Computer Networks & Communications (NetCom) Proceedings of the Fourth International Conference on Networks & Communications /

Computer Networks & Communications (NetCom) is the proceedings from the Fourth International Conference on Networks & Communications. This book covers theory, methodology and applications of computer networks, network protocols and wireless networks, data communication technologies, and netw...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Chaki, Nabendu (Επιμελητής έκδοσης), Meghanathan, Natarajan (Επιμελητής έκδοσης), Nagamalai, Dhinaharan (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: New York, NY : Springer New York : Imprint: Springer, 2013.
Σειρά:Lecture Notes in Electrical Engineering, 131
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 10049nam a22004935i 4500
001 978-1-4614-6154-8
003 DE-He213
005 20151121051811.0
007 cr nn 008mamaa
008 130228s2013 xxu| s |||| 0|eng d
020 |a 9781461461548  |9 978-1-4614-6154-8 
024 7 |a 10.1007/978-1-4614-6154-8  |2 doi 
040 |d GrThAP 
050 4 |a TK1-9971 
072 7 |a TJK  |2 bicssc 
072 7 |a TEC041000  |2 bisacsh 
082 0 4 |a 621.382  |2 23 
245 1 0 |a Computer Networks & Communications (NetCom)  |h [electronic resource] :  |b Proceedings of the Fourth International Conference on Networks & Communications /  |c edited by Nabendu Chaki, Natarajan Meghanathan, Dhinaharan Nagamalai. 
264 1 |a New York, NY :  |b Springer New York :  |b Imprint: Springer,  |c 2013. 
300 |a XXIII, 865 p. 357 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Electrical Engineering,  |x 1876-1100 ;  |v 131 
505 0 |a Adhoc and Sensor Networks -- Perspectives of Sybil Attack in Routing Protocols of Mobile Ad Hoc Network -- A Jini Based Implementation for Best Leader Node Selection in MANETs -- A Novel Methodology for Securing Adhoc Network by Friendly Group Model -- Energy Efficient Medium Access Protocol for Clustered Wireless Sensor Networks -- A Design Mode of Streaming Media Transmission and Access in Wireless Video Sensor Network -- PSO-PAC: An Intelligent Clustering Mechanism in Ad hoc Network -- SEMSuS: Semantic Middleware For Dynamic Service –Oriented Sensor Network -- CO2 Gas Sensor Using Resonant Frequency changes in Micro-Cantilever -- Heterogeneous Wireless, WLAN and Mobile Networks -- A mechanism for enhanced performance of Chord DHT in mobile environment -- A Hybrid Model of CLMS and ACLMS Algorithms for Smart Antennas -- Novel Protection from Internal Attacks in Wireless Sensor Networks -- Channel-Usage Model in Underlay Cognitive Radio Networks -- Supporting LTE Networks in Heterogeneous Environment using the Y-Comm Framework -- A Call Admission Control Scheme for Cellular Network to Handle Sudden Influx in a Confined Area -- Distributed Joint Optimal Network Scheduling and Controller Design for Wireless Networks -- On the Estimation Capacity of Equal Gain Diversity Scheme Under Multi-Path Fading Channel -- Low Overhead Time Coordinated Checkpointing Algorithm for Mobile Distributed Systems -- Measurement and Performance Analysis -- Performance evaluation of TCP NewVegas and TCP Newreno on Burstification in an OBS Network -- Performance Enhancement through Optimization in FPGA Synthesis: Constraint Specific Approach -- Performance Optimization of Vehicular Ad hoc Network (VANET) using Clustering Approach -- Performance Evaluation of TCP Congestion Control variants using Ad Hoc On-Demand Distance Vector Routing -- Performance Analysis of Dynamic Source Routing for Ad-hoc Networks Using Active Packet -- Overhead Analysis of AODV, TORA and AOMDV in MANET Using Various Energy Models -- Network Architectures, Protocols and Routing Low Power and High Speed Adders in Modified Gated Diffusion Input Technique -- Guided Local Search for Optimal GPON/FTTP Network Design -- Image Segmentation Using Variable Kernel Fuzzy C Means (VKFCM) Clustering on Modified Level Set Method -- Comparison of SPIHT, Classical and Adaptive Lifting Scheme for Compression of Satellite Imageries -- Comparison of Routing Protocols – Distance Vector and Fisheye State Routing -- A Gene Expression Based Quality of Service Aware Routing Protocol for Mobile Adhoc Networks -- User Behavior and Capability Based Access Control Model and Architecture -- Congestion Adaptive Most Favorable Control Routing in Ad Hoc Networks -- An Improved Blind Channel Estimation based on Subspace Approach for OFDM Systems Under Fast Time Varying Conditions -- Adaptive Control and Synchronization Design for the Lu-Xiao Chaotic System -- Network Operations and Management -- Secure Patient Monitoring and Self-management Using Brain Expression Interpreter -- Coverage and Connectivity Guaranteed Deterministic Deployment Pattern for WSN -- Hybrid Deployment Schemes for Wireless Sensor Networks -- Adaptive Optimal Distributed Power Allocation for Enhanced Cognitive Radio Network in the Presence of Channel Uncertainties -- Secure Real Time Remote Video Monitoring System -- Fully Self-organized Key Management Scheme in MANET and Its Applications -- A Hierarchical Color Net Model for Smart Grid Security Monitoring -- Chapter 6: Network Security, Trust and Privacy -- A Comprehensive study on Two-factor