skip to main content
10.1007/978-3-030-36987-3guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
Distributed Computing and Internet Technology: 16th International Conference, ICDCIT 2020, Bhubaneswar, India, January 9–12, 2020, Proceedings
2020 Proceeding
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
Conference:
International Conference on Distributed Computing and Internet TechnologyBhubaneswar, India9 January 2020
ISBN:
978-3-030-36986-6
Published:
09 January 2020

Reflects downloads up to 07 Jan 2025Bibliometrics
Abstract

No abstract available.

front-matter
Front Matter
Pages i–xiii
back-matter
Back Matter
Article
Front Matter
Page 1
Article
Distributed Graph Analytics
Abstract

Graph Analytics is important in different domains: social networks, computer networks, and computational biology to name a few. This paper describes the challenges involved in programming the underlying graph algorithms for graph analytics for ...

Article
A Distributed and Trusted Web of Formal Proofs
Abstract

Most computer checked proofs are tied to the particular technology of a prover’s software. While sharing results between proof assistants is a recognized and desirable goal, the current organization of theorem proving tools makes such sharing an ...

Article
Prospero’s Books: A Distributed Architecture for AI: Invited Extended Abstract
Abstract

This preliminary note and its sequels present a distributed architecture for AI (Artificial Intelligence) based on a novel market microstructure. The underlying game theory is based on Information-Asymmetric (Signaling) games, where deception is ...

Article
Trust: Anthropomorphic Algorithmic
Abstract

Computer Science often emulates humanlike behaviours including intelligence that has taken to storms in every other domain where human deals with. A computing system with a defined role and goal is called an agent with humanlike capability for ...

Article
A Very Gentle Introduction to Multiparty Session Types
Abstract

Multiparty session types (MPST) are a formal specification and verification framework for message-passing protocols without central control: the desired interactions at the scale of the network itself are specified into a session (called global ...

Article
Constructing Knowledge Graphs from Data Catalogues
Abstract

We have witnessed about a decade’s effort in opening up government institutions around the world by making data about their services, performance and programmes publicly available on open data portals. While these efforts have yielded some ...

Article
Front Matter
Page 109
Article
Round-Message Trade-Off in Distributed Steiner Tree Construction in the CONGEST Model
Abstract

The Steiner tree problem is one of the fundamental optimization problems in distributed graph algorithms. Recently Saikia and Karmakar [27] proposed a deterministic distributed algorithm for the Steiner tree problem that constructs a Steiner tree ...

Article
An Efficient Message Transmission and Verification Scheme for VANETs
Abstract

The vehicular ad-hoc network (VANET) is used for communication between vehicles in the same vicinity and road-side-units (RSUs). Since they communicate over a public channel, a secure data transmission protocol is necessary to exchange ...

Article
Generalised Dining Philosophers as Feedback Control
Abstract

We examine the mutual exclusion problem of concurrency through the systematic application of modern feedback control theory, by revisiting the classical problem involving mutual exclusion: the Generalised Dining Philosophers problem. The result is ...

Article
Verifying Implicitly Quantified Modal Logic over Dynamic Networks of Processes
Abstract

When we consider systems with process creation and exit, we have potentially infinite state systems where the number of processes alive at any state is unbounded. Properties of such systems are naturally specified using modal logics with ...

Article
Front Matter
Page 177
Article
Secure Content-Based Image Retrieval Using Combined Features in Cloud
Abstract

Secure Content-Based Image Retrieval (SCBIR) is gaining enormous importance due to its applications involving highly sensitive images comprising of medical and personally identifiable data such as clinical decision-making, biometric-matching, and ...

Article
Design of a Scheduling Approach for Budget-Deadline Constrained Applications in Heterogeneous Clouds
Abstract

The notion of seemingly infinite resources and the dynamic provisioning of these resources on rental premise fascinated the execution of scientific applications in the cloud. The scheduling of the workflows under the utility model is always ...

Article
Resource Scheduling for Tasks of a Workflow in Cloud Environment
Abstract

In recent days most of the enterprises and communities adopt cloud services to deploy their workflow-based applications due to the inherent benefits of cloud-based services. These workflow-based applications are mainly compute-intensive. The major ...

Article
Bearing Fault Classification Using Wavelet Energy and Autoencoder
Abstract

Today’s modern industry has widely accepted the intelligent condition monitoring system to improve the industrial organization. As an effect, the data-driven-based fault diagnosis methods are designed by integrating signal processing techniques ...

Article
Front Matter
Page 239
Article
Community Detection in Social Networks Using Deep Learning
Abstract

Community structure is found everywhere from simple networks to real world complex networks. The problem of community detection is to predict clusters of nodes that are densely connected among themselves. The task of community detection has a wide ...

Article
Multi-Winner Heterogeneous Spectrum Auction Mechanism for Channel Allocation in Cognitive Radio Networks
Abstract

Fair allocation of unused licensed spectrum among preferable secondary users (SUs) is an important feature to be supported by Cognitive Radio (CR) for its successful deployment. This paper proposes an auction theoretic model for spectrum ...

Article
A Hybrid Approach for Fake News Detection in Twitter Based on User Features and Graph Embedding
Abstract

The quest for trustworthy, reliable and efficient sources of information has been a struggle long before the era of internet. However, social media unleashed an abundance of information and neglected the establishment of competent gatekeepers that ...

Article
Online Context-Adaptive Energy-Aware Security Allocation in Mobile Devices: A Tale of Two Algorithms
Abstract

Cryptographic operations involved in securing communications are computationally intensive and contribute to energy drain in mobile devices. Thus, varying the level of security according to the user’s location may provide a convenient solution to ...

Article
A Framework Towards Generalized Mid-term Energy Forecasting Model for Industrial Sector in Smart Grid
Abstract

Smart Grid is emerging as one of the most promising technologies that will provide several improvements over the traditional power grid. Providing availability is a significant concern for the power sector, and to achieve an uninterrupted power ...

Article
An Online Low-Cost System for Air Quality Monitoring, Prediction, and Warning
Abstract

Air-quality is degrading in developing countries and there is an urgent need to monitor and predict air-quality online in real-time. Although offline air-quality monitoring using hand-held devices is common, online air-quality monitoring is still ...

Article
Word2vec’s Distributed Word Representation for Hindi Word Sense Disambiguation
Abstract

Word Sense Disambiguation (WSD) is the task of extracting an appropriate sense of an ambiguous word in a sentence. WSD is an essential task for language processing, as it is a pre-requisite for determining the closest interpretations of various ...

Article
Text Document Clustering Using Community Discovery Approach
Abstract

The problem of document clustering is about automatic grouping of text documents into groups containing similar documents. This problem under supervised setting yields good results whereas for unannotated data the unsupervised machine learning ...

Article
Front Matter
Page 347
Article
An Efficient and Novel Buyer and Seller’s Distributed Ledger Based Protocol Using Smart Contracts
Abstract

The emergence of Distributed Ledger systems has made us rethink things that are possible to be digitized. A lot of tedious man labour requiring systems can be converted to digital systems for various benefits. With this new technology, we have a ...

Contributors
  • Vietnam National University, Hanoi
  • IIIT Bangalore
Index terms have been assigned to the content through auto-classification.

Recommendations