|
|
|
|
LEADER |
05722nam a22006015i 4500 |
001 |
978-3-319-51204-4 |
003 |
DE-He213 |
005 |
20200701044317.0 |
007 |
cr nn 008mamaa |
008 |
161216s2017 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319512044
|9 978-3-319-51204-4
|
024 |
7 |
|
|a 10.1007/978-3-319-51204-4
|2 doi
|
050 |
|
4 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
072 |
|
7 |
|a UKN
|2 thema
|
082 |
0 |
4 |
|a 004.6
|2 23
|
245 |
1 |
0 |
|a Ad Hoc Networks
|h [electronic resource] :
|b 8th International Conference, ADHOCNETS 2016, Ottawa, Canada, September 26-27, 2016, Revised Selected Papers /
|c edited by Yifeng Zhou, Thomas Kunz.
|
250 |
|
|
|a 1st ed. 2017.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2017.
|
300 |
|
|
|a XIV, 416 p. 176 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
|x 1867-8211 ;
|v 184
|
505 |
0 |
|
|a Management of Surveillance Underwater Acoustic Networks -- Relative Localization for Small Wireless Sensor Networks -- Performance Study of the IEEE 802.15.6 Slotted Aloha Mechanism With Power Control in a Multiuser Environment -- New Selection Strategies of Actor’s Substitute in DARA for Connectivity Restoration in WSANs -- Asymmetric Multi-Way Ranging for Resource-Limited Nodes -- Comparison of RPL Routing Metrics on grids UAV and Vehicular Networks -- Communication and Coordination for Drone Networks 8 Intelligent Wireless AdHoc Routing Protocol and Controller for UAV Networks -- Theoretical Analysis of Obstruction’s influence on Data Dissemination in Vehicular Networks -- Performance Analysis for Traffic-aware Utility in Vehicular Ad Hoc Networks -- Investigation and Adaptation of Signal Propagation Models for a Mixed Outdoor-Indoor Scenario Using a Flying GSM Base Station Modelling and Analysis -- Optimizing Power Allocation in Wireless Networks: Are the Implicit Constraints Really Redundant? -- Towards Dynamic Capacity Management for the Masses -- Distance Distributions in Finite Ad Hoc Networks: Approaches, Applications, and Directions -- Towards More Realistic Network Simulations: Leveraging the System-Call Barrier -- 16 Resource Allocation for Relay-aided Cooperative Hospital Wireless Networks -- Improving the performance of challenged networks with controlled mobility -- SDN Coordination for CCN and FC Content Dissemination -- A Bandwidth Adaptation Scheme for Cloud Radio Access Networks -- Cooperative On-the-Fly Decision Making in Mobility-Controlled Multi Ferry Delay Tolerant Networks -- Multipath Routing Optimization with Interference Consideration in Wireless Ad hoc Network -- An Accurate Passive RFID Indoor Localization System based on SenseaTag and Zoning Algorithm Workshop on practical ad hoc network security and vulnerability -- Communication Links Vulnerability Model for Cyber Security Mitigation -- Entropy-Based Recommendation Trust Model for Machine to Machine Communications -- Reliability, Throughput and Latency Analysis of an Aerial Network -- Gender Assignment for Directional Full-Duplex FDD Nodes in a Multihop Wireless Network -- A Massive MIMO Panel Array at Ka-band with Flexible Patterns and Beam Steering Performance.
|
520 |
|
|
|a This book constitutes the proceedings of the 8th International Conference on Ad Hoc Networks, ADHOCNETS 2016, held in Ottawa, Canada, September 26-17, 2016. The 34 revised full papers presented were carefully reviewed and selected from 46 submissions. The papers provide visions, trends, challenges and opportunities in the area of ad hoc networking and emerging applications. The conference also features two workshops on ad hoc network security and vulnerability, and convergence of wireless directional network systems and software defined networking, respectively.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Special purpose computers.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computer simulation.
|
650 |
|
0 |
|a Electrical engineering.
|
650 |
1 |
4 |
|a Computer Communication Networks.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I13022
|
650 |
2 |
4 |
|a Systems and Data Security.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I28060
|
650 |
2 |
4 |
|a Special Purpose and Application-Based Systems.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I13030
|
650 |
2 |
4 |
|a Security.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I28000
|
650 |
2 |
4 |
|a Simulation and Modeling.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I19000
|
650 |
2 |
4 |
|a Communications Engineering, Networks.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/T24035
|
700 |
1 |
|
|a Zhou, Yifeng.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Kunz, Thomas.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319512037
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319512051
|
830 |
|
0 |
|a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
|x 1867-8211 ;
|v 184
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-319-51204-4
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|