|
|
|
|
LEADER |
09925nam a22004575i 4500 |
001 |
978-90-481-3662-9 |
003 |
DE-He213 |
005 |
20151125193037.0 |
007 |
cr nn 008mamaa |
008 |
100715s2010 ne | s |||| 0|eng d |
020 |
|
|
|a 9789048136629
|9 978-90-481-3662-9
|
024 |
7 |
|
|a 10.1007/978-90-481-3662-9
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a TK1-9971
|
072 |
|
7 |
|a TJK
|2 bicssc
|
072 |
|
7 |
|a TEC041000
|2 bisacsh
|
082 |
0 |
4 |
|a 621.382
|2 23
|
245 |
1 |
0 |
|a Novel Algorithms and Techniques in Telecommunications and Networking
|h [electronic resource] /
|c edited by Tarek Sobh, Khaled Elleithy, Ausif Mahmood.
|
264 |
|
1 |
|a Dordrecht :
|b Springer Netherlands,
|c 2010.
|
300 |
|
|
|a XII, 517 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a IP Application Test Framework -- Cross-Layer Based Approach to Detect Idle Channels and Allocate Them Efficiently Using Markov Models -- Threshold Based Call Admission Control for QoS Provisioning in Cellular Wireless Networks with Spectrum Renting -- Ontology-Based Web Application Testing -- Preventing the “Worst Case Scenario:” Combating the Lost Laptop Epidemic with RFID Technology -- Information Security and System Development -- A Survey of Wireless Sensor Network Interconnection to External Networks -- Comparing the Performance of UMTS and Mobile WiMAX Convolutional Turbo Code -- Performance of Interleaved Cipher Block Chaining in CCMP -- Localization and Frequency of Packet Retransmission as Criteria for Successful Message Propagation in Vehicular Ad Hoc Networks -- Authentication Information Alignment for Cross-Domain Federations -- Formally Specifying Linux Protection -- Path Failure Effects on Video Quality in Multihomed Environments -- Reconfigurable Implementation of Karatsuba Multiplier for Galois Field in Elliptic Curves -- Nonlinear Congestion Control Scheme for Time Delayed Differentiated-Services Networks -- Effect of Packet Size and Channel Capacity on the performance of EADARP Routing Protocol for Multicast Wireless ad hoc Networks -- Improving BGP Convergence Time via MRAI Timer -- Error Reduction using TCP with Selective Acknowledgement and HTTP with Page Response Time over Wireless Link -- Enhanced Reconfigurability for MIMO Systems using Parametric Arrays -- Modified LEACH – Energy Efficient Wireless Networks Communication -- Intrusion Detection and Classification of Attacks in High-Level Network Protocols Using Recurrent Neural Networks -- Automatic Construction and Optimization of Layered Network Attack Graph -- Parallel Data Transmission: A Proposed Multilayered Reference Model -- Besides Tracking – Simulation of RFID Marketing and Beyond -- Light Path Provisioning using Connection Holding Time and Flexible Window -- Distributed Hybrid Research Network Operations Framework -- Performance of the Duo-Binary Turbo Codes in WiMAX Systems -- A unified event reporting solution for wireless sensor networks -- A Low Computational Complexity Multiple Description Image Coding Algorithm Based on JPEG Standard -- A General Method for Synthesis of Uniform Sequences with Perfect Periodic Autocorrelation -- Using Support Vector Machines for Passive Steady State RF Fingerprinting -- Genetic Optimization for Optimum 3G Network Planning: an Agent-Based Parallel Implementation -- A Survey about IEEE 802.11e for better QoS in WLANs -- Method of a Signal Analysis for Imitation Modeling in a Real-Time Network -- Simple yet efficient NMEA sentence generator for testing GPS reception firmware and hardware. -- Game Theoretic Approach for Discovering Vulnerable Links in Complex Networks -- Modeling Trust in Wireless Ad-Hoc Networks -- Address Management in MANETs Using an Ant Colony Metaphor -- Elitism Between Populations for the Improvement of the Fitness of a Genetic Algorithm Solution -- Adaptive Genetic Algorithm for Neural Network Retraining -- A New Collaborative Approach for Intrusion Detection System on Wireless Sensor Networks -- A Dynamic Scheme for Authenticated Group Key Agreement Protocol -- Performance Evaluation of TCP Congestion Control Mechanisms -- Optimization and Job Scheduling in Heterogeneous Networks -- A New Methodology for Self Localization in Wireless Sensor Networks -- A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET) -- A New Analytical Model for Maximizing the Capacity and Minimizing the Transmission Delay for MANET -- Faulty Links Optimization for Hypercube Networks via Stored and Forward One-Bit Round Robin Routing Algorithm -- Improving the Data Rate in Wireless Mesh Networks Using Orthogonal Frequency Code Division (OFCD) -- A Novel Encrypted Database Technique to Develop a Secure Application for an Academic Institution -- A Mathematical Model for Reducing Handover Time at MAC Layer for Wireless Networks -- A Software Solution for Mobile Context