This book contains a selection of refereed and revised papers of the Intelligent Distributed Computing Track originally presented at the third International Symposium on Intelligent Informatics (ISI-2014), September 24-27, 2014, Delhi, India. The papers selected for this Track cover several Distributed Computing and related topics including Peer-to-Peer Networks, Cloud Computing, Mobile Clouds, Wireless Sensor Networks, and their applications.
Inhaltsverzeichnis
Customization of Recommendation System using Collaborative Filtering Algorithm on Cloud using Mahout. - A Result Verification Scheme for MapReduce Having Untrusted Participants. - Quantifying direct trust for private information sharing in an Online Social Network. - A Heuristic for Link Prediction in Online Social Network. - P-Skip Graph: An Efficient Data Structure for Peer-to-Peer Network. - Localization in Wireless Sensor Networks with Ranging Error. - Dynamic Job Scheduling Using Ant Colony Optimization for Mobile Cloud Computing. - Enhancing the Security of Dynamic Source Routing Protocol Using Energy Aware And Distributed Trust Mechanism in MANETs. - Dir-DREAM: Geographical Routing Protocol for FSO MANET. - Extending lifetime of Wireless Sensor Network using Cellular Automata. - Computer Network Optimization using Topology Modification. - Mobile Sensor Localization Under Wormhole Attacks: An Analysis. - Hash based incremental optimistic concurrency control algorithm in distributed databases. - Evaluating travel websites using WebQual: A group decision support approach. - Location-based Mutual and Mobile Information Navigation System: Lemmings. - Neural Network Based Early Warning System for an Emerging Blackout in Smart Grid Power Networks. - Hybrid Genetic Fuzzy Rule Based Inference Engine to Detect Intrusion in Networks. - Enhancement Of Data Level Security In MongoDB. - SemCrawl: Framework for Crawling Ontology Annotated Web Documents for Intelligent Information Retrieval. - OwlsGov: an OWL-S based framework for e-government services. - A Survey on Reduction of load on the Network. - Smart Human Security Framework Using Internet of Things, Cloud and Fog Computing. - Classification Mechanism for IoT devices towards Creating a Security Framework. - Data Owner Centric Approach to Ensure Data Protection in Cloud Environment. - Predictive Rule Discovery for Network Intrusion Detection.