Computer Networks & Communications (NetCom)
Proceedings of the Fourth International Conference on Networks & Communications
Herausgegeben:Chaki, Nabendu; Meghanathan, Natarajan; Nagamalai, Dhinaharan
Computer Networks & Communications (NetCom)
Proceedings of the Fourth International Conference on Networks & Communications
Herausgegeben:Chaki, Nabendu; Meghanathan, Natarajan; Nagamalai, Dhinaharan
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Computer Networks & Communications (NetCom) is the proceedings from the Fourth International Conference on Networks & Communications. This book covers theory, methodology and applications of computer networks, network protocols and wireless networks, data communication technologies, and network security. The proceedings will feature peer-reviewed papers that illustrate research results, projects, surveys and industrial experiences that describe significant advances in the diverse areas of computer networks & communications.
- Computer Networks & Communications (NetCom)257,99 €
- Thomas RobertazziBasics of Computer Networking37,99 €
- Sitharama S. IyengarMathematical Theories of Distributed Sensor Networks74,99 €
- Routing in Opportunistic Networks110,99 €
- Josef PuzmanPublic Data Networks53,49 €
- Inventive Communication and Computational Technologies206,99 €
- Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2018)126,99 €
-
-
-
- Produktdetails
- Lecture Notes in Electrical Engineering 131
- Verlag: Springer / Springer New York / Springer, Berlin
- Artikelnr. des Verlages: 978-1-4614-6153-1
- 2013
- Seitenzahl: 892
- Erscheinungstermin: 26. Februar 2013
- Englisch
- Abmessung: 241mm x 160mm x 51mm
- Gewicht: 1427g
- ISBN-13: 9781461461531
- ISBN-10: 1461461537
- Artikelnr.: 36615242
- Lecture Notes in Electrical Engineering 131
- Verlag: Springer / Springer New York / Springer, Berlin
- Artikelnr. des Verlages: 978-1-4614-6153-1
- 2013
- Seitenzahl: 892
- Erscheinungstermin: 26. Februar 2013
- Englisch
- Abmessung: 241mm x 160mm x 51mm
- Gewicht: 1427g
- ISBN-13: 9781461461531
- ISBN-10: 1461461537
- Artikelnr.: 36615242
Low Power and High Speed Adders in Modified Gated Diffusion Input Technique.- Guided Local Search for Optimal GPON/FTTP Network Design.- Image Segmentation Using Variable Kernel Fuzzy C Means (VKFCM) Clustering on Modified Level Set Method.- Comparison of SPIHT, Classical and Adaptive Lifting Scheme for Compression of Satellite Imageries.- Comparison of Routing Protocols - Distance Vector and Fisheye State Routing.- A Gene Expression Based Quality of Service Aware Routing Protocol for Mobile Adhoc Networks.- User Behavior and Capability Based Access Control Model and Architecture.- Congestion Adaptive Most Favorable Control Routing in Ad Hoc Networks.- An Improved Blind Channel Estimation based on Subspace Approach for OFDM Systems Under Fast Time Varying Conditions.- Adaptive Control and Synchronization Design for the Lu-Xiao Chaotic System.- Network Operations and Management.- Secure Patient Monitoring and Self-management Using Brain Expression Interpreter.- Coverage and Connectivity Guaranteed Deterministic Deployment Pattern for WSN.- Hybrid Deployment Schemes for Wireless Sensor Networks.- Adaptive Optimal Distributed Power Allocation for Enhanced Cognitive Radio Network in the Presence of Channel Uncertainties.- Secure Real Time Remote Video Monitoring System.- Fully Self-organized Key Management Scheme in MANET and Its Applications.- A Hierarchical Color Net Model for Smart Grid Security Monitoring.- Chapter 6: Network Security, Trust and Privacy.- A Comprehensive study on Two-factor Authentication with One Time Passwords.- ITRANS encoded Marathi Literature Document Relevance Ranking for Natural Language Flexible Queries.