Handoff in WLANs * -- Robust Transmission of Video Stream over Fading Channels -- An Attack Classification Tool Based On Traffic Properties and Machine Learning -- Browser based Communications Integration using Representational State Transfer -- Security Aspects of Internet based Voting -- Middleware-based distributed heterogeneous simulation -- Analysis of the flooding search algorithm with OPNET -- Efficient Self-Localization and Data Gathering Architecture for Wireless Sensor Networks -- Two Cross-Coupled H? Filters for Fading Channel Estimation in OFDM Systems -- An Architecture for Wireless Intrusion Detection Systems Using Artificial Neural Networks -- A highly parallel scheduling model for IT change management -- Design and Implementation of a Multi-sensor Mobile Platform -- Methods based on fuzzy sets to solve problems of Safe Ship control -- Network Topology Impact on Influence Spreading -- An Adaptive Combiner-Equalizer for Multiple-Input Receivers -- KSAm – An Improved RC4 Key-Scheduling Algorithm for Securing WEP -- Ubiquitous Media Communication Algorithms -- Balancing Streaming and Demand Accesses in a Network Based Storage Environment -- An Energy and Distance Based Clustering Protocol for Wireless Sensor Networks -- Encoding Forensic Multimedia Evidence from MARF Applications as Forensic Lucid Expressions -- Distributed Modular Audio Recognition Framework (DMARF) and its Applications Over Web Services -- The Authentication Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement -- Performance Evaluation of MPLS Path Restoration Schemes using OMNET++ -- FM Transmitter System for Telemetrized Temperature Sensing Project -- Enhancing Sensor Network Security with RSL Codes -- The Integrity Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement -- A Multi-layer GSM Network Design Model -- Performance Analysis of Multi Carrier CDMA and DSCDMA on the basis of different users and Modulation scheme -- Scalability Analysis of a Model for GSM Mobile Network Design -- Location Management in 4G Wireless Heterogeneous Networks using Mobile Data Mining Techniques -- A new clustered Directed Diffusion Algorithm based on credit of nodes for wireless sensor networks -- Multiview Media Transmission Algorithm for Next Generation Networks -- A 4 GHz Clock Synchronized Non Coherent Energy Collection UWB Transceiver -- Comparison of Cascaded LMS-RLS, LMS and RLS Adaptive Filters in Non-Stationary Environments -- Data Mining Based Network Intrusion Detection System: A Survey -- VDisaster recovery with the help of real time video streaming using MANET support.
|
520 |
|
|
|a Novel Algorithms and Techniques in Telecommunications and Networking includes a set of rigorously reviewed world-class manuscripts addressing and detailing state-of-the-art research projects in the areas of Industrial Electronics, Technology & Automation, Telecommunications and Networking. Novel Algorithms and Techniques in Telecommunications and Networking includes selected papers form the conference proceedings of the International Conference on Telecommunications and Networking (TeNe 08) which was part of the International Joint Conferences on Computer, Information and Systems Sciences and Engineering (CISSE 2008). Topics Covered: Computer Networks: Access Technologies, Medium Access Control, Network architectures and Equipment, Optical Networks and Switching, Telecommunication Technology, and Ultra Wideband Communications. Coding and Modulation: Modeling and Simulation, OFDM technology , Space-time Coding, Spread Spectrum and CDMA Systems. Wireless technologies: Bluetooth , Cellular Wireless Networks, Cordless Systems and Wireless Local Loop, HIPERLAN, IEEE 802.11, Mobile Network Layer, Mobile Transport Layer, and Spread Spectrum. Network Security and applications: Authentication Applications, Block Ciphers Design Principles, Block Ciphers Modes of Operation, Electronic Mail Security, Encryption & Message Confidentiality, Firewalls, IP Security, Key Cryptography & Message Authentication, and Web Security. New trends in Automation and Communications: Biometric Authentication, Computer Forensics, Machine Vision, MEMS Sensors, Stenography, and Support for Mobility.
|
650 |
|
0 |
|a Engineering.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Electrical engineering.
|
650 |
1 |
4 |
|a Engineering.
|
650 |
2 |
4 |
|a Communications Engineering, Networks.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
700 |
1 |
|
|a Sobh, Tarek.
|e editor.
|
700 |
1 |
|
|a Elleithy, Khaled.
|e editor.
|
700 |
1 |
|
|a Mahmood, Ausif.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9789048136612
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-90-481-3662-9
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-ENG
|
950 |
|
|
|a Engineering (Springer-11647)
|