


default search action
2nd ICDCIT 2005: Bhubaneswar, India
- Goutam Chakraborty:

Distributed Computing and Internet Technology, Second International Conference, ICDCIT 2005, Bhubaneswar, India, December 22-24, 2005, Proceedings. Lecture Notes in Computer Science 3816, Springer 2005, ISBN 3-540-30999-3
Plenary Talk I
- S. Sitharama Iyengar

:
The Distributed Sensor Networks - An Emerging Technology. 1
Distributed Computing
- Arunabha Sen:

Distribute Computing Track Chair's Message. 2
Network Protcols
- Sun Ok Yang, SungSuk Kim, Chong-Sun Hwang:

Efficient Binding Lifetime Determination Schemes in HMIPv6. 3-14 - Jia Hou, Moon Ho Lee:

A Fast Search and Advanced Marking Scheme for Network IP Traceback Model. 15-20 - Li-Mei Peng, Young-Chul Kim, Kyoung-Min Yoo, Kyeong-Eun Han, Young-Chon Kim:

Design and Performance Evaluation of Token-Based MAC Protocols in WDM Burst Switched Ring Networks. 21-26
Routing in Mobile Ad Hoc Network
- Smruti Padhy, Diganta Goswami:

Self-stabilizing Energy-Aware Routing Algorithm in Wireless Sensor Network with Limited Mobility. 27-38 - Anand Prakash Ruhil, D. K. Lobiyal

, Ivan Stojmenovic:
Position Based Gradient Routing in Mobile Ad Hoc Networks. 39-49 - B. Paul, S. V. Rao:

Distributed Clustering Algorithm for Finding Virtual Backbone in Ad Hoc Networks. 50-55 - Orhan Dagdeviren

, Kayhan Erciyes, Deniz Cokuslu:
Merging Clustering Algorithms in Mobile Ad Hoc Networks. 56-61 - Krishnan Murugan, Sethu Shanmugavel:

Performance Study and Implementation of Self Organized Routing Algorithm for Mobile Ad Hoc Network Using GloMoSim. 62-68
Communication and Coverage in Wireless Networks
- Mahesh Arumugam, Sandeep S. Kulkarni:

Self-stabilizing Deterministic TDMA for Sensor Networks. 69-81 - Michihiro Inoue, Noriaki Yoshiura, Yoshikuni Onozato:

Effect of Mobility on Communication Performance in Overloaded One-Dimensional Cellular Networks. 82-92 - Subhasis Bhattacharjee

, Nabanita Das:
Distributed Time Slot Assignment in Wireless Ad Hoc Networks for STDMA. 93-104 - Sasanka Roy, Debabrata Bardhan, Sandip Das:

Efficient Algorithm for Placing Base Stations by Avoiding Forbidden Zone. 105-116
Secured Communication in Distributed Systems
- Anshuman Singh, Siddharth Barman, Kaushal K. Shukla:

Secure Two-Party Context Free Language Recognition. 117-124 - Jaydip Sen

, Indranil Sengupta:
Autonomous Agent Based Distributed Fault-Tolerant Intrusion Detection System. 125-131 - Paola Flocchini, Amiya Nayak

, Arno Schulz:
Cleaning an Arbitrary Regular Network with Mobile Agents. 132-142
Query and Transaction Processing
- Yon Dohn Chung, Ji Yeon Lee:

Multi-attribute Hashing of Wireless Data for Content-Based Queries. 143-153 - B. Nagaprabhanjan, Varsha Apte:

A Tool for Automated Resource Consumption Profiling of Distributed Transactions. 154-165 - JinHo Ahn:

An Efficient Algorithm for Removing Useless Logged Messages in SBML Protocols. 166-171
Theory of Distributed Systems
- Rahul Agarwal, Mahender Bisht, S. N. Maheshwari, Sanjiva Prasad:

Divide and Concur: Employing Chandra and Toueg's Consensus Algorithm in a Multi-level Setting. 172-183 - Chandrashekhara Thejaswi P. S., Ranjeet Kumar Patro:

Distributed Multiple Hypothesis Testing in Sensor Networks Under Bandwidth Constraint. 184-191 - Paritosh Chandrapal, Padam Kumar:

A Scalable Multi-level Distributed System-Level Diagnosis. 192-202 - Punit Chandra, Ajay D. Kshemkalyani

:
Analysis of Interval-Based Global State Detection. 203-216
Grid Computing
- Junghee Lee, Dongsoo Han

:
A Two-Phase Scheduling Algorithm for Efficient Collective Communications of MPICH-G2. 217-228 - Sarbani Roy

, Nandini Mukherjee:
Towards an Agent-Based Framework for Monitoring and Tuning Application Performance in Grid Environment. 229-234 - D. Janakiram, M. Venkateswara Reddy, A. Vijay Srinivas, M. A. Maluk Mohamed

, S. Santosh Kumar:
GDP: A Paradigm for Intertask Communication in Grid Computing Through Distributed Pipes. 235-241
Internet Technology
- Sanjay Kumar Madria:

Internet Technology Track Chair's Message. 242
Internet Search and Query
- Huajun Chen:

Rewriting Queries Using View for RDF/RDFS-Based Relational Data Integration. 243-254 - Kil Hong Joo, Jaeho Lee:

An Effective Searching Method Using the Example-Based Query. 255-266 - Rajat Shuvro Roy, Mohammad Sohel Rahman:

