|
|
|
|
LEADER |
10672nam a22005655i 4500 |
001 |
978-1-4614-6154-8 |
003 |
DE-He213 |
005 |
20210708131511.0 |
007 |
cr nn 008mamaa |
008 |
130228s2013 xxu| s |||| 0|eng d |
020 |
|
|
|a 9781461461548
|9 978-1-4614-6154-8
|
024 |
7 |
|
|a 10.1007/978-1-4614-6154-8
|2 doi
|
050 |
|
4 |
|a TK1-9971
|
072 |
|
7 |
|a TJK
|2 bicssc
|
072 |
|
7 |
|a TEC041000
|2 bisacsh
|
072 |
|
7 |
|a TJK
|2 thema
|
082 |
0 |
4 |
|a 621.382
|2 23
|
245 |
1 |
0 |
|a Computer Networks & Communications (NetCom)
|h [electronic resource] :
|b Proceedings of the Fourth International Conference on Networks & Communications /
|c edited by Nabendu Chaki, Natarajan Meghanathan, Dhinaharan Nagamalai.
|
250 |
|
|
|a 1st ed. 2013.
|
264 |
|
1 |
|a New York, NY :
|b Springer New York :
|b Imprint: Springer,
|c 2013.
|
300 |
|
|
|a XXIII, 865 p. 357 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Electrical Engineering,
|x 1876-1100 ;
|v 131
|
505 |
0 |
|
|a Adhoc and Sensor Networks -- Perspectives of Sybil Attack in Routing Protocols of Mobile Ad Hoc Network -- A Jini Based Implementation for Best Leader Node Selection in MANETs -- A Novel Methodology for Securing Adhoc Network by Friendly Group Model -- Energy Efficient Medium Access Protocol for Clustered Wireless Sensor Networks -- A Design Mode of Streaming Media Transmission and Access in Wireless Video Sensor Network -- PSO-PAC: An Intelligent Clustering Mechanism in Ad hoc Network -- SEMSuS: Semantic Middleware For Dynamic Service –Oriented Sensor Network -- CO2 Gas Sensor Using Resonant Frequency changes in Micro-Cantilever -- Heterogeneous Wireless, WLAN and Mobile Networks -- A mechanism for enhanced performance of Chord DHT in mobile environment -- A Hybrid Model of CLMS and ACLMS Algorithms for Smart Antennas -- Novel Protection from Internal Attacks in Wireless Sensor Networks -- Channel-Usage Model in Underlay Cognitive Radio Networks -- Supporting LTE Networks in Heterogeneous Environment using the Y-Comm Framework -- A Call Admission Control Scheme for Cellular Network to Handle Sudden Influx in a Confined Area -- Distributed Joint Optimal Network Scheduling and Controller Design for Wireless Networks -- On the Estimation Capacity of Equal Gain Diversity Scheme Under Multi-Path Fading Channel -- Low Overhead Time Coordinated Checkpointing Algorithm for Mobile Distributed Systems -- Measurement and Performance Analysis -- Performance evaluation of TCP NewVegas and TCP Newreno on Burstification in an OBS Network -- Performance Enhancement through Optimization in FPGA Synthesis: Constraint Specific Approach -- Performance Optimization of Vehicular Ad hoc Network (VANET) using Clustering Approach -- Performance Evaluation of TCP Congestion Control variants using Ad Hoc On-Demand Distance Vector Routing -- Performance Analysis of Dynamic Source Routing for Ad-hoc Networks Using Active Packet -- Overhead Analysis of AODV, TORA and AOMDV in MANET Using Various Energy Models -- Network Architectures, Protocols and Routing Low Power and High Speed Adders in Modified Gated Diffusion Input Technique -- Guided Local Search for Optimal GPON/FTTP Network Design -- Image Segmentation Using Variable Kernel Fuzzy C Means (VKFCM) Clustering on Modified Level Set Method -- Comparison of SPIHT, Classical and Adaptive Lifting Scheme for Compression of Satellite Imageries -- Comparison of Routing Protocols – Distance Vector and Fisheye State Routing -- A Gene Expression Based Quality of Service Aware Routing Protocol for Mobile Adhoc Networks -- User Behavior and Capability Based Access Control Model and Architecture -- Congestion Adaptive Most Favorable Control Routing in Ad Hoc Networks -- An Improved Blind Channel Estimation based on Subspace Approach for OFDM Systems Under Fast Time Varying Conditions -- Adaptive Control and Synchronization Design for the Lu-Xiao Chaotic System -- Network Operations and Management -- Secure Patient Monitoring and Self-management Using Brain Expression Interpreter -- Coverage and Connectivity Guaranteed Deterministic Deployment Pattern for WSN -- Hybrid Deployment Schemes for Wireless Sensor Networks -- Adaptive Optimal Distributed Power Allocation for Enhanced Cognitive Radio Network in the Presence of Channel Uncertainties -- Secure Real Time Remote Video Monitoring System -- Fully Self-organized Key Management Scheme in MANET and Its Applications -- A Hierarchical Color Net Model for Smart Grid Security Monitoring -- Chapter 6: Network Security, Trust and Privacy -- A Comprehensive study on Two-factor Authentication with One Time Passwords -- ITRANS encoded Marathi Literature Document Relevance Ranking for Natural Language Flexible Queries -- AB-OR: Improving the efficiency in Onion Routing using Attribute Based Cryptography -- PASIC: A Novel Approach for Page-Wise Web Application Security -- Cryptanalysis of Lo et al.’s password based authentication scheme -- Intrusion Detection in Zero Knowledge System Using Model Checking Approach -- Detecting Malicious users in P2P Streaming Systems by Using Feedback Correlations -- An Efficient Dual Text Steganographic Approach: Hiding Data in a List of