- AB-OR: Improving the efficiency in Onion Routing using Attribute Based Cryptography.- PASIC: A Novel Approach for Page-Wise Web Application Security.- Cryptanalysis of Lo et al.'s password based authentication scheme.- Intrusion Detection in Zero Knowledge System Using Model CheckingApproach.- Detecting Malicious users in P2P Streaming Systems by Using Feedback Correlations.- An Efficient Dual Text Steganographic Approach: Hiding Data in a List of Words.- Secure Cryptosystem with Blind Authentication.- An Effective Technique for Intrusion Detection Using Neuro-Fuzzy and Radial SVM Classifier.- A Novel Octuple Images Encryption Algorithm Using Chaos in Wavelet Domain.- The Fourth International Workshop on Network and Communications Security (NCS 2012).- A Strong Pvss Scheme.- Secure Cosine Similarity Computation with Malicious Adversaries.- Test Suite for Intrusion Detection by Layered Conditional Random Fields Using Mobile Phones.- An Efficient Microaggregation Method for Protecting Mixed Data.- Plus/Delta (+/ ) Evaluation to Help Organizations Deliver Projects Effectively.- A Secure Routing Protocol for Manets Against Byzantine Attacks.- Analysis of different Mobility Models for Ad Hoc On-Demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol.- NIZKPDS to achieve Non-Repudiation.- An Integrated Solution for both Monitoring and Controlling for Automization using Wireless Sensor Networks:A Case Study.- A Secure Image Steganography Technique to Hide Multiple Secret Images.- Source Code Analysis of a Connection-Oriented File Reader Server Socket Program in Java and Removal of the Security Vulnerabilities.- Document Library System using RDF based inferences.- The Fourth International workshop on Wireless and Mobile Networks (WiMoNe-2012).- Spread and Erase: Efficient routing algorithm based on Anti-message Info Relay Hubs for Delay Tolerant Networks.- Novel architecture of adaptive and optimized policy based handover in MANET.- Trusted control information in the application of cold chain logistics.- PHY Layer Considerations for Real Time Multimedia Signal Transmission in Wireless Medium.- Approximate Minimum Spanning Tree for Points moving in a Euclidean Two-Dimensions Plane.- Low Complexity Speech Enhancement Algorithmfor Improved Perception in Mobile Devices.- Prolonging the Lifetime of Wireless Sensor Network by Exponential Node Distribution and Ant-colony Optimization Routing.- Multimedia Traffic over MANETs: Evaluation and Performance Analysis.- Web Accessibility : Designing and Testing of Web Based Application for Persons with
Disabilities.- CBADE - Hybrid Approach for Duplication detection and Elimination.- Fourth Workshop on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC - 2012).- Energy Aware Multipath Routing Protocol for Wireless Sensor Networks.- Virtual Classroom for E - Education in Rural Areas.- Unsupervised Methods On Image Database Using Cluster Mean Average Methods For Image Searching.- Impact of Fix Cluster Head Selection (FCHS) Routing Protocol for Wireless Sensors Network.- The Fourth International Workshop on Ad Hoc and Ubiquitous Computing (AUC- 2012).- Ontology Oriented Approach to Service Selection and Invocation in Complex Context Analysis.- Compression of Ecg Signals Using A Novel Discrete Wavelet Transform Algorithm for Dynamic Arrythmia Database.- Performance Analysis of ETX and ETT Routing Metrics over AODV Routing Protocol in WMNs.- Optimized CPU Frequency Scaling on Android Devices Based on Foreground Running Application.- Message Efficient Ring Leader Election in Distributed Systems.- RAW - A novel Reconfigurable Architecture design using Wireless for future generation Supercomputers.- Interference Management Analysis of Double-ABBA and ABBA Quasi-Orthogonal Space Time Code.
