default search action
IWDC 2004: Kolkata, India
- Nabanita Das, Arunabha Sen, Sajal K. Das, Bhabani P. Sinha:
Distributed Computing - IWDC 2004, 6th International Workshop, Kolkata, India, December 27-30, 2004, Proceedings. Lecture Notes in Computer Science 3326, Springer 2004, ISBN 3-540-24076-4
Keynote Talk I
- Guru M. Parulkar:
The Next Chapter in Networking Research: Evolutionary or Revolutionary? 1
Session I A: Distributed Algorithms
- Kandarp Jani, Ajay D. Kshemkalyani:
Performance of Fair Distributed Mutual Exclusion Algorithms. 2-15 - Himadri Sekhar Paul, Arobinda Gupta, Amit Sharma:
A Framework for Automatic Identification of the Best Checkpoint and Recovery Protocol. 16-27 - Linda Pagli, Giuseppe Prencipe, Tranos Zuva:
Distributed Computation for Swapping a Failing Edge. 28-39 - Xuehui Wang, Lei Zhang, Kedi Huang:
Flexible Cycle Synchronized Algorithm in Parallel and Distributed Simulation. 40-45 - A. Das, D. K. Bhattacharyya:
Rule Mining for Dynamic Databases. 46-51
Session I B: High Performance Computing
- Hai Jin, Zuoning Yin, Xudong Yang, Fucheng Wang, Jie Ma, Hao Wang, Jiangpei Yin:
APPLE: A Novel P2P Based e-Learning Environment. 52-62 - Souvik Ray, Zhao Zhang:
Heuristic-Based Scheduling to Maximize Throughput of Data-Intensive Grid Applications. 63-74 - Sushant Goel, Hema Sharda, David Taniar:
Failure Recovery in Grid Database Systems. 75-81 - Chao-Tung Yang, Yu-Lun Kuo, Kuan-Ching Li, Jean-Luc Gaudiot:
On Design of Cluster and Grid Computing Environment Toolkit for Bioinformatics Applications. 82-87 - R. A. Dheepak, Shakeb Ali, Shubhashis Sengupta, Anirban Chakrabarti:
Study of Scheduling Strategies in a Dynamic Data Grid Environment. 88-94 - Sanjay Goswami, Susmita Sur-Kolay:
Virtual Molecular Computing - Emulating DNA Molecules. 95-101
Session II A: Distributed Systems
- Krishnendu Chatterjee, Pallab Dasgupta, P. P. Chakrabarti:
Complexity of Compositional Model Checking of Computation Tree Logic on Simple Structures. 102-113 - M. Jamshid Bagherzadeh, S. Arun-Kumar:
A Multi-agent Framework Based on Communication and Concurrency. 114-125 - Jean-Loup Guillaume, Matthieu Latapy, Stevens Le Blond:
Statistical Analysis of a P2P Query Graph Based on Degrees and Their Time-Evolution. 126-137 - Sumit Kumar Basu:
t-UNITY - A Formal Framework for Modeling and Reasoning About Timing Constraints in Real-Time Systems. 138-143 - Satish K. Sehgal, Asim K. Pal:
Finding Pareto-Optimal Set of Distributed Vectors with Minimum Disclosure. 144-149 - Shyam Antony, Gautam Barua:
Lean-DFS: A Distributed Filesystem for Resource Starved Clients. 150-155
Session II B: Wireless Networks
- Dola Saha, Siuli Roy, Somprakash Bandyopadhyay, Tetsuro Ueda, Shinsuke Tanaka:
A Fair Medium Access Protocol Using Adaptive Flow-Rate Control Through Cooperative Negotiation Among Contending Flows in Ad Hoc Wireless Network with Directional Antenna. 156-167 - Myung-Kyu Yi, Chong-Sun Hwang:
Analytical-Numerical Study of Mobile IPv6 and Hierarchical Mobile IPv6. 168-179 - Kyung-jun Kim, Nam-koo Ha, Ki Jun Han:
An Adaptive Transmission Power Control Protocol for Mobile Ad Hoc Networks. 180-185 - Basav Roychoudhury, Dilip Kr. Saikia:
