menu
{ "item_title" : "Distributed Computing and Internet Technology", "item_author" : [" Nikolaj Bjorner", "Sanjiva Prasad", "Laxmi Parida "], "item_description" : "Teaching Computer Science in the Community.- Attacks in the Resource-as-a-Service (RaaS) Cloud Context.- Trustworthy Self-Integrating .- HiRE - A Heuristic Approach for User Generated Record Extraction.- Optimization of service rate in a discrete-time impatient customer queue using particle swarm optimization.- A Wait-Free Stack.- Influential Degree Heuristic for Influence Maximization in Social Networks.- An Efficient Task Consolidation Algorithm for Cloud Computing Systems.- Storage Load Control Through Meta-Scheduler Using Predictive Analytics.- A Distributed Approach based on Maximal Far-Flung Scalar Premier Selection for Camera Actuation.- An Extension to UDDI for the Discovery of User Driven Web Services.- Longest Wire Length of Midimew-connected Mesh Network.- K-means and Wordnet based Feature Selection Combine with Extreme Learning Machines for Text Classification.- Language Identification and Disambiguation in Indian Mixed-Scripts.- A Dynamic Priority Based Scheduling Scheme for Multimedia Streaming Over MANETs.- Improved Bug Localization Technique using Hybrid Information Retrieval Model.- HGASA: An Efficient Hybrid Technique for Optimizing Data Access in Dynamic Data Grid.- Energy Efficient SNR Based Clustering in Underwater Sensor Network with Data Encryption.- Collaborative Access Control Mechanism for Online Social Networks.- i-TSS: An Image Encryption Algorithm Based on Transposition, Shuffling and Substitution using Randomly Generated Bitmap Image.- A type system for counting logs of multi-threaded nested transactional programs.- A Proactive Resource Provisioning Model for Cloud Federation.- A Multiclass SVM Classification Approach for Intrusion Detection.- Dynamic Data Replication across Geo-Distributed Cloud Data Centres.- Trust Based Target Coverage Protocol for Wireless Sensor Networks Using Fuzzy Logic.- An Internet of Things based Software Framework to handle Medical Emergencies.- Minimal Start Time Heuristics for Scheduling Workflows in Heterogeneous Computing Systems.- FC-LID: File classifier based Linear Indexing for Deduplication in Cloud Backup Services.", "item_img_path" : "https://covers1.booksamillion.com/covers/bam/3/31/928/033/3319280333_b.jpg", "price_data" : { "retail_price" : "54.99", "online_price" : "54.99", "our_price" : "54.99", "club_price" : "54.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Distributed Computing and Internet Technology|Nikolaj Bjorner

Distributed Computing and Internet Technology : 12th International Conference, Icdcit 2016, Bhubaneswar, India, January 15-18, 2016, Proceedings

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Teaching Computer Science in the Community.- Attacks in the Resource-as-a-Service (RaaS) Cloud Context.- Trustworthy Self-Integrating .- HiRE - A Heuristic Approach for User Generated Record Extraction.- Optimization of service rate in a discrete-time impatient customer queue using particle swarm optimization.- A Wait-Free Stack.- Influential Degree Heuristic for Influence Maximization in Social Networks.- An Efficient Task Consolidation Algorithm for Cloud Computing Systems.- Storage Load Control Through Meta-Scheduler Using Predictive Analytics.- A Distributed Approach based on Maximal Far-Flung Scalar Premier Selection for Camera Actuation.- An Extension to UDDI for the Discovery of User Driven Web Services.- Longest Wire Length of Midimew-connected Mesh Network.- K-means and Wordnet based Feature Selection Combine with Extreme Learning Machines for Text Classification.- Language Identification and Disambiguation in Indian Mixed-Scripts.- A Dynamic Priority Based Scheduling Scheme for Multimedia Streaming Over MANETs.- Improved Bug Localization Technique using Hybrid Information Retrieval Model.- HGASA: An Efficient Hybrid Technique for Optimizing Data Access in Dynamic Data Grid.- Energy Efficient SNR Based Clustering in Underwater Sensor Network with Data Encryption.- Collaborative Access Control Mechanism for Online Social Networks.- i-TSS: An Image Encryption Algorithm Based on Transposition, Shuffling and Substitution using Randomly Generated Bitmap Image.- A type system for counting logs of multi-threaded nested transactional programs.- A Proactive Resource Provisioning Model for Cloud Federation.- A Multiclass SVM Classification Approach for Intrusion Detection.- Dynamic Data Replication across Geo-Distributed Cloud Data Centres.- Trust Based Target Coverage Protocol for Wireless Sensor Networks Using Fuzzy Logic.- An Internet of Things based Software Framework to handle Medical Emergencies.- Minimal Start Time Heuristics for Scheduling Workflows in Heterogeneous Computing Systems.- FC-LID: File classifier based Linear Indexing for Deduplication in Cloud Backup Services.

This item is Non-Returnable

Details

  • ISBN-13: 9783319280332
  • ISBN-10: 3319280333
  • Publisher: Springer
  • Publish Date: December 2015
  • Dimensions: 9.21 x 6.14 x 0.52 inches
  • Shipping Weight: 0.78 pounds
  • Page Count: 223

Related Categories

You May Also Like...

    1

BAM Customer Reviews