Low Power and High Speed Adders in Modified Gated Diffusion Input Technique.- Guided Local Search for Optimal GPON/FTTP Network Design.- Image Segmentation Using Variable Kernel Fuzzy C Means (VKFCM) Clustering on Modified Level Set Method.- Comparison of SPIHT, Classical and Adaptive Lifting Scheme for Compression of Satellite Imageries.- Comparison of Routing Protocols – Distance Vector and Fisheye State Routing.- A Gene Expression Based Quality of Service Aware Routing Protocol for Mobile Adhoc Networks.- User Behavior and Capability Based Access Control Model and Architecture.- Congestion Adaptive Most Favorable Control Routing in Ad Hoc Networks.- An Improved Blind Channel Estimation based on Subspace Approach for OFDM Systems Under Fast Time Varying Conditions.- Adaptive Control and Synchronization Design for the Lu-Xiao Chaotic System.- Network Operations and Management.- Secure Patient Monitoring and Self-management Using Brain Expression Interpreter.- Coverage and Connectivity Guaranteed Deterministic Deployment Pattern for WSN.- Hybrid Deployment Schemes for Wireless Sensor Networks.- Adaptive Optimal Distributed Power Allocation for Enhanced Cognitive Radio Network in the Presence of Channel Uncertainties.- Secure Real Time Remote Video Monitoring System.- Fully Self-organized Key Management Scheme in MANET and Its Applications.- A Hierarchical Color Net Model for Smart Grid Security Monitoring.- Chapter 6: Network Security, Trust and Privacy.- A Comprehensive study on Two-factor Authentication with One Time Passwords.- ITRANS encoded Marathi Literature Document Relevance Ranking for Natural Language Flexible Queries.- AB-OR: Improving the efficiency in Onion Routing using Attribute Based Cryptography.- PASIC: A Novel Approach for Page-Wise Web Application Security.- Cryptanalysis of Lo et al.’s password based authentication scheme.- Intrusion Detection in Zero Knowledge System Using Model CheckingApproach.- Detecting Malicious users in P2P Streaming Systems by Using Feedback Correlations.- An Efficient Dual Text Steganographic Approach: Hiding Data in a List of Words.- Secure Cryptosystem with Blind Authentication.- An Effective Technique for Intrusion Detection Using Neuro-Fuzzy and Radial SVM Classifier.- A Novel Octuple Images Encryption Algorithm Using Chaos in Wavelet Domain.- The Fourth International Workshop on Network and Communications Security (NCS 2012).- A Strong Pvss Scheme.- Secure Cosine Similarity Computation with Malicious Adversaries.- Test Suite for Intrusion Detection by Layered Conditional Random Fields Using Mobile Phones.- An Efficient Microaggregation Method for Protecting Mixed Data.- Plus/Delta (+/∆) Evaluation to Help Organizations Deliver Projects Effectively.- A Secure Routing Protocol for Manets Against Byzantine Attacks.- Analysis of different Mobility Models for Ad Hoc On-Demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol.- NIZKPDS to achieve Non-Repudiation.- An Integrated Solution for both Monitoring and Controlling for Automization using Wireless Sensor Networks:A Case Study.- A Secure Image Steganography Technique to Hide Multiple Secret Images.- Source Code Analysis of a Connection-Oriented File Reader Server Socket Program in Java and Removal of the Security Vulnerabilities.- Document Library System using RDF based inferences.- The Fourth International workshop on Wireless and Mobile Networks (WiMoNe-2012).- Spread and Erase: Efficient routing algorithm based on Anti-message Info Relay Hubs for Delay Tolerant Networks.- Novel architecture of adaptive and optimized policy based handover in MANET.- Trusted control information in the application of cold chain logistics.- PHY Layer Considerations for Real Time Multimedia Signal Transmission in Wireless Medium.- Approximate Minimum Spanning Tree for Points moving in a Euclidean Two-Dimensions Plane.- Low Complexity Speech Enhancement Algorithmfor Improved Perception in Mobile Devices.- Prolonging the Lifetime of Wireless Sensor Network by Exponential Node Distribution and Ant-colony Optimization Routing.- Multimedia Traffic over MANETs: Evaluation and Performance Analysis.- Web Accessibility : Designing and Testing of Web Based Application for Persons with
Disabilities.- CBADE - Hybrid Approach for Duplication detection and Elimination.- Fourth Workshop on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC – 2012).- Energy Aware Multipath Routing Protocol for Wireless Sensor Networks.- Virtual Classroom for E – Education in Rural Areas.- Unsupervised Methods On Image Database Using Cluster Mean Average Methods For Image Searching.- Impact of Fix Cluster Head Selection (FCHS) Routing Protocol for Wireless Sensors Network.- The Fourth International Workshop on Ad Hoc and Ubiquitous Computing (AUC- 2012).- Ontology Oriented Approach to Service Selection and Invocation in Complex Context Analysis.- Compression of Ecg Signals Using A Novel Discrete Wavelet Transform Algorithm for Dynamic Arrythmia Database.- Performance Analysis of ETX and ETT Routing Metrics over AODV Routing Protocol in WMNs.- Optimized CPU Frequency Scaling on Android Devices Based on Foreground Running Application.- Message Efficient Ring Leader Election in Distributed Systems.- RAW – A novel Reconfigurable Architecture design using Wireless for future generation Supercomputers.- Interference Management Analysis of Double-ABBA and ABBA Quasi-Orthogonal Space Time Code.