A Macro-Mobility Scheme for Reduction in Handover Delay and Signaling Traffic in MIPv6. 186-191 - Mohuya Chakraborty, Iti Saha Misra, Debashis Saha, Amitava Mukherjee:
QoS Support in TLMM: Three Level Mobility Model for IP-Based Networks. 192-197 - Sandeep Choudhary, M. M. Gore, O. P. Vyas:
Path Stability Based Adaptation of MANET Routing Protocols. 198-203
A. K. Choudhury Memorial Lecture
- Amar Mukherjee:
Computational Biology - The New Frontier of Computer Science. 204-218
Session III A: Information Security
- Tanmoy Kanti Das, Subhamoy Maitra:
Cryptanalysis of "Wavelet Tree Quantization" Watermarking Scheme. 219-230 - S. Rahul, R. C. Hansdah:
A Multisignature Scheme for Implementing Safe Delivery Rule in Group Communication Systems. 231-239 - Arjita Ghosh, Sandip Sen:
Agent-Based Distributed Intrusion Alert System. 240-241 - Ajith Abraham, Ravi Jain, Sugata Sanyal, Sang-Yong Han:
SCIDS: A Soft Computing Intrusion Detection System. 252-257 - Vijay K. Garg, R. K. Ghosh:
Effect of Data Encryption on Wireless Ad Hoc Network Performance. 258-263
Session III B: Network Protocols
- Muhammad Ali Malik, Salil S. Kanhere, Mahbub Hassan, Boualem Benatallah:
On-Board RSVP: An Extension of RSVP to Support Real-Time Services in On-Board IP Networks. 264-275 - Junqi Zhang, Vijay Varadharajan, Yi Mu:
A Secure PIM-SM Multicast Routing Protocol. 276-288 - Chittaranjan Hota, Sanjay Kumar Jha, G. Raghurama:
Restoration of Virtual Private Networks with QoS Guarantees in the Pipe Model. 289-302 - Tan Wang, Ajit Singh:
A User Level, Reliable, and Reconfigurable Transport Layer Protocol. 303-314
Keynote Talk II
- Roy Friedman, Achour Mostéfaoui, Michel Raynal:
The Notion of Veto Number for Distributed Agreement Problems. 315-325
Session IV A: Reliability and Testing
- Soumen Maity, Amiya Nayak, Bimal K. Roy:
Reliability of VLSI Linear Arrays with Redundant Links. 326-337 - Swarup Mandal, Sougata Bera, Debashis Saha:
A Technique to Ensure Reliability in a WDM Optical Backbone Network with Contemporary Link Failures. 338-346 - K. Gopinath, Anil K. Pugalia, K. V. M. Naidu:
Formal Proof of Impossibility of Reliability in Crashing Protocols. 347-352 - Sunil R. Das, Chuan Jin, Liwu Jin, Mansour H. Assaf, Emil M. Petriu, Mehmet Sahinoglu:
Altera Max Plus II Development Environment in Fault Simulation and Test Implementation of Embedded Cores-Based Sequential Circuits. 353-360
Session IV B: Networks: Topology and Routing
- Ashok K. Turuk, Rajeev Kumar:
A Distributed Contention Resolution Scheme to Reduce Blocking Probability in Optical Burst Switching Networks. 361-372 - Prasanta K. Jana:
Polynomial Interpolation on OTIS-Mesh Optoelectronic Computers. 373-378 - Nahid Afroz, Bhabani P. Sinha, Rabiul Islam, Subir Bandyopadhyay:
A New Network Topology with Multiple Three-Dimensional Meshes. 379-384 - Rajib K. Das:
Adaptive Fault Tolerant Routing in Star Graph. 385-390 - Ajit Pal, Umesh Patel:
Routing and Wavelength Assignment in Wavelength Division Multiplexing Networks. 391-396
Session V: Mobile Computing I
- Susmit Bagchi, Mads Nygaard:
Designing the MDVM-Stub and Memory Estimator. 397-411 - Gautam K. Das, Sasthi C. Ghosh, Subhas C. Nandy:
Improved Algorithm for Minimum Cost Range Assignment Problem for Linear Radio Networks. 412-423 - B. S. Panda, Mahesh Kumar, Sajal K. Das:
Optimal Schemes for Channel Assignment Problem in Wireless Networks Modeled as 2-Dimensional Square Grids. 424-434
Session VI: Ad Hoc Networks
- Pradip K. Srimani, Bhabani P. Sinha:
Mobility Tolerant Broadcast in Mobile Ad Hoc Networks. 435-446 - Zainab R. Zaidi, Brian L. Mark:
Distributed Mobility Tracking for Ad Hoc Networks Based on an Autoregressive Model. 447-458 - Koushik Sinha, Pradip K. Srimani:
Broadcast and Gossiping Algorithms for Mobile Ad Hoc Networks Based on Breadth-First Traversal. 459-470 - Kalpesh Patel, Sridhar Iyer, Krishna Paul:
RINGS: Lookup Service for Peer-to-Peer Systems in Mobile Ad Hoc Networks. 471-476
Session VII: Mobile Computing II
- Ki-Sik Kong, Chong-Sun Hwang:
Performance Analysis of Location Caching with Fixed Local Anchor in Wireless Networks. 477-488 - Jahan Hassan, Sanjay Jha:
On the Optimization Trade-Offs of Expanding Ring Search. 489-494 - Jun Zheng, Emma E. Regentova, Pradip K. Srimani:
Dynamic Location Management with Personalized Location Area for Future PCS Networks. 495-501 - Daisuke Senzaki, Goutam Chakraborty, Masafumi Matsuhara, Hiroshi Mabuchi:
Improvement of Paging Cost by Updating Using Paging Delay Divergence. 502-507
Session VIII: Sensor Networks
- Shamik Sengupta, Mainak Chatterjee:
Distributed Power Control in Sensor Networks: A Game Theoretic Approach. 508-519 - Lei Zhang, Xuehui Wang, Wenhua Dou:
A K-Connected Energy-Saving Topology Control Algorithm for Wireless Sensor Networks. 520-525 - Buddhadeb Sau, Krishnendu Mukhopadhyaya:
Locating Objects in a Sensor Grid. 526-531
Poster Presentations
- Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati:
A Novel Remote User Authentication Scheme Through Dynamic Login Identity. 532 - Monir Hossain, Mahbub Hassan:
A Probabilistic Admission Control Algorithm in Wireless/Mobile Cellular Networks. 533 - Tarun Bhaskar, B. Narasimha Kamath:
A Rough Neuro Data Mining Approach for Network Intrusion Detection. 534 - Subrata Nandi, Manish K. Raushan:
An Efficient Implementation of Distance-Based Update Scheme Using Directional Cell Identification Codes. 535 - Ritesh Kumar Tiwari:
Application of Formal Methods for Analysis of Authentication Protocols. 536 - Sandeep Gupta, M. M. Gore:
BUSTRAP - An Efficient Travel Planner for Metropolitans. 537 - Rajeev Kumar, Pramod Kumar Singh, P. P. Chakrabarti:
Distributed Evolutionary Algorithm Search for Multiobjective Spanning Tree Problem. 538 - A. Ranjeeth Kumar, Sridhar Iyer:
MSIP: A Protocol for Efficient Handoffs of Real Time Multimedia Sessions in Mobile Wireless Scenarios. 539 - Ashutosh Upadhaya, Saurabh Vashishtha, Raman Grover, Anil Kumar Sarje:
Network Management System Using Web Server Controlled Mobile Agents. 540 - Punit Rathod, Nirali Mody, Dhaval Gada, Rajat Gogri, Zalak Dedhia, Sugata Sanyal, Ajith Abraham:
Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks. 541-542 - Kaizar Amin, Gregor von Laszewski:
High-Level Grid Execution Patterns. 543-544
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.