|
|
|
|
LEADER |
09185nam a22005895i 4500 |
001 |
978-3-642-11723-7 |
003 |
DE-He213 |
005 |
20161208030643.0 |
007 |
cr nn 008mamaa |
008 |
100301s2010 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642117237
|9 978-3-642-11723-7
|
024 |
7 |
|
|a 10.1007/978-3-642-11723-7
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
082 |
0 |
4 |
|a 004.6
|2 23
|
245 |
1 |
0 |
|a Ad Hoc Networks
|h [electronic resource] :
|b First International Conference, ADHOCNETS 2009, Niagara Falls, Ontario, Canada, September 22-25, 2009. Revised Selected Papers /
|c edited by Jun Zheng, Shiwen Mao, Scott F. Midkiff, Hua Zhu.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2010.
|
300 |
|
|
|a XVI, 915 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
|x 1867-8211 ;
|v 28
|
505 |
0 |
|
|a 1st ICST International Conference on Ad Hoc Networks -- Supporting Proactive Application Event Notification to Improve Sensor Network Performance -- An Energy-Efficient Cluster-Head Selection Protocol for Energy-Constrained Wireless Sensor Networks -- Optimization of Cluster Heads for Energy Efficiency in Large-Scale Wireless Sensor Networks -- Optimal Cluster Sizes for Wireless Sensor Networks: An Experimental Analysis -- A Parallel Paths Communication Technique for Energy Efficient Wireless Sensor Networks -- Scalable Max-Min Fairness in Wireless Ad Hoc Networks -- Upper Bounding Service Capacity in Multihop Wireless SSMA-Based Ad Hoc Networks -- QoS over Real-Time Wireless Multi-hop Protocol -- Efficient Distribution of Large Files in UMTS Supported by Network Coded M2M Data Transfer with Multiple Generations -- Enhancement of Self-organisation in Wireless Networking through a Cross-Layer Approach -- SPECS: Secure and Privacy Enhancing Communications Schemes for VANETs -- Security and Privacy in a Sensor-Based Search and Rescue System -- Computationally Efficient Mutual Entity Authentication in Wireless Sensor Networks -- Distributed Detection of Wormhole Attacks in Wireless Sensor Networks -- Power-Aware Intrusion Detection in Mobile Ad Hoc Networks -- DHT-Based Detection of Node Clone in Wireless Sensor Networks -- Connectivity-Aware Minimum-Delay Geographic Routing with Vehicle Tracking in VANETs -- Buckshot Routing - A Robust Source Routing Protocol for Dense Ad-Hoc Networks -- Enhanced Route-Split Routing Tolerant to Multiple Concurrent Link Failure for Mobile Ad Hoc Networks -- A Simulation-Based Performance Analysis of Various Multipath Routing Techniques in ZigBee Sensor Networks -- Centralized Routing and Scheduling Using Multi-Channel System Single Transceiver in 802.16d -- Contact Time in Random Walk and Random Waypoint: Dichotomy in Tail Distribution -- Throughput Analysis of IEEE 802.11 DCF in the Presence of Transmission Errors -- Effects of Unintentional Denial of Service (DOS) Due to Push-to-Talk (PTT) Delays on Performance of CSMA/CA Based Adhoc Land Mobile Radio (LMR) Networks -- Achievable Region in Slotted ALOHA Throughput for One-Relay Two-Hop Wireless Network Coding -- Exact Models for the k-Connected Minimum Energy Problem -- Performance Evaluation of Quality of Service in IEEE 802.11e Wireless LANs -- Cooperative Localization in GPS-Limited Urban Environments -- Tracking a Vehicle Moving in a Wireless Sensor Network -- Improved Topology Control Algorithms for Simple Mobile Networks -- Reliable Coverage Area Based Link Expiration Time (LET) Routing Metric for Mobile Ad Hoc Networks -- Constructing Minimum Relay Connected Sensor Cover in Heterogeneous Wireless Sensor Networks -- Experimentation Made Easy -- Enhancing Learning Using Modular Wireless Sensor Networking (WSN) Hands-On Experiments -- Sensor Network in the Wireless UHF Band -- VoIP Implementation and Experiments on a Mobile Wireless AdHoc Network -- Relay Implementation in WiMAX System Level Simulator -- MeshMAC: Enabling Mesh Networking over IEEE 802.15.4 through Distributed Beacon Scheduling -- Compressing MAC Headers on Shared Wireless Media -- An RTS Based Data Channel Reservations and Access Scheme in Multi-Channel Systems -- Building Intrusion Detection with a Wireless Sensor Network -- Passive and Active Analysis in DSR-Based Ad Hoc Networks -- An E-Hospital Security Architecture -- Cooperative Certificate Revocation List Distribution Methods