Low Power and High Speed Adders in Modified Gated Diffusion Input Technique.- Guided Local Search for Optimal GPON/FTTP Network Design.- Image Segmentation Using Variable Kernel Fuzzy C Means (VKFCM) Clustering on Modified Level Set Method.- Comparison of SPIHT, Classical and Adaptive Lifting Scheme for Compression of Satellite Imageries.- Comparison of Routing Protocols - Distance Vector and Fisheye State Routing.- A Gene Expression Based Quality of Service Aware Routing Protocol for Mobile Adhoc Networks.- User Behavior and Capability Based Access Control Model and Architecture.- Congestion Adaptive Most Favorable Control Routing in Ad Hoc Networks.- An Improved Blind Channel Estimation based on Subspace Approach for OFDM Systems Under Fast Time Varying Conditions.- Adaptive Control and Synchronization Design for the Lu-Xiao Chaotic System.- Network Operations and Management.- Secure Patient Monitoring and Self-management Using Brain Expression Interpreter.- Coverage and Connectivity Guaranteed Deterministic Deployment Pattern for WSN.- Hybrid Deployment Schemes for Wireless Sensor Networks.- Adaptive Optimal Distributed Power Allocation for Enhanced Cognitive Radio Network in the Presence of Channel Uncertainties.- Secure Real Time Remote Video Monitoring System.- Fully Self-organized Key Management Scheme in MANET and Its Applications.- A Hierarchical Color Net Model for Smart Grid Security Monitoring.- Chapter 6: Network Security, Trust and Privacy.- A Comprehensive study on Two-factor Authentication with One Time Passwords.- ITRANS encoded Marathi Literature Document Relevance Ranking for Natural Language Flexible Queries.- AB-OR: Improving the efficiency in Onion Routing using Attribute Based Cryptography.- PASIC: A Novel Approach for Page-Wise Web Application Security.- Cryptanalysis of Lo et al.'s password based authentication scheme.- Intrusion Detection in Zero Knowledge System Using Model CheckingApproach.- Detecting Malicious users in P2P Streaming Systems by Using Feedback Correlations.- An Efficient Dual Text Steganographic Approach: Hiding Data in a List of Words.- Secure Cryptosystem with Blind Authentication.- An Effective Technique for Intrusion Detection Using Neuro-Fuzzy and Radial SVM Classifier.- A Novel Octuple Images Encryption Algorithm Using Chaos in Wavelet Domain.- The Fourth International Workshop on Network and Communications Security (NCS 2012).- A Strong Pvss Scheme.- Secure Cosine Similarity Computation with Malicious Adversaries.- Test Suite for Intrusion Detection by Layered Conditional Random Fields Using Mobile Phones.- An Efficient Microaggregation Method for Protecting Mixed Data.- Plus/Delta (+/ ) Evaluation to Help Organizations Deliver Projects Effectively.- A Secure Routing Protocol for Manets Against Byzantine Attacks.- Analysis of different Mobility Models for Ad Hoc On-Demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol.- NIZKPDS to achieve Non-Repudiation.- An Integrated Solution for both Monitoring and Controlling for Automization using Wireless Sensor Networks:A Case Study.- A Secure Image Steganography Technique to Hide Multiple Secret Images.- Source Code Analysis of a Connection-Oriented File Reader Server Socket Program in Java and Removal of the Security Vulnerabilities.- Document Library System using RDF based inferences.- The Fourth International workshop on Wireless and Mobile Networks (WiMoNe-2012).- Spread and Erase: Efficient routing algorithm based on Anti-message Info Relay Hubs for Delay Tolerant Networks.- Novel architecture of adaptive and optimized policy based handover in MANET.