Words -- Secure Cryptosystem with Blind Authentication -- An Effective Technique for Intrusion Detection Using Neuro-Fuzzy and Radial SVM Classifier -- A Novel Octuple Images Encryption Algorithm Using Chaos in Wavelet Domain -- The Fourth International Workshop on Network and Communications Security (NCS 2012) -- A Strong Pvss Scheme -- Secure Cosine Similarity Computation with Malicious Adversaries -- Test Suite for Intrusion Detection by Layered Conditional Random Fields Using Mobile Phones -- An Efficient Microaggregation Method for Protecting Mixed Data -- Plus/Delta (+/∆) Evaluation to Help Organizations Deliver Projects Effectively -- A Secure Routing Protocol for Manets Against Byzantine Attacks -- Analysis of different Mobility Models for Ad Hoc On-Demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol -- NIZKPDS to achieve Non-Repudiation -- An Integrated Solution for both Monitoring and Controlling for Automization using Wireless Sensor Networks:A Case Study -- A Secure Image Steganography Technique to Hide Multiple Secret Images -- Source Code Analysis of a Connection-Oriented File Reader Server Socket Program in Java and Removal of the Security Vulnerabilities -- Document Library System using RDF based inferences -- The Fourth International workshop on Wireless and Mobile Networks (WiMoNe-2012) -- Spread and Erase: Efficient routing algorithm based on Anti-message Info Relay Hubs for Delay Tolerant Networks -- Novel architecture of adaptive and optimized policy based handover in MANET -- Trusted control information in the application of cold chain logistics -- PHY Layer Considerations for Real Time Multimedia Signal Transmission in Wireless Medium -- Approximate Minimum Spanning Tree for Points moving in a Euclidean Two-Dimensions Plane -- Low Complexity Speech Enhancement Algorithm for Improved Perception in Mobile Devices -- Prolonging the Lifetime of Wireless Sensor Network by Exponential Node Distribution and Ant-colony Optimization Routing -- Multimedia Traffic over MANETs: Evaluation and Performance Analysis -- Web Accessibility : Designing and Testing of Web Based Application for Persons with Disabilities -- CBADE - Hybrid Approach for Duplication detection and Elimination -- Fourth Workshop on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC – 2012) -- Energy Aware Multipath Routing Protocol for Wireless Sensor Networks -- Virtual Classroom for E – Education in Rural Areas -- Unsupervised Methods On Image Database Using Cluster Mean Average Methods For Image Searching -- Impact of Fix Cluster Head Selection (FCHS) Routing Protocol for Wireless Sensors Network -- The Fourth International Workshop on Ad Hoc and Ubiquitous Computing (AUC- 2012) -- Ontology Oriented Approach to Service Selection and Invocation in Complex Context Analysis -- Compression of Ecg Signals Using A Novel Discrete Wavelet Transform Algorithm for Dynamic Arrythmia Database -- Performance Analysis of ETX and ETT Routing Metrics over AODV Routing Protocol in WMNs -- Optimized CPU Frequency Scaling on Android Devices Based on Foreground Running Application -- Message Efficient Ring Leader Election in Distributed Systems -- RAW – A novel Reconfigurable Architecture design using Wireless for future generation Supercomputers -- Interference Management Analysis of Double-ABBA and ABBA Quasi-Orthogonal Space Time Code.
|
520 |
|
|
|a Computer Networks & Communications (NetCom) is the proceedings from the Fourth International Conference on Networks & Communications. This book covers theory, methodology and applications of computer networks, network protocols and wireless networks, data communication technologies, and network security. The proceedings will feature peer-reviewed papers that illustrate research results, projects, surveys and industrial experiences that describe significant advances in the diverse areas of computer networks & communications.
|
650 |
|
0 |
|a Electrical engineering.
|
650 |
|
0 |
|a Computer organization.
|
650 |
|
0 |
|a Signal processing.
|
650 |
|
0 |
|a Image processing.
|
650 |
|
0 |
|a Speech processing systems.
|
650 |
1 |
4 |
|a Communications Engineering, Networks.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/T24035
|
650 |
2 |
4 |
|a Computer Systems Organization and Communication Networks.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I13006
|
650 |
2 |
4 |
|a Signal, Image and Speech Processing.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/T24051
|
700 |
1 |
|
|a Chaki, Nabendu.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Meghanathan, Natarajan.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Nagamalai, Dhinaharan.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9781461461555
|
776 |
0 |
8 |
|i Printed edition:
|z 9781461461531
|
776 |
0 |
8 |
|i Printed edition:
|z 9781493946037
|
830 |
|
0 |
|a Lecture Notes in Electrical Engineering,
|x 1876-1100 ;
|v 131
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-1-4614-6154-8
|
912 |
|
|
|a ZDB-2-ENG
|
912 |
|
|
|a ZDB-2-SXE
|
950 |
|
|
|a Engineering (SpringerNature-11647)
|
950 |
|
|
|a Engineering (R0) (SpringerNature-43712)
|