08000nam 22007815 450 99646600590331620230405225525.03-540-92295-410.1007/978-3-540-92295-7(CKB)1000000000718114(SSID)ssj0000317268(PQKBManifestationID)11253064(PQKBTitleCode)TC0000317268(PQKBWorkID)10293638(PQKB)10079454(DE-He213)978-3-540-92295-7(MiAaPQ)EBC3064086(PPN)134126203(EXLCZ)99100000000071811420100301d2009 u| 0engurnn|008mamaatxtccrDistributed Computing and Networking[electronic resource] 10th International Conference, ICDCN 2009, Hyderabad, India, January 3-6, 2009, Proceedings /edited by Vijay Garg, Roger Wattenhofer, Kishore Kothapalli1st ed. 2009.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2009.1 online resource (XVIII, 476 p.) Theoretical Computer Science and General Issues,2512-2029 ;5408Bibliographic Level Mode of Issuance: Monograph3-540-92294-6 Includes bibliographical references and index.A.K. Choudhury Memorial Lecture -- Tracking Dynamics Using Sensor Networks: Some Recurring Themes -- Keynote Talks -- Distributed Computing and the Multicore Revolution -- The Rise of People-Centric Sensing -- Temporal Considerations in Wireless Networks and Cyberphysical Systems -- Sensor Networks 1 -- Finding Facilities Fast -- Large-Scale Networked Systems: From Anarchy to Geometric Self-structuring -- Cheapest Paths in Multi-interface Networks -- Concept-Based Routing in Ad-Hoc Networks -- Heuristics for Minimizing Interference in Sensor Networks -- Multi-core and Shared Memory -- Non-blocking Array-Based Algorithms for Stacks and Queues -- Provable STM Properties: Leveraging Clock and Locks to Favor Commit and Early Abort -- Aspectising Concurrency for the RTSJ -- An Asymptotic Performance/Energy Analysis and Optimization of Multi-core Architectures -- A Cost-Optimal Algorithm for Guard Zone Problem -- Peer-to-Peer Computing -- Underlay Aware Resiliency in P2P Overlays -- HPC5: An Efficient Topology Generation Mechanism for Gnutella Networks -- Representation of Complex Concepts for Semantic Routed Network -- Guaranteeing Eventual Coherency across Data Copies, in a Highly Available Peer-to-Peer Distributed File System -- Reliability and Security -- On Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous Networks -- Response-Time Modeling of Controller Area Network (CAN) -- A Threat-Aware Anomaly-Based Intrusion-Detection Approach for Obtaining Network-Specific Useful Alarms -- Traffic Engineering Based Attack Detection in Active Networks -- Security against Sybil Attack in Wireless Sensor Network through Location Verification -- Distributed Computing -- Incentives to Tight the Runtime Estimates of EASY Backfilling -- An Index-Based Mobile Checkpointing and Recovery Algorithm -- A Formal Framework and a Tool for the Specification and Analysis of G-Nets Models Based on Graph Transformation -- Fair Resource Allocation in Distributed Combinatorial Auctioning Systems -- Network Algorithms -- Compact Routing Schemes for Dynamic Trees in the Fixed Port Model -- An Analytical Model of Information Dissemination for a Gossip-Based Protocol -- A Distributed O(|E|) Algorithm for Optimal Link-Reversal -- Fault Tolerance and Models -- Two Consensus Algorithms with Atomic Registers and Failure Detector ? -- Self-similar Functions and Population Protocols: A Characterization and a Comparison -- Byzantine-Resilient Convergence in Oblivious Robot Networks -- Snap-Stabilization in Message-Passing Systems -- A Novel Performance Index for Characterizing Stochastic Faulty Patterns in Mesh-Based Networks -- Sensor Networks 2 -- Optimizing Multi-hop Queries in ZigBee Based Multi-sink Sensor Networks -- QDMAC: An Energy Efficient Low Latency MAC Protocol for Query Based Wireless Sensor Networks -- Field Sensing and Target Tracking Using Mobile Sensors -- Q-Coverage Problem in Wireless Sensor Networks -- On Providing Reliability and Maximizing Network Lifetime in Multi-Sink Wireless Sensor Networks -- Fault-Tolerance and Replication -- Fault-Tolerant Implementations of Regular Registers by Safe Registers with Applications to Networks -- A General Approach to Analyzing Quorum-Based Heterogeneous Dynamic Data Replication Schemes -- Tree-Based Dynamic Primary Copy Algorithms for Replicated Databases -- FTRepMI: Fault-Tolerant, Sequentially-Consistent Object Replication for Grid Applications -- Wireless Networks -- Effective Layer-3 Protocols for Integrating Mobile Ad Hoc Network and the Internet -- Performance Analysis of a UMTS Cell with Underlying Tunnel-WLANs -- Performance Comparison of Orthogonal Gold and Walsh Hadamard Codes for Quasi-Synchronous CDMA Communication -- Analysis of Optimum Interleaver for Receivers in IDMA Systems -- Enhancement of QoS in 802.11e for Different Traffics -- Sensor Networks 