The opening ceremony and pre-conference tutorials on various related topics were held on December 21. The technical program started on December 22 and continued for three days. The program was arranged in single track so as to enable participants to attend sessions of di?erent tracks. Papers from the DM, IT, SE, and SS tracks were divided into two sessions, whereas DC track sessions were held on the ?rst two days of the conference. The program also included two plenary talks. The ?rst talk was delivered by S. S. Iyengar from Louisiana State University, USA. The second talk was delivered by He Jifeng from the International Institute for Software Technology (IIST) Macau. Prof. Iyenger’s talk on “The Distributed Sensor Networks — An Emerging Technology” was focused on new ideas about the use of distributed systems for emerging technology, while Prof. Jifeng’s talk on “Linking Theories of Concurrency by Retraction” dealt with semantics of concurrency. All the conference committee members contributed towards the success of ICDCIT 2005. And it was a pleasant experience for me to work with them. The one name that sticks out is R. K. Ghosh, Steering Committee Chair. He really steered the group with his past experience as Program Chair of ICDCIT 2004.
Author(s): S. S. Iyengar (auth.), Goutam Chakraborty (eds.)
Series: Lecture Notes in Computer Science 3816 : Information Systems and Applications, incl. Internet/Web, and HCI
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2005
Language: English
Pages: 608
Tags: Computer Communication Networks; Communication Studies; Programming Techniques; Software Engineering; Algorithm Analysis and Problem Complexity; Information Systems Applications (incl. Internet)
Front Matter....Pages -
The Distributed Sensor Networks – An Emerging Technology....Pages 1-1
Distribute Computing Track Chair’s Message....Pages 2-2
Efficient Binding Lifetime Determination Schemes in HMIPv6....Pages 3-14
A Fast Search and Advanced Marking Scheme for Network IP Traceback Model....Pages 15-20
Design and Performance Evaluation of Token-Based MAC Protocols in WDM Burst Switched Ring Networks....Pages 21-26
Self-stabilizing Energy-Aware Routing Algorithm in Wireless Sensor Network with Limited Mobility....Pages 27-38
Position Based Gradient Routing in Mobile Ad Hoc Networks....Pages 39-49
Distributed Clustering Algorithm for Finding Virtual Backbone in Ad Hoc Networks....Pages 50-55
Merging Clustering Algorithms in Mobile Ad Hoc Networks....Pages 56-61
Performance Study and Implementation of Self Organized Routing Algorithm for Mobile Ad Hoc Network Using GloMoSim....Pages 62-68
Self-stabilizing Deterministic TDMA for Sensor Networks....Pages 69-81
Effect of Mobility on Communication Performance in Overloaded One-Dimensional Cellular Networks....Pages 82-92
Distributed Time Slot Assignment in Wireless Ad Hoc Networks for STDMA....Pages 93-104
Efficient Algorithm for Placing Base Stations by Avoiding Forbidden Zone....Pages 105-116
Secure Two-Party Context Free Language Recognition....Pages 117-124
Autonomous Agent Based Distributed Fault-Tolerant Intrusion Detection System....Pages 125-131
Cleaning an Arbitrary Regular Network with Mobile Agents....Pages 132-142
Multi-attribute Hashing of Wireless Data for Content-Based Queries....Pages 143-153
A Tool for Automated Resource Consumption Profiling of Distributed Transactions....Pages 154-165
An Efficient Algorithm for Removing Useless Logged Messages in SBML Protocols....Pages 166-171
Divide and Concur: Employing Chandra and Toueg’s Consensus Algorithm in a Multi-level Setting....Pages 172-183
Distributed Multiple Hypothesis Testing in Sensor Networks Under Bandwidth Constraint....Pages 184-191
A Scalable Multi-level Distributed System-Level Diagnosis....Pages 192-202
