Distributed Computing and Networking [[electronic resource] ] : 11th International Conference, ICDCN 2010, Kolkata, India, January 3-6, 2010, Proceedings / / edited by Krishna Kant, Sriram V. Pemmaraju, Krishna M. Sivalingam, Jie Wu |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XIX, 522 p.) |
Disciplina | 004.6 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Computer networks
Computer engineering Cryptography Data encryption (Computer science) Data protection Electronic digital computers—Evaluation Algorithms Computer Communication Networks Computer Engineering and Networks Cryptology Data and Information Security System Performance and Evaluation |
ISBN |
1-280-38542-1
9786613563347 3-642-11322-2 |
Classificazione |
DAT 250f
SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynotes -- An Intelligent IT Infrastructure for the Future -- Heavy Tails and Models for the Web and Social Networks -- Data Structures and Algorithms for Packet Forwarding and Classification: Prof. A.K. Choudhury Memorial Lecture -- Spoken Web: A Parallel Web for the Masses: Industry Keynote -- India’s Mobile Revolution and the Unfinished Tasks: Invited Lecture -- Network Protocols and Applications -- Scheduling in Multi-Channel Wireless Networks -- Email Shape Analysis -- Maintaining Safety in Interdomain Routing with Hierarchical Path-Categories -- Fault-tolerance and Security -- On Communication Complexity of Secure Message Transmission in Directed Networks -- On Composability of Reliable Unicast and Broadcast -- A Leader-Free Byzantine Consensus Algorithm -- Authenticated Byzantine Generals in Dual Failure Model -- Sensor Networks -- Mission-Oriented k-Coverage in Mobile Wireless Sensor Networks -- Lessons from the Sparse Sensor Network Deployment in Rural India -- A New Architecture for Hierarchical Sensor Networks with Mobile Data Collectors -- Stability Analysis of Multi-hop Routing in Sensor Networks with Mobile Sinks -- Distributed Algorithms and Optimization -- Optimizing Distributed Computing Workflows in Heterogeneous Network Environments -- Radio Network Distributed Algorithms in the Unknown Neighborhood Model -- Probabilistic Self-stabilizing Vertex Coloring in Unidirectional Anonymous Networks -- A Token-Based Solution to the Group Mutual l-Exclusion Problem in Message Passing Distributed Systems -- Peer-to-Peer Networks and Network Tracing -- The Weak Network Tracing Problem -- Poisoning the Kad Network -- Credit Reputation Propagation: A Strategy to Curb Free-Riding in a Large BitTorrent Swarm -- Formal Understanding of the Emergence of Superpeer Networks: A Complex Network Approach -- Parallel and Distributed Systems -- Parallelization of the Lanczos Algorithm on Multi-core Platforms -- Supporting Malleability in Parallel Architectures with Dynamic CPUSETsMapping and Dynamic MPI -- Impact of Object Operations and Relationships on Concurrency Control in DOOS -- Causal Cycle Based Communication Pattern Matching -- Wireless Networks -- Channel Assignment in Virtual Cut-through Switching Based Wireless Mesh Networks -- Efficient Multi-hop Broadcasting in Wireless Networks Using k-Shortest Path Pruning -- Bandwidth Provisioning in Infrastructure-Based Wireless Networks Employing Directional Antennas -- ROTIO+: A Modified ROTIO for Nested Network Mobility -- Applications of Distributed Systems -- VirtualConnection: Opportunistic Networking for Web on Demand -- Video Surveillance with PTZ Cameras: The Problem of Maximizing Effective Monitoring Time -- DisClus: A Distributed Clustering Technique over High Resolution Satellite Data -- Performance Evaluation of a Wormhole-Routed Algorithm for Irregular Mesh NoC Interconnect -- Optical, Cellular and Mobile Ad Hoc Networks -- Dynamic Multipath Bandwidth Provisioning with Jitter, Throughput, SLA Constraints in MPLS over WDM Network -- Path Protection in Translucent WDM Optical Networks -- Post Deployment Planning of 3G Cellular Networks through Dual Homing of NodeBs -- K-Directory Community: Reliable Service Discovery in MANET -- Theory of Distributed Systems -- An Online, Derivative-Free Optimization Approach to Auto-tuning of Computing Systems -- Consistency-Driven Probabilistic Quorum System Construction for Improving Operation Availability -- Hamiltonicity of a General OTIS Network -- Specifying Fault-Tolerance Using Split Precondition Logic -- Network Protocols -- Fast BGP Convergence Following Link/Router Failure -- On Using Network Tomography for Overlay Availability -- QoSBR: A Quality Based Routing Protocol for Wireless Mesh Networks -- An ACO Based Approach for Detection of an Optimal Attack Path in a Dynamic Environment. |
Record Nr. | UNISA-996465635703316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Distributed computing and networking : 11th international conference, ICDCN 2010, Kolkata, India, January 3-6, 2010, proceedings / / Krishna Kant ... [et al.], eds |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | New York, : Springer, 2010 |
