Distributed computing and internet technology: second international conference, ICDCIT 2005 ; Bhubaneswar, India, December 22 - 24, 2005 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2005
|
Schriftenreihe: | Lecture notes in computer science
3816 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XXI, 606 S. Ill., graph. Darst. |
ISBN: | 9783540309994 3540309993 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV021292716 | ||
003 | DE-604 | ||
005 | 20060316 | ||
007 | t| | ||
008 | 060116s2005 gw ad|| |||| 10||| eng d | ||
015 | |a 06,A04,0015 |2 dnb | ||
016 | 7 | |a 977471276 |2 DE-101 | |
020 | |a 9783540309994 |c kart. : EUR 77.04 (freier Pr.), sfr 127.50 (freier Pr.) |9 978-3-540-30999-4 | ||
020 | |a 3540309993 |c kart. : EUR 77.04 (freier Pr.), sfr 127.50 (freier Pr.) |9 3-540-30999-3 | ||
024 | 3 | |a 9783540309994 | |
028 | 5 | 2 | |a 11604655 |
035 | |a (OCoLC)62795883 | ||
035 | |a (DE-599)BVBBV021292716 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-739 |a DE-91G |a DE-706 |a DE-83 |a DE-188 | ||
050 | 0 | |a QA76.9.D5 | |
082 | 0 | |a 004.36 |2 22 | |
084 | |a DAT 614f |2 stub | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 461f |2 stub | ||
245 | 1 | 0 | |a Distributed computing and internet technology |b second international conference, ICDCIT 2005 ; Bhubaneswar, India, December 22 - 24, 2005 ; proceedings |c Goutam Chakraborty (ed.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2005 | |
300 | |a XXI, 606 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 3816 | |
650 | 4 | |a Internet - Congrès | |
650 | 4 | |a Traitement réparti - Congrès | |
650 | 4 | |a Datenverarbeitung | |
650 | 4 | |a Electronic data processing |x Distributed processing |v Congresses | |
650 | 4 | |a Internet |v Congresses | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Data Mining |0 (DE-588)4428654-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Software Engineering |0 (DE-588)4116521-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Verteiltes System |0 (DE-588)4238872-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2005 |z Bhubaneswar |2 gnd-content | |
689 | 0 | 0 | |a Verteiltes System |0 (DE-588)4238872-7 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Software Engineering |0 (DE-588)4116521-4 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 3 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 3 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 3 | |5 DE-604 | |
689 | 4 | 0 | |a Data Mining |0 (DE-588)4428654-5 |D s |
689 | 4 | |5 DE-604 | |
700 | 1 | |a Chakraborty, Goutam |e Sonstige |0 (DE-588)130633410 |4 oth | |
711 | 2 | |a ICDCIT |n 2 |d 2005 |c Bhubaneswar |j Sonstige |0 (DE-588)10122969-0 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 3816 |w (DE-604)BV000000607 |9 3816 | |
856 | 4 | 2 | |m Digitalisierung UBPassau |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014613544&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-014613544 |
Datensatz im Suchindex
_version_ | 1820874979373219840 |
---|---|
adam_text |
Table of Contents
Plenary Talk I
The Distributed Sensor Networks
S.S.
