Distributed Computing and Internet Technology: 6th International Conference, ICDCIT 2010, Bhubaneswar, India, February 15-17, 2010, Proceedings (Lecture ... Applications, incl. Internet/Web, and HCI)

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the proceedings of the 6th International Conference on Distributed Computing and Internet Technology, ICDCIT 2010, held in Bhubaneswar, India, in February 2010. The 26 papers presented consists of 12 long papers, 9 short papers and 5 extended abstracts. They were carefully reviewed and selected from 91 submissions. In addition the volume contains 4 invited talks. The topics covered are networking, grid computing and Web services, internet technology and distributed computing, software engineering of secured systems, and societal applications.

Author(s): Tomasz Janowski, Hrushikesha Mohanty
Series: Lecture ... Applications, incl. Internet/Web, and HCI
Edition: 1st Edition.
Publisher: Springer
Year: 2010

Language: English
Pages: 296

3642116582......Page 1
Distributed Computing
and Internet Technology......Page 3
Preface......Page 5
Table of Contents......Page 12
Background......Page 15
Transactional Model......Page 17
Unbounded HTM......Page 18
Eager vs. Lazy Update......Page 19
Privatization......Page 20
Software Engineering......Page 21
Lock Elision......Page 22
Conclusions......Page 23
References......Page 24
Introduction......Page 27
Caches and Views......Page 28
Data Coherency......Page 29
Dynamic Content Distribution Network of Data Aggregators......Page 30
References......Page 34
Malware: From Modelling to Practical Detection......Page 35
Introduction......Page 36
Formal Approaches to Virus Characterization......Page 37
Signature Based Detection......Page 40
Static Analysis of Binaries......Page 42
Semantics Based Detection......Page 43
Protection Mechanisms......Page 44
A New Approach: Validating Behaviours of Programs......Page 47
Discussion......Page 50
References......Page 51
Introduction......Page 54
Semantics......Page 55
Semantic Frameworks......Page 57
Application......Page 61
A Domain Challenge......Page 62
Scenarios......Page 63
Challenges......Page 65
A Grand Challenge in Informatics......Page 66
References......Page 67
Introduction......Page 69
Overview......Page 70
Description of Input Parameters of LSI......Page 72
Description of Input Parameters of MRS......Page 75
Fuzzy Rule Bases of LSI......Page 76
Fuzzy Rule Bases of PPE......Page 77
Fuzzy Rule Bases of MRS......Page 78
Simulation Results......Page 80
Mathematical Analysis......Page 82
References......Page 84
Introduction......Page 86
Related Work......Page 88
Assumptions......Page 89
Proposed Perspective for Optimal Coverage......Page 90
Analysis......Page 91
Trade Off between the Gain due to Overlapping and the Number of Nodes Required to Space Tessellate......Page 92
Scalability to K-Coverage with Deterministic Deployment......Page 94
Connectivity......Page 95
Conclusion......Page 96
References......Page 97
Introduction......Page 98
Proposed GPRS-WiFi Integration......Page 99
Simulations......Page 101
References......Page 103
Introduction......Page 105
Key Considerations and Our System Parameter......Page 106
Proposed Algorithm......Page 107
Network Formation......Page 108
Network Optimization......Page 109
Experimental Results......Page 110
References......Page 111
Introduction......Page 112
The System Model......Page 113
Calculation of Delay, Message Complexity, Energy* Delay Product and Mean Delay......Page 114
Simulation Results......Page 115
References......Page 117
Existing Model of Relevant Page Graph Model......Page 118
Index Based Acyclic Graph Model......Page 119
Construction of IBAG from RPaG......Page 120
Procedure for Web-Page Selection and Its Related Dynamic Ranking......Page 122
References......Page 123
Introduction......Page 124
Component Based and Service Oriented System Architectures......Page 125
Run Time Service Re-composition on Open Platforms......Page 126
1/$e$ Law of Optimal Stopping......Page 127
Application Scenario......Page 128
Multi Criteria Utility Function......Page 129
Optimal Stopping......Page 130
Simulation Experiments......Page 131
Related Work......Page 132
References......Page 133
Introduction......Page 136
Related Work......Page 137
Overview of Template-Based Process Abstraction......Page 138
