Distributed Computing and Internet Technology : (Registro nro. 295432)
[ vista simple ]
000 -CABECERA | |
---|---|
campo de control de longitud fija | 08403nam a22003735i 4500 |
001 - NÚMERO DE CONTROL | |
campo de control | 295432 |
003 - IDENTIFICADOR DEL NÚMERO DE CONTROL | |
campo de control | MX-SnUAN |
005 - FECHA Y HORA DE LA ÚLTIMA TRANSACCIÓN | |
campo de control | 20160429155227.0 |
007 - CAMPO FIJO DE DESCRIPCIÓN FÍSICA--INFORMACIÓN GENERAL | |
campo de control de longitud fija | cr nn 008mamaa |
008 - DATOS DE LONGITUD FIJA--INFORMACIÓN GENERAL | |
campo de control de longitud fija | 150903s2005 gw | o |||| 0|eng d |
020 ## - NÚMERO INTERNACIONAL ESTÁNDAR DEL LIBRO | |
Número Internacional Estándar del Libro | 9783540324294 |
-- | 9783540324294 |
024 7# - IDENTIFICADOR DE OTROS ESTÁNDARES | |
Número estándar o código | 10.1007/11604655 |
Fuente del número o código | doi |
035 ## - NÚMERO DE CONTROL DEL SISTEMA | |
Número de control de sistema | vtls000348402 |
039 #9 - NIVEL DE CONTROL BIBLIOGRÁFICO Y DETALLES DE CODIFICACIÓN [OBSOLETO] | |
Nivel de reglas en descripción bibliográfica | 201509030743 |
Nivel de esfuerzo utilizado para asignar no-encabezamientos de materia en puntos de acceso | VLOAD |
Nivel de esfuerzo utilizado en la asignación de encabezamientos de materia | 201404121118 |
Nivel de esfuerzo utilizado para asignar clasificación | VLOAD |
Nivel de esfuerzo utilizado en la asignación de encabezamientos de materia | 201404090855 |
Nivel de esfuerzo utilizado para asignar clasificación | VLOAD |
-- | 201402071027 |
-- | staff |
040 ## - FUENTE DE LA CATALOGACIÓN | |
Centro catalogador/agencia de origen | MX-SnUAN |
Lengua de catalogación | spa |
Centro/agencia transcriptor | MX-SnUAN |
Normas de descripción | rda |
050 #4 - CLASIFICACIÓN DE LA BIBLIOTECA DEL CONGRESO | |
Número de clasificación | QA76.6-76.66 |
100 1# - ENTRADA PRINCIPAL--NOMBRE DE PERSONA | |
Nombre de persona | Chakraborty, Goutam. |
Término indicativo de función/relación | editor. |
9 (RLIN) | 329852 |
245 10 - MENCIÓN DE TÍTULO | |
Título | Distributed Computing and Internet Technology : |
Resto del título | Second International Conference, ICDCIT 2005, Bhubaneswar, India, December 22-24, 2005. Proceedings / |
Mención de responsabilidad, etc. | edited by Goutam Chakraborty. |
264 #1 - PRODUCCIÓN, PUBLICACIÓN, DISTRIBUCIÓN, FABRICACIÓN Y COPYRIGHT | |
Producción, publicación, distribución, fabricación y copyright | Berlin, Heidelberg : |
Nombre del de productor, editor, distribuidor, fabricante | Springer Berlin Heidelberg, |
Fecha de producción, publicación, distribución, fabricación o copyright | 2005. |
300 ## - DESCRIPCIÓN FÍSICA | |
Extensión | xxI, 606 páginas Also available online. |
Otras características físicas | recurso en línea. |
336 ## - TIPO DE CONTENIDO | |
Término de tipo de contenido | texto |
Código de tipo de contenido | txt |
Fuente | rdacontent |
337 ## - TIPO DE MEDIO | |
Nombre/término del tipo de medio | computadora |
Código del tipo de medio | c |
Fuente | rdamedia |
338 ## - TIPO DE SOPORTE | |
Nombre/término del tipo de soporte | recurso en línea |
Código del tipo de soporte | cr |
Fuente | rdacarrier |
347 ## - CARACTERÍSTICAS DEL ARCHIVO DIGITAL | |
Tipo de archivo | archivo de texto |
Formato de codificación | |
Fuente | rda |
490 0# - MENCIÓN DE SERIE | |
Mención de serie | Lecture Notes in Computer Science, |
Número Internacional Normalizado para Publicaciones Seriadas | 0302-9743 ; |
Designación de volumen o secuencia | 3816 |
500 ## - NOTA GENERAL | |
Nota general | Springer eBooks |
505 0# - NOTA DE CONTENIDO CON FORMATO | |