Distributed Computing
Distributed Computing Trade Chair's Message
Arunabha Sen
Network Protcols
Efficient Binding Lifetime Determination Schemes in HMIPv6
Sun Ok Yang, SungSuk Kim, Chong-Sun Hwang
A Fast Search and Advanced Marking Scheme for Network IP
Traceback Model
Jia Hou, Moon Ho Lee
Design and Performance Evaluation of Token-Based MAC Protocols in
WDM Burst Switched Ring Networks
Li~Mei Peng, Young-Chul Kim, Kyoung-Min Yoo, Kyeong-Eun Han,
Young-Chon Kim
Routing in Mobile Ad Hoc Network
Self-stabilizing Energy-Aware Routing Algorithm in Wireless Sensor
Network with Limited Mobility
Smruti Padhy, Diganta Goswami
Position Based Gradient Routing in Mobile Ad Hoc Networks
Anand Praksh Ruhil, D.K. Lobiyal, Ivan Stojmenovic
Distributed Clustering Algorithm for Finding Virtual Backbone in
Ad Hoc Networks
B. Paul,
XVI Table of Contents
Merging Clustering Algorithms in Mobile Ad Hoc Networks
Orhan Dagdeviren, Kayhan Erciyes, Deniz Cokuslu
Performance Study and Implementation of Self Organized Routing
Algorithm for Mobile Ad Hoc Network Using GloMoSim
K. Murugan, S. Shanmugavel
Communication and Coverage in Wireless Networks
Self-stabilizing Deterministic TDMA for Sensor Networks
Mahesh Arumugam, Sandeep S. Kulkarni
Effect of Mobility on Communication Performance in Overloaded
One-Dimensional Cellular Networks
Michihiro Inoue, Noriaki Yoshiura, Yoshikuni Onozato
Distributed Time Slot Assignment in Wireless Ad Hoc Networks for
STDMA
Subhasis Bhattacharjee,
Efficient Algorithm for Placing Base Stations by Avoiding Forbidden
Zone
Sasanka Roy, Debabrata Bardhan, Sandip
Secured Communication in Distributed Systems
Secure Two-Party Context Free Language Recognition
Anshurnan Singh, Siddharth Barman, K.K. Shukla
Autonomous Agent Based Distributed Fault-Tolerant Intrusion
Detection System
Up Sen, Indranil Sengupta
Cleaning an Arbitrary Regular Network with Mobile Agents
Paola
Query and Transaction Processing
Multi-attribute Hashing of Wireless Data for Content-Based Queries
Yon Dohn Chung, Ji Yeon Lee
A Tool for Automated Resource Consumption Profiling of Distributed
Transactions
B. Nagaprabhanjan, Varsha
Table of Contents XVII
An Efficient Algorithm for Removing Useless Logged Messages in
SBML Protocols
JinHo
Theory of Distributed Systems
Divide and Concur: Employing Chandra and Toueg's Consensus
Algorithm in a Multi-level Setting
Rahul Agarwal,
Sanjiva Prasad
Distributed Multiple Hypothesis Testing in Sensor Networks Under
Bandwidth Constraint
Chandrashekhar Thejaswi PS, Ranjeet Kumar Patro
A Scalable Multi-level Distributed System-Level Diagnosis
Paritosh Chandrapal, Padam Kumar
Analysis of Interval-Based Global State Detection
Punit
Grid Computing
A Two-Phase Scheduling Algorithm for Efficient Collective
Communications of MPICH-G2
Junghee Lee, Dongsoo Han
Towards an Agent-Based framework for Monitoring and Tuning
Application Performance in Grid Environment
Sarbani Roy, Nandini Mukherjee
GDP: A Paradigm for Intertask Communication in Grid Computing
Through Distributed Pipes
D. JanaMram, M. Venkateswara Ready, A. Vijay Srinivas,
M.A. Maluk
Internet Technology
Internet Technology Track Chair's Message
Sanjay K. Madria
XVIII Table of Contents
Internet Search and Query
Rewriting Queries Using View for RDF/BDFS-Based Relational Data
Integration
Huajun Chen
An Effective Searching Method Using the Example-Based Query
Kil Hong Joo, Jaeho Lee
On Communicating with Agents on the Network
Rajat Shuvro Roy, M, Sohel Rahman
E-Commerce
Applying Fuzzy Logic to Recommend Consumer Electronics
Yukim Cao, Yunfeng Li, Xiaofeng Liao
Generic XML Schema Definition (XSD) to GUI Translator
V. Radha, S. Ramakrishna, N. Pradeep Kumar
Off-Line Micro-payment System for Content Sharing in P2P Networks
Xiaoling Dai, John Grundy
Browsing and Analysis of Web Elements
FlexiRank: An Algorithm Offering Flexibility and Accuracy for
Ranking the Web Pages
Debajyoti Mukhopadhyay, Pradipta Biswas
Adaptable Web Browsing of Images in Mobile Computing Environment:
Experiments and Observations
Atul Kumar, Anjali Bhargava, Bharat Bhargava, Sanjay Madria
An Incremental Document Clustering Algorithm Based on a
Hierarchical Agglomerative Approach
Kil Hong Joo, SooJung Lee
Systems Security
System Security Track Chair's Message
Indrafit Ray
Table of Contents XIX
Theory of Secured Systems
A Game Based Model of Security for Key Predistribution Schemes in
Wireless Sensor Network
Debapriyay Mukhopadhyay, Suman Roy
E-mail Worm Detection Using the Analysis of Behavior
Tao Jiang, Wonil Kim, Kyungsuk Lhee, Manpyo Hong
Verifiably Encrypted Signature Scheme Without Random
Oracles
M. Choudary Gorantla, Ashutosh Saxena
Intrusion Detection and Ad Hoc Network Security
An Improved Intrusion Detection Technique for Mobile
Adhoc Networks
S. Prasanna, V. Vetriselvi
User Revocation in Secure Adhoc Networks
Bezawada Bruhadeshwar, Sandeep S. Kulkarni
A Hybrid Method to Intrusion Detection Systems Using HMM
C. V. Raman, AM Negi
Secured Systems Techniques
Enhanced Network Traffic Anomaly Detector
Suresh Reddy, Sukumar Nandi
Statistically Secure Extension of Anti-collusion Code Fingerprinting
Jae-Min Seal, Seong- Whan Kim
An Improvement of Auto-Correlation Based Video Watermarking
Scheme Using Perceptual Masking for Motion
Hyun-Seong Sung, Seong-Whan Kim
Validation of Policy Integration Using Alloy
Manachai Toahchoodee, Indrakshi Ray
Plenary Talk II
Linking Theories of Concurrency by Retraction
He Jifeng
XX Table of Contents
Software Engineering
Software Engineering Track Chair's Message
Gopal Gupta
Software Architecture
Integrating Architecture Description Languages: A Semantics-Based
Approach
Qian Wang
Automated Runtime Validation of Software Architecture
Design
Zhifiang Dong, Yujian
Software Optimization and Reliability
Analyzing Loop Paths for Execution Time Estimation
Abhik Roychoudhury, Tulika
A Technique for Early Software Reliability Prediction
Rakesh Tripathi, Rajib Mall
Formal Methods
Executable Requirements Specifications Using Triggered Message
Sequence Charts
Bikram Sengupta, Ranee Cleaveland
Efficient Symmetry Reduction for an Actor-Based Model
M.M. Jaghoori, M. Sirjani, M.R. Mousavi, A, Movaghar
Validated Code Generation for Activity Diagrams
A.K, Bhattacharjee, R.K. Shyamasundar
Data Mining
Data Mining Track Chair's Message
Mukesh Mohania
Table of Contents XXI
Data Clustering Techniques
An Approach to Find Embedded Clusters Using Density Based
Techniques
S. Roy, D.K. Bhattacharyya
Using Sub-sequence Information with kNN for Classification of
Sequential Data
N. Pradeep Kumar, M. Venkateswara Rao, P. Radha Krishna,
Raju S. Bapi
Distance-Based Outliers in Sequences
Girish Keshav Palshikar
Capturing Market Intelligence from Customer Feedback E-mails
Using Self-enhancing Bolztmann Machine-Based Network of
Knowledge Maps
N. Pradeep Kumar, Tapati Bandopadhyay
Multidimensional Data Mining
Algorithm for Fuzzy Clustering of Mixed Data with Numeric and
Categorical Attributes
Amir Ahmad, Lipika
Dissemination of Multidimensional Data Using Broadcast Clusters
Rias
Multidimensional Frequent Pattern Mining Using Association Rule
Based Constraints
S. Vijayalakshmi, S. Suresh Raja
A Classification Based Approach for Root Unknown Phylogenetic
Networks Under Constrained Recombination
M.A.E. Zahid, Ankush
Author Index |
adam_txt |
Table of Contents
Plenary Talk I
The Distributed Sensor Networks
S.S.