Analysis of Interval-Based Global State Detection....Pages 203-216
A Two-Phase Scheduling Algorithm for Efficient Collective Communications of MPICH-G2....Pages 217-228
Towards an Agent-Based Framework for Monitoring and Tuning Application Performance in Grid Environment....Pages 229-234
GDP: A Paradigm for Intertask Communication in Grid Computing Through Distributed Pipes....Pages 235-241
Internet Technology Track Chair’s Message....Pages 242-242
Rewriting Queries Using View for RDF/RDFS-Based Relational Data Integration....Pages 243-254
An Effective Searching Method Using the Example-Based Query....Pages 255-266
On Communicating with Agents on the Network....Pages 267-277
Applying Fuzzy Logic to Recommend Consumer Electronics....Pages 278-289
Generic XML Schema Definition (XSD) to GUI Translator....Pages 290-296
Off-Line Micro-payment System for Content Sharing in P2P Networks....Pages 297-307
FlexiRank: An Algorithm Offering Flexibility and Accuracy for Ranking the Web Pages....Pages 308-313
Adaptable Web Browsing of Images in Mobile Computing Environment: Experiments and Observations....Pages 314-320
An Incremental Document Clustering Algorithm Based on a Hierarchical Agglomerative Approach....Pages 321-332
System Security Track Chair’s Message....Pages 333-333
A Game Based Model of Security for Key Predistribution Schemes in Wireless Sensor Network....Pages 334-347
E-mail Worm Detection Using the Analysis of Behavior....Pages 348-356
Verifiably Encrypted Signature Scheme Without Random Oracles....Pages 357-363
An Improved Intrusion Detection Technique for Mobile Adhoc Networks....Pages 364-376
User Revocation in Secure Adhoc Networks....Pages 377-388
A Hybrid Method to Intrusion Detection Systems Using HMM....Pages 389-396
Enhanced Network Traffic Anomaly Detector....Pages 397-403
Statistically Secure Extension of Anti-collusion Code Fingerprinting....Pages 404-409
An Improvement of Auto-Correlation Based Video Watermarking Scheme Using Perceptual Masking for Motion....Pages 410-419
Validation of Policy Integration Using Alloy....Pages 420-431
Linking Theories of Concurrency by Retraction....Pages 432-432
Software Engineering Track Chair’s Message....Pages 433-433
Integrating Architecture Description Languages: A Semantics-Based Approach....Pages 434-445
Automated Runtime Validation of Software Architecture Design....Pages 446-457
Analyzing Loop Paths for Execution Time Estimation....Pages 458-469
A Technique for Early Software Reliability Prediction....Pages 470-481
Executable Requirements Specifications Using Triggered Message Sequence Charts....Pages 482-493
Efficient Symmetry Reduction for an Actor-Based Model....Pages 494-507
Validated Code Generation for Activity Diagrams....Pages 508-521
Data Mining Track Chair’s Message....Pages 522-522
An Approach to Find Embedded Clusters Using Density Based Techniques....Pages 523-535
Using Sub-sequence Information with kNN for Classification of Sequential Data....Pages 536-546
Distance-Based Outliers in Sequences....Pages 547-552
Capturing Market Intelligence from Customer Feedback E-mails Using Self-enhancing Bolzmann Machine-Based Network of Knowledge Maps....Pages 553-560
Algorithm for Fuzzy Clustering of Mixed Data with Numeric and Categorical Attributes....Pages 561-572
Dissemination of Multidimensional Data Using Broadcast Clusters....Pages 573-584
Multidimensional Frequent Pattern Mining Using Association Rule Based Constraints....Pages 585-591
A Classification Based Approach for Root Unknown Phylogenetic Networks Under Constrained Recombination....Pages 592-603
Erratum: Distributed Computing and Internet Technology....Pages E1-E1
Capturing Market Intelligence from Customer Feedback E-mails Using Self-enhancing Boltzmann Machine-Based Network of Knowledge Maps....Pages E12-E19
Back Matter....Pages -