LEADER 07775nam 22008775 450 001 996465635703316 005 20230406011241.0 010 $a1-280-38542-1 010 $a9786613563347 010 $a3-642-11322-2 024 7 $a10.1007/978-3-642-11322-2 035 $a(CKB)2560000000000992 035 $a(SSID)ssj0000355485 035 $a(PQKBManifestationID)11275402 035 $a(PQKBTitleCode)TC0000355485 035 $a(PQKBWorkID)10337791 035 $a(PQKB)10632185 035 $a(DE-He213)978-3-642-11322-2 035 $a(MiAaPQ)EBC3065050 035 $a(PPN)149073658 035 $a(EXLCZ)992560000000000992 100 $a20100715d2010 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aDistributed Computing and Networking$b[electronic resource] $e11th International Conference, ICDCN 2010, Kolkata, India, January 3-6, 2010, Proceedings /$fedited by Krishna Kant, Sriram V. Pemmaraju, Krishna M. Sivalingam, Jie Wu 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (XIX, 522 p.) 225 1 $aTheoretical Computer Science and General Issues,$x2512-2029 ;$v5935 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-11321-4 320 $aIncludes bibliographical references and index. 327 $aKeynotes -- An Intelligent IT Infrastructure for the Future -- Heavy Tails and Models for the Web and Social Networks -- Data Structures and Algorithms for Packet Forwarding and Classification: Prof. A.K. Choudhury Memorial Lecture -- Spoken Web: A Parallel Web for the Masses: Industry Keynote -- India?s Mobile Revolution and the Unfinished Tasks: Invited Lecture -- Network Protocols and Applications -- Scheduling in Multi-Channel Wireless Networks -- Email Shape Analysis -- Maintaining Safety in Interdomain Routing with Hierarchical Path-Categories -- Fault-tolerance and Security -- On Communication Complexity of Secure Message Transmission in Directed Networks -- On Composability of Reliable Unicast and Broadcast -- A Leader-Free Byzantine Consensus Algorithm -- Authenticated Byzantine Generals in Dual Failure Model -- Sensor Networks -- Mission-Oriented k-Coverage in Mobile Wireless Sensor Networks -- Lessons from the Sparse Sensor Network Deployment in Rural India -- A New Architecture for Hierarchical Sensor Networks with Mobile Data Collectors -- Stability Analysis of Multi-hop Routing in Sensor Networks with Mobile Sinks -- Distributed Algorithms and Optimization -- Optimizing Distributed Computing Workflows in Heterogeneous Network Environments -- Radio Network Distributed Algorithms in the Unknown Neighborhood Model -- Probabilistic Self-stabilizing Vertex Coloring in Unidirectional Anonymous Networks -- A Token-Based Solution to the Group Mutual l-Exclusion Problem in Message Passing Distributed Systems -- Peer-to-Peer Networks and Network Tracing -- The Weak Network Tracing Problem -- Poisoning the Kad Network -- Credit Reputation Propagation: A Strategy to Curb Free-Riding in a Large BitTorrent Swarm -- Formal Understanding of the Emergence of Superpeer Networks: A Complex Network Approach -- Parallel and Distributed Systems -- Parallelization of the Lanczos Algorithm on Multi-core Platforms -- Supporting Malleability in Parallel Architectures with Dynamic CPUSETsMapping and Dynamic MPI -- Impact of Object Operations and Relationships on Concurrency Control in DOOS -- Causal Cycle Based Communication Pattern Matching -- Wireless Networks -- Channel Assignment in Virtual Cut-through Switching Based Wireless Mesh Networks -- Efficient Multi-hop Broadcasting in Wireless Networks Using k-Shortest Path Pruning -- Bandwidth Provisioning in Infrastructure-Based Wireless Networks Employing Directional Antennas -- ROTIO+: A Modified ROTIO for Nested Network Mobility -- Applications of Distributed Systems -- VirtualConnection: Opportunistic Networking for Web on Demand -- Video Surveillance with PTZ Cameras: The Problem of Maximizing Effective Monitoring Time -- DisClus: A Distributed Clustering Technique over High Resolution Satellite Data -- Performance Evaluation of a Wormhole-Routed Algorithm for Irregular Mesh NoC Interconnect -- Optical, Cellular and Mobile Ad Hoc Networks -- Dynamic Multipath Bandwidth Provisioning with Jitter, Throughput, SLA Constraints in MPLS over WDM Network -- Path Protection in Translucent WDM Optical Networks -- Post Deployment Planning of 3G Cellular Networks through Dual Homing of NodeBs -- K-Directory Community: Reliable Service Discovery in MANET -- Theory of Distributed Systems -- An Online, Derivative-Free Optimization Approach to Auto-tuning of Computing Systems -- Consistency-Driven Probabilistic Quorum System Construction for Improving Operation Availability -- Hamiltonicity of a General OTIS Network -- Specifying Fault-Tolerance Using Split Precondition Logic -- Network Protocols -- Fast BGP Convergence Following Link/Router Failure -- On Using Network Tomography for Overlay Availability -- QoSBR: A Quality Based Routing Protocol for Wireless Mesh Networks -- An ACO Based Approach for Detection of an Optimal Attack Path in a Dynamic Environment. 330 $aThis book constitutes the refereed proceedings of the 11th International Conference on Distributed Computing and Networking, ICDCN 2010, held in Kolkata, India, during January 3-6, 2010. There were 169 submissions, 96 to the networking track and 73 to the distributed computing track. After review the committee selected 23 papers for the networking and 21 for the distributed computing track. The topics addressed are network protocol and applications, fault-tolerance and security, sensor networks, distributed algorithms and optimization, peer-to-peer networks and network tracing, parallel and distributed systems, wireless networks, applications and distributed systems, optical, cellular and mobile ad hoc networks, and theory of distributed systems. 410 0$aTheoretical Computer Science and General Issues,$x2512-2029 ;$v5935 606 $aComputer networks 606 $aComputer engineering 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aElectronic digital computers?Evaluation 606 $aAlgorithms 606 $aComputer Communication Networks 606 $aComputer Engineering and Networks 606 $aCryptology 606 $aData and Information Security 606 $aSystem Performance and Evaluation 606 $aAlgorithms 615 0$aComputer networks. 615 0$aComputer engineering. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aElectronic digital computers?Evaluation. 615 0$aAlgorithms. 615 14$aComputer Communication Networks. 615 24$aComputer Engineering and Networks. 615 24$aCryptology. 615 24$aData and Information Security. 615 24$aSystem Performance and Evaluation. 615 24$aAlgorithms. 676 $a004.6 686 $aDAT 250f$2stub 686 $aSS 4800$2rvk 702 $aKant$b Krishna$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPemmaraju$b Sriram V$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSivalingam$b Krishna M$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWu$b Jie$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aICDCN (Conference) 906 $aBOOK 912 $a996465635703316 996 $aDistributed Computing and Networking$9772591 997 $aUNISA