Data Grid Environment.- Virtual Molecular Computing – Emulating DNA Molecules.- Session II A: Distributed Systems.- Complexity of Compositional Model Checking of Computation Tree Logic on Simple Structures.- A Multi-agent Framework Based on Communication and Concurrency.- Statistical Analysis of a P2P Query Graph Based on Degrees and Their Time-Evolution.- t-UNITY – A Formal Framework for Modeling and Reasoning About Timing Constraints in Real-Time Systems.- Finding Pareto-Optimal Set of Distributed Vectors with Minimum Disclosure.- Lean-DFS: A Distributed Filesystem for Resource Starved Clients.- Session II B: Wireless Networks.- A Fair Medium Access Prool Using Adaptive Flow-Rate Control Through Cooperative Negotiation Among Contending Flows in Ad Hoc Wireless Network with Directional Antenna.- Analytical-Numerical Study of Mobile IPv6 and Hierarchical Mobile IPv6.- An Adaptive Transmission Power Control Prool for Mobile Ad Hoc Networks.- A Macro-Mobility Scheme for Reduction in Handover Delay and Signaling Traffic in MIPv6.- QoS Support in TLMM: Three Level Mobility Model for IP-Based Networks.- Path Stability Based Adaptation of MANET Routing Prools.- A. K. Choudhury Memorial Lecture.- Computational Biology – The New Frontier of Computer Science.- Session III A: Information Security.- Cryptanalysis of “Wavelet Tree Quantization” Watermarking Scheme.- A Multisignature Scheme for Implementing Safe Delivery Rule in Group Communication Systems.- Agent-Based Distributed Intrusion Alert System.- SCIDS: A Soft Computing Intrusion Detection System.- Effect of Data Encryption on Wireless Ad Hoc Network Performance.- Session III B: Network Prools.- On-Board RSVP: An Extension of RSVP to Support Real-Time Services in On-Board IP Networks.- A Secure PIM-SM Multicast Routing Prool.- Restoration of Virtual Private Networks with QoS Guarantees in the Pipe Model.- A User Level, Reliable, and Reconfigurable Transport Layer Prool.- Keynote Talk II.- The Notion of Veto Number for Distributed Agreement Problems.- Session IV A: Reliability and Testing.- Reliability of VLSI Linear Arrays with Redundant Links.- A Technique to Ensure Reliability in a WDM Optical Backbone Network with Contemporary Link Failures.- Formal Proof of Impossibility of Reliability in Crashing Prools.- Altera Max Plus II Development Environment in Fault Simulation and Test Implementation of Embedded.- Session IV B: Networks: Topology and Routing.- A Distributed Contention Resolution Scheme to Reduce Blocking Probability in Optical Burst Switching Networks.- Polynomial Interpolation on OTIS-Mesh Optoelectronic Computers.- A New Network Topology with Multiple Three-Dimensional Meshes.- Adaptive Fault Tolerant Routing in Star Graph.- Routing and Wavelength Assignment in Wavelength Division Multiplexing Networks.- Session V: Mobile Computing I.- Designing the MDVM-Stub and Memory Estimator.- Improved Algorithm for Minimum Cost Range Assignment Problem for Linear Radio Networks.- Optimal Schemes for Channel Assignment Problem in Wireless Networks Modeled as 2-Dimensional Square Grids.- Session VI: Ad Hoc Networks.- Mobility Tolerant Broadcast in Mobile Ad Hoc Networks.- Distributed Mobility Tracking for Ad Hoc Networks Based on an Autoregressive Model.- Broadcast and Gossiping Algorithms for Mobile Ad Hoc Networks Based on Breadth-First Traversal.- RINGS: Lookup Service for Peer-to-Peer Systems in Mobile Ad-Hoc Networks.- Session VII: Mobile Computing II.- Performance Analysis of Location Caching with Fixed Local Anchor in Wireless Networks.- On the Optimization Trade-Offs of Expanding Ring Search.- Dynamic Location Management with Personalized Location Area for Future PCS Networks.- Improvement of Paging Cost by Updating Using Paging Delay Divergence.- Session VIII: Sensor Networks.- Distributed Power Control in Sensor Networks: A Game Theoretic Approach.- A K-Connected Energy-Saving Topology Control Algorithm for Wireless Sensor Networks.- Locating Objects in a Sensor Grid.- Poster Presentations.- A Novel Remote User Authentication Scheme Through Dynamic Login Identity.- A Probabilistic Admission Control Algorithm in Wireless/Mobile Cellular Networks.- A Rough Neuro Data Mining Approach for Network Intrusion Detection.- An Efficient Implementation of Distance-Based Update Scheme Using Directional Cell Identification Codes.- Application of Formal Methods for Analysis of Authentication Prools.- BUSTRAP – An Efficient Travel Planner for Metropolitans.- Distributed Evolutionary Algorithm Search for Multiobjective Spanning Tree Problem.- MSIP: A Prool for Efficient Handoffs of Real Time Multimedia Sessions in Mobile Wireless Scenarios.- Network Management System Using Web Server Controlled Mobile Agents.- Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks.- High-Level Grid Execution Patterns.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)