FEEDBACK Smiley face
Normal view MARC view ISBD view

On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS [electronic resource] :OTM Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and IS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part II /

Contributor(s): Meersman, Robert [editor.] | Tari, Zahir [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 4804Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007.Description: XXIX, 1860 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783540768432.Subject(s): Computer science | Computer communication systems | Data structures (Computer science) | Database management | Data mining | User interfaces (Computer systems) | Computer Science | Data Structures, Cryptology and Information Theory | Database Management | Data Mining and Knowledge Discovery | Information Systems Applications (incl. Internet) | Computer Communication Networks | User Interfaces and Human Computer InteractionOnline resources: Click here to access online
Contents:
GADA 2007 International Conference (Grid Computing, High-Performance and Distributed Applications) -- GADA 2007 PC Co-chairs’ Message -- Service Architectures for e-Science Grid Gateways: Opportunities and Challenges -- Access Control Management in Open Distributed Virtual Repositories and the Grid -- Transforming the Adaptive Irregular Out-of-Core Applications for Hiding Communication and Disk I/O -- Adaptive Data Block Placement Based on Deterministic Zones (AdaptiveZ) -- Keyword Based Indexing and Searching over Storage Resource Broker -- eCube: Hypercube Event for Efficient Filtering in Content-Based Routing -- Combining Incomparable Public Session Keys and Certificateless Public Key Cryptography for Securing the Communication Between Grid Participants -- A Service-Oriented Platform for the Enhancement and Effectiveness of the Collaborative Learning Process in Distributed Environments -- Social Networking to Support Collaboration in Computational Grids -- A Policy Based Approach to Managing Shared Data in Dynamic Collaborations -- Grid Service Composition in BPEL for Scientific Applications -- Efficient Management of Grid Resources Using a Bi-level Decision-Making Architecture for “Processable” Bulk Data -- Towards an Open Grid Marketplace Framework for Resources Trade -- A Hybrid Algorithm for Scheduling Workflow Applications in Grid Environments (ICPDP) -- Contention-Free Communication Scheduling for Group Communication in Data Parallelism -- SNMP-Based Monitoring Agents and Heuristic Scheduling for Large-Scale Grids -- HARC: The Highly-Available Resource Co-allocator -- Assessing a Distributed Market Infrastructure for Economics-Based Service Selection -- Grid Problem Solving Environment for Stereology Based Modeling -- Managing Dynamic Virtual Organizations to Get Effective Cooperation in Collaborative Grid Environments -- Sidera: A Cluster-Based Server for Online Analytical Processing -- Parallel Implementation of a Neural Net Training Application in a Heterogeneous Grid Environment -- Generalized Load Sharing for Distributed Operating Systems -- An Application-Level Service Control Mechanism for QoS-Based Grid Scheduling -- Fine Grained Access Control with Trust and Reputation Management for Globus -- Vega: A Service-Oriented Grid Workflow Management System -- Information Security (IS) 2007 International Symposium -- IS 2007 PC Co-chairs’ Message -- Cryptography: Past, Present and Future -- E-Passport: Cracking Basic Access Control Keys -- Managing Risks in RBAC Employed Distributed Environments -- STARBAC: Spatiotemporal Role Based Access Control -- Authentication Architecture for eHealth Professionals -- On RSN-Oriented Wireless Intrusion Detection -- A Hybrid, Stateful and Cross-Protocol Intrusion Detection System for Converged Applications -- Toward Sound-Assisted Intrusion Detection Systems -- End-to-End Header Protection in Signed S/MIME -- Estimation of Behavior of Scanners Based on ISDAS Distributed Sensors -- A Multi-core Security Architecture Based on EFI -- Intelligent Home Network Authentication: Home Device Authentication Using Device Certification -- Bayesian Analysis of Secure P2P Sharing Protocols -- Network Coding Protocols for Secret Key Distribution -- 3-Party Approach for Fast Handover in EAP-Based Wireless Networks -- SWorD– A Simple Worm Detection Scheme -- Prevention of Cross-Site Scripting Attacks on Current Web Applications -- Compiler Assisted Elliptic Curve Cryptography -- Trust Management Model and Architecture for Context-Aware Service Platforms -- Mobile Agent Protection in E-Business Application A Dynamic Adaptability Based Approach -- Business Oriented Information Security Management – A Layered Approach.
In: Springer eBooks
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)
No physical items for this record