On Communicating with Agents on the Network. 267-277
E-Commerce
- Yukun Cao, Yunfeng Li, Xiaofeng Liao:

Applying Fuzzy Logic to Recommend Consumer Electronics. 278-289 - V. Radha, S. Ramakrishna, N. Pradeep Kumar:

Generic XML Schema Definition (XSD) to GUI Translator. 290-296 - Xiaoling Dai, John C. Grundy

:
Off-Line Micro-payment System for Content Sharing in P2P Networks. 297-307
Browsing and Analysis of Web Elements
- Debajyoti Mukhopadhyay

, Pradipta Biswas
:
FlexiRank: An Algorithm Offering Flexibility and Accuracy for Ranking the Web Pages. 308-313 - Atul Kumar, Anjali Bhargava, Bharat K. Bhargava, Sanjay Madria:

Adaptable Web Browsing of Images in Mobile Computing Environment: Experiments and Observations. 314-320 - Kil Hong Joo, Soojung Lee:

An Incremental Document Clustering Algorithm Based on a Hierarchical Agglomerative Approach. 321-332
Systems Security
- Indrajit Ray:

System Security Track Chair's Message. 333
Theory of Secured Systems
- Debapriyay Mukhopadhyay, Suman Roy

:
A Game Based Model of Security for Key Predistribution Schemes in Wireless Sensor Network. 334-347 - Tao Jiang, Wonil Kim, Kyung-suk Lhee, Manpyo Hong:

E-mail Worm Detection Using the Analysis of Behavior. 348-356 - M. Choudary Gorantla, Ashutosh Saxena:

Verifiably Encrypted Signature Scheme Without Random Oracles. 357-363
Intrusion Detection and Ad Hoc Network Security
- S. Prasanna, V. Vetri Selvi:

An Improved Intrusion Detection Technique for Mobile Adhoc Networks. 364-376 - Bezawada Bruhadeshwar

, Sandeep S. Kulkarni:
User Revocation in Secure Adhoc Networks. 377-388 - C. V. Raman, Atul Negi

:
A Hybrid Method to Intrusion Detection Systems Using HMM. 389-396
Secured Systems Techniques
- Suresh Reddy, Sukumar Nandi

:
Enhanced Network Traffic Anomaly Detector. 397-403 - Jae-Min Seol, Seong-Whan Kim:

Statistically Secure Extension of Anti-collusion Code Fingerprinting. 404-409 - Hyun-Seong Sung, Seong-Whan Kim:

An Improvement of Auto-Correlation Based Video Watermarking Scheme Using Perceptual Masking for Motion. 410-419 - Manachai Toahchoodee, Indrakshi Ray:

Validation of Policy Integration Using Alloy. 420-431
Plenary Talk II
- Jifeng He:

Linking Theories of Concurrency by Retraction. 432
Software Engineering
- Gopal Gupta:

Software Engineering Track Chair's Message. 433
Software Architecture
- Qian Wang:

Integrating Architecture Description Languages: A Semantics-Based Approach. 434-445 - Zhijiang Dong, Yujian Fu, Yue Fu, Xudong He:

Automated Runtime Validation of Software Architecture Design. 446-457
Software Optimization and Reliability
- Abhik Roychoudhury

, Tulika Mitra
, Hemendra Singh Negi:
Analyzing Loop Paths for Execution Time Estimation. 458-469 - Rakesh Tripathi, Rajib Mall:

A Technique for Early Software Reliability Prediction. 470-481
Formal Methods
- Bikram Sengupta, Rance Cleaveland:

Executable Requirements Specifications Using Triggered Message Sequence Charts. 482-493 - Mohammad Mahdi Jaghoori, Marjan Sirjani, Mohammad Reza Mousavi

, Ali Movaghar
:
Efficient Symmetry Reduction for an Actor-Based Model. 494-507 - A. K. Bhattacharjee, R. K. Shyamasundar:

Validated Code Generation for Activity Diagrams. 508-521
Data Mining
- Mukesh K. Mohania:

Data Mining Track Chair's Message. 522
Data Clustering Techniques
- Swarup Roy

, D. K. Bhattacharyya
:
An Approach to Find Embedded Clusters Using Density Based Techniques. 523-535 - Pradeep Kumar, M. Venkateswara Rao, P. Radha Krishna, Raju S. Bapi:

Using Sub-sequence Information with kNN for Classification of Sequential Data. 536-546 - Girish Keshav Palshikar:

Distance-Based Outliers in Sequences. 547-552 - Pradeep Kumar, Tapati Bandopadhyay:

Capturing Market Intelligence from Customer Feedback E-mails Using Self-enhancing Bolzmann Machine-Based Network of Knowledge Maps. 553-560
Multidimensional Data Mining
- Amir Ahmad, Lipika Dey:

Algorithm for Fuzzy Clustering of Mixed Data with Numeric and Categorical Attributes. 561-572 - Ilias Michalarias, Hans-Joachim Lenz:

Dissemination of Multidimensional Data Using Broadcast Clusters. 573-584 - S. Vijayalakshmi

, S. Suresh Raja:
Multidimensional Frequent Pattern Mining Using Association Rule Based Constraints. 585-591 - M. A. H. Zahid, Ankush Mittal, Ramesh Chandra Joshi:

A Classification Based Approach for Root Unknown Phylogenetic Networks Under Constrained Recombination. 592-603

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