3 -- Flooding-Assisted Threshold Assignment for Aggregate Monitoring in Sensor Networks -- A Mechanism to Structure Mission-Aware Interaction in Mobile Sensor Networks -- Balancing Energy Dissipation in Data Gathering Wireless Sensor Networks Using Ant Colony Optimization -- Rate Adaptive Channel MAC -- Grid and Cluster Computing -- Efficient Load Balancing on a Cluster for Large Scale Online Video Surveillance -- Cluster Performance Forecasting Using Predictive Modeling for Virtual Beowulf Clusters -- A Hierarchical Approach to Handle Group Mutual Exclusion Problem in Distributed Systems -- Virtual Time Fair Queuing Algorithm for a Computational Grid.This book constitutes the refereed proceedings of the 10th International Conference on Distributed Computing and Networking, ICDCN 2009, held in Hyderabad, India, during January 3-6, 2009. The 20 papers and 32 short presentations presented together with 3 keynote talks and a memorial lecture on A.K. Choudhury were carefully reviewed and selected from 179 submissions. The topics addressed are sensor networks, multi-core and shared memory, peer-to-peer-computing, reliability and security, distributed computing, network algorithms, fault tolerance and models, fault tolerance and replication, wireless networks, and grid and cluster computing.Theoretical Computer Science and General Issues,2512-2029 ;5408Computer networksComputer programmingSoftware engineeringData protectionAlgorithmsApplication softwareComputer Communication NetworksProgramming TechniquesSoftware EngineeringData and Information SecurityAlgorithmsComputer and Information Systems ApplicationsComputer networks.Computer programming.Software engineering.Data protection.Algorithms.Application software.Computer Communication Networks.Programming Techniques.Software Engineering.Data and Information Security.Algorithms.Computer and Information Systems Applications.004/.36Garg Vijayedthttp://id.loc.gov/vocabulary/relators/edtWattenhofer Rogeredthttp://id.loc.gov/vocabulary/relators/edtKothapalli Kishoreedthttp://id.loc.gov/vocabulary/relators/edtBOOK996466005903316Distributed Computing and Networking772591UNISA02554nam0 2200517 i 450 UFI013888620231121125905.0351901763620150527e19911957||||0itac50 balatdez01i xxxe z01nC. Sallusti Crispi CatilinaIugurthaFragmenta ampliorapost A. W. Ahlberg edidit Alphonsus KurfessEditio stereotypa editionis tertiae (1957)Stutgardiae et Lipsiaein aedibus B. G. Teubneri1991XXXII, 200 p.20 cm.Bibliotheca scriptorum Graecorum et Romanorum Teubneriana001CFI00691762001 Bibliotheca scriptorum Graecorum et Romanorum Teubneriana2001 Catilina C. Sallustius Crispus!. -700 1Sallustius Crispus, GaiusCFIV0025000702001 Iugurtha. -700 1Sallustius Crispus, GaiusCFIV002500070CatilinaVEA0035072Sallustio Crispo, Gaio . De coniuratione CatilinaeEdizioni criticheFIRRMLC428100ESallustio Crispo, Gaio . De bello IugurthinoEdizioni criticheFIRRMLC428101E937.05Penisola italiana e territori limitrofi, fino al476. Periodo delle guerre civili, 146-31 a.C.21Sallustius Crispus, GaiusCFIV002500070154956Kurfess, AlfonsSBLV112181Ahlberg, A. W.SBLV285063Sallustio Crispo, C.BVEV267444Sallustius Crispus, GaiusSallustius Crispus, CaiusCFIV155537Sallustius Crispus, GaiusSallustio Crispo, CaioCFIV155538Sallustius Crispus, GaiusSallustio Crispo, GaioCFIV173740Sallustius Crispus, GaiusSallustio <86-ca. 35 a.C.>NAPV087127Sallustius Crispus, GaiusSallustius <86-ca. 35 a.C.>SBNV038865Sallustius Crispus, GaiusKurfess, AlphonsusMILV171312Kurfess, AlfonsAhlberg, Axel WilhelmMILV242586Ahlberg, A. W.ITIT-0120150527IT-FR0017 Biblioteca umanistica Giorgio ApreaFR0017 NUFI0138886Biblioteca umanistica Giorgio Aprea 52BTL Sal.Con.C. 1 52FLS0000020325 VMB RS C 2015052720150527 52Fragmenta ampliora1713238C. Sallusti Crispi Catilina1102017Iugurtha739256UNICAS01415nam 2200373 450 991013549560332120170929124440.00-7381-4873-3(CKB)3780000000093056(WaSeSS)IndRDA00078131(NjHacI)993780000000093056(EXLCZ)99378000000009305620170929d2006 || |engur|||||||||||txtrdacontentcrdamediacrrdacarrierIEEE standard for IEEE amendment to part 15.3 wireless medium access control (MAC) and physical layer (PHY) specifications for high rate wireless personal area networks (WPANs): amendment to MAC sublayerNew York :IEEE,2006.1 online resource (146 pages)Local area networks (Computer networks)StandardsMetropolitan area networks (Computer networks)StandardsPersonal communication service systemsStandardsLocal area networks (Computer networks)Standards.Metropolitan area networks (Computer networks)Standards.Personal communication service systemsStandards.004.68WaSeSSWaSeSSDOCUMENT9910135495603321IEEE standard for IEEE amendment to part 15.32575095UNINA