in VANETs -- Distributed Channel Selection for Ad-Hoc Networks in the Presence of Jamming Sources -- Joint Random Access and Power Control Game in Ad Hoc Networks with Noncooperative Users -- Graph Marginalization for Rapid Assignment in Wide-Area Surveillance -- Error Correction with the Implicit Encoding Capability of Random Network Coding -- An End-to-End Loss Discrimination Scheme for Multimedia Transmission over Wireless IP Networks -- International Workshop on Advanced Sensor Integration Technology -- Architecture for WSN Nodes Integration in Context Aware Systems Using Semantic Messages -- Performance Analysis of ZigBee Technology for Wireless Body Area Sensor Networks -- Analytical Models of Cross-Layer Protocol Optimization in Real-Time Wireless Sensor Ad Hoc Networks -- Programmable Re-tasking of Wireless Sensor Networks Using WISEMAN -- Oxybuoy: Constructing a Real-Time Inexpensive Hypoxia Monitoring Platform -- An Energy-Efficient, Application-Oriented Control Algorithm for MAC Protocols in WSN -- An Integrated RFID and Sensor System for Emergency Handling in Underground Coal Mines Environments -- An Area-Based Overlay Architecture for Scalable Integration of Sensor Networks -- International Workshop on Cross-Layer Design in Wireless Mobile Ad Hoc Networks -- Outage Probability for ARQ Decode-and-Forward Relaying under Packet-Rate Fading -- Distributed Spectrum Sharing for Video Streaming in Cognitive Radio Ad Hoc Networks -- The Cognitive Radio Channel: From Spectrum Sensing to Message Cribbing -- AM-AOMDV: Adaptive Multi-metric Ad-Hoc On-Demand Multipath Distance Vector Routing -- A Low-Latency TDMA Scheduler for Multi-hop Cluster Based MANETs with Directional Antennas.
|
520 |
|
|
|a Ad hoc networks refer to the wireless networking paradigm that covers a variety of network forms for specific purposes, such as mobile ad hoc networks, sensor n- works, vehicular networks, underwater networks, underground networks, personal area networks, and home networks. The various forms of ad hoc networks promise a broad scope of applications in civilian, commercial, and military areas, which have led to significant new research problems and challenges, and have attracted great efforts from academia, industry, and government. This unique networking paradigm neces- tates re-examination of many established wireless networking concepts and protocols, and calls for developing new fundamental understanding of problems such as interf- ence, mobility, connectivity, capacity, and security, among others. While it is ess- tial to advance theoretical research on fundamentals and practical research on efficient algorithms and protocols, it is also critical to develop useful applications, experim- tal prototypes, and real-world deployments to achieve a practical impact on our so- ety for the success of this networking paradigm. The annual International Conference on Ad Hoc Networks (AdHocNets) is a new event that aims at providing a forum to bring together researchers from academia as well as practitioners from industry and government to meet and exchange ideas and recent research work on all aspects of ad hoc networks. As the first edition of this event, AdHocNets 2009 was successfully held in Niagara Falls, Ontario, Canada, during September 22–25, 2009.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer organization.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computer system failures.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Computers.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Theory of Computation.
|
650 |
2 |
4 |
|a Computer Systems Organization and Communication Networks.
|
650 |
2 |
4 |
|a Software Engineering/Programming and Operating Systems.
|
650 |
2 |
4 |
|a System Performance and Evaluation.
|
650 |
2 |
4 |
|a Data Structures, Cryptology and Information Theory.
|
700 |
1 |
|
|a Zheng, Jun.
|e editor.
|
700 |
1 |
|
|a Mao, Shiwen.
|e editor.
|
700 |
1 |
|
|a Midkiff, Scott F.
|e editor.
|
700 |
1 |
|
|a Zhu, Hua.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642117220
|
830 |
|
0 |
|a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
|x 1867-8211 ;
|v 28
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-11723-7
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|