Authentication with One Time Passwords -- ITRANS encoded Marathi Literature Document Relevance Ranking for Natural Language Flexible Queries -- AB-OR: Improving the efficiency in Onion Routing using Attribute Based Cryptography -- PASIC: A Novel Approach for Page-Wise Web Application Security -- Cryptanalysis of Lo et al.’s password based authentication scheme -- Intrusion Detection in Zero Knowledge System Using Model Checking Approach -- Detecting Malicious users in P2P Streaming Systems by Using Feedback Correlations -- An Efficient Dual Text Steganographic Approach: Hiding Data in a List of Words -- Secure Cryptosystem with Blind Authentication -- An Effective Technique for Intrusion Detection Using Neuro-Fuzzy and Radial SVM Classifier -- A Novel Octuple Images Encryption Algorithm Using Chaos in Wavelet Domain -- The Fourth International Workshop on Network and Communications Security (NCS 2012) -- A Strong Pvss Scheme -- Secure Cosine Similarity Computation with Malicious Adversaries -- Test Suite for Intrusion Detection by Layered Conditional Random Fields Using Mobile Phones -- An Efficient Microaggregation Method for Protecting Mixed Data -- Plus/Delta (+/∆) Evaluation to Help Organizations Deliver Projects Effectively -- A Secure Routing Protocol for Manets Against Byzantine Attacks -- Analysis of different Mobility Models for Ad Hoc On-Demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol -- NIZKPDS to achieve Non-Repudiation -- An Integrated Solution for both Monitoring and Controlling for Automization using Wireless Sensor Networks:A Case Study -- A Secure Image Steganography Technique to Hide Multiple Secret Images -- Source Code Analysis of a Connection-Oriented File Reader Server Socket Program in Java and Removal of the Security Vulnerabilities -- Document Library System using RDF based inferences -- The Fourth International workshop on Wireless and  Mobile Networks (WiMoNe-2012) -- Spread and Erase: Efficient routing algorithm based on Anti-message Info Relay Hubs for Delay Tolerant Networks -- Novel architecture of adaptive and optimized policy based handover in MANET -- Trusted control information in the application of cold chain logistics -- PHY Layer Considerations for Real Time Multimedia Signal Transmission in Wireless Medium -- Approximate Minimum Spanning Tree for Points moving in a Euclidean Two-Dimensions Plane -- Low Complexity Speech Enhancement Algorithm for Improved Perception in Mobile Devices -- Prolonging the Lifetime of Wireless Sensor Network by Exponential Node Distribution and Ant-colony Optimization Routing -- Multimedia Traffic over MANETs: Evaluation and Performance Analysis -- Web Accessibility : Designing and Testing of Web Based Application for Persons with Disabilities -- CBADE - Hybrid Approach for Duplication detection and Elimination -- Fourth Workshop on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC – 2012) -- Energy Aware Multipath Routing Protocol for Wireless Sensor Networks -- Virtual Classroom for E – Education in Rural Areas -- Unsupervised Methods On Image Database Using Cluster Mean Average Methods For Image Searching -- Impact of Fix Cluster Head Selection (FCHS) Routing Protocol for Wireless Sensors Network -- The Fourth International Workshop on Ad Hoc and Ubiquitous Computing (AUC- 2012) -- Ontology Oriented Approach to Service Selection and Invocation in Complex Context Analysis -- Compression of Ecg Signals Using A Novel Discrete Wavelet Transform Algorithm for Dynamic Arrythmia Database -- Performance Analysis of ETX and ETT Routing Metrics over AODV Routing Protocol in WMNs -- Optimized CPU Frequency Scaling on Android Devices Based on Foreground Running Application -- Message Efficient Ring Leader Election in Distributed Systems -- RAW – A novel Reconfigurable Architecture design using Wireless for future generation Supercomputers -- Interference Management Analysis of Double-ABBA and ABBA Quasi-Orthogonal Space Time Code. 
520 |a Computer Networks & Communications (NetCom) is the proceedings from the Fourth International Conference on Networks & Communications. This book covers theory, methodology and applications of computer networks, network protocols and wireless networks, data communication technologies, and network security. The proceedings will feature peer-reviewed papers that illustrate research results, projects, surveys and industrial experiences that describe significant advances in the diverse areas of computer networks & communications. 
650 0 |a Engineering. 
650 0 |a Computer organization. 
650 0 |a Electrical engineering. 
650 1 4 |a Engineering. 
650 2 4 |a Communications Engineering, Networks. 
650 2 4 |a Computer Systems Organization and Communication Networks. 
650 2 4 |a Signal, Image and Speech Processing. 
700 1 |a Chaki, Nabendu.  |e editor. 
700 1 |a Meghanathan, Natarajan.  |e editor. 
700 1 |a Nagamalai, Dhinaharan.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9781461461531 
830 0 |a Lecture Notes in Electrical Engineering,  |x 1876-1100 ;  |v 131 
856 4 0 |u http://dx.doi.org/10.1007/978-1-4614-6154-8  |z Full Text via HEAL-Link 
912 |a ZDB-2-ENG 
950 |a Engineering (Springer-11647)