LEADER 06148nam 22008775 450 001 9910483800403321 005 20230829201957.0 010 $a3-540-88140-9 024 7 $a10.1007/978-3-540-88140-7 035 $a(CKB)1000000000490823 035 $a(SSID)ssj0000319123 035 $a(PQKBManifestationID)11240073 035 $a(PQKBTitleCode)TC0000319123 035 $a(PQKBWorkID)10354343 035 $a(PQKB)11668836 035 $a(DE-He213)978-3-540-88140-7 035 $a(MiAaPQ)EBC3063577 035 $a(MiAaPQ)EBC6283545 035 $a(PPN)130185590 035 $a(EXLCZ)991000000000490823 100 $a20100301d2008 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aNetwork and Parallel Computing $eIFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008, Proceedings /$fedited by Jian Cao, Minglu Li, Min-You Wu, Jinjun Chen 205 $a1st ed. 2008. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2008. 215 $a1 online resource (XIII, 366 p.) 225 1 $aTheoretical Computer Science and General Issues,$x2512-2029 ;$v5245 300 $a"Proceedings of the 2008 IFIP International Conference on Network and Parallel Computing (NPC 2008) held in Shanghai, China"--Pref. 311 $a3-540-88139-5 320 $aIncludes bibliographical references and index. 327 $aNetwork Technologies -- An AIAD-Based Adaptive Routing Protocol in Ad-Hoc Wireless Networks -- Adaptive Neighbor Selection for Service Discovery in Mobile Ad Hoc Networks -- A Formal Approach to Robustness Testing of Network Protocol -- Deadline Probing: Towards Timely Cognitive Wireless Network -- SRDFA: A Kind of Session Reconstruction DFA -- Measuring the Normality of Web Proxies? Behavior Based on Locality Principles -- Network Applications -- Feedback Control-Based Database Connection Management for Proportional Delay Differentiation-Enabled Web Application Servers -- Research on the Detection of Distributed Denial of Service Attacks Based on the Characteristics of IP Flow -- Password-Authenticated Key Exchange between Clients in a Cross-Realm Setting -- Forward Secure Password-Based Authenticated Key Distribution in the Three-Party Setting -- Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks -- A Data Storage Mechanism for P2P VoD Based on Multi-channel Overlay -- HTL: A Locality Bounded Flat Hash Location Service -- Accelerating the Propagation of Active Worms by Employing Multiple Target Discovery Techniques -- Online Accumulation: Reconstruction of Worm Propagation Path -- HRS: A Hybrid Replication Strategy for Exhaustive P2P Search -- ResourceDog: A Trusted Resource Discovery and Automatic Invocation P2P Framework -- Network and Parallel Architectures -- A Novel Approach to Manage Asymmetric Traffic Flows for Secure Network Proxies -- Automatic Transformation for Overlapping Communication and Computation -- Cooperative Communication System for Parallel Computing Agents in Multi-cluster Grid -- CPI: A Novel Three-Phase Algorithm for QoS-Aware Replica Placement Problem -- Online Balancing Two Independent Criteria -- Procrastination Scheduling for Fixed-Priority Tasks with Preemption Thresholds -- Parallel and Distributed Software -- Survey on Parallel Programming Model -- An Integrated Framework for Wireless Sensor Web Service and Its Performance Analysis Based on Queue Theory -- Grid Computing: A Case Study in Hybrid GMRES Method -- Towards Resource Reliability Support for Grid Workflows -- A SyncML Middleware-Based Solution for Pervasive Relational Data Synchronization -- An Efficient Authentication and Key Agreement Protocol in RFID System -- Grid Service Discovery Based on Cross-VO Service Domain Model -- Ontology-Based Semantic Method for Service Modeling in Grid -- A Scalable and Adaptive Distributed Service Discovery Mechanism in SOC Environments. 330 $aThis book constitutes the refereed proceedings of the IFIP International Conference on Network and Parallel Computing, NPC 2008, held in Shanghai, China in October 2008. The 32 revised full papers presented were carefully selected from over 140 submissions. The papers are organized in topical sections on network technologies; network applications; network and parallel architectures; parallel and distributed software. 410 0$aTheoretical Computer Science and General Issues,$x2512-2029 ;$v5245 606 $aComputer networks 606 $aComputer engineering 606 $aData structures (Computer science) 606 $aInformation theory 606 $aComputer science 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer Communication Networks 606 $aComputer Engineering and Networks 606 $aData Structures and Information Theory 606 $aModels of Computation 606 $aCryptology 615 0$aComputer networks. 615 0$aComputer engineering. 615 0$aData structures (Computer science). 615 0$aInformation theory. 615 0$aComputer science. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 14$aComputer Communication Networks. 615 24$aComputer Engineering and Networks. 615 24$aData Structures and Information Theory. 615 24$aModels of Computation. 615 24$aCryptology. 676 $a004.35 686 $a54.32$2bcl 702 $aCao$b Jian$f1972-$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLi$b Minglu$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWu$b Min-You$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aChen$b Jinjun$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 02$aInternational Federation for Information Processing. 712 12$aNPC 2008 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483800403321 996 $aNetwork and Parallel Computing$9772150 997 $aUNINA