000 | 05598nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-540-88140-7 | ||
003 | DE-He213 | ||
005 | 20240730195349.0 | ||
007 | cr nn 008mamaa | ||
008 | 100301s2008 gw | s |||| 0|eng d | ||
020 |
_a9783540881407 _9978-3-540-88140-7 |
||
024 | 7 |
_a10.1007/978-3-540-88140-7 _2doi |
|
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM043000 _2bisacsh |
|
072 | 7 |
_aUKN _2thema |
|
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aNetwork and Parallel Computing _h[electronic resource] : _bIFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008, Proceedings / _cedited by Jian Cao, Minglu Li, Min-You Wu, Jinjun Chen. |
250 | _a1st ed. 2008. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2008. |
|
300 |
_aXIII, 366 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aTheoretical Computer Science and General Issues, _x2512-2029 ; _v5245 |
|
505 | 0 | _aNetwork Technologies -- An AIAD-Based Adaptive Routing Protocol in Ad-Hoc Wireless Networks -- Adaptive Neighbor Selection for Service Discovery in Mobile Ad Hoc Networks -- A Formal Approach to Robustness Testing of Network Protocol -- Deadline Probing: Towards Timely Cognitive Wireless Network -- SRDFA: A Kind of Session Reconstruction DFA -- Measuring the Normality of Web Proxies' Behavior Based on Locality Principles -- Network Applications -- Feedback Control-Based Database Connection Management for Proportional Delay Differentiation-Enabled Web Application Servers -- Research on the Detection of Distributed Denial of Service Attacks Based on the Characteristics of IP Flow -- Password-Authenticated Key Exchange between Clients in a Cross-Realm Setting -- Forward Secure Password-Based Authenticated Key Distribution in the Three-Party Setting -- Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks -- A Data Storage Mechanism for P2P VoD Based on Multi-channel Overlay -- HTL: A Locality Bounded Flat Hash Location Service -- Accelerating the Propagation of Active Worms by Employing Multiple Target Discovery Techniques -- Online Accumulation: Reconstruction of Worm Propagation Path -- HRS: A Hybrid Replication Strategy for Exhaustive P2P Search -- ResourceDog: A Trusted Resource Discovery and Automatic Invocation P2P Framework -- Network and Parallel Architectures -- A Novel Approach to Manage Asymmetric Traffic Flows for Secure Network Proxies -- Automatic Transformation for Overlapping Communication and Computation -- Cooperative Communication System for Parallel Computing Agents in Multi-cluster Grid -- CPI: A Novel Three-Phase Algorithm for QoS-Aware Replica Placement Problem -- Online Balancing Two Independent Criteria -- Procrastination Scheduling forFixed-Priority Tasks with Preemption Thresholds -- Parallel and Distributed Software -- Survey on Parallel Programming Model -- An Integrated Framework for Wireless Sensor Web Service and Its Performance Analysis Based on Queue Theory -- Grid Computing: A Case Study in Hybrid GMRES Method -- Towards Resource Reliability Support for Grid Workflows -- A SyncML Middleware-Based Solution for Pervasive Relational Data Synchronization -- An Efficient Authentication and Key Agreement Protocol in RFID System -- Grid Service Discovery Based on Cross-VO Service Domain Model -- Ontology-Based Semantic Method for Service Modeling in Grid -- A Scalable and Adaptive Distributed Service Discovery Mechanism in SOC Environments. | |
520 | _aThis book constitutes the refereed proceedings of the IFIP International Conference on Network and Parallel Computing, NPC 2008, held in Shanghai, China in October 2008. The 32 revised full papers presented were carefully selected from over 140 submissions. The papers are organized in topical sections on network technologies; network applications; network and parallel architectures; parallel and distributed software. | ||
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aComputer engineering. _910164 |
|
650 | 0 |
_aData structures (Computer science). _98188 |
|
650 | 0 |
_aInformation theory. _914256 |
|
650 | 0 |
_aComputer science. _99832 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 1 | 4 |
_aComputer Communication Networks. _9160040 |
650 | 2 | 4 |
_aComputer Engineering and Networks. _9160041 |
650 | 2 | 4 |
_aData Structures and Information Theory. _931923 |
650 | 2 | 4 |
_aModels of Computation. _931806 |
650 | 2 | 4 |
_aCryptology. _931769 |
700 | 1 |
_aCao, Jian. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9160042 |
|
700 | 1 |
_aLi, Minglu. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9160043 |
|
700 | 1 |
_aWu, Min-You. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9160044 |
|
700 | 1 |
_aChen, Jinjun. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9160045 |
|
710 | 2 |
_aSpringerLink (Online service) _9160046 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783540881391 |
776 | 0 | 8 |
_iPrinted edition: _z9783540882206 |
830 | 0 |
_aTheoretical Computer Science and General Issues, _x2512-2029 ; _v5245 _9160047 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-540-88140-7 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c95598 _d95598 |