|  |
 |
| Artikel-Nr.: 858A-9783642116582 Herst.-Nr.: 9783642116582 EAN/GTIN: 9783642116582 |
| |
|
|  |  |
 | Section 1 - Invited Papers.- Transactional Memory Today.- Maintaining Coherent Views over Dynamic Distributed Data.- Malware: From Modelling to Practical Detection.- Semantic Frameworks--Meanings in the Architecture.- Section 2 - Networking.- Fuzzy-Controlled Source-Initiated Multicasting (FSIM) in Ad Hoc Networks.- On Optimal Space Tessellation with Deterministic Deployment for Coverage in Three-Dimensional Wireless Sensor Networks.- Seamless Handoff between IEEE 802.11 and GPRS Networks.- A Tool to Determine Strategic Location and Ranges of Nodes for Optimum Deployment of Wireless Sensor Network.- An Efficient Hybrid Data-Gathering Scheme in Wireless Sensor Networks.- Section 3 - Grid Computing and Web Services.- Introducing Dynamic Ranking on Web Pages Based on Multiple Ontology Supported Domains.- Multi-criteria Service Selection with Optimal Stopping in Dynamic Service-Oriented Systems.- Template-Based Process Abstraction for Reusable Inter-organizational Applications in RESTful Architecture.- Enhancing the Hierarchical Clustering Mechanism of Storing Resources' Security Policies in a Grid Authorization System.- A Framework for Web-Based Negotiation.- Section 4 - Internet Technology and Distributed Computing.- Performance Analysis of a Renewal Input Bulk Service Queue with Accessible and Non-accessible Batches.- A Distributed Algorithm for Pattern Formation by Autonomous Robots, with No Agreement on Coordinate Compass.- Gathering Asynchronous Transparent Fat Robots.- Development of Generalized HPC Simulator.- Performance Analysis of Finite Buffer Queueing System with Multiple Heterogeneous Servers.- Finite Buffer Controllable Single and Batch Service Queues.- Enhanced Search in Peer-to-Peer Networks Using Fuzzy Logic.- Section 5 - Software Engineering:Secured Systems.- UML-Compiler: A Framework for Syntactic and Semantic Verification of UML Diagrams.- Evolution of Hyperelliptic Curve Cryptosystems.- Reliability Improvement Based on Prioritization of Source Code.- Secure Dynamic Identity-Based Remote User Authentication Scheme.- Theoretical Notes on Regular Graphs as Applied to Optimal Network Design.- Formal Approaches to Location Management in Mobile Communications.- Automated Test Scenario Selection Based on Levenshtein Distance.- Section 6 - Societal Applications.- Study of Diffusion Models in an Academic Social Network.- First Advisory and Real-Time Health Surveillance to Reduce Maternal Mortality Using Mobile Technology. Weitere Informationen:  |  | Author: | Tomasz Janowski; Hrushikesha Mohanty | Verlag: | Springer Berlin | Sprache: | eng |
|
|  |  |
 | |  |  |
 | Weitere Suchbegriffe: Netzwerkbücher, Netzwerkbücher - englischsprachig, datenbanken (fachbücher), access control, algorithms analysis, autonomic computing, business processing, cloud computing, complexity analysis, concurrency, e-governance, entertainment systems, formal methods, information retrieval |
|  |  |
| |