Atjaunināt sīkdatņu piekrišanu

Network and Parallel Computing: IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008, Proceedings 2008 ed. [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 366 pages, height x width: 235x155 mm, weight: 580 g, XIII, 366 p., 1 Paperback / softback
  • Sērija : Theoretical Computer Science and General Issues 5245
  • Izdošanas datums: 07-Oct-2008
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3540881395
  • ISBN-13: 9783540881391
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 366 pages, height x width: 235x155 mm, weight: 580 g, XIII, 366 p., 1 Paperback / softback
  • Sērija : Theoretical Computer Science and General Issues 5245
  • Izdošanas datums: 07-Oct-2008
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3540881395
  • ISBN-13: 9783540881391
Welcome to the proceedings of the 2008 IFIP International Conference on Network and Parallel Computing (NPC 2008) held in Shanghai, China. NPC has been a premier conference that has brought together researchers and pr- titioners from academia, industry and governments around the world to advance the theories and technologies of network and parallel computing. The goal of NPC is to establish an international forum for researchers and practitioners to present their - cellent ideas and experiences in all system fields of network and parallel computing. The main focus of NPC 2008 was on the most critical areas of network and parallel computing, network technologies, network applications, network and parallel archit- tures, and parallel and distributed software. In total, the conference received more than 140 papers from researchers and prac- tioners. Each paper was reviewed by at least two internationally renowned referees and selected based on its originality, significance, correctness, relevance, and clarity of presentation. Among the high-quality submissions, only 32 regular papers were accepted by the conferences. All of the selected conference papers are included in the conference proceedings. After the conference, some high-quality papers will be r- ommended to be published in the special issue of international journals. We were delighted to host three well-known international scholars offering the k- note speeches, Sajal K. Das from University Texas at Arlington USA, Matt Mutka from Michigan State University and David Hung-Chang Du from University of M- nesota University of Minnesota.
Network Technologies.- An AIAD-Based Adaptive Routing Protocol in Ad-Hoc
Wireless Networks.- Adaptive Neighbor Selection for Service Discovery in
Mobile Ad Hoc Networks.- A Formal Approach to Robustness Testing of Network
Protocol.- Deadline Probing: Towards Timely Cognitive Wireless Network.-
SRDFA: A Kind of Session Reconstruction DFA.- Measuring the Normality of Web
Proxies Behavior Based on Locality Principles.- Network Applications.-
Feedback Control-Based Database Connection Management for Proportional Delay
Differentiation-Enabled Web Application Servers.- Research on the Detection
of Distributed Denial of Service Attacks Based on the Characteristics of IP
Flow.- Password-Authenticated Key Exchange between Clients in a Cross-Realm
Setting.- Forward Secure Password-Based Authenticated Key Distribution in the
Three-Party Setting.- Key Management Using Certificateless Public Key
Cryptography in Ad Hoc Networks.- A Data Storage Mechanism for P2P VoD Based
on Multi-channel Overlay.- HTL: A Locality Bounded Flat Hash Location
Service.- Accelerating the Propagation of Active Worms by Employing Multiple
Target Discovery Techniques.- Online Accumulation: Reconstruction of Worm
Propagation Path.- HRS: A Hybrid Replication Strategy for Exhaustive P2P
Search.- ResourceDog: A Trusted Resource Discovery and Automatic Invocation
P2P Framework.- Network and Parallel Architectures.- A Novel Approach to
Manage Asymmetric Traffic Flows for Secure Network Proxies.- Automatic
Transformation for Overlapping Communication and Computation.- Cooperative
Communication System for Parallel Computing Agents in Multi-cluster Grid.-
CPI: A Novel Three-Phase Algorithm for QoS-Aware Replica Placement Problem.-
Online Balancing Two Independent Criteria.- Procrastination Scheduling
forFixed-Priority Tasks with Preemption Thresholds.- Parallel and Distributed
Software.- Survey on Parallel Programming Model.- An Integrated Framework for
Wireless Sensor Web Service and Its Performance Analysis Based on Queue
Theory.- Grid Computing: A Case Study in Hybrid GMRES Method.- Towards
Resource Reliability Support for Grid Workflows.- A SyncML Middleware-Based
Solution for Pervasive Relational Data Synchronization.- An Efficient
Authentication and Key Agreement Protocol in RFID System.- Grid Service
Discovery Based on Cross-VO Service Domain Model.- Ontology-Based Semantic
Method for Service Modeling in Grid.- A Scalable and Adaptive Distributed
Service Discovery Mechanism in SOC Environments.