Distributed Computing
Distributed Computing Trade Chair's Message
Arunabha Sen
Network Protcols
Efficient Binding Lifetime Determination Schemes in HMIPv6
Sun Ok Yang, SungSuk Kim, Chong-Sun Hwang
A Fast Search and Advanced Marking Scheme for Network IP
Traceback Model
Jia Hou, Moon Ho Lee
Design and Performance Evaluation of Token-Based MAC Protocols in
WDM Burst Switched Ring Networks
Li~Mei Peng, Young-Chul Kim, Kyoung-Min Yoo, Kyeong-Eun Han,
Young-Chon Kim
Routing in Mobile Ad Hoc Network
Self-stabilizing Energy-Aware Routing Algorithm in Wireless Sensor
Network with Limited Mobility
Smruti Padhy, Diganta Goswami
Position Based Gradient Routing in Mobile Ad Hoc Networks
Anand Praksh Ruhil, D.K. Lobiyal, Ivan Stojmenovic
Distributed Clustering Algorithm for Finding Virtual Backbone in
Ad Hoc Networks
B. Paul,
XVI Table of Contents
Merging Clustering Algorithms in Mobile Ad Hoc Networks
Orhan Dagdeviren, Kayhan Erciyes, Deniz Cokuslu
Performance Study and Implementation of Self Organized Routing
Algorithm for Mobile Ad Hoc Network Using GloMoSim
K. Murugan, S. Shanmugavel
Communication and Coverage in Wireless Networks
Self-stabilizing Deterministic TDMA for Sensor Networks
Mahesh Arumugam, Sandeep S. Kulkarni
Effect of Mobility on Communication Performance in Overloaded
One-Dimensional Cellular Networks
Michihiro Inoue, Noriaki Yoshiura, Yoshikuni Onozato
Distributed Time Slot Assignment in Wireless Ad Hoc Networks for
STDMA
Subhasis Bhattacharjee,
Efficient Algorithm for Placing Base Stations by Avoiding Forbidden
Zone
Sasanka Roy, Debabrata Bardhan, Sandip
Secured Communication in Distributed Systems
Secure Two-Party Context Free Language Recognition
Anshurnan Singh, Siddharth Barman, K.K. Shukla
Autonomous Agent Based Distributed Fault-Tolerant Intrusion
Detection System
Up Sen, Indranil Sengupta
Cleaning an Arbitrary Regular Network with Mobile Agents
Paola
Query and Transaction Processing
Multi-attribute Hashing of Wireless Data for Content-Based Queries
Yon Dohn Chung, Ji Yeon Lee
A Tool for Automated Resource Consumption Profiling of Distributed
Transactions
B. Nagaprabhanjan, Varsha
Table of Contents XVII
An Efficient Algorithm for Removing Useless Logged Messages in
SBML Protocols
JinHo
Theory of Distributed Systems
Divide and Concur: Employing Chandra and Toueg's Consensus
Algorithm in a Multi-level Setting
Rahul Agarwal,
Sanjiva Prasad
Distributed Multiple Hypothesis Testing in Sensor Networks Under
Bandwidth Constraint
Chandrashekhar Thejaswi PS, Ranjeet Kumar Patro
A Scalable Multi-level Distributed System-Level Diagnosis
Paritosh Chandrapal, Padam Kumar
Analysis of Interval-Based Global State Detection
Punit
Grid Computing
A Two-Phase Scheduling Algorithm for Efficient Collective
Communications of MPICH-G2
Junghee Lee, Dongsoo Han
Towards an Agent-Based framework for Monitoring and Tuning
Application Performance in Grid Environment
Sarbani Roy, Nandini Mukherjee
GDP: A Paradigm for Intertask Communication in Grid Computing
Through Distributed Pipes
D. JanaMram, M. Venkateswara Ready, A. Vijay Srinivas,
M.A. Maluk
Internet Technology
Internet Technology Track Chair's Message
Sanjay K. Madria
XVIII Table of Contents
Internet Search and Query
Rewriting Queries Using View for RDF/BDFS-Based Relational Data
Integration
Huajun Chen
An Effective Searching Method Using the Example-Based Query
Kil Hong Joo, Jaeho Lee
On Communicating with Agents on the Network
Rajat Shuvro Roy, M, Sohel Rahman
E-Commerce
Applying Fuzzy Logic to Recommend Consumer Electronics
Yukim Cao, Yunfeng Li, Xiaofeng Liao
Generic XML Schema Definition (XSD) to GUI Translator
V. Radha, S. Ramakrishna, N. Pradeep Kumar
Off-Line Micro-payment System for Content Sharing in P2P Networks
Xiaoling Dai, John Grundy
Browsing and Analysis of Web Elements
FlexiRank: An Algorithm Offering Flexibility and Accuracy for
Ranking the Web Pages
Debajyoti Mukhopadhyay, Pradipta Biswas
Adaptable Web Browsing of Images in Mobile Computing Environment:
Experiments and Observations
Atul Kumar, Anjali Bhargava, Bharat Bhargava, Sanjay Madria
