Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.
You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.
After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.
This book constitutes the refereed proceedings of the 10th International Conference on Distributed Computing and Internet Technology, ICDCIT 2014, held in Bhubaneswar, India, in February 2014. The 29 revised full papers presented together with 6 invited talks in this volume were carefully reviewed and selected from 197 submissions. The papers cover topics such as distributed computing, sensor networks, Internet technologies and applications, security and multimedia.
Content Level »Research
Keywords »cloud computing - internet research - similarity measure - social networks - wireless sensor networks
Hop and HipHop : Multitier Web Orchestration.- Reinforcement Learning for Matrix Computations: PageRank as an Example.- Cyber Security via Signaling Games: Toward a Science of Cyber Security.- Privacy through Accountability: A Computer Science Perspective.- Cells as Machines: Towards Deciphering Biochemical Programs in the Cell.- A Spatial Web Crawler for Discovering Geo-Servers and Semantic Referencing with Spatial Features.- Software Transactional Memory Friendly Slot Schedulers.- Value Added Services on Stationary Vehicular Cloud.- SNAPWebD and SNAPSync: A Web Desktop and Transparent sync of NFS and Standalone System Logical Volumes.- Energy-aware Multi-level Routing Algorithm for Two-tier Wireless Sensor Networks.- Minimum Range Assignment Problem for Two Connectivity in Wireless Sensor Networks.- A Digital-Geometric Approach for Computing Area Coverage in Wireless Sensor Networks.- A Second View on SecureString.- Dynamic Ciphertext-Policy Attribute-Based Encryption for Expressive Access Policy.- Detection and Reduction of Impulse Noise in RGB Color Image using Fuzzy Technique.