Distributed Computing and Internet Technology [E-Book] : 12th International Conference, ICDCIT 2016, Bhubaneswar, India, January 15-18, 2016, Proceedings / edited by Nikolaj Bjørner, Sanjiva Prasad, Laxmi Parida.
Bjørner, Nikolaj. (editor)
Parida, Laxmi. (editor) / Prasad, Sanjiva. (editor)
1st ed. 2016.
Cham : Springer, 2016
XXI, 223 p. 72 illus. in color. online resource.
Lecture notes in computer science ; 9581
Full Text
Table of Contents:
  • Teaching Computer Science in the Community
  • Attacks in the Resource-as-a-Service (RaaS) Cloud Context
  • Trustworthy Self-Integrating
  • HiRE - A Heuristic Approach for User Generated Record Extraction
  • Optimization of service rate in a discrete-time impatient customer queue using particle swarm optimization
  • A Wait-Free Stack
  • Influential Degree Heuristic for Influence Maximization in Social Networks
  • An Efficient Task Consolidation Algorithm for Cloud Computing Systems
  • Storage Load Control Through Meta-Scheduler Using Predictive Analytics
  • A Distributed Approach based on Maximal Far-Flung Scalar Premier Selection for Camera Actuation
  • An Extension to UDDI for the Discovery of User Driven Web Services
  • Longest Wire Length of Midimew-connected Mesh Network
  • K-means and Wordnet based Feature Selection Combine with Extreme Learning Machines for Text Classification
  • Language Identification and Disambiguation in Indian Mixed-Scripts
  • A Dynamic Priority Based Scheduling Scheme for Multimedia Streaming Over MANETs
  • Improved Bug Localization Technique using Hybrid Information Retrieval Model
  • HGASA: An Efficient Hybrid Technique for Optimizing Data Access in Dynamic Data Grid
  • Energy Efficient SNR Based Clustering in Underwater Sensor Network with Data Encryption
  • Collaborative Access Control Mechanism for Online Social Networks
  • i-TSS: An Image Encryption Algorithm Based on Transposition, Shuffling and Substitution using Randomly Generated Bitmap Image
  • A type system for counting logs of multi-threaded nested transactional programs
  • A Proactive Resource Provisioning Model for Cloud Federation
  • A Multiclass SVM Classification Approach for Intrusion Detection
  • Dynamic Data Replication across Geo-Distributed Cloud Data Centres
  • Trust Based Target Coverage Protocol for Wireless Sensor Networks Using Fuzzy Logic
  • An Internet of Things based Software Framework to handle Medical Emergencies
  • Minimal Start Time Heuristics for Scheduling Workflows in Heterogeneous Computing Systems
  • FC-LID: File classifier based Linear Indexing for Deduplication in Cloud Backup Services. .