An Incremental Document Clustering Algorithm Based on a
Hierarchical Agglomerative Approach
Kil Hong Joo, SooJung Lee
Systems Security
System Security Track Chair's Message
Indrafit Ray
Table of Contents XIX
Theory of Secured Systems
A Game Based Model of Security for Key Predistribution Schemes in
Wireless Sensor Network
Debapriyay Mukhopadhyay, Suman Roy
E-mail Worm Detection Using the Analysis of Behavior
Tao Jiang, Wonil Kim, Kyungsuk Lhee, Manpyo Hong
Verifiably Encrypted Signature Scheme Without Random
Oracles
M. Choudary Gorantla, Ashutosh Saxena
Intrusion Detection and Ad Hoc Network Security
An Improved Intrusion Detection Technique for Mobile
Adhoc Networks
S. Prasanna, V. Vetriselvi
User Revocation in Secure Adhoc Networks
Bezawada Bruhadeshwar, Sandeep S. Kulkarni
A Hybrid Method to Intrusion Detection Systems Using HMM
C. V. Raman, AM Negi
Secured Systems Techniques
Enhanced Network Traffic Anomaly Detector
Suresh Reddy, Sukumar Nandi
Statistically Secure Extension of Anti-collusion Code Fingerprinting
Jae-Min Seal, Seong- Whan Kim
An Improvement of Auto-Correlation Based Video Watermarking
Scheme Using Perceptual Masking for Motion
Hyun-Seong Sung, Seong-Whan Kim
Validation of Policy Integration Using Alloy
Manachai Toahchoodee, Indrakshi Ray
Plenary Talk II
Linking Theories of Concurrency by Retraction
He Jifeng
XX Table of Contents
Software Engineering
Software Engineering Track Chair's Message
Gopal Gupta
Software Architecture
Integrating Architecture Description Languages: A Semantics-Based
Approach
Qian Wang
Automated Runtime Validation of Software Architecture
Design
Zhifiang Dong, Yujian
Software Optimization and Reliability
Analyzing Loop Paths for Execution Time Estimation
Abhik Roychoudhury, Tulika
A Technique for Early Software Reliability Prediction
Rakesh Tripathi, Rajib Mall
Formal Methods
Executable Requirements Specifications Using Triggered Message
Sequence Charts
Bikram Sengupta, Ranee Cleaveland
Efficient Symmetry Reduction for an Actor-Based Model
M.M. Jaghoori, M. Sirjani, M.R. Mousavi, A, Movaghar
Validated Code Generation for Activity Diagrams
A.K, Bhattacharjee, R.K. Shyamasundar
Data Mining
Data Mining Track Chair's Message
Mukesh Mohania
Table of Contents XXI
Data Clustering Techniques
An Approach to Find Embedded Clusters Using Density Based
Techniques
S. Roy, D.K. Bhattacharyya
Using Sub-sequence Information with kNN for Classification of
Sequential Data
N. Pradeep Kumar, M. Venkateswara Rao, P. Radha Krishna,
Raju S. Bapi
Distance-Based Outliers in Sequences
Girish Keshav Palshikar
Capturing Market Intelligence from Customer Feedback E-mails
Using Self-enhancing Bolztmann Machine-Based Network of
Knowledge Maps
N. Pradeep Kumar, Tapati Bandopadhyay
Multidimensional Data Mining
Algorithm for Fuzzy Clustering of Mixed Data with Numeric and
Categorical Attributes
Amir Ahmad, Lipika
Dissemination of Multidimensional Data Using Broadcast Clusters
Rias
Multidimensional Frequent Pattern Mining Using Association Rule
Based Constraints
S. Vijayalakshmi, S. Suresh Raja
A Classification Based Approach for Root Unknown Phylogenetic
Networks Under Constrained Recombination
M.A.E. Zahid, Ankush
Author Index |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author_GND | (DE-588)130633410 |
building | Verbundindex |
bvnumber | BV021292716 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.D5 |
callnumber-search | QA76.9.D5 |
callnumber-sort | QA 276.9 D5 |
callnumber-subject | QA - Mathematics |
classification_rvk | SS 4800 |
classification_tum | DAT 614f DAT 461f |
ctrlnum | (OCoLC)62795883 (DE-599)BVBBV021292716 |
dewey-full | 004.36 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.36 |
dewey-search | 004.36 |
