LNCS 5966
Зміст
Section 1 – Invited Papers.- Transactional Memory Today.- Maintaining Coherent Views over Dynamic Distributed Data.- Malware: From Modelling to Practical Detection.- Semantic Frameworks—Meanings in the Architecture.- Section 2 – Networking.- Fuzzy-Controlled Source-Initiated Multicasting (FSIM) in Ad Hoc Networks.- On Optimal Space Tessellation with Deterministic Deployment for Coverage in Three-Dimensional Wireless Sensor Networks.- Seamless Handoff between IEEE 802.11 and GPRS Networks.- A Tool to Determine Strategic Location and Ranges of Nodes for Optimum Deployment of Wireless Sensor Network.- An Efficient Hybrid Data-Gathering Scheme in Wireless Sensor Networks.- Section 3 – Grid Computing and Web Services.- Introducing Dynamic Ranking on Web Pages Based on Multiple Ontology Supported Domains.- Multi-criteria Service Selection with Optimal Stopping in Dynamic Service-Oriented Systems.- Template-Based Process Abstraction for Reusable Inter-organizational Applications in RESTful Architecture.- Enhancing the Hierarchical Clustering Mechanism of Storing Resources’ Security Policies in a Grid Authorization System.- A Framework for Web-Based Negotiation.- Section 4 – Internet Technology and Distributed Computing.- Performance Analysis of a Renewal Input Bulk Service Queue with Accessible and Non-accessible Batches.- A Distributed Algorithm for Pattern Formation by Autonomous Robots, with No Agreement on Coordinate Compass.- Gathering Asynchronous Transparent Fat Robots.- Development of Generalized HPC Simulator.- Performance Analysis of Finite Buffer Queueing System with Multiple Heterogeneous Servers.- Finite Buffer Controllable Single and Batch Service Queues.- Enhanced Search in Peer-to-Peer Networks Using Fuzzy Logic.- Section 5 – Software Engineering: Secured Systems.- UML-Compiler: A Framework for Syntactic and Semantic Verification of UML Diagrams.- Evolution of Hyperelliptic Curve Cryptosystems.- Reliability Improvement Based on Prioritization of Source Code.- Secure Dynamic Identity-Based Remote User Authentication Scheme.- Theoretical Notes on Regular Graphs as Applied to Optimal Network Design.- Formal Approaches to Location Management in Mobile Communications.- Automated Test Scenario Selection Based on Levenshtein Distance.- Section 6 – Societal Applications.- Study of Diffusion Models in an Academic Social Network.- First Advisory and Real-Time Health Surveillance to Reduce Maternal Mortality Using Mobile Technology.