- Trusted control information in the application of cold chain logistics.- PHY Layer Considerations for Real Time Multimedia Signal Transmission in Wireless Medium.- Approximate Minimum Spanning Tree for Points moving in a Euclidean Two-Dimensions Plane.- Low Complexity Speech Enhancement Algorithmfor Improved Perception in Mobile Devices.- Prolonging the Lifetime of Wireless Sensor Network by Exponential Node Distribution and Ant-colony Optimization Routing.- Multimedia Traffic over MANETs: Evaluation and Performance Analysis.- Web Accessibility : Designing and Testing of Web Based Application for Persons with
Disabilities.- CBADE - Hybrid Approach for Duplication detection and Elimination.- Fourth Workshop on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC - 2012).- Energy Aware Multipath Routing Protocol for Wireless Sensor Networks.- Virtual Classroom for E - Education in Rural Areas.- Unsupervised Methods On Image Database Using Cluster Mean Average Methods For Image Searching.- Impact of Fix Cluster Head Selection (FCHS) Routing Protocol for Wireless Sensors Network.- The Fourth International Workshop on Ad Hoc and Ubiquitous Computing (AUC- 2012).- Ontology Oriented Approach to Service Selection and Invocation in Complex Context Analysis.- Compression of Ecg Signals Using A Novel Discrete Wavelet Transform Algorithm for Dynamic Arrythmia Database.- Performance Analysis of ETX and ETT Routing Metrics over AODV Routing Protocol in WMNs.- Optimized CPU Frequency Scaling on Android Devices Based on Foreground Running Application.- Message Efficient Ring Leader Election in Distributed Systems.- RAW - A novel Reconfigurable Architecture design using Wireless for future generation Supercomputers.- Interference Management Analysis of Double-ABBA and ABBA Quasi-Orthogonal Space Time Code.
Low Power and High Speed Adders in Modified Gated Diffusion Input Technique.- Guided Local Search for Optimal GPON/FTTP Network Design.- Image Segmentation Using Variable Kernel Fuzzy C Means (VKFCM) Clustering on Modified Level Set Method.- Comparison of SPIHT, Classical and Adaptive Lifting Scheme for Compression of Satellite Imageries.- Comparison of Routing Protocols – Distance Vector and Fisheye State Routing.- A Gene Expression Based Quality of Service Aware Routing Protocol for Mobile Adhoc Networks.- User Behavior and Capability Based Access Control Model and Architecture.- Congestion Adaptive Most Favorable Control Routing in Ad Hoc Networks.- An Improved Blind Channel Estimation based on Subspace Approach for OFDM Systems Under Fast Time Varying Conditions.- Adaptive Control and Synchronization Design for the Lu-Xiao Chaotic System.- Network Operations and Management.- Secure Patient Monitoring and Self-management Using Brain Expression Interpreter.- Coverage and Connectivity Guaranteed Deterministic Deployment Pattern for WSN.- Hybrid Deployment Schemes for Wireless Sensor Networks.- Adaptive Optimal Distributed Power Allocation for Enhanced Cognitive Radio Network in the Presence of Channel Uncertainties.- Secure Real Time Remote Video Monitoring System.- Fully Self-organized Key Management Scheme in MANET and Its Applications.- A Hierarchical Color Net Model for Smart Grid Security Monitoring.- Chapter 6: Network Security, Trust and Privacy.- A Comprehensive study on Two-factor Authentication with One Time Passwords.- ITRANS encoded Marathi Literature Document Relevance Ranking for Natural Language Flexible Queries.- AB-OR: Improving the efficiency in Onion Routing using Attribute Based Cryptography.- PASIC: A Novel Approach for Page-Wise Web Application Security.