Networks and Communications (NetCom2013) (eBook, PDF)
Proceedings of the Fifth International Conference on Networks & Communications
Redaktion: Meghanathan, Natarajan; Rajasekaran, Sanguthevar; Nagamalai, Dhinaharan
161,95 €
161,95 €
inkl. MwSt.
Sofort per Download lieferbar
81 °P sammeln
161,95 €
Als Download kaufen
161,95 €
inkl. MwSt.
Sofort per Download lieferbar
81 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
161,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
81 °P sammeln
Networks and Communications (NetCom2013) (eBook, PDF)
Proceedings of the Fifth International Conference on Networks & Communications
Redaktion: Meghanathan, Natarajan; Rajasekaran, Sanguthevar; Nagamalai, Dhinaharan
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book covers theory, methodology and applications of computer networks, network protocols and wireless networks, data communication technologies, and network security. The book is based on the proceedings from the Fifth International Conference on Networks & Communications (NetCom). The proceedings will feature peer-reviewed papers that illustrate research results, projects, surveys and industrial experiences that describe significant advances in the diverse areas of computer networks & communications.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 8.86MB
Andere Kunden interessierten sich auch für
- Computer Networks & Communications (NetCom) (eBook, PDF)274,95 €
- Computer Networks and Inventive Communication Technologies (eBook, PDF)161,95 €
- Information Science and Applications (eBook, PDF)161,95 €
- Anandakumar HaldoraiIntelligent Spectrum Handovers in Cognitive Radio Networks (eBook, PDF)69,95 €
- Information Science and Applications 2018 (eBook, PDF)217,95 €
- Future Information Technology (eBook, PDF)161,95 €
- Mobile and Wireless Network Security and Privacy (eBook, PDF)113,95 €
-
-
-
This book covers theory, methodology and applications of computer networks, network protocols and wireless networks, data communication technologies, and network security. The book is based on the proceedings from the Fifth International Conference on Networks & Communications (NetCom). The proceedings will feature peer-reviewed papers that illustrate research results, projects, surveys and industrial experiences that describe significant advances in the diverse areas of computer networks & communications.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer Nature Switzerland
- Seitenzahl: 335
- Erscheinungstermin: 5. Februar 2014
- Englisch
- ISBN-13: 9783319036922
- Artikelnr.: 43786104
- Verlag: Springer Nature Switzerland
- Seitenzahl: 335
- Erscheinungstermin: 5. Februar 2014
- Englisch
- ISBN-13: 9783319036922
- Artikelnr.: 43786104
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Natarajan Meghanathan PhD is an Associate Professor at Jackson State University, Jackson, MS, USA Dhinaharan Nagamalai Ph.D is an Associate Professor KTO Karatay University, Turkey Sanguthevar Rajasekaran is UTC Chair Professor of CSE and Director of the Booth Engineering Center for Advanced Technologies, University of Connecticut, USA
Part I: Measurement and Performance Analysis.- An Evaluation of EpiChord in OverSim.- Enhanced back-off technique for IEEE 802.15.4 WSN standard.- Efficient Retransmission QoS-Aware MAC Scheme in Wireless Sensor Networks.- Performance Analysis of Correlated Channel for UWB-MIMO System.- Part II: Network Architectures, Protocols and Routing.- Node Failure Time Analysis for Maximum Stability vs. Minimum Distance.- Spanning Tree-based Data Gathering in Mobile Sensor Networks.- Wireless Networks: An Instance of Tandem Discrete-Time Queues.- An Equal Share Ant Colony Optimization Algorithm for Job Shop Scheduling adapted to Cloud Environments.- A Dynamic Trust Computation Model for Peer to Peer Network.- Road Traffic Management using Egyptian Vulture Optimization Algorithm - A New Graph Agent-Based Optimization Meta-Heuristic Algorithm.