Distributed Computing and Networking 10th International Conference, ICDCN 2009, Hyderabad, India, January 3-6, 2009, Proceedings /

Distributed Computing and Networking 10th International Conference, ICDCN 2009, Hyderabad, India, January 3-6, 2009, Proceedings / [electronic resource] : edited by Vijay Garg, Roger Wattenhofer, Kishore Kothapalli. - 1st ed. 2009. - XVIII, 476 p. online resource. - Theoretical Computer Science and General Issues, 5408 2512-2029 ; . - Theoretical Computer Science and General Issues, 5408 .

A.K. Choudhury Memorial Lecture -- Tracking Dynamics Using Sensor Networks: Some Recurring Themes -- Keynote Talks -- Distributed Computing and the Multicore Revolution -- The Rise of People-Centric Sensing -- Temporal Considerations in Wireless Networks and Cyberphysical Systems -- Sensor Networks 1 -- Finding Facilities Fast -- Large-Scale Networked Systems: From Anarchy to Geometric Self-structuring -- Cheapest Paths in Multi-interface Networks -- Concept-Based Routing in Ad-Hoc Networks -- Heuristics for Minimizing Interference in Sensor Networks -- Multi-core and Shared Memory -- Non-blocking Array-Based Algorithms for Stacks and Queues -- Provable STM Properties: Leveraging Clock and Locks to Favor Commit and Early Abort -- Aspectising Concurrency for the RTSJ -- An Asymptotic Performance/Energy Analysis and Optimization of Multi-core Architectures -- A Cost-Optimal Algorithm for Guard Zone Problem -- Peer-to-Peer Computing -- Underlay Aware Resiliency in P2P Overlays -- HPC5: An Efficient Topology Generation Mechanism for Gnutella Networks -- Representation of Complex Concepts for Semantic Routed Network -- Guaranteeing Eventual Coherency across Data Copies, in a Highly Available Peer-to-Peer Distributed File System -- Reliability and Security -- On Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous Networks -- Response-Time Modeling of Controller Area Network (CAN) -- A Threat-Aware Anomaly-Based Intrusion-Detection Approach for Obtaining Network-Specific Useful Alarms -- Traffic Engineering Based Attack Detection in Active Networks -- Security against Sybil Attack in Wireless Sensor Network through Location Verification -- Distributed Computing -- Incentives to Tight the Runtime Estimates of EASY Backfilling -- An Index-Based Mobile Checkpointing and Recovery Algorithm -- A Formal Framework and a Tool for the Specification and Analysis of G-Nets Models Based on Graph Transformation -- Fair Resource Allocation in Distributed Combinatorial Auctioning Systems -- Network Algorithms -- Compact Routing Schemes for Dynamic Trees in the Fixed Port Model -- An Analytical Model of Information Dissemination for a Gossip-Based Protocol -- A Distributed O(/E/) Algorithm for Optimal Link-Reversal -- Fault Tolerance and Models -- Two Consensus Algorithms with Atomic Registers and Failure Detector ? -- Self-similar Functions and Population Protocols: A Characterization and a Comparison -- Byzantine-Resilient Convergence in Oblivious Robot Networks -- Snap-Stabilization in Message-Passing Systems -- A Novel Performance Index for Characterizing Stochastic Faulty Patterns in Mesh-Based Networks -- Sensor Networks 2 -- Optimizing Multi-hop Queries in ZigBee Based Multi-sink Sensor Networks -- QDMAC: An Energy Efficient Low Latency MAC Protocol for Query Based Wireless Sensor Networks -- Field Sensing and Target Tracking Using Mobile Sensors -- Q-Coverage Problem in Wireless Sensor Networks -- On Providing Reliability and Maximizing Network Lifetime in Multi-Sink Wireless Sensor Networks -- Fault-Tolerance and Replication -- Fault-Tolerant Implementations of Regular Registers by Safe Registers with Applications to Networks -- A General Approach to Analyzing Quorum-Based Heterogeneous Dynamic Data Replication Schemes -- Tree-Based Dynamic Primary Copy Algorithms for Replicated Databases -- FTRepMI: Fault-Tolerant, Sequentially-Consistent Object Replication for Grid Applications -- Wireless Networks -- Effective Layer-3 Protocols for Integrating Mobile Ad Hoc Network and the Internet -- Performance Analysis of a UMTS Cell with Underlying Tunnel-WLANs -- PerformanceComparison of Orthogonal Gold and Walsh Hadamard Codes for Quasi-Synchronous CDMA Communication -- Analysis of Optimum Interleaver for Receivers in IDMA Systems -- Enhancement of QoS in 802.11e for Different Traffics -- Sensor Networks 3 -- Flooding-Assisted Threshold Assignment for Aggregate Monitoring in Sensor Networks -- A Mechanism to Structure Mission-Aware Interaction in Mobile Sensor Networks -- Balancing Energy Dissipation in Data Gathering Wireless Sensor Networks Using Ant Colony Optimization -- Rate Adaptive Channel MAC -- Grid and Cluster Computing -- Efficient Load Balancing on a Cluster for Large Scale Online Video Surveillance -- Cluster Performance Forecasting Using Predictive Modeling for Virtual Beowulf Clusters -- A Hierarchical Approach to Handle Group Mutual Exclusion Problem in Distributed Systems -- Virtual Time Fair Queuing Algorithm for a Computational Grid.

This book constitutes the refereed proceedings of the 10th International Conference on Distributed Computing and Networking, ICDCN 2009, held in Hyderabad, India, during January 3-6, 2009. The 20 papers and 32 short presentations presented together with 3 keynote talks and a memorial lecture on A.K. Choudhury were carefully reviewed and selected from 179 submissions. The topics addressed are sensor networks, multi-core and shared memory, peer-to-peer-computing, reliability and security, distributed computing, network algorithms, fault tolerance and models, fault tolerance and replication, wireless networks, and grid and cluster computing.

9783540922957

10.1007/978-3-540-92295-7 doi


Computer networks .
Computer programming.
Software engineering.
Data protection.
Algorithms.
Application software.
Computer Communication Networks.
Programming Techniques.
Software Engineering.
Data and Information Security.
Algorithms.
Computer and Information Systems Applications.

TK5105.5-5105.9

004.6
© 2024 IIIT-Delhi, library@iiitd.ac.in