


default search action
1st ICDCIT 2004: Bhubaneswar, India
- R. K. Ghosh, Hrushikesha Mohanty:

Distributed Computing and Internet Technology, First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004, Proceedings. Lecture Notes in Computer Science 3347, Springer 2004, ISBN 3-540-24075-6
Plenary Talk - I
- Krithi Ramamritham:

Taming the Dynamics of Distributed Data. 1
Distributed Computing
Keynote Address - I
- Vijay Kumar:

Data in Your Space. 2-20
Invited Talk - I
- Sharma Chakravarthy:

Enabling Technologies for Harnessing Information Explosion. 21
Algorithms and Modeling
- Siddhartha Brahma, Sandeep Macharla, Sudebkumar Prasant Pal, Sudhir Kumar Singh:

Fair Leader Election by Randomized Voting. 22-31 - Pradeep Parvathipuram, Vijay Kumar, Gi-Chul Yang:

An Efficient Leader Election Algorithm for Mobile Ad Hoc Networks. 32-41 - Amiya K. Tripathy, Tripti Negi, Anil Singh:

Distributed Balanced Tables: A New Approach. 42-49
Systems, Protocols and Performance
- Rajesh Kalmady, Digamber Sonvane:

Performance Evaluation of Gigabit Ethernet and SCI in a Linux Cluster. 50-59 - Vijay Shanker Tripathi, Sudarshan Tiwari:

Performance Evaluation of a Modified-Cyclic-Banyan Based ATM/IP Switching Fabric. 60-64 - Sathish Rajasekhar, Ibrahim Khalil, Zahir Tari:

A Scalable and Roboust QoS Architecture for WiFi P2P Networks. 65-74 - Shilpa Dhar, Krishnendu Roy, Rajgopal Kannan:

NEC: Node Energy Based Clustering Protocol for Wireless Sensor Networks with Guaranteed Connectivity. 75-84 - Narottam Chand, Ramesh C. Joshi, Manoj Misra:

Energy Efficient Cache Invalidation in a Disconnected Mobile Environment. 85-95
Transaction and Information Dissemination
- KwangJin Park, MoonBae Song, Chong-Sun Hwang:

An Efficient Data Dissemination Schemes for Location Dependent Information Services. 96-105 - Sharma Chakravarthy, Nishant Vontella:

A Publish/Subscribe Based Architecture of an Alert Server to Support Prioritized and Persistent Alerts. 106-116 - Debmalya Biswas, K. Vidyasankar:

A Nested Transaction Model for LDAP Transactions. 117-126 - Ankur Gupta

, Nitin Gupta, R. K. Ghosh, M. M. Gore:
Team Transaction: A New Transaction Model for Mobile Ad Hoc Networks. 127-134 - Diganta Goswami, S. Sahu:

An Efficient Protocol for Checkpoint-Based Failure Recovery in Distributed Systems. 135-144
Plenary Talk - II
- Pradeep K. Khosla:

Cybersecurity: Opportunities and Challenges. 145
Internet Technology
Keynote Address - II
- Bharat K. Bhargava, Leszek Lilien

:
Vulnerabilities and Threats in Distributed Systems. 146-157
Query and Retrieval
- Yih-Ling Hedley, Muhammad Younas, Anne E. James:

A TNATS Approcah to Hidden Web Documents. 158-167 - Manjeet Rege, Izabell Caraconcea, Shiyong Lu, Farshad Fotouhi:

Querying XML Documents from a Relational Database in the Presence of DTDs. 168-177 - M. K. MadhuMohan, Sujatha R. Upadhyaya, P. Sreenivasa Kumar:

SAQI: Semantics Aware Query Interface. 178-193
Protocol and Replica Management
- Paola Flocchini, Amiya Nayak

, Ming Xie:
Hybrid-Chord: A Peer-to-Peer System Based on Chord. 194-203 - Corina Ferdean, Mesaac Makpangou:

A Generic and Flexible Model for Replica Consistency Management. 204-209 - Vijayalakshmi Hadimani, R. C. Hansdah:

An Efficient Distributed Scheme for Source Routing Protocol in Communication Networks. 210-216
Ontology and Services
- Jeong-Oog Lee, Myeong-Cheol Ko, Woojin Paik, Heung Seok Jeon, Junghwan Kim, Hyun-Kyu Kang, Jinsoo Kim:

The Roles of Ontology and Metadata Registry for Interoperable Databases. 217-226 - Gi-Chul Yang, Sanjay Madria:

