


default search action
IWDC 2004: Kolkata, India
- Nabanita Das, Arunabha Sen, Sajal K. Das, Bhabani P. Sinha:

Distributed Computing - IWDC 2004, 6th International Workshop, Kolkata, India, December 27-30, 2004, Proceedings. Lecture Notes in Computer Science 3326, Springer 2004, ISBN 3-540-24076-4
Keynote Talk I
- Guru M. Parulkar:

The Next Chapter in Networking Research: Evolutionary or Revolutionary? 1
Session I A: Distributed Algorithms
- Kandarp Jani, Ajay D. Kshemkalyani

:
Performance of Fair Distributed Mutual Exclusion Algorithms. 2-15 - Himadri Sekhar Paul, Arobinda Gupta, Amit Sharma:

A Framework for Automatic Identification of the Best Checkpoint and Recovery Protocol. 16-27 - Linda Pagli, Giuseppe Prencipe

, Tranos Zuva:
Distributed Computation for Swapping a Failing Edge. 28-39 - Xuehui Wang, Lei Zhang, Kedi Huang:

Flexible Cycle Synchronized Algorithm in Parallel and Distributed Simulation. 40-45 - A. Das, D. K. Bhattacharyya:

Rule Mining for Dynamic Databases. 46-51
Session I B: High Performance Computing
- Hai Jin, Zuoning Yin, Xudong Yang, Fucheng Wang, Jie Ma, Hao Wang, Jiangpei Yin:

APPLE: A Novel P2P Based e-Learning Environment. 52-62 - Souvik Ray, Zhao Zhang:

Heuristic-Based Scheduling to Maximize Throughput of Data-Intensive Grid Applications. 63-74 - Sushant Goel, Hema Sharda, David Taniar:

Failure Recovery in Grid Database Systems. 75-81 - Chao-Tung Yang, Yu-Lun Kuo, Kuan-Ching Li, Jean-Luc Gaudiot:

On Design of Cluster and Grid Computing Environment Toolkit for Bioinformatics Applications. 82-87 - R. A. Dheepak, Shakeb Ali, Shubhashis Sengupta

, Anirban Chakrabarti:
Study of Scheduling Strategies in a Dynamic Data Grid Environment. 88-94 - Sanjay Goswami, Susmita Sur-Kolay:

Virtual Molecular Computing - Emulating DNA Molecules. 95-101
Session II A: Distributed Systems
- Krishnendu Chatterjee, Pallab Dasgupta, P. P. Chakrabarti:

Complexity of Compositional Model Checking of Computation Tree Logic on Simple Structures. 102-113 - M. Jamshid Bagherzadeh, S. Arun-Kumar:

A Multi-agent Framework Based on Communication and Concurrency. 114-125 - Jean-Loup Guillaume, Matthieu Latapy, Stevens Le Blond:

Statistical Analysis of a P2P Query Graph Based on Degrees and Their Time-Evolution. 126-137 - Sumit Kumar Basu:

t-UNITY - A Formal Framework for Modeling and Reasoning About Timing Constraints in Real-Time Systems. 138-143 - Satish K. Sehgal, Asim K. Pal:

Finding Pareto-Optimal Set of Distributed Vectors with Minimum Disclosure. 144-149 - Shyam Antony, Gautam Barua:

Lean-DFS: A Distributed Filesystem for Resource Starved Clients. 150-155
Session II B: Wireless Networks
- Dola Saha, Siuli Roy, Somprakash Bandyopadhyay, Tetsuro Ueda, Shinsuke Tanaka:

A Fair Medium Access Protocol Using Adaptive Flow-Rate Control Through Cooperative Negotiation Among Contending Flows in Ad Hoc Wireless Network with Directional Antenna. 156-167 - Myung-Kyu Yi, Chong-Sun Hwang:

Analytical-Numerical Study of Mobile IPv6 and Hierarchical Mobile IPv6. 168-179 - Kyung-jun Kim, Nam-koo Ha, Ki Jun Han:

An Adaptive Transmission Power Control Protocol for Mobile Ad Hoc Networks. 180-185 - Basav Roychoudhury, Dilip Kr. Saikia:

A Macro-Mobility Scheme for Reduction in Handover Delay and Signaling Traffic in MIPv6. 186-191 - Mohuya Chakraborty, Iti Saha Misra, Debashis Saha

, Amitava Mukherjee
:
QoS Support in TLMM: Three Level Mobility Model for IP-Based Networks. 192-197 - Sandeep Choudhary, M. M. Gore, O. P. Vyas:

Path Stability Based Adaptation of MANET Routing Protocols. 198-203
A. K. Choudhury Memorial Lecture
- Amar Mukherjee:

Computational Biology - The New Frontier of Computer Science. 204-218
Session III A: Information Security
- Tanmoy Kanti Das, Subhamoy Maitra:

Cryptanalysis of "Wavelet Tree Quantization" Watermarking Scheme. 219-230 - S. Rahul, R. C. Hansdah:

A Multisignature Scheme for Implementing Safe Delivery Rule in Group Communication Systems. 231-239 - Arjita Ghosh, Sandip Sen:

Agent-Based Distributed Intrusion Alert System. 240-241 - Ajith Abraham, Ravi Jain, Sugata Sanyal, Sang-Yong Han:

SCIDS: A Soft Computing Intrusion Detection System. 252-257 - Vijay K. Garg, R. K. Ghosh:

Effect of Data Encryption on Wireless Ad Hoc Network Performance. 258-263
Session III B: Network Protocols
- Muhammad Ali Malik, Salil S. Kanhere

, Mahbub Hassan, Boualem Benatallah:
On-Board RSVP: An Extension of RSVP to Support Real-Time Services in On-Board IP Networks. 264-275 - Junqi Zhang, Vijay Varadharajan, Yi Mu:

A Secure PIM-SM Multicast Routing Protocol. 276-288 - Chittaranjan Hota

, Sanjay Kumar Jha, G. Raghurama:
Restoration of Virtual Private Networks with QoS Guarantees in the Pipe Model. 289-302 - Tan Wang, Ajit Singh:

A User Level, Reliable, and Reconfigurable Transport Layer Protocol. 303-314
Keynote Talk II
- Roy Friedman, Achour Mostéfaoui, Michel Raynal:

The Notion of Veto Number for Distributed Agreement Problems. 315-325
Session IV A: Reliability and Testing
- Soumen Maity, Amiya Nayak

, Bimal K. Roy:
Reliability of VLSI Linear Arrays with Redundant Links. 326-337 - Swarup Mandal, Sougata Bera, Debashis Saha

:
A Technique to Ensure Reliability in a WDM Optical Backbone Network with Contemporary Link Failures. 338-346 - K. Gopinath, Anil K. Pugalia, K. V. M. Naidu:

Formal Proof of Impossibility of Reliability in Crashing Protocols. 347-352 - Sunil R. Das, Chuan Jin, Liwu Jin, Mansour H. Assaf, Emil M. Petriu, Mehmet Sahinoglu:

Altera Max Plus II Development Environment in Fault Simulation and Test Implementation of Embedded Cores-Based Sequential Circuits. 353-360
Session IV B: Networks: Topology and Routing
- Ashok K. Turuk

, Rajeev Kumar:
A Distributed Contention Resolution Scheme to Reduce Blocking Probability in Optical Burst Switching Networks. 361-372 - Prasanta K. Jana:

Polynomial Interpolation on OTIS-Mesh Optoelectronic Computers. 373-378 - Nahid Afroz, Bhabani P. Sinha, Rabiul Islam, Subir Bandyopadhyay:

A New Network Topology with Multiple Three-Dimensional Meshes. 379-384 - Rajib K. Das

:
Adaptive Fault Tolerant Routing in Star Graph. 385-390 - Ajit Pal, Umesh Patel:

Routing and Wavelength Assignment in Wavelength Division Multiplexing Networks. 391-396
Session V: Mobile Computing I
- Susmit Bagchi

