libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

chen guihai (curatore); pan yi (curatore); guo minyi (curatore); lu jian (curatore) - parallel and distributed processing and applications - ispa 2005 workshops

Parallel and Distributed Processing and Applications - ISPA 2005 Workshops ISPA 2005 International Workshops, AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA, Nanjing, China, November 2-5, 2005, Proceedings

; ; ;




Disponibilità: Normalmente disponibile in 15 giorni


PREZZO
108,98 €
NICEPRICE
103,53 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Pubblicazione: 10/2005
Edizione: 2005





Sommario

Workshop 1: International Workshop on Applications and Economics of Peer-to-Peer Systems (AEPP 2005).- Aurelia: Building Locality-Preserving Overlay Network over Heterogeneous P2P Environments.- On Building and Updating Distributed LSI for P2P Systems.- Performing Efficient Keyword Search by Keyword Grouping in DHT Peer-to-Peer Network.- Characterization of P2P File-Sharing System.- Analysis of GHT in Mobile Ad Hoc Networks.- Attack Vulnerability of Peer-to-Peer Networks and Cost-Effective Immunization.- A P2P Market Place Based on Aggregate Signatures.- Proof of Service in a Hybrid P2P Environment.- Construct Optimal Diameter Network and d-partition Routing Algorithm.- Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System.- Workshop 2: International Workshop on Advanced Storage Technology and Autonomic Distributed Data (ASTD 2005).- VTarget: An Improved Software Target Emulator for SANs.- Design and Implementation of an Efficient Multipath for a SAN Environment.- Research of Hot-Spot Selection Algorithm in Virtual Address Switch.- An Efficient Cache Replacement Policy with Distinguishing Write Blocks from Read Blocks in Disk Arrays.- An NFSv4-Based Security Scheme for NAS.- Using Blocks Correlations to Improve the I/O Performance of Large Network Storage System.- A Cluster LVM for SAN Environments.- Workshop 3: International Workshop on Bioinformatics (BIOS 2005).- COMPACT: A Comparative Package for Clustering Assessment.- Fast Sequence Similarity Computing with LCS on LARPBS.- Fast Scalable Algorithm on LARPBS for Sequence Alignment.- Identification, Expansion, and Disambiguation of Acronyms in Biomedical Texts.- A Knowledge-Driven Method to Evaluate Multi-source Clustering.- Understanding Protein Structure Prediction Using SVM_DT.- Various Features with Integrated Strategies for Protein Name Classification.- Workshop 4: International Workshop on Grid Computing in China (GCIC 2005).- Uniform Authorization Management in ChinaGrid Support Platform.- to ChinaGrid Support Platform.- A Microeconomics-Based Resource Assignment Model for Grid Computing.- The Campus Resource Management Based on Constellation Model in the ChinaGrid.- Grid Computing Methodology for Protein Structure Prediction and Analysis.- Applying Service Composition in Digital Museum Grid.- Grid Supporting Platform for AMS Data Processing.- A CGSP-Based Grid Application for University Digital Museums.- FleMA: A Flexible Measurement Architecture for ChinaGrid.- A Resource Scheduling Strategy for the CFD Application on the Grid.- Workshop 5: International Workshop on Information Assurance in Distributed Systems (IADS 2005).- A Robust Coalition-Resistant Threshold Signature Scheme with Anonymous Signers.- A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme.- An Efficient Proxy-Protected Signature Scheme Based on Factoring.- Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings.- Encryption Based on Reversible Second-Order Cellular Automata.- ID-Based Proxy Signature Using Bilinear Pairings.- Efficient Fair Certified E-Mail Delivery Based on RSA.- Intrusion Tolerant CA Scheme with Cheaters Detection Ability.- Improvement of Protocol Anomaly Detection Based on Markov Chain and Its Application.- Research and Implementation of Workflow Interoperability Crossing Organizations.- Workshop 6: International Workshop on Mobile Ad-Hoc and Ubiquitous Sensor Networks (MASN 2005).- LSBE: A Localization Scheme Based on Events for Wireless Sensor and Actor Networks.- Crossing Effects Analysis Between Routing and MAC Protocol in Mobile Ad Hoc Networks.- Low-Latency Routing in Ad Hoc Wireless Networks Using Finite Horizons.- Energy Usage in Biomimetic Models for Massively-Deployed Sensor Networks.- Probabilistic Behavior of Sensor Network Localization.- Hybrid Authentication and Key Management Scheme for WSANs.- Storage-Optimal Key Sharing with Authentication in Sensor Networks.- Workshop 7: International Workshop on Service Grid Computing and Applications (SGCA 2005).- An Asynchronous Replica Consistency Model in Data Grid.- Distributed Access Control for Grid Environments Using Trust Management Approach.- Research on Database Access and Integration in UDMGrid.- Resource Allocation Based on Pricing for Grid Computing Environments.- CMSA: A Method for Construction and Maintenance of Semantic Annotations.- NDP2PSim: A NS2-Based Platform for Peer-to-Peer Network Simulations.- Resource Scheduling Scheme for Grid Computing and Its Petri Net Model and Analysis.- The Design and Implementation of Service Adapter in ShanghaiGrid Core.- MCRM System: CIM-Based Multiple Clusters Manager.- Workshop 8: International Workshop on Web Information Systems and Applications (WISA 2005).- to an Agent-Based Grid Workflow Management System.- An XML Query Mechanism with Ontology Integration.- Implementation of Cooperative Cognition Under Web Environment.- Access Authorization Policy for XML Document Security.- OWL2Jess: A Transformational Implementation of the OWL Semantics.- Security Frameworks for Open LBS Based on Web Services Security Mechanism.- Testing and Fault Diagnosis for Web Application Compatibility Based on Combinatorial Method.- A K-Anonymizing Approach for Preventing Link Attacks in Data Publishing.- Transformation-Driven Development of Composite Web Services.- Badness Information Audit Based onImage Character Filtering.- User’s Rough Set Based Fuzzy Interest Model in Mining WWW Cache.










Altre Informazioni

ISBN:

9783540297703

Condizione: Nuovo
Collana: Lecture Notes in Computer Science
Dimensioni: 233 x 155 mm
Formato: Brossura
Illustration Notes:XX, 672 p.
Pagine Arabe: 672
Pagine Romane: xx


Dicono di noi