The Resource Distributed computing and internet technology : first international conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004 : proceedings, R.K. Ghosh, Hrushikesha Mohanty (eds.)
Distributed computing and internet technology : first international conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004 : proceedings, R.K. Ghosh, Hrushikesha Mohanty (eds.)
Resource Information
The item Distributed computing and internet technology : first international conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004 : proceedings, R.K. Ghosh, Hrushikesha Mohanty (eds.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.This item is available to borrow from 2 library branches.
Resource Information
The item Distributed computing and internet technology : first international conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004 : proceedings, R.K. Ghosh, Hrushikesha Mohanty (eds.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.
This item is available to borrow from 2 library branches.
- Extent
- 1 online resource (xx, 472 pages)
- Contents
-
- Plenary Talk
- I
- Taming the Dynamics of Disributed Data
- DISTRIBUTED COMPUTING
- Data in Your Space
- Enabling Technologies for Harnessing Information Explosion
- Fair Leader Election by Randomized Voting
- An Efficient Leader Election Algorithm for Mobile Ad Hoc Networks
- Distributed Balanced Tables: A New Approach
- Performance Evaluation of Gigabit Ethernet and SCI in a Linux Cluster
- Performance Evaluation of a Modified-Cyclic-Banyan Based ATM / IP Switching Fabric
- A Scalable and Robust QoS Architecture for WiFi P2P Networks
- NEC: Node Energy Based Clustering Protocol for Wireless Sensor Networks with Guaranteed Connectivity
- Energy Efficient Cache Invalidation in a Disconnected Mobile Environment
- An Efficient Data Dissemination Schemes for Location Dependent Information Services
- A Publish / Subscribe Based Architecture of an Alert Server to Support Prioritized and Persistent Alerts
- A Nested Transaction Model for LDAP Transactions
- Team Transaction: A New Transaction Model for Mobile Ad Hoc Networks
- An Efficient Protocol for Checkpoint-Based Failure Recovery in Distributed Systems
- Cybersecurity: Opportunities and Challenges
- INTERNET TECHNOLOGY
- Vulnerabilities and Threats in Distributed Systems
- A TNATS Approach to Hidden Web Documents
- Querying XML Documents from a Relational Database in the Presence of DTDs
- SAQI: Semantics Aware Query Interface
- Hybrid-Chord: A Peer-to-Peer System Based on Chord
- A Generic and Flexible Model for Replica Consistency Management
- An Efficient Distributed Scheme for Source Routing Protocol in Communication Networks
- The Roles of Ontology and Metadata Registry for Interoperable Databases
- DHL: Semantically Rich Dynamic and Active Hyperlinks
- User-Class Based Service Acceptance Policy Using Cluster Analysis
- SOFTWARE ENGINEERING
- Tools and Techniques for Multi-site Software Development
- Specifying a Mobile Computing Infrastructure and Services
- Generating a Prototype from a UML Model of System Requirements
- A Type System for an Aspect Oriented Programming Language
- Secure Requirements Elicitation Through Triggered Message Sequence Charts
- Framework for Safe Reuse of Software Binaries
- Supporting Partial Component Matching
- A Novel Approach for Dynamic Slicing of Distributed Object-Oriented Programs
- Pattern Semantic Link: A Reusable Pattern Representation in MDA Context
- Compatibility Test and Adapter Generation for Interfaces of Software Components
- A Modern Graphic Flowchart Layout Tool
- SYSTEMS SECURITY
- A Flexible Authorization Framework for E-Commerce
- Efficient Algorithms for Intrusion Detection
- Proxi-Annotated Control Flow Graphs: Deterministic Context-Sensitive Monitoring for Intrusion Detection
- Using Schemas to Simplify Access Control for XML Documents
- Automatic Enforcement of Access Control Policies Among Dynamic Coalitions
- Implementing Consistency Checking in Correlating Attacks
- LSAD: Lightweight SYN Flooding Attack Detector
- UGSP: Secure Key Establishment Protocol for Ad-Hoc Networks
- Tracing Attackers with Deterministic Edge Router Marking (DERM)
- Distributing Key Updates in Secure Dynamic Groups
- Succinct and Fast Accessible Data Structures for Database Damage Assessment
- A Secure Checkpointing Protocol for Survivable Server Design
- MobiCoin: Digital Cash for M-Commerce
- Cellular Automata: An Ideal Candidate for a Block Cipher
- NFD Technique for Efficient and Secured Information Hiding in Low Resolution Images
- WORKSHOP ON DATAMINING, SECURITY & APPLICATION
- Improving Feature Selection in Anomaly Intrusion Detection Using Specifications
- Towards Automatic Learning of Valid Services for Honeypots
- Isbn
- 9783540305552
- Label
- Distributed computing and internet technology : first international conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004 : proceedings
- Title
- Distributed computing and internet technology
- Title remainder
- first international conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004 : proceedings
- Statement of responsibility
- R.K. Ghosh, Hrushikesha Mohanty (eds.)
- Title variation
- ICDCIT 2004
- Subject
-
- Conference papers and proceedings
- Electronic data processing -- Distributed processing
- Electronic data processing -- Distributed processing
- Electronic data processing -- Distributed processing -- Congresses
- Génie logiciel
- Informatique
- Informatique répartie
- Internet
- Internet
- Internet
- Internet -- Congresses
- Sécurité informatique
- Conference papers and proceedings
- Language
- eng
- Cataloging source
- GW5XE
- Dewey number
- 004.6/78
- Illustrations
- illustrations
- Index
- index present
- LC call number
- QA76.9.D5
- LC item number
- I56 2004
- Literary form
- non fiction
- http://bibfra.me/vocab/lite/meetingDate
- 2004
- http://bibfra.me/vocab/lite/meetingName
- ICDCIT 2004
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/relatedWorkOrContributorName
-
- Ghosh, R. K
- Mohanty, Hrushikesha
- Series statement
- Lecture notes in computer science,
- Series volume
- 3347
- http://library.link/vocab/subjectName
-
- Electronic data processing
- Internet
- Informatique
- Electronic data processing
- Internet
- Génie logiciel
- Informatique répartie
- Internet
- Sécurité informatique
- Label
- Distributed computing and internet technology : first international conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004 : proceedings, R.K. Ghosh, Hrushikesha Mohanty (eds.)
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Plenary Talk -- I -- Taming the Dynamics of Disributed Data -- DISTRIBUTED COMPUTING -- Data in Your Space -- Enabling Technologies for Harnessing Information Explosion -- Fair Leader Election by Randomized Voting -- An Efficient Leader Election Algorithm for Mobile Ad Hoc Networks -- Distributed Balanced Tables: A New Approach -- Performance Evaluation of Gigabit Ethernet and SCI in a Linux Cluster -- Performance Evaluation of a Modified-Cyclic-Banyan Based ATM / IP Switching Fabric -- A Scalable and Robust QoS Architecture for WiFi P2P Networks -- NEC: Node Energy Based Clustering Protocol for Wireless Sensor Networks with Guaranteed Connectivity -- Energy Efficient Cache Invalidation in a Disconnected Mobile Environment -- An Efficient Data Dissemination Schemes for Location Dependent Information Services -- A Publish / Subscribe Based Architecture of an Alert Server to Support Prioritized and Persistent Alerts -- A Nested Transaction Model for LDAP Transactions -- Team Transaction: A New Transaction Model for Mobile Ad Hoc Networks -- An Efficient Protocol for Checkpoint-Based Failure Recovery in Distributed Systems -- Cybersecurity: Opportunities and Challenges -- INTERNET TECHNOLOGY -- Vulnerabilities and Threats in Distributed Systems -- A TNATS Approach to Hidden Web Documents -- Querying XML Documents from a Relational Database in the Presence of DTDs -- SAQI: Semantics Aware Query Interface -- Hybrid-Chord: A Peer-to-Peer System Based on Chord -- A Generic and Flexible Model for Replica Consistency Management -- An Efficient Distributed Scheme for Source Routing Protocol in Communication Networks -- The Roles of Ontology and Metadata Registry for Interoperable Databases -- DHL: Semantically Rich Dynamic and Active Hyperlinks -- User-Class Based Service Acceptance Policy Using Cluster Analysis -- SOFTWARE ENGINEERING -- Tools and Techniques for Multi-site Software Development -- Specifying a Mobile Computing Infrastructure and Services -- Generating a Prototype from a UML Model of System Requirements -- A Type System for an Aspect Oriented Programming Language -- Secure Requirements Elicitation Through Triggered Message Sequence Charts -- Framework for Safe Reuse of Software Binaries -- Supporting Partial Component Matching -- A Novel Approach for Dynamic Slicing of Distributed Object-Oriented Programs -- Pattern Semantic Link: A Reusable Pattern Representation in MDA Context -- Compatibility Test and Adapter Generation for Interfaces of Software Components -- A Modern Graphic Flowchart Layout Tool -- SYSTEMS SECURITY -- A Flexible Authorization Framework for E-Commerce -- Efficient Algorithms for Intrusion Detection -- Proxi-Annotated Control Flow Graphs: Deterministic Context-Sensitive Monitoring for Intrusion Detection -- Using Schemas to Simplify Access Control for XML Documents -- Automatic Enforcement of Access Control Policies Among Dynamic Coalitions -- Implementing Consistency Checking in Correlating Attacks -- LSAD: Lightweight SYN Flooding Attack Detector -- UGSP: Secure Key Establishment Protocol for Ad-Hoc Networks -- Tracing Attackers with Deterministic Edge Router Marking (DERM) -- Distributing Key Updates in Secure Dynamic Groups -- Succinct and Fast Accessible Data Structures for Database Damage Assessment -- A Secure Checkpointing Protocol for Survivable Server Design -- MobiCoin: Digital Cash for M-Commerce -- Cellular Automata: An Ideal Candidate for a Block Cipher -- NFD Technique for Efficient and Secured Information Hiding in Low Resolution Images -- WORKSHOP ON DATAMINING, SECURITY & APPLICATION -- Improving Feature Selection in Anomaly Intrusion Detection Using Specifications -- Towards Automatic Learning of Valid Services for Honeypots
- Control code
- 324998507
- Dimensions
- unknown
- Extent
- 1 online resource (xx, 472 pages)
- Form of item
- online
- Isbn
- 9783540305552
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other physical details
- illustrations.
- http://library.link/vocab/ext/overdrive/overdriveId
- 978-3-540-24075-4
- Specific material designation
- remote
- System control number
- (OCoLC)324998507
- Label
- Distributed computing and internet technology : first international conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004 : proceedings, R.K. Ghosh, Hrushikesha Mohanty (eds.)
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Plenary Talk -- I -- Taming the Dynamics of Disributed Data -- DISTRIBUTED COMPUTING -- Data in Your Space -- Enabling Technologies for Harnessing Information Explosion -- Fair Leader Election by Randomized Voting -- An Efficient Leader Election Algorithm for Mobile Ad Hoc Networks -- Distributed Balanced Tables: A New Approach -- Performance Evaluation of Gigabit Ethernet and SCI in a Linux Cluster -- Performance Evaluation of a Modified-Cyclic-Banyan Based ATM / IP Switching Fabric -- A Scalable and Robust QoS Architecture for WiFi P2P Networks -- NEC: Node Energy Based Clustering Protocol for Wireless Sensor Networks with Guaranteed Connectivity -- Energy Efficient Cache Invalidation in a Disconnected Mobile Environment -- An Efficient Data Dissemination Schemes for Location Dependent Information Services -- A Publish / Subscribe Based Architecture of an Alert Server to Support Prioritized and Persistent Alerts -- A Nested Transaction Model for LDAP Transactions -- Team Transaction: A New Transaction Model for Mobile Ad Hoc Networks -- An Efficient Protocol for Checkpoint-Based Failure Recovery in Distributed Systems -- Cybersecurity: Opportunities and Challenges -- INTERNET TECHNOLOGY -- Vulnerabilities and Threats in Distributed Systems -- A TNATS Approach to Hidden Web Documents -- Querying XML Documents from a Relational Database in the Presence of DTDs -- SAQI: Semantics Aware Query Interface -- Hybrid-Chord: A Peer-to-Peer System Based on Chord -- A Generic and Flexible Model for Replica Consistency Management -- An Efficient Distributed Scheme for Source Routing Protocol in Communication Networks -- The Roles of Ontology and Metadata Registry for Interoperable Databases -- DHL: Semantically Rich Dynamic and Active Hyperlinks -- User-Class Based Service Acceptance Policy Using Cluster Analysis -- SOFTWARE ENGINEERING -- Tools and Techniques for Multi-site Software Development -- Specifying a Mobile Computing Infrastructure and Services -- Generating a Prototype from a UML Model of System Requirements -- A Type System for an Aspect Oriented Programming Language -- Secure Requirements Elicitation Through Triggered Message Sequence Charts -- Framework for Safe Reuse of Software Binaries -- Supporting Partial Component Matching -- A Novel Approach for Dynamic Slicing of Distributed Object-Oriented Programs -- Pattern Semantic Link: A Reusable Pattern Representation in MDA Context -- Compatibility Test and Adapter Generation for Interfaces of Software Components -- A Modern Graphic Flowchart Layout Tool -- SYSTEMS SECURITY -- A Flexible Authorization Framework for E-Commerce -- Efficient Algorithms for Intrusion Detection -- Proxi-Annotated Control Flow Graphs: Deterministic Context-Sensitive Monitoring for Intrusion Detection -- Using Schemas to Simplify Access Control for XML Documents -- Automatic Enforcement of Access Control Policies Among Dynamic Coalitions -- Implementing Consistency Checking in Correlating Attacks -- LSAD: Lightweight SYN Flooding Attack Detector -- UGSP: Secure Key Establishment Protocol for Ad-Hoc Networks -- Tracing Attackers with Deterministic Edge Router Marking (DERM) -- Distributing Key Updates in Secure Dynamic Groups -- Succinct and Fast Accessible Data Structures for Database Damage Assessment -- A Secure Checkpointing Protocol for Survivable Server Design -- MobiCoin: Digital Cash for M-Commerce -- Cellular Automata: An Ideal Candidate for a Block Cipher -- NFD Technique for Efficient and Secured Information Hiding in Low Resolution Images -- WORKSHOP ON DATAMINING, SECURITY & APPLICATION -- Improving Feature Selection in Anomaly Intrusion Detection Using Specifications -- Towards Automatic Learning of Valid Services for Honeypots
- Control code
- 324998507
- Dimensions
- unknown
- Extent
- 1 online resource (xx, 472 pages)
- Form of item
- online
- Isbn
- 9783540305552
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other physical details
- illustrations.
- http://library.link/vocab/ext/overdrive/overdriveId
- 978-3-540-24075-4
- Specific material designation
- remote
- System control number
- (OCoLC)324998507
Subject
- Conference papers and proceedings
- Electronic data processing -- Distributed processing
- Electronic data processing -- Distributed processing
- Electronic data processing -- Distributed processing -- Congresses
- Génie logiciel
- Informatique
- Informatique répartie
- Internet
- Internet
- Internet
- Internet -- Congresses
- Sécurité informatique
- Conference papers and proceedings
Genre
Member of
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Distributed-computing-and-internet-technology-/CGRqHXbKlXY/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Distributed-computing-and-internet-technology-/CGRqHXbKlXY/">Distributed computing and internet technology : first international conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004 : proceedings, R.K. Ghosh, Hrushikesha Mohanty (eds.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Distributed computing and internet technology : first international conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004 : proceedings, R.K. Ghosh, Hrushikesha Mohanty (eds.)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Distributed-computing-and-internet-technology-/CGRqHXbKlXY/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Distributed-computing-and-internet-technology-/CGRqHXbKlXY/">Distributed computing and internet technology : first international conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004 : proceedings, R.K. Ghosh, Hrushikesha Mohanty (eds.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>