- Cryptanalysis of Lo et al.’s password based authentication scheme.- Intrusion Detection in Zero Knowledge System Using Model CheckingApproach.- Detecting Malicious users in P2P Streaming Systems by Using Feedback Correlations.- An Efficient Dual Text Steganographic Approach: Hiding Data in a List of Words.- Secure Cryptosystem with Blind Authentication.- An Effective Technique for Intrusion Detection Using Neuro-Fuzzy and Radial SVM Classifier.- A Novel Octuple Images Encryption Algorithm Using Chaos in Wavelet Domain.- The Fourth International Workshop on Network and Communications Security (NCS 2012).- A Strong Pvss Scheme.- Secure Cosine Similarity Computation with Malicious Adversaries.- Test Suite for Intrusion Detection by Layered Conditional Random Fields Using Mobile Phones.- An Efficient Microaggregation Method for Protecting Mixed Data.- Plus/Delta (+/∆) Evaluation to Help Organizations Deliver Projects Effectively.- A Secure Routing Protocol for Manets Against Byzantine Attacks.- Analysis of different Mobility Models for Ad Hoc On-Demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol.- NIZKPDS to achieve Non-Repudiation.- An Integrated Solution for both Monitoring and Controlling for Automization using Wireless Sensor Networks:A Case Study.- A Secure Image Steganography Technique to Hide Multiple Secret Images.- Source Code Analysis of a Connection-Oriented File Reader Server Socket Program in Java and Removal of the Security Vulnerabilities.- Document Library System using RDF based inferences.- The Fourth International workshop on Wireless and Mobile Networks (WiMoNe-2012).- Spread and Erase: Efficient routing algorithm based on Anti-message Info Relay Hubs for Delay Tolerant Networks.- Novel architecture of adaptive and optimized policy based handover in MANET.- Trusted control information in the application of cold chain logistics.- PHY Layer Considerations for Real Time Multimedia Signal Transmission in Wireless Medium.- Approximate Minimum Spanning Tree for Points moving in a Euclidean Two-Dimensions Plane.- Low Complexity Speech Enhancement Algorithmfor Improved Perception in Mobile Devices.- Prolonging the Lifetime of Wireless Sensor Network by Exponential Node Distribution and Ant-colony Optimization Routing.- Multimedia Traffic over MANETs: Evaluation and Performance Analysis.- Web Accessibility : Designing and Testing of Web Based Application for Persons with
Disabilities.- CBADE - Hybrid Approach for Duplication detection and Elimination.- Fourth Workshop on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC – 2012).- Energy Aware Multipath Routing Protocol for Wireless Sensor Networks.- Virtual Classroom for E – Education in Rural Areas.- Unsupervised Methods On Image Database Using Cluster Mean Average Methods For Image Searching.- Impact of Fix Cluster Head Selection (FCHS) Routing Protocol for Wireless Sensors Network.- The Fourth International Workshop on Ad Hoc and Ubiquitous Computing (AUC- 2012).- Ontology Oriented Approach to Service Selection and Invocation in Complex Context Analysis.- Compression of Ecg Signals Using A Novel Discrete Wavelet Transform Algorithm for Dynamic Arrythmia Database.- Performance Analysis of ETX and ETT Routing Metrics over AODV Routing Protocol in WMNs.- Optimized CPU Frequency Scaling on Android Devices Based on Foreground Running Application.- Message Efficient Ring Leader Election in Distributed Systems.- RAW – A novel Reconfigurable Architecture design using Wireless for future generation Supercomputers.- Interference Management Analysis of Double-ABBA and ABBA Quasi-Orthogonal Space Time Code.