dewey-sort | 14.36 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV021292716</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20060316</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">060116s2005 gw ad|| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">06,A04,0015</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">977471276</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783540309994</subfield><subfield code="c">kart. : EUR 77.04 (freier Pr.), sfr 127.50 (freier Pr.)</subfield><subfield code="9">978-3-540-30999-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540309993</subfield><subfield code="c">kart. : EUR 77.04 (freier Pr.), sfr 127.50 (freier Pr.)</subfield><subfield code="9">3-540-30999-3</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783540309994</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">11604655</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)62795883</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV021292716</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.D5</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.36</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 614f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Distributed computing and internet technology</subfield><subfield code="b">second international conference, ICDCIT 2005 ; Bhubaneswar, India, December 22 - 24, 2005 ; proceedings</subfield><subfield code="c">Goutam Chakraborty (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXI, 606 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">3816</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet - Congrès</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Traitement réparti - Congrès</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Datenverarbeitung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic data processing</subfield><subfield code="x">Distributed processing</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Software Engineering</subfield><subfield code="0">(DE-588)4116521-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Verteiltes System</subfield><subfield code="0">(DE-588)4238872-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2005</subfield><subfield code="z">Bhubaneswar</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Verteiltes System</subfield><subfield code="0">(DE-588)4238872-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Software Engineering</subfield><subfield code="0">(DE-588)4116521-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chakraborty, Goutam</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)130633410</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ICDCIT</subfield><subfield code="n">2</subfield><subfield code="d">2005</subfield><subfield code="c">Bhubaneswar</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)10122969-0</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">3816</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">3816</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UBPassau</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014613544&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-014613544</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2005 Bhubaneswar gnd-content |
genre_facet | Konferenzschrift 2005 Bhubaneswar |
id | DE-604.BV021292716 |
illustrated | Illustrated |
index_date | 2024-07-02T13:50:19Z |
indexdate | 2025-01-10T15:08:20Z |
institution | BVB |
institution_GND | (DE-588)10122969-0 |
isbn | 9783540309994 3540309993 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-014613544 |
oclc_num | 62795883 |
open_access_boolean | |
owner | DE-739 DE-91G DE-BY-TUM DE-706 DE-83 DE-188 |
owner_facet | DE-739 DE-91G DE-BY-TUM DE-706 DE-83 DE-188 |
physical | XXI, 606 S. Ill., graph. Darst. |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Distributed computing and internet technology second international conference, ICDCIT 2005 ; Bhubaneswar, India, December 22 - 24, 2005 ; proceedings Goutam Chakraborty (ed.) Berlin [u.a.] Springer 2005 XXI, 606 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 3816 Internet - Congrès Traitement réparti - Congrès Datenverarbeitung Electronic data processing Distributed processing Congresses Internet Congresses Datensicherung (DE-588)4011144-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Data Mining (DE-588)4428654-5 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Software Engineering (DE-588)4116521-4 