Nota de contenido con formato | Plenary Talk I -- The Distributed Sensor Networks – An Emerging Technology -- Distributed Computing -- Distribute Computing Track Chair’s Message -- Network Protcols -- Efficient Binding Lifetime Determination Schemes in HMIPv6 -- A Fast Search and Advanced Marking Scheme for Network IP Traceback Model -- Design and Performance Evaluation of Token-Based MAC Protocols in WDM Burst Switched Ring Networks -- Routing in Mobile Ad Hoc Network -- Self-stabilizing Energy-Aware Routing Algorithm in Wireless Sensor Network with Limited Mobility -- Position Based Gradient Routing in Mobile Ad Hoc Networks -- Distributed Clustering Algorithm for Finding Virtual Backbone in Ad Hoc Networks -- Merging Clustering Algorithms in Mobile Ad Hoc Networks -- Performance Study and Implementation of Self Organized Routing Algorithm for Mobile Ad Hoc Network Using GloMoSim -- Communication and Coverage in Wireless Networks -- Self-stabilizing Deterministic TDMA for Sensor Networks -- Effect of Mobility on Communication Performance in Overloaded One-Dimensional Cellular Networks -- Distributed Time Slot Assignment in Wireless Ad Hoc Networks for STDMA -- Efficient Algorithm for Placing Base Stations by Avoiding Forbidden Zone -- Secured Communication in Distributed Systems -- Secure Two-Party Context Free Language Recognition -- Autonomous Agent Based Distributed Fault-Tolerant Intrusion Detection System -- Cleaning an Arbitrary Regular Network with Mobile Agents -- Query and Transaction Processing -- Multi-attribute Hashing of Wireless Data for Content-Based Queries -- A Tool for Automated Resource Consumption Profiling of Distributed Transactions -- An Efficient Algorithm for Removing Useless Logged Messages in SBML Protocols -- Theory of Distributed Systems -- Divide and Concur: Employing Chandra and Toueg’s Consensus Algorithm in a Multi-level Setting -- Distributed Multiple Hypothesis Testing in Sensor Networks Under Bandwidth Constraint -- A Scalable Multi-level Distributed System-Level Diagnosis -- Analysis of Interval-Based Global State Detection -- Grid Computing -- A Two-Phase Scheduling Algorithm for Efficient Collective Communications of MPICH-G2 -- Towards an Agent-Based Framework for Monitoring and Tuning Application Performance in Grid Environment -- GDP: A Paradigm for Intertask Communication in Grid Computing Through Distributed Pipes -- Internet Technology -- Internet Technology Track Chair’s Message -- Internet Search and Query -- Rewriting Queries Using View for RDF/RDFS-Based Relational Data Integration -- An Effective Searching Method Using the Example-Based Query -- On Communicating with Agents on the Network -- E-Commerce -- Applying Fuzzy Logic to Recommend Consumer Electronics -- Generic XML Schema Definition (XSD) to GUI Translator -- Off-Line Micro-payment System for Content Sharing in P2P Networks -- Browsing and Analysis of Web Elements -- FlexiRank: An Algorithm Offering Flexibility and Accuracy for Ranking the Web Pages -- Adaptable Web Browsing of Images in Mobile Computing Environment: Experiments and Observations -- An Incremental Document Clustering Algorithm Based on a Hierarchical Agglomerative Approach -- Systems Security -- System Security Track Chair’s Message -- Theory of Secured Systems -- A Game Based Model of Security for Key Predistribution Schemes in Wireless Sensor Network -- E-mail Worm Detection Using the Analysis of Behavior -- Verifiably Encrypted Signature Scheme Without Random Oracles -- Intrusion Detection and Ad Hoc Network Security -- An Improved Intrusion Detection Technique for Mobile Adhoc Networks -- User Revocation in Secure Adhoc Networks -- A Hybrid Method to Intrusion Detection Systems Using HMM -- Secured Systems Techniques -- Enhanced Network Traffic Anomaly Detector -- Statistically Secure Extension of Anti-collusion Code Fingerprinting -- An Improvement of Auto-Correlation Based Video Watermarking Scheme Using Perceptual Masking for Motion -- Validation of Policy Integration Using Alloy -- Plenary Talk II -- Linking Theories of Concurrency by Retraction -- Software Engineering -- Software Engineering Track Chair’s Message -- Software Architecture -- Integrating Architecture Description Languages: A Semantics-Based Approach -- Automated Runtime Validation of Software Architecture Design -- Software Optimization and Reliability -- Analyzing Loop Paths for Execution Time Estimation -- A Technique for Early Software Reliability Prediction -- Formal Methods -- Executable Requirements Specifications Using Triggered Message Sequence Charts -- Efficient Symmetry Reduction for an Actor-Based Model -- Validated Code Generation for Activity Diagrams -- Data Mining -- Data Mining Track Chair’s Message -- Data Clustering Techniques -- An Approach to Find Embedded Clusters Using Density Based Techniques -- Using Sub-sequence Information with kNN for Classification of Sequential Data -- Distance-Based Outliers in Sequences -- Capturing Market Intelligence from Customer Feedback E-mails Using Self-enhancing Bolzmann Machine-Based Network of Knowledge Maps -- Multidimensional Data Mining -- Algorithm for Fuzzy Clustering of Mixed Data with Numeric and Categorical Attributes -- Dissemination of Multidimensional Data Using Broadcast Clusters -- Multidimensional Frequent Pattern Mining Using Association Rule Based Constraints -- A Classification Based Approach for Root Unknown Phylogenetic Networks Under Constrained Recombination -- Erratum -- Using Sub-sequence Information with kNN for Classification of Sequential Data -- Capturing Market Intelligence from Customer Feedback E-mails Using Self-enhancing Boltzmann Machine-Based Network of Knowledge Maps. |
520 ## - SUMARIO, ETC. | |
Sumario, etc. | This book constitutes the refereed proceedings of the Second International Conference on Distributed Computing and Internet Technology, ICDCIT 2005, held in Bhubaneswar, India in December 2005. The 40 revised full papers and 19 revised short papers presented together with 2 invited plenary talks were carefully reviewed and selected from 426 submissions. Covering the main areas distributed computing, internet technology, system security, data mining, and software engineering the papers are subdivided in topical sections on network protcols, routing in mobile ad hoc network, communication and coverage in wireless networks, secured communication in distributed systems, query and transaction processing, theory of distributed systems, grid computing, internet search and query, e-commerce, browsing and analysis of Web elements, theory of secured systems, intrusion detection and ad hoc network security, secured systems techniques, software architecture, software optimization and reliability, formal methods, data clustering techniques, and multidimensional data mining. |
590 ## - NOTA LOCAL (RLIN) | |
Nota local | Para consulta fuera de la UANL se requiere clave de acceso remoto. |
710 2# - PUNTO DE ACCESO ADICIONAL--NOMBRE DE ENTIDAD CORPORATIVA | |
Nombre de entidad corporativa o nombre de jurisdicción como elemento de entrada | SpringerLink (Servicio en línea) |
9 (RLIN) | 299170 |
776 08 - ENTRADA/ENLACE A UN FORMATO FÍSICO ADICIONAL | |
Información de relación/Frase instructiva de referencia | Edición impresa: |
Número Internacional Estándar del Libro | 9783540309994 |
856 40 - LOCALIZACIÓN Y ACCESO ELECTRÓNICOS | |
Identificador Uniforme del Recurso | <a href="http://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/11604655">http://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/11604655</a> |
Nota pública | Conectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL) |
942 ## - ELEMENTOS DE PUNTO DE ACCESO ADICIONAL (KOHA) | |
Tipo de ítem Koha | Recurso en línea |
No hay ítems disponibles.