Computer Networks & Communications (NetCom) Proceedings of the Fourth International Conference on Networks & Communications /
Computer Networks & Communications (NetCom) is the proceedings from the Fourth International Conference on Networks & Communications. This book covers theory, methodology and applications of computer networks, network protocols and wireless networks, data communication technologies, and netw...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
New York, NY :
Springer New York : Imprint: Springer,
2013.
|
Σειρά: | Lecture Notes in Electrical Engineering,
131 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Adhoc and Sensor Networks
- Perspectives of Sybil Attack in Routing Protocols of Mobile Ad Hoc Network
- A Jini Based Implementation for Best Leader Node Selection in MANETs
- A Novel Methodology for Securing Adhoc Network by Friendly Group Model
- Energy Efficient Medium Access Protocol for Clustered Wireless Sensor Networks
- A Design Mode of Streaming Media Transmission and Access in Wireless Video Sensor Network
- PSO-PAC: An Intelligent Clustering Mechanism in Ad hoc Network
- SEMSuS: Semantic Middleware For Dynamic Service –Oriented Sensor Network
- CO2 Gas Sensor Using Resonant Frequency changes in Micro-Cantilever
- Heterogeneous Wireless, WLAN and Mobile Networks
- A mechanism for enhanced performance of Chord DHT in mobile environment
- A Hybrid Model of CLMS and ACLMS Algorithms for Smart Antennas
- Novel Protection from Internal Attacks in Wireless Sensor Networks
- Channel-Usage Model in Underlay Cognitive Radio Networks
- Supporting LTE Networks in Heterogeneous Environment using the Y-Comm Framework
- A Call Admission Control Scheme for Cellular Network to Handle Sudden Influx in a Confined Area
- Distributed Joint Optimal Network Scheduling and Controller Design for Wireless Networks
- On the Estimation Capacity of Equal Gain Diversity Scheme Under Multi-Path Fading Channel
- Low Overhead Time Coordinated Checkpointing Algorithm for Mobile Distributed Systems
- Measurement and Performance Analysis
- Performance evaluation of TCP NewVegas and TCP Newreno on Burstification in an OBS Network
- Performance Enhancement through Optimization in FPGA Synthesis: Constraint Specific Approach
- Performance Optimization of Vehicular Ad hoc Network (VANET) using Clustering Approach
- Performance Evaluation of TCP Congestion Control variants using Ad Hoc On-Demand Distance Vector Routing
- Performance Analysis of Dynamic Source Routing for Ad-hoc Networks Using Active Packet
- Overhead Analysis of AODV, TORA and AOMDV in MANET Using Various Energy Models
- Network Architectures, Protocols and Routing Low Power and High Speed Adders in Modified Gated Diffusion Input Technique
- Guided Local Search for Optimal GPON/FTTP Network Design
- Image Segmentation Using Variable Kernel Fuzzy C Means (VKFCM) Clustering on Modified Level Set Method
- Comparison of SPIHT, Classical and Adaptive Lifting Scheme for Compression of Satellite Imageries
- Comparison of Routing Protocols – Distance Vector and Fisheye State Routing
- A Gene Expression Based Quality of Service Aware Routing Protocol for Mobile Adhoc Networks
- User Behavior and Capability Based Access Control Model and Architecture
- Congestion Adaptive Most Favorable Control Routing in Ad Hoc Networks
- An Improved Blind Channel Estimation based on Subspace Approach for OFDM Systems Under Fast Time Varying Conditions
- Adaptive Control and Synchronization Design for the Lu-Xiao Chaotic System
- Network Operations and Management
- Secure Patient Monitoring and Self-management Using Brain Expression Interpreter
- Coverage and Connectivity Guaranteed Deterministic Deployment Pattern for WSN
- Hybrid Deployment Schemes for Wireless Sensor Networks
- Adaptive Optimal Distributed Power Allocation for Enhanced Cognitive Radio Network in the Presence of Channel Uncertainties
- Secure Real Time Remote Video Monitoring System
- Fully Self-organized Key Management Scheme in MANET and Its Applications