gnd rswk-swf Verteiltes System (DE-588)4238872-7 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2005 Bhubaneswar gnd-content Verteiltes System (DE-588)4238872-7 s DE-604 Internet (DE-588)4308416-3 s Software Engineering (DE-588)4116521-4 s Rechnernetz (DE-588)4070085-9 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s Data Mining (DE-588)4428654-5 s Chakraborty, Goutam Sonstige (DE-588)130633410 oth ICDCIT 2 2005 Bhubaneswar Sonstige (DE-588)10122969-0 oth Lecture notes in computer science 3816 (DE-604)BV000000607 3816 Digitalisierung UBPassau application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014613544&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Distributed computing and internet technology second international conference, ICDCIT 2005 ; Bhubaneswar, India, December 22 - 24, 2005 ; proceedings Lecture notes in computer science Internet - Congrès Traitement réparti - Congrès Datenverarbeitung Electronic data processing Distributed processing Congresses Internet Congresses Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Data Mining (DE-588)4428654-5 gnd Internet (DE-588)4308416-3 gnd Software Engineering (DE-588)4116521-4 gnd Verteiltes System (DE-588)4238872-7 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4070085-9 (DE-588)4428654-5 (DE-588)4308416-3 (DE-588)4116521-4 (DE-588)4238872-7 (DE-588)4274324-2 (DE-588)1071861417 |
title | Distributed computing and internet technology second international conference, ICDCIT 2005 ; Bhubaneswar, India, December 22 - 24, 2005 ; proceedings |
title_auth | Distributed computing and internet technology second international conference, ICDCIT 2005 ; Bhubaneswar, India, December 22 - 24, 2005 ; proceedings |
title_exact_search | Distributed computing and internet technology second international conference, ICDCIT 2005 ; Bhubaneswar, India, December 22 - 24, 2005 ; proceedings |
title_exact_search_txtP | Distributed computing and internet technology second international conference, ICDCIT 2005 ; Bhubaneswar, India, December 22 - 24, 2005 ; proceedings |
title_full | Distributed computing and internet technology second international conference, ICDCIT 2005 ; Bhubaneswar, India, December 22 - 24, 2005 ; proceedings Goutam Chakraborty (ed.) |
title_fullStr | Distributed computing and internet technology second international conference, ICDCIT 2005 ; Bhubaneswar, India, December 22 - 24, 2005 ; proceedings Goutam Chakraborty (ed.) |
title_full_unstemmed | Distributed computing and internet technology second international conference, ICDCIT 2005 ; Bhubaneswar, India, December 22 - 24, 2005 ; proceedings Goutam Chakraborty (ed.) |
title_short | Distributed computing and internet technology |
title_sort | distributed computing and internet technology second international conference icdcit 2005 bhubaneswar india december 22 24 2005 proceedings |
title_sub | second international conference, ICDCIT 2005 ; Bhubaneswar, India, December 22 - 24, 2005 ; proceedings |
topic | Internet - Congrès Traitement réparti - Congrès Datenverarbeitung Electronic data processing Distributed processing Congresses Internet Congresses Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Data Mining (DE-588)4428654-5 gnd Internet (DE-588)4308416-3 gnd Software Engineering (DE-588)4116521-4 gnd Verteiltes System (DE-588)4238872-7 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Internet - Congrès Traitement réparti - Congrès Datenverarbeitung Electronic data processing Distributed processing Congresses Internet Congresses Datensicherung Rechnernetz Data Mining Internet Software Engineering Verteiltes System Computersicherheit Konferenzschrift 2005 Bhubaneswar |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014613544&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT chakrabortygoutam distributedcomputingandinternettechnologysecondinternationalconferenceicdcit2005bhubaneswarindiadecember22242005proceedings AT icdcitbhubaneswar distributedcomputingandinternettechnologysecondinternationalconferenceicdcit2005bhubaneswarindiadecember22242005proceedings |