|
|
|
|
LEADER |
07225nam a22005775i 4500 |
001 |
978-3-642-17994-5 |
003 |
DE-He213 |
005 |
20161208033258.0 |
007 |
cr nn 008mamaa |
008 |
101129s2010 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642179945
|9 978-3-642-17994-5
|
024 |
7 |
|
|a 10.1007/978-3-642-17994-5
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
082 |
0 |
4 |
|a 004.6
|2 23
|
245 |
1 |
0 |
|a Ad Hoc Networks
|h [electronic resource] :
|b Second International Conference, ADHOCNETS 2010, Victoria, BC, Canada, August 18-20, 2010, Revised Selected Papers /
|c edited by Jun Zheng, David Simplot-Ryl, Victor C. M. Leung.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2010.
|
300 |
|
|
|a XIV, 542 p. 272 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
|x 1867-8211 ;
|v 49
|
505 |
0 |
|
|a Ad Hoc Network Design I -- Towards Autonomous Vehicular Clouds -- Ad Hoc Networks and Mobile Devices in Emergency Response – A Perfect Match? -- Sensorium – An Active Monitoring System for Neighborhood Relations in Wireless Sensor Networks -- Cashflow: A Channel-Oriented, Credit-Based Virtual Currency System for Establishing Fairness in Ad-Hoc Networks with Selfish Nodes -- Routing -- Location Management in Heterogeneous VANETs: A Mobility Aware Server Selection Method -- Insights into the Routing Stability of a Multi-hop Wireless Testbed -- A Study of Adaptive Gossip Routing in Wireless Mesh Networks -- A Multipath Routing Method with Dynamic ID for Reduction of Routing Load in Ad Hoc Networks -- Ad Hoc Network Design II -- Terminal Design without Using Receiver Circuits for Wireless Sensor Networks -- Cooperative Spectrum Sensing in Ad-Hoc Networks (Invited Paper) -- Receiver Sensitivity in Opportunistic Cooperative Internet of Things (IoT) -- Event Detection in Wireless Sensor Networks – Can Fuzzy Values Be Accurate? -- Medium Access Control -- An Efficient Geo-Routing Aware MAC Protocol for Underwater Acoustic Networks -- A Decentralized Scheduling Algorithm for Time Synchronized Channel Hopping -- DCLA: A Duty-Cycle Learning Algorithm for IEEE 802.15.4 Beacon-Enabled WSNs -- Collision-free Routing Centralized Scheduling Using EbMR-CS Algorithm for IEEE 802.16 Mesh Networks -- Tracking and Routing -- Energy-Efficient Target Tracking in Sensor Networks -- QoS for Wireless Sensor Networks: Service Differentiation at the MAC Sub-Layer -- Mobility and Traffic Adapted Cluster Based Routing for Mobile Nodes (CBR-Mobile) Protocol in Wireless Sensor Networks -- Quantifying the Negative Impact of Mobility and Location Service Inaccuracy on Geo-Routing in Urban Vehicular Environments -- Network Security and Reliability -- Establishing Trust on VANET Safety Messages -- Accelerating Signature-Based Broadcast Authentication for Wireless Sensor Networks -- Secure Data Aggregation in Wireless Sensor Networks: Homomorphism versus Watermarking Approach -- Guaranteeing Reliable Communications in Mesh Beacon-Enabled IEEE802.15.4 WSN for Industrial Monitoring Applications -- Clustering and Node Placement -- A Tree-Based Multiple-Hop Clustering Protocol for Wireless Sensor Networks -- Evaluation of Wireless Body Area Sensor Placement for Mobility Support in Healthcare Monitoring Systems -- Optimal Relay Node Placement and Trajectory Computation in Sensor Networks with Mobile Data Collector -- Balanced Itinerary Planning for Multiple Mobile Agents in Wireless Sensor Networks -- Performance Analysis and Evaluation I -- Analytical Modeling of Address Allocation Protocols in Wireless Ad Hoc Networks -- Analysis of One-Hop Packet Delay in MANETs over IEEE 802.11 DCF -- Performance of Packet-Based Frequency-Hopping Spread Spectrum Radio Control Systems -- Performance Analysis of UWB Body Sensor Networks for Medical Applications -- Performance Analysis and Evaluation II -- A Vehicle-to-Vehicle Communication Protocol for Collaborative Identification of Urban Traffic Conditions -- A Practical Evaluation of ZigBee Sensor Networks for Temperature Measurement -- Minimum Total Node Interference in Wireless Sensor Networks -- Reproducing Consistent Wireless Protocol Performance across Environments.
|
520 |
|
|
|a Ad hoc networks, which include a variety of autonomous networks for specific purposes, promise a broad range of civilian, commercial, and military applications. These networks were originally envisioned as collections of autonomous mobile or stationary nodes that dynamically auto-configure themselves into a wireless network without relying on any existing network infrastructure or centralized administration. With the significant advances in the last decade, the concept of ad hoc networks now covers an even broader scope, referring to the many types of autonomous wireless networks designed and deployed for a specific task or function, such as wireless sensor networks, vehicular networks, home networks, and so on. In contrast to the traditional wireless networking paradigm, such networks are all characterized by sporadic connections, highly error-prone communications, distributed autonomous operation, and fragile multi-hop relay paths. The new wireless networking paradigm necessitates reexamination of many established concepts and protocols, and calls for developing a new understanding of fundamental problems such as interference, mobility, connectivity, capacity, and security, among others. While it is essential to advance theoretical research on fundamental and practical research on efficient policies, algorithms and protocols, it is also critical to develop useful applications, experimental prototypes, and real-world deployments to achieve an immediate impact on society for the success of this wireless networking paradigm.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computer system failures.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Management information systems.
|
650 |
|
0 |
|a Electrical engineering.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Communications Engineering, Networks.
|
650 |
2 |
4 |
|a Algorithm Analysis and Problem Complexity.
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a System Performance and Evaluation.
|
700 |
1 |
|
|a Zheng, Jun.
|e editor.
|
700 |
1 |
|
|a Simplot-Ryl, David.
|e editor.
|
700 |
1 |
|
|a Leung, Victor C. M.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642179938
|
830 |
|
0 |
|a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
|x 1867-8211 ;
|v 49
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-17994-5
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|