Cover image for
Title:
Computer Networks & Communications (NetCom) [electronic resource] : Proceedings of the Fourth International Conference on Networks & Communications / edited by Nabendu Chaki, Natarajan Meghanathan, Dhinaharan Nagamalai.
Author:
Chaki, Nabendu.
Published:
New York, NY : Springer New York : Imprint: Springer, 2013.
Description:
XXIII, 865 p. 357 illus. digital.
Series:
Lecture Notes in Electrical Engineering, 131
Summary:
Computer Networks & Communications (NetCom) is the proceedings from the Fourth International Conference on Networks & Communications. This book covers theory, methodology and applications of computer networks, network protocols and wireless networks, data communication technologies, and network security. The proceedings will feature peer-reviewed papers that illustrate research results, projects, surveys and industrial experiences that describe significant advances in the diverse areas of computer networks & communications.
Contents:
Adhoc and Sensor Networks -- Perspectives of Sybil Attack in Routing Protocols of Mobile Ad Hoc Network -- A Jini Based Implementation for Best Leader Node Selection in MANETs -- A Novel Methodology for Securing Adhoc Network by Friendly Group Model -- Energy Efficient Medium Access Protocol for Clustered Wireless Sensor Networks -- A Design Mode of Streaming Media Transmission and Access in Wireless Video Sensor Network -- PSO-PAC: An Intelligent Clustering Mechanism in Ad hoc Network -- SEMSuS: Semantic Middleware For Dