default search action
1st ICDCIT 2004: Bhubaneswar, India
- R. K. Ghosh, Hrushikesha Mohanty:
Distributed Computing and Internet Technology, First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004, Proceedings. Lecture Notes in Computer Science 3347, Springer 2004, ISBN 3-540-24075-6
Plenary Talk - I
- Krithi Ramamritham:
Taming the Dynamics of Distributed Data. 1
Distributed Computing
Keynote Address - I
- Vijay Kumar:
Data in Your Space. 2-20
Invited Talk - I
- Sharma Chakravarthy:
Enabling Technologies for Harnessing Information Explosion. 21
Algorithms and Modeling
- Siddhartha Brahma, Sandeep Macharla, Sudebkumar Prasant Pal, Sudhir Kumar Singh:
Fair Leader Election by Randomized Voting. 22-31 - Pradeep Parvathipuram, Vijay Kumar, Gi-Chul Yang:
An Efficient Leader Election Algorithm for Mobile Ad Hoc Networks. 32-41 - Amiya K. Tripathy, Tripti Negi, Anil Singh:
Distributed Balanced Tables: A New Approach. 42-49
Systems, Protocols and Performance
- Rajesh Kalmady, Digamber Sonvane:
Performance Evaluation of Gigabit Ethernet and SCI in a Linux Cluster. 50-59 - Vijay Shanker Tripathi, Sudarshan Tiwari:
Performance Evaluation of a Modified-Cyclic-Banyan Based ATM/IP Switching Fabric. 60-64 - Sathish Rajasekhar, Ibrahim Khalil, Zahir Tari:
A Scalable and Roboust QoS Architecture for WiFi P2P Networks. 65-74 - Shilpa Dhar, Krishnendu Roy, Rajgopal Kannan:
NEC: Node Energy Based Clustering Protocol for Wireless Sensor Networks with Guaranteed Connectivity. 75-84 - Narottam Chand, Ramesh C. Joshi, Manoj Misra:
Energy Efficient Cache Invalidation in a Disconnected Mobile Environment. 85-95
Transaction and Information Dissemination
- KwangJin Park, MoonBae Song, Chong-Sun Hwang:
An Efficient Data Dissemination Schemes for Location Dependent Information Services. 96-105 - Sharma Chakravarthy, Nishant Vontella:
A Publish/Subscribe Based Architecture of an Alert Server to Support Prioritized and Persistent Alerts. 106-116 - Debmalya Biswas, K. Vidyasankar:
A Nested Transaction Model for LDAP Transactions. 117-126 - Ankur Gupta, Nitin Gupta, R. K. Ghosh, M. M. Gore:
Team Transaction: A New Transaction Model for Mobile Ad Hoc Networks. 127-134 - Diganta Goswami, S. Sahu:
An Efficient Protocol for Checkpoint-Based Failure Recovery in Distributed Systems. 135-144
Plenary Talk - II
- Pradeep K. Khosla:
Cybersecurity: Opportunities and Challenges. 145
Internet Technology
Keynote Address - II
- Bharat K. Bhargava, Leszek Lilien:
Vulnerabilities and Threats in Distributed Systems. 146-157
Query and Retrieval
- Yih-Ling Hedley, Muhammad Younas, Anne E. James:
A TNATS Approcah to Hidden Web Documents. 158-167 - Manjeet Rege, Izabell Caraconcea, Shiyong Lu, Farshad Fotouhi:
Querying XML Documents from a Relational Database in the Presence of DTDs. 168-177 - M. K. MadhuMohan, Sujatha R. Upadhyaya, P. Sreenivasa Kumar:
SAQI: Semantics Aware Query Interface. 178-193
Protocol and Replica Management
- Paola Flocchini, Amiya Nayak, Ming Xie:
Hybrid-Chord: A Peer-to-Peer System Based on Chord. 194-203 - Corina Ferdean, Mesaac Makpangou:
A Generic and Flexible Model for Replica Consistency Management. 204-209 - Vijayalakshmi Hadimani, R. C. Hansdah:
An Efficient Distributed Scheme for Source Routing Protocol in Communication Networks. 210-216
Ontology and Services
- Jeong-Oog Lee, Myeong-Cheol Ko, Woojin Paik, Heung Seok Jeon, Junghwan Kim, Hyun-Kyu Kang, Jinsoo Kim:
The Roles of Ontology and Metadata Registry for Interoperable Databases. 217-226 - Gi-Chul Yang, Sanjay Madria:
DHL: Semantically Rich Dynamic and Active Hyperlinks. 227-236 - Hea-Sook Park, Yan Ha, Soon-Mi Lee, Young-Whan Park, Doo-Kwon Baik:
User-Class Based Service Acceptance Policy Using Cluster Analysis. 237-242
Software Engineering
Invited Talk - II
- Satish Chandra:
Tools and Techniques for Multi-site Sotware Development. 243
Analysis and Modelling
- Satyajit Acharya, Chris George, Hrushikesha Mohanty:
Specifying a Mobile Computing Infrastructure and Services. 244-254 - Xiaoshan Li, Zhiming Liu, Jifeng He, Quan Long:
Generating a Prototype from a UML Model of System Requirements. 255-265 - M. Devi Prasad, Banshi Dhar Chaudhary:
A Type System for an Aspect Oriented Programming Language. 266-272 - Arnab Ray, Bikram Sengupta, Rance Cleaveland:
Secure Requirements Elicitation Through Triggered Message Sequence Charts. 273-282 - Ramakrishnan Venkitaraman, Gopal Gupta:
Framework for Safe Reuse of Software Binaries. 283-293
Tools and Techniques
- Padmanabhan Krishnan, Lei Wang:
Supporting Partial Component Matching. 294-303 - Durga Prasad Mohapatra, Rajib Mall, Rajeev Kumar:
A Novel Approach for Dynamic Slicing of Distributed Object-Oriented Programs. 304-309 - Jianfei Yin, Heqing Guo, Xinyi Peng, Manshan Lin:
Pattern Semantic Link: A Reusable Pattern Representation in MDA Context. 310-317 - Johannes Maria Zaha, Marco Geisenberger, Martin Groth:
Compatibility Test and Adapter Generation for Interfaces of Software Components. 318-328 - Sukhamay Kundu:
A Modern Graphic Flowchart Layout Tool. 329-335
Systems Security
Keynote Address - III
- Sushil Jajodia, Duminda Wijesekera:
A Flexible Authorization Framework for E-Commerce. 336-345
Intrusion Detection and Access Control
- Niranjan K. Boora, Chiranjib Bhattacharyya, Kanchi Gopinath:
Efficient Algorithms for Intrusion Detection. 346-352 - Samik Basu, Prem Uppuluri:
Proxy-Annotated Control Flow Graphs: Deterministic Context-Sensitive Monitoring for Intrusion Detection. 353-362 - Indrakshi Ray, Marianna Muller:
Using Schemas to Simplify Access Control for XML Documents. 363-368 - Vijayalakshmi Atluri, Janice Warner:
Automatic Enforcement of Access Control Policies Among Dynamic Coalitions. 369-378
Network and Security
- Kaushal Sarda, Duminda Wijesekera, Sushil Jajodia:
Implementing Consistency Checking in Correlating Attacks. 379-384 - Seung-Won Shin, Ki-Young Kim, Jong-Soo Jang:
LSAD: Lightweight SYN Flooding Attack Detector. 385-390 - Neelima Arora, R. K. Shyamasundar:
UGSP: Secure Key Establishment Protocol for Ad-Hoc Network. 391-399 - Shravan K. Rayanchu, Gautam Barua:
Tracing Attackers with Deterministic Edge Router Marking (DERM). 400-409
Secured Systems Design
- Sandeep S. Kulkarni, Bezawada Bruhadeshwar:
Distributing Key Updates in Secure Dynamic Groups. 410-419 - Jing Zhou, Brajendra Panda, Yi Hu:
Succinct and Fast Accessible Data Structures for Database Damage Assessment. 420-429 - Vamsi Kambhampati, Indrajit Ray, Eunjong Kim:
A Secure Checkpointing Protocol for Survivable Server Design. 430-440
Security Services
- Ranjit Abbadasari, Ravi Mukkamala, V. Valli Kumari:
MobiCoin: Digital Cash for M-Commerce. 441-451 - Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Cellular Automata : An Ideal Candidate for a Block Cipher. 452-457 - S. N. Sivanandam, C. K. Gokulnath, K. Prasanna, S. Rajeev:
NFD Technique for Efficient and Secured Information Hiding in Low Resolution Images. 458-467
Workshop on Datamining, Security & Application
- Yanxin Wang, Andrew S. Miner, Johnny Wong, Prem Uppuluri:
Improving Feature Selection in Anomaly Intrusion Detection Using Specifications. 468 - Vishal Chowdhary, Alok Tongaonkar, Tzi-cker Chiueh:
Towards Automatic Learning of Valid Services for Honeypots. 469-470
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.