Information and Communication Technologies
18th EUNICE/IFIP WG 6.2, 6.6 International Conference, EUNICE 2012, Budapest, Hungary, August 29-31, 2012, Proceedings
Herausgegeben:Szabo, Robert; Vidacs, Attila
Information and Communication Technologies
18th EUNICE/IFIP WG 6.2, 6.6 International Conference, EUNICE 2012, Budapest, Hungary, August 29-31, 2012, Proceedings
Herausgegeben:Szabo, Robert; Vidacs, Attila
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the refereed proceedings of the 18th EUNICE 2011 conference on information and communication technologies, held in Budapest, in August 2012. The 23 oral papers demostrated together with 15 poster presentations were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on radio communications, security, management, protocols and performance, algorithms, models, and simulations.
Andere Kunden interessierten sich auch für
- Information and Communication Technology82,99 €
- Distributed Computing and Internet Technology41,99 €
- Future Generation Information Technology41,99 €
- Internet and Distributed Computing Systems41,99 €
- Distributed Computing and Internet Technology42,99 €
- Computer Information Systems and Industrial Management42,99 €
- Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices42,99 €
-
-
-
This book constitutes the refereed proceedings of the 18th EUNICE 2011 conference on information and communication technologies, held in Budapest, in August 2012.
The 23 oral papers demostrated together with 15 poster presentations were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on radio communications, security, management, protocols and performance, algorithms, models, and simulations.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
The 23 oral papers demostrated together with 15 poster presentations were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on radio communications, security, management, protocols and performance, algorithms, models, and simulations.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 7479
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 978-3-642-32807-7
- 2012
- Seitenzahl: 440
- Erscheinungstermin: 27. Juli 2012
- Englisch
- Abmessung: 235mm x 155mm x 24mm
- Gewicht: 663g
- ISBN-13: 9783642328077
- ISBN-10: 3642328075
- Artikelnr.: 36148139
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Lecture Notes in Computer Science 7479
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 978-3-642-32807-7
- 2012
- Seitenzahl: 440
- Erscheinungstermin: 27. Juli 2012
- Englisch
- Abmessung: 235mm x 155mm x 24mm
- Gewicht: 663g
- ISBN-13: 9783642328077
- ISBN-10: 3642328075
- Artikelnr.: 36148139
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Radio Communications.-Testbed Analysis of the Effects of IEEE 802.11s Power Save on Mesh Link Performance.-Path Selection and Adaptive Selection of Smart Antenna Transmission Schemes in Multi-hop Wireless Networks.-Receiver-Initiated vs. Short-Preamble Burst MAC Approaches for Multi-channel Wireless Sensor Networks.-White Spaces in UHF Band: Catalonia Case Study and Impact of the Digital Dividend.-Security.-A Framework for Security Context Migration in a Firewall Secured Virtual Machine Environment.-Enhancing Collaborative Intrusion Detection Methods Using a Kademlia Overlay Network.-Flow-Based Security Issue Detection in Building Automation and Control Networks.-Hash-Based Mutual Authentication Protocol for Low-Cost RFID Systems.-The Impact of IPv6 on Penetration Testing.-Management Linking Telecom Service High-Level Abstract Models to Simulators Based on Model Transformations: The IMS Case Study.-Network Migration Optimization Using Genetic Algorithms.-OWL-Based Node Capability Parameter Configuration.-Techno-Economic Comparison of Next-Generation Access Networks for the French Market.-The Design of a Single Funding Point Charging Architecture -Protocols and Performance A Two Layer Guaranteed and Sustained Rate Based Scheduler for IEEE 802.16-2009 Based WiMAX Networks.-Implementation and Evaluation of Coupled Congestion Control for Multipath TCP.-Improving Fairness for Adaptive HTTP Video Streaming.-Prototype of High Performance Scalable Advertising Server with Local Memory Storage and Centralised Processing.-Responsible Source Multicasting.-Algorithms, models and Simulations.-A Model for System Resources in Flexible Time-Triggered Middleware Architectures.-Modeling and Analysis of the Survivability of an Infrastructure-Based Wireless Network.-Private Quantum Coding for Quantum Relay Networks.-Target Surrounding Solution for Swarm Robots.-Poster Papers.-A Split Connection TCP Proxy in LTE Networks.-Adaptive Routing in Wireless Sensor Networks for Fire Fighting.-Automatic Handover Decision in Content Centric Networking.-Autonomous Sensor Network Architecture Model.-Efficient Multihop Broadcast with Distributed Protocol Evolution.-Finding Typical Internet User Behaviors.-Interoperability Description of Web Services Based Application Servers.Investigation of Quality of Experience for 3D Video in Wireless Network Environment.-Investigation of WLAN Access Point Placement for Indoor Positioning Improving the Efficiency of HTTP Caching by Hash Based Resource Identifiers.-Nonmonotonicity in Trust Management.-Radio Propagation Modeling on 433 MHz.-Semantic Intelligent Space for Ambient Assisted Living.-Simulating Network Coding for Accelerating Tit-for-Tat in Peer-to-Peer Content Sharing.-The Costs of Web Advertisements While Mobile Browsing.-
Radio Communications.-Testbed Analysis of the Effects of IEEE 802.11s Power Save on Mesh Link Performance.-Path Selection and Adaptive Selection of Smart Antenna Transmission Schemes in Multi-hop Wireless Networks.-Receiver-Initiated vs. Short-Preamble Burst MAC Approaches for Multi-channel Wireless Sensor Networks.-White Spaces in UHF Band: Catalonia Case Study and Impact of the Digital Dividend.-Security.-A Framework for Security Context Migration in a Firewall Secured Virtual Machine Environment.-Enhancing Collaborative Intrusion Detection Methods Using a Kademlia Overlay Network.-Flow-Based Security Issue Detection in Building Automation and Control Networks.-Hash-Based Mutual Authentication Protocol for Low-Cost RFID Systems.-The Impact of IPv6 on Penetration Testing.-Management Linking Telecom Service High-Level Abstract Models to Simulators Based on Model Transformations: The IMS Case Study.-Network Migration Optimization Using Genetic Algorithms.-OWL-Based Node Capability Parameter Configuration.-Techno-Economic Comparison of Next-Generation Access Networks for the French Market.-The Design of a Single Funding Point Charging Architecture -Protocols and Performance A Two Layer Guaranteed and Sustained Rate Based Scheduler for IEEE 802.16-2009 Based WiMAX Networks.-Implementation and Evaluation of Coupled Congestion Control for Multipath TCP.-Improving Fairness for Adaptive HTTP Video Streaming.-Prototype of High Performance Scalable Advertising Server with Local Memory Storage and Centralised Processing.-Responsible Source Multicasting.-Algorithms, models and Simulations.-A Model for System Resources in Flexible Time-Triggered Middleware Architectures.-Modeling and Analysis of the Survivability of an Infrastructure-Based Wireless Network.-Private Quantum Coding for Quantum Relay Networks.-Target Surrounding Solution for Swarm Robots.-Poster Papers.-A Split Connection TCP Proxy in LTE Networks.-Adaptive Routing in Wireless Sensor Networks for Fire Fighting.-Automatic Handover Decision in Content Centric Networking.-Autonomous Sensor Network Architecture Model.-Efficient Multihop Broadcast with Distributed Protocol Evolution.-Finding Typical Internet User Behaviors.-Interoperability Description of Web Services Based Application Servers.Investigation of Quality of Experience for 3D Video in Wireless Network Environment.-Investigation of WLAN Access Point Placement for Indoor Positioning Improving the Efficiency of HTTP Caching by Hash Based Resource Identifiers.-Nonmonotonicity in Trust Management.-Radio Propagation Modeling on 433 MHz.-Semantic Intelligent Space for Ambient Assisted Living.-Simulating Network Coding for Accelerating Tit-for-Tat in Peer-to-Peer Content Sharing.-The Costs of Web Advertisements While Mobile Browsing.-