Descrizione fisica | 1 online resource (XIX, 522 p.) |
Disciplina | 004.6 |
Altri autori (Persone) | KantKrishna |
Collana | Lecture notes in computer science |
Soggetto topico |
Electronic data processing - Distributed processing
Information technology |
ISBN |
1-280-38542-1
9786613563347 3-642-11322-2 |
Classificazione |
DAT 250f
SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynotes -- An Intelligent IT Infrastructure for the Future -- Heavy Tails and Models for the Web and Social Networks -- Data Structures and Algorithms for Packet Forwarding and Classification: Prof. A.K. Choudhury Memorial Lecture -- Spoken Web: A Parallel Web for the Masses: Industry Keynote -- India’s Mobile Revolution and the Unfinished Tasks: Invited Lecture -- Network Protocols and Applications -- Scheduling in Multi-Channel Wireless Networks -- Email Shape Analysis -- Maintaining Safety in Interdomain Routing with Hierarchical Path-Categories -- Fault-tolerance and Security -- On Communication Complexity of Secure Message Transmission in Directed Networks -- On Composability of Reliable Unicast and Broadcast -- A Leader-Free Byzantine Consensus Algorithm -- Authenticated Byzantine Generals in Dual Failure Model -- Sensor Networks -- Mission-Oriented k-Coverage in Mobile Wireless Sensor Networks -- Lessons from the Sparse Sensor Network Deployment in Rural India -- A New Architecture for Hierarchical Sensor Networks with Mobile Data Collectors -- Stability Analysis of Multi-hop Routing in Sensor Networks with Mobile Sinks -- Distributed Algorithms and Optimization -- Optimizing Distributed Computing Workflows in Heterogeneous Network Environments -- Radio Network Distributed Algorithms in the Unknown Neighborhood Model -- Probabilistic Self-stabilizing Vertex Coloring in Unidirectional Anonymous Networks -- A Token-Based Solution to the Group Mutual l-Exclusion Problem in Message Passing Distributed Systems -- Peer-to-Peer Networks and Network Tracing -- The Weak Network Tracing Problem -- Poisoning the Kad Network -- Credit Reputation Propagation: A Strategy to Curb Free-Riding in a Large BitTorrent Swarm -- Formal Understanding of the Emergence of Superpeer Networks: A Complex Network Approach -- Parallel and Distributed Systems -- Parallelization of the Lanczos Algorithm on Multi-core Platforms -- Supporting Malleability in Parallel Architectures with Dynamic CPUSETsMapping and Dynamic MPI -- Impact of Object Operations and Relationships on Concurrency Control in DOOS -- Causal Cycle Based Communication Pattern Matching -- Wireless Networks -- Channel Assignment in Virtual Cut-through Switching Based Wireless Mesh Networks -- Efficient Multi-hop Broadcasting in Wireless Networks Using k-Shortest Path Pruning -- Bandwidth Provisioning in Infrastructure-Based Wireless Networks Employing Directional Antennas -- ROTIO+: A Modified ROTIO for Nested Network Mobility -- Applications of Distributed Systems -- VirtualConnection: Opportunistic Networking for Web on Demand -- Video Surveillance with PTZ Cameras: The Problem of Maximizing Effective Monitoring Time -- DisClus: A Distributed Clustering Technique over High Resolution Satellite Data -- Performance Evaluation of a Wormhole-Routed Algorithm for Irregular Mesh NoC Interconnect -- Optical, Cellular and Mobile Ad Hoc Networks -- Dynamic Multipath Bandwidth Provisioning with Jitter, Throughput, SLA Constraints in MPLS over WDM Network -- Path Protection in Translucent WDM Optical Networks -- Post Deployment Planning of 3G Cellular Networks through Dual Homing of NodeBs -- K-Directory Community: Reliable Service Discovery in MANET -- Theory of Distributed Systems -- An Online, Derivative-Free Optimization Approach to Auto-tuning of Computing Systems -- Consistency-Driven Probabilistic Quorum System Construction for Improving Operation Availability -- Hamiltonicity of a General OTIS Network -- Specifying Fault-Tolerance Using Split Precondition Logic -- Network Protocols -- Fast BGP Convergence Following Link/Router Failure -- On Using Network Tomography for Overlay Availability -- QoSBR: A Quality Based Routing Protocol for Wireless Mesh Networks -- An ACO Based Approach for Detection of an Optimal Attack Path in a Dynamic Environment. |
Record Nr. | UNINA-9910484672003321 |
New York, : Springer, 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Handbook on securing cyber-physical critical infrastructure [[electronic resource] /] / Sajal Das, Krishna Kant, Nan Zhang (editors) |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, Mass., : Elsevier/Morgan Kaufmann, 2012 |
Descrizione fisica | 1 online resource (849 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
DasSajal K
KantKrishna ZhangNan <1982-> |
Soggetto topico |
Computer networks - Security measures
Computer security |
