did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540681397

Distributed Computing and Networking: 8th International Conference, ICDCN 2006, Guwahati, India, December 27-30, 2006, Proceedings

by ; ; ;
  • ISBN13:

    9783540681397

  • ISBN10:

    3540681396

  • Format: Paperback
  • Copyright: 2007-02-03
  • Publisher: Springer Verlag

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

List Price: $149.00 Save up to $115.59
  • Buy Used
    $111.75
    Add to Cart Free Shipping Icon Free Shipping

    USUALLY SHIPS IN 2-4 BUSINESS DAYS

Supplemental Materials

What is included with this book?

Summary

This book constitutes the refereed proceedings of the 8th International Conference on Distributed Computing and Networking, ICDCN 2006 - formerly known as IWDC International Workshop on Distributed Computing) - held in Guwahati, India in December 2006. The 29 revised full papers and 30 revised short papers presented together with 5 invited keynote talks were carefully reviewed and selected from 245 submissions. The papers are organized in topical sections on ad hoc networks, distributed computing and algorithms, security, grid and P2P computing, performance evaluation, internetworking protocols and applications, optical networks and multimedia, sensor networks, and wireless networks.

Table of Contents

Distributed security algorithms by mobile agentsp. 1
A real-time guarantee scheme based on the runtime message scheduling and error control for the dual wireless ad hoc sensor networkp. 15
ADIAN : a distributed intelligent ad-hoc networkp. 27
A mobility tolerant cluster management protocol with dynamic surrogate cluster-heads for a large ad hoc networkp. 40
Prediction based QoS routing in MANETsp. 46
MCDS based multicasting in mobile adhoc networksp. 52
Programmer-centric conditions for itanium memory consistencyp. 58
A group quorum system of degree [actual symbol not reproducible]p. 70
An efficient non-intrusive checkpointing algorithm for distributed database systemsp. 82
Adaptive connected dominating set - an exercise in distributed output switchingp. 88
An efficient and scalable checkpointing and recovery algorithm for distributed systemsp. 94
On distributed verificationp. 100
The price of defense and fractional matchingsp. 115
Construction of adaptive IDS through IREP++ and ARMp. 127
Proving optimality of DWS (distance-weighted sampling) probability function for EMS IP trace-back techniquep. 133
A mechanism for detection and prevention of distributed denial of service attacksp. 139
Auction based resource allocation in gridsp. 145
MLBLM : a multi-level load balancing mechanism in agent-based gridp. 157
Data management for a distributed hash tablep. 163
DRWT : an efficient random walk algorithm for unstructured P2P networksp. 169
Stochastic models of IEEE 802. 11e wireless networks with multimedia applicationsp. 175
Maintaining information about nearby processors in a mobile environmentp. 193
Energy aware topology management in ad hoc wireless networksp. 203
On maximizing network lifetime of broadcast in WANETs under an overhearing cost modelp. 215
On maximizing residual energy of actors in wireless sensor and actor networksp. 227
Locant : a nature inspired location service for ad hoc networksp. 239
An analytical model for capacity evaluation of VoIP on HCCA and TCP file transfers over EDCA in an IEEE 802. 11e WLANp. 245
Developing analytical framework to measure robustness of peer-to-peer networksp. 257
Design and implementation of a network processor based 10Gbps network traffic generatorp. 269
Stochastic spectral density analysis on network traffic characterizationp. 276
Negotiating monitoring task allocation for orbitersp. 282
Primality tests based on Fermat's little theoremp. 288
Efficient distributed handshake using mobile agentsp. 294
Improved distributed exploration of anonymous networksp. 306
The complexity of updating multi-writer snapshot objectsp. 319
Simultaneous consensus tasks : a tighter characterization of set-consensusp. 331
Database summarization and publishing in wireless environmentsp. 342
Read-write reductionsp. 349
Large scale voice over IP experiences on high performance intranetsp. 355
Z!Stream : an application streaming system by copy-on-reference block of executable filesp. 367
Supervised grid-of-tries : a novel framework for classifier managementp. 373
BGPSep. S : an algorithm for constructing IBGP configurations with complete visibilityp. 379
Performance enhancement in REM using adaptive drop policy for protective and best-effort trafficp. 385
A new precomputation scheme for MPLS traffic engineering routingp. 391
A mobility aware technique for clustering on mobile ad-hoc networksp. 397
Design and analysis of rate aware ad hoc 802.11 networksp. 409
Tightly packed IP address configuration (TPIA) protocol in small-scale MANETp. 421
TransMAN : a group communication system for MANETsp. 430
On fault tolerance of two-dimensional mesh networksp. 442
Feedback control with prediction for thread allocation in pipeline architecture web serverp. 454
Variants of priority scheduling algorithms for reducing context-switches in real-time systemsp. 466
Dynamic path shared protection for survivable differentiated reliable WDM optical networksp. 479
A time model for distributed multimedia applicationsp. 491
Destination initiated multi-wavelength reservation protocol (DIMRP) in WDM optical networks : finding the optimal selectivity for wavelength assignmentp. 497
A hybrid transformation technique for video codingp. 503
Location verification based defense against Sybil attack in sensor networksp. 509
A new scheme for establishing pairwise keys for wireless sensor networksp. 522
Distributed location and lifetime biased clustering for large scale wireless sensor networkp. 534
Power aware duty scheduling in wireless sensor networksp. 546
Data forwarding protocol for reliable delivery service in wireless sensor networksp. 552
Synchronous and asynchronous auction models for dynamic spectrum accessp. 558
A one-pass method of MIP registration by WLAN host through GPRS networkp. 570
An idea bag strategy to discourage selfish behavior under random token MAC protocols for wireless LANsp. 582
A signalling technique for disseminating neighbouring AP channel information to mobile stationsp. 594
A predictive location management scheme by extracting the unique sub-patterns from the mobility logsp. 600
Table of Contents provided by Blackwell. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program