- A Hierarchical Color Net Model for Smart Grid Security Monitoring
- Chapter 6: Network Security, Trust and Privacy
- A Comprehensive study on Two-factor Authentication with One Time Passwords
- ITRANS encoded Marathi Literature Document Relevance Ranking for Natural Language Flexible Queries
- AB-OR: Improving the efficiency in Onion Routing using Attribute Based Cryptography
- PASIC: A Novel Approach for Page-Wise Web Application Security
- Cryptanalysis of Lo et al.’s password based authentication scheme
- Intrusion Detection in Zero Knowledge System Using Model Checking Approach
- Detecting Malicious users in P2P Streaming Systems by Using Feedback Correlations
- An Efficient Dual Text Steganographic Approach: Hiding Data in a List of Words
- Secure Cryptosystem with Blind Authentication
- An Effective Technique for Intrusion Detection Using Neuro-Fuzzy and Radial SVM Classifier
- A Novel Octuple Images Encryption Algorithm Using Chaos in Wavelet Domain
- The Fourth International Workshop on Network and Communications Security (NCS 2012)
- A Strong Pvss Scheme
- Secure Cosine Similarity Computation with Malicious Adversaries
- Test Suite for Intrusion Detection by Layered Conditional Random Fields Using Mobile Phones
- An Efficient Microaggregation Method for Protecting Mixed Data
- Plus/Delta (+/∆) Evaluation to Help Organizations Deliver Projects Effectively
- A Secure Routing Protocol for Manets Against Byzantine Attacks
- Analysis of different Mobility Models for Ad Hoc On-Demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol
- NIZKPDS to achieve Non-Repudiation
- An Integrated Solution for both Monitoring and Controlling for Automization using Wireless Sensor Networks:A Case Study
- A Secure Image Steganography Technique to Hide Multiple Secret Images
- Source Code Analysis of a Connection-Oriented File Reader Server Socket Program in Java and Removal of the Security Vulnerabilities
- Document Library System using RDF based inferences
- The Fourth International workshop on Wireless and Mobile Networks (WiMoNe-2012)
- Spread and Erase: Efficient routing algorithm based on Anti-message Info Relay Hubs for Delay Tolerant Networks
- Novel architecture of adaptive and optimized policy based handover in MANET
- Trusted control information in the application of cold chain logistics
- PHY Layer Considerations for Real Time Multimedia Signal Transmission in Wireless Medium
- Approximate Minimum Spanning Tree for Points moving in a Euclidean Two-Dimensions Plane
- Low Complexity Speech Enhancement Algorithm for Improved Perception in Mobile Devices
- Prolonging the Lifetime of Wireless Sensor Network by Exponential Node Distribution and Ant-colony Optimization Routing
- Multimedia Traffic over MANETs: Evaluation and Performance Analysis
- Web Accessibility : Designing and Testing of Web Based Application for Persons with Disabilities
- CBADE - Hybrid Approach for Duplication detection and Elimination
- Fourth Workshop on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC – 2012)
- Energy Aware Multipath Routing Protocol for Wireless Sensor Networks
- Virtual Classroom for E – Education in Rural Areas
- Unsupervised Methods On Image Database Using Cluster Mean Average Methods For Image Searching
- Impact of Fix Cluster Head Selection (FCHS) Routing Protocol for Wireless Sensors Network
- The Fourth International Workshop on Ad Hoc and Ubiquitous Computing (AUC- 2012)
- Ontology Oriented Approach to Service Selection and Invocation in Complex Context Analysis
- Compression of Ecg Signals Using A Novel Discrete Wavelet Transform Algorithm for Dynamic Arrythmia Database
- Performance Analysis of ETX and ETT Routing Metrics over AODV Routing Protocol in WMNs
- Optimized CPU Frequency Scaling on Android Devices Based on Foreground Running Application
- Message Efficient Ring Leader Election in Distributed Systems
- RAW – A novel Reconfigurable Architecture design using Wireless for future generation Supercomputers
- Interference Management Analysis of Double-ABBA and ABBA Quasi-Orthogonal Space Time Code.