, Mads Nygaard:
Designing the MDVM-Stub and Memory Estimator. 397-411 - Gautam K. Das, Sasthi C. Ghosh, Subhas C. Nandy:

Improved Algorithm for Minimum Cost Range Assignment Problem for Linear Radio Networks. 412-423 - B. S. Panda, Mahesh Kumar, Sajal K. Das:

Optimal Schemes for Channel Assignment Problem in Wireless Networks Modeled as 2-Dimensional Square Grids. 424-434
Session VI: Ad Hoc Networks
- Pradip K. Srimani, Bhabani P. Sinha:

Mobility Tolerant Broadcast in Mobile Ad Hoc Networks. 435-446 - Zainab R. Zaidi, Brian L. Mark:

Distributed Mobility Tracking for Ad Hoc Networks Based on an Autoregressive Model. 447-458 - Koushik Sinha, Pradip K. Srimani:

Broadcast and Gossiping Algorithms for Mobile Ad Hoc Networks Based on Breadth-First Traversal. 459-470 - Kalpesh Patel, Sridhar Iyer, Krishna Paul:

RINGS: Lookup Service for Peer-to-Peer Systems in Mobile Ad Hoc Networks. 471-476
Session VII: Mobile Computing II
- Ki-Sik Kong, Chong-Sun Hwang:

Performance Analysis of Location Caching with Fixed Local Anchor in Wireless Networks. 477-488 - Jahan Hassan, Sanjay Jha

:
On the Optimization Trade-Offs of Expanding Ring Search. 489-494 - Jun Zheng, Emma E. Regentova, Pradip K. Srimani:

Dynamic Location Management with Personalized Location Area for Future PCS Networks. 495-501 - Daisuke Senzaki, Goutam Chakraborty

, Masafumi Matsuhara, Hiroshi Mabuchi:
Improvement of Paging Cost by Updating Using Paging Delay Divergence. 502-507
Session VIII: Sensor Networks
- Shamik Sengupta, Mainak Chatterjee:

Distributed Power Control in Sensor Networks: A Game Theoretic Approach. 508-519 - Lei Zhang, Xuehui Wang, Wenhua Dou:

A K-Connected Energy-Saving Topology Control Algorithm for Wireless Sensor Networks. 520-525 - Buddhadeb Sau, Krishnendu Mukhopadhyaya:

Locating Objects in a Sensor Grid. 526-531
Poster Presentations
- Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati:

A Novel Remote User Authentication Scheme Through Dynamic Login Identity. 532 - Monir Hossain, Mahbub Hassan:

A Probabilistic Admission Control Algorithm in Wireless/Mobile Cellular Networks. 533 - Tarun Bhaskar, B. Narasimha Kamath:

A Rough Neuro Data Mining Approach for Network Intrusion Detection. 534 - Subrata Nandi, Manish K. Raushan:

An Efficient Implementation of Distance-Based Update Scheme Using Directional Cell Identification Codes. 535 - Ritesh Kumar Tiwari:

Application of Formal Methods for Analysis of Authentication Protocols. 536 - Sandeep Gupta, M. M. Gore:

BUSTRAP - An Efficient Travel Planner for Metropolitans. 537 - Rajeev Kumar, Pramod Kumar Singh, P. P. Chakrabarti:

Distributed Evolutionary Algorithm Search for Multiobjective Spanning Tree Problem. 538 - A. Ranjeeth Kumar, Sridhar Iyer:

MSIP: A Protocol for Efficient Handoffs of Real Time Multimedia Sessions in Mobile Wireless Scenarios. 539 - Ashutosh Upadhaya, Saurabh Vashishtha, Raman Grover, Anil Kumar Sarje:

Network Management System Using Web Server Controlled Mobile Agents. 540 - Punit Rathod, Nirali Mody, Dhaval Gada, Rajat Gogri, Zalak Dedhia, Sugata Sanyal, Ajith Abraham:

Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks. 541-542 - Kaizar Amin, Gregor von Laszewski:

High-Level Grid Execution Patterns. 543-544

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