Soggetto genere / forma | Electronic books. |
ISBN |
1-78402-345-0
1-283-43424-5 9786613434241 0-12-415910-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | pt. 1. Theoretical foundations -- pt. 2. Security for wireless mobile networks -- pt. 3. Security for sensor networks -- pt. 4. Platform secruity -- pt. 5. Cloud computing and data security -- pt. 6. Event monitoring and situation awareness -- pt. 7. Policy issues in security management -- pt. 8. Security in real-world systems. |
Record Nr. | UNINA-9910457887703321 |
Waltham, Mass., : Elsevier/Morgan Kaufmann, 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Handbook on securing cyber-physical critical infrastructure [[electronic resource] /] / Sajal Das, Krishna Kant, Nan Zhang (editors) |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, Mass., : Elsevier/Morgan Kaufmann, 2012 |
Descrizione fisica | 1 online resource (849 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
DasSajal K
KantKrishna ZhangNan <1982-> |
Soggetto topico |
Computer networks - Security measures
Computer security |
ISBN |
1-78402-345-0
1-283-43424-5 9786613434241 0-12-415910-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | pt. 1. Theoretical foundations -- pt. 2. Security for wireless mobile networks -- pt. 3. Security for sensor networks -- pt. 4. Platform secruity -- pt. 5. Cloud computing and data security -- pt. 6. Event monitoring and situation awareness -- pt. 7. Policy issues in security management -- pt. 8. Security in real-world systems. |
Record Nr. | UNINA-9910778936803321 |
Waltham, Mass., : Elsevier/Morgan Kaufmann, 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Handbook on securing cyber-physical critical infrastructure / / Sajal Das, Krishna Kant, Nan Zhang (editors) |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, Mass., : Elsevier/Morgan Kaufmann, 2012 |
Descrizione fisica | 1 online resource (849 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
DasSajal K
KantKrishna ZhangNan <1982-> |
Soggetto topico |
Computer networks - Security measures
Computer security |
ISBN |
9786613434241
9781784023454 1784023450 9781283434249 1283434245 9780124159105 0124159109 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | pt. 1. Theoretical foundations -- pt. 2. Security for wireless mobile networks -- pt. 3. Security for sensor networks -- pt. 4. Platform secruity -- pt. 5. Cloud computing and data security -- pt. 6. Event monitoring and situation awareness -- pt. 7. Policy issues in security management -- pt. 8. Security in real-world systems. |
Record Nr. | UNINA-9910807118903321 |
Waltham, Mass., : Elsevier/Morgan Kaufmann, 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration |
Pubbl/distr/stampa | [Place of publication not identified], : ACM, 2010 |
Descrizione fisica | 1 online resource (90 pages) |
Collana | ACM Conferences |
Soggetto topico |
Electrical & Computer Engineering
Engineering & Applied Sciences Telecommunications |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | SafeConfig '10 |
Record Nr. | UNINA-9910376004703321 |
[Place of publication not identified], : ACM, 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Secure Cloud Computing / / edited by Sushil Jajodia, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup, Cliff Wang |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | New York, NY : , : Springer New York : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (351 p.) |
Disciplina |
004
004.6 004.6782 005.7 |
Soggetto topico |
Computer security
Application software Computer communication systems Computers Systems and Data Security Information Systems Applications (incl. Internet) Computer Communication Networks Information Systems and Communication Service |
ISBN | 1-4614-9278-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptographic Key Management Issues and Challenges in Cloud Services -- Costs and Security in Clouds -- Hardware-enhanced Security for Cloud Computing -- Cloud Computing Security: What Changes with Software-Defined Networking? -- Proof of Isolation for Cloud Storage -- Selective and Fine-Grained Access to Data in the Cloud -- Enabling Collaborative Data Authorization Between Enterprise Clouds -- Making Query Execution Over Encrypted Data Practical -- Privacy-preserving Keyword Search over Encrypted Data in Cloud Computing -- Towards Data Confidentiality and a Vulnerability Analysis Framework for Cloud Computing -- Secure Mission-Centric Operations in Cloud Computing -- Computational Decoys for Cloud Security -- Towards Data Confidentiality and a Vulnerability Analysis Framework for Cloud Computing -- Software Cruising: A New Technology for Building Concurrent Software Monitor -- Controllability and Observability of Risk and Resilience in Cyber-Physical Cloud Systems. |
Record Nr. | UNINA-9910298573503321 |
New York, NY : , : Springer New York : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|