DHL: Semantically Rich Dynamic and Active Hyperlinks. 227-236 - Hea-Sook Park, Yan Ha, Soon-Mi Lee, Young-Whan Park, Doo-Kwon Baik:

User-Class Based Service Acceptance Policy Using Cluster Analysis. 237-242
Software Engineering
Invited Talk - II
- Satish Chandra:

Tools and Techniques for Multi-site Sotware Development. 243
Analysis and Modelling
- Satyajit Acharya, Chris George, Hrushikesha Mohanty:

Specifying a Mobile Computing Infrastructure and Services. 244-254 - Xiaoshan Li, Zhiming Liu, Jifeng He, Quan Long:

Generating a Prototype from a UML Model of System Requirements. 255-265 - M. Devi Prasad, Banshi Dhar Chaudhary:

A Type System for an Aspect Oriented Programming Language. 266-272 - Arnab Ray, Bikram Sengupta, Rance Cleaveland:

Secure Requirements Elicitation Through Triggered Message Sequence Charts. 273-282 - Ramakrishnan Venkitaraman, Gopal Gupta:

Framework for Safe Reuse of Software Binaries. 283-293
Tools and Techniques
- Padmanabhan Krishnan, Lei Wang:

Supporting Partial Component Matching. 294-303 - Durga Prasad Mohapatra

, Rajib Mall, Rajeev Kumar:
A Novel Approach for Dynamic Slicing of Distributed Object-Oriented Programs. 304-309 - Jianfei Yin, Heqing Guo, Xinyi Peng, Manshan Lin:

Pattern Semantic Link: A Reusable Pattern Representation in MDA Context. 310-317 - Johannes Maria Zaha, Marco Geisenberger, Martin Groth:

Compatibility Test and Adapter Generation for Interfaces of Software Components. 318-328 - Sukhamay Kundu:

A Modern Graphic Flowchart Layout Tool. 329-335
Systems Security
Keynote Address - III
- Sushil Jajodia, Duminda Wijesekera:

A Flexible Authorization Framework for E-Commerce. 336-345
Intrusion Detection and Access Control
- Niranjan K. Boora, Chiranjib Bhattacharyya, Kanchi Gopinath:

Efficient Algorithms for Intrusion Detection. 346-352 - Samik Basu, Prem Uppuluri:

Proxy-Annotated Control Flow Graphs: Deterministic Context-Sensitive Monitoring for Intrusion Detection. 353-362 - Indrakshi Ray, Marianna Muller:

Using Schemas to Simplify Access Control for XML Documents. 363-368 - Vijayalakshmi Atluri

, Janice Warner:
Automatic Enforcement of Access Control Policies Among Dynamic Coalitions. 369-378
Network and Security
- Kaushal Sarda, Duminda Wijesekera, Sushil Jajodia:

Implementing Consistency Checking in Correlating Attacks. 379-384 - Seung-Won Shin, Ki-Young Kim, Jong-Soo Jang:

LSAD: Lightweight SYN Flooding Attack Detector. 385-390 - Neelima Arora, R. K. Shyamasundar:

UGSP: Secure Key Establishment Protocol for Ad-Hoc Network. 391-399 - Shravan K. Rayanchu, Gautam Barua:

Tracing Attackers with Deterministic Edge Router Marking (DERM). 400-409
Secured Systems Design
- Sandeep S. Kulkarni, Bezawada Bruhadeshwar:

Distributing Key Updates in Secure Dynamic Groups. 410-419 - Jing Zhou, Brajendra Panda, Yi Hu:

Succinct and Fast Accessible Data Structures for Database Damage Assessment. 420-429 - Vamsi Kambhampati, Indrajit Ray, Eunjong Kim:

A Secure Checkpointing Protocol for Survivable Server Design. 430-440
Security Services
- Ranjit Abbadasari, Ravi Mukkamala, V. Valli Kumari

:
MobiCoin: Digital Cash for M-Commerce. 441-451 - Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:

Cellular Automata : An Ideal Candidate for a Block Cipher. 452-457 - S. N. Sivanandam, C. K. Gokulnath, K. Prasanna, S. Rajeev:

NFD Technique for Efficient and Secured Information Hiding in Low Resolution Images. 458-467
Workshop on Datamining, Security & Application
- Yanxin Wang, Andrew S. Miner, Johnny Wong, Prem Uppuluri:

Improving Feature Selection in Anomaly Intrusion Detection Using Specifications. 468 - Vishal Chowdhary, Alok Tongaonkar, Tzi-cker Chiueh:

Towards Automatic Learning of Valid Services for Honeypots. 469-470

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