- Part III: Adhoc and Sensor Networks.- A Novel Bloom Filter Based Variant of Elliptic Curve Digital Signature Algorithm for Wireless Sensor Networks.- Energy Efficient Localization in Wireless Sensor Networks.- Part IV: Network Security, Trust and Privacy.- Data Integrity Verification in Hybrid Cloud using TTPA.- A Comparitive Study of Data Perturbation Using Fuzzy Logic in Preserving Privacy.- Vector Quantization in Language Independent Speaker Identification Using Mel-Frequency Cepstrum Co-Efficient.- Improved Technique for Data Confidentiality in Cloud Environment.- A Hybrid-Based Feature Selection Approach for IDS.- Reckoning Minutiae Points with RNA-FINNT Augments Trust and Privacy of Legitimate User and Ensures Network Security in the Public Network.- Empirical Study of Email Security Threats and Countermeasures.- Improving Business Intelligence based on Frequent Itemsets using k-means Clustering Algorithm.- Reputation-Based Trust Management for Distributed Spectrum Sensing.- Ontology Based Multi-Agent Intrusion Detection System for Web Service Attacks Using Self Learning.- A Novel Key ExchangeProtocol provably secure against Man-In-The-Middle Attack.- Neutralizing DoS attacks on Linux Servers.- Part V: Wireless and Mobile Networks.- Cache Coherency Algorithm to Optimize Bandwidth in Mobile Networks.- Connected Dominating Set based Scheduling for Publish-Subscribe Scenarios in WSN.- Ubiquitous Compaction Monitoring Interface for Soil compactor - A Web Based Approach.
Part I: Measurement and Performance Analysis.- An Evaluation of EpiChord in OverSim.- Enhanced back-off technique for IEEE 802.15.4 WSN standard.- Efficient Retransmission QoS-Aware MAC Scheme in Wireless Sensor Networks.- Performance Analysis of Correlated Channel for UWB-MIMO System.- Part II: Network Architectures, Protocols and Routing.- Node Failure Time Analysis for Maximum Stability vs. Minimum Distance.- Spanning Tree-based Data Gathering in Mobile Sensor Networks.- Wireless Networks: An Instance of Tandem Discrete-Time Queues.- An Equal Share Ant Colony Optimization Algorithm for Job Shop Scheduling adapted to Cloud Environments.- A Dynamic Trust Computation Model for Peer to Peer Network.- Road Traffic Management using Egyptian Vulture Optimization Algorithm - A New Graph Agent-Based Optimization Meta-Heuristic Algorithm.- Part III: Adhoc and Sensor Networks.- A Novel Bloom Filter Based Variant of Elliptic Curve Digital Signature Algorithm for Wireless Sensor Networks.- Energy Efficient Localization in Wireless Sensor Networks.- Part IV: Network Security, Trust and Privacy.- Data Integrity Verification in Hybrid Cloud using TTPA.- A Comparitive Study of Data Perturbation Using Fuzzy Logic in Preserving Privacy.- Vector Quantization in Language Independent Speaker Identification Using Mel-Frequency Cepstrum Co-Efficient.- Improved Technique for Data Confidentiality in Cloud Environment.- A Hybrid-Based Feature Selection Approach for IDS.- Reckoning Minutiae Points with RNA-FINNT Augments Trust and Privacy of Legitimate User and Ensures Network Security in the Public Network.- Empirical Study of Email Security Threats and Countermeasures.- Improving Business Intelligence based on Frequent Itemsets using k-means Clustering Algorithm.- Reputation-Based Trust Management for Distributed Spectrum Sensing.- Ontology Based Multi-Agent Intrusion Detection System for Web Service Attacks Using Self Learning.- A Novel Key ExchangeProtocol provably secure against Man-In-The-Middle Attack.- Neutralizing DoS attacks on Linux Servers.- Part V: Wireless and Mobile Networks.- Cache Coherency Algorithm to Optimize Bandwidth in Mobile Networks.- Connected Dominating Set based Scheduling for Publish-Subscribe Scenarios in WSN.- Ubiquitous Compaction Monitoring Interface for Soil compactor - A Web Based Approach.