GADA 2007 International Conference (Grid Computing, High-Performance and Distributed Applications) -- GADA 2007 PC Co-chairs’ Message -- Service Architectures for e-Science Grid Gateways: Opportunities and Challenges -- Access Control Management in Open Distributed Virtual Repositories and the Grid -- Transforming the Adaptive Irregular Out-of-Core Applications for Hiding Communication and Disk I/O -- Adaptive Data Block Placement Based on Deterministic Zones (AdaptiveZ) -- Keyword Based Indexing and Searching over Storage Resource Broker -- eCube: Hypercube Event for Efficient Filtering in Content-Based Routing -- Combining Incomparable Public Session Keys and Certificateless Public Key Cryptography for Securing the Communication Between Grid Participants -- A Service-Oriented Platform for the Enhancement and Effectiveness of the Collaborative Learning Process in Distributed Environments -- Social Networking to Support Collaboration in Computational Grids -- A Policy Based Approach to Managing Shared Data in Dynamic Collaborations -- Grid Service Composition in BPEL for Scientific Applications -- Efficient Management of Grid Resources Using a Bi-level Decision-Making Architecture for “Processable” Bulk Data -- Towards an Open Grid Marketplace Framework for Resources Trade -- A Hybrid Algorithm for Scheduling Workflow Applications in Grid Environments (ICPDP) -- Contention-Free Communication Scheduling for Group Communication in Data Parallelism -- SNMP-Based Monitoring Agents and Heuristic Scheduling for Large-Scale Grids -- HARC: The Highly-Available Resource Co-allocator -- Assessing a Distributed Market Infrastructure for Economics-Based Service Selection -- Grid Problem Solving Environment for Stereology Based Modeling -- Managing Dynamic Virtual Organizations to Get Effective Cooperation in Collaborative Grid Environments -- Sidera: A Cluster-Based Server for Online Analytical Processing -- Parallel Implementation of a Neural Net Training Application in a Heterogeneous Grid Environment -- Generalized Load Sharing for Distributed Operating Systems -- An Application-Level Service Control Mechanism for QoS-Based Grid Scheduling -- Fine Grained Access Control with Trust and Reputation Management for Globus -- Vega: A Service-Oriented Grid Workflow Management System -- Information Security (IS) 2007 International Symposium -- IS 2007 PC Co-chairs’ Message -- Cryptography: Past, Present and Future -- E-Passport: Cracking Basic Access Control Keys -- Managing Risks in RBAC Employed Distributed Environments -- STARBAC: Spatiotemporal Role Based Access Control -- Authentication Architecture for eHealth Professionals -- On RSN-Oriented Wireless Intrusion Detection -- A Hybrid, Stateful and Cross-Protocol Intrusion Detection System for Converged Applications -- Toward Sound-Assisted Intrusion Detection Systems -- End-to-End Header Protection in Signed S/MIME -- Estimation of Behavior of Scanners Based on ISDAS Distributed Sensors -- A Multi-core Security Architecture Based on EFI -- Intelligent Home Network Authentication: Home Device Authentication Using Device Certification -- Bayesian Analysis of Secure P2P Sharing Protocols -- Network Coding Protocols for Secret Key Distribution -- 3-Party Approach for Fast Handover in EAP-Based Wireless Networks -- SWorD– A Simple Worm Detection Scheme -- Prevention of Cross-Site Scripting Attacks on Current Web Applications -- Compiler Assisted Elliptic Curve Cryptography -- Trust Management Model and Architecture for Context-Aware Service Platforms -- Mobile Agent Protection in E-Business Application A Dynamic Adaptability Based Approach -- Business Oriented Information Security Management – A Layered Approach.

There are no comments for this item.

Log in to your account to post a comment.

© IIIT-Delhi, 2013 | Phone: +91-11-26907510| FAX +91-11-26907405 | E-mail: library@iiitd.ac.in