Template-Based Process Abstraction Definitions......Page 139
BPEL Extension......Page 140
Transformation from Template Process to Concrete Process......Page 142
Business Process and Structural Information Analysis......Page 143
Template Process Description with Template-BPEL......Page 145
Conclusion......Page 146
References......Page 147
Introduction......Page 148
The Temporal Caching Mechanism (TCM)......Page 149
User's Frequently Changeable Roles......Page 150
The Decision Tree Manipulation Processes......Page 151
References......Page 153
Introduction......Page 154
Related Work......Page 155
On Negotiation......Page 156
An Analysis......Page 158
Example......Page 161
Web-Based Negotiation Framework......Page 162
References......Page 164
Description and Analysis of the Model......Page 166
Steady State Distribution at Pre-arrival Epochs......Page 167
Steady State Distribution at Arbitrary Epochs......Page 168
Numerical Examples and Conclusion......Page 169
References......Page 170
Introduction......Page 171
The Algorithm......Page 172
Steps......Page 175
Correctness of Algorithm NoCompass......Page 176
Conclusion......Page 180
Appendix......Page 181
Gathering Multiple Transparent Fat Robots......Page 184
Tie Breaking Algorithm......Page 185
Gathering Algorithm......Page 187
References......Page 189
Problem Statement and Its Significance......Page 190
HPC Simulator Implementation Overview......Page 191
Simulation Results......Page 192
Conclusion......Page 193
Introduction......Page 194
Model Description and Analysis......Page 195
Numerical Discussion......Page 196
References......Page 197
Introduction......Page 198
The Model Description......Page 199
Numerical Results......Page 200
References......Page 201
Proposed Method......Page 202
Fuzzy Based Probabilities......Page 203
Search Algorithm......Page 205
Simulation Results......Page 206
References......Page 207
Introduction......Page 208
Review of Related Work......Page 209
Scope of Work......Page 210
Grammar for Class Diagram......Page 211
Notations Used in the above Grammar and Their Meanings......Page 212
Correctness Rules......Page 214
Verifying Syntactic Correctness – Using Grammar......Page 215
Verifying Consistency – Using Grammar......Page 217
References......Page 218
Introduction......Page 220
Group Operations on a Jacobian......Page 221
Proposed Improvement in Existing Explicit Formula......Page 222
Proposed Improvement in Existing Explicit Formula for Doubling of Divisor of a Genus-3 HEC over GF(p)......Page 223
Analysis......Page 224
References......Page 225
Introduction......Page 226
Related Work......Page 228
Basic Concepts and Definitions......Page 230
Computation of Influence Value......Page 231
Working of the above Algorithm......Page 233
Experimental Studies......Page 234
References......Page 236
Introduction......Page 238
Verification Phase......Page 240
Malicious User Attack......Page 241
Registration Phase......Page 242
Authentication and Session Key Agreement Phase......Page 243
Password Change Phase......Page 244
Security Analysis......Page 245
Cost and Functionality Analysis......Page 247
Conclusion......Page 248
References......Page 249
Introduction......Page 250
Extending Regular Graphs......Page 251
Regularity and Connectivity......Page 253
Regularity and Hamiltonicity......Page 254
References......Page 255
Introduction......Page 257
Calculus......Page 258
Location Management......Page 259
Model of Mobile Station......Page 260
Model of MSC and VLR......Page 261
System Composition......Page 262
Mobility......Page 263
Mobility Irrelevance......Page 265
Conclusion and Future Work......Page 267
References......Page 268
Introduction......Page 269
Related Work......Page 270
Methodology......Page 272
Selection Techniques......Page 273
Algorithm......Page 274
Example......Page 275
Threats to Validity......Page 277
References......Page 278
Introduction......Page 281
Academic Social Network......Page 282
Related Work......Page 283
The Academic Social Network Formulation......Page 284
Diffusion Models and Criterions......Page 285
Criterions Considered for Selecting Initial Active Node Set......Page 286
Experiments, Results and Discussions......Page 287
Conclusions and Future Scope......Page 291
References......Page 292
Introduction......Page 293
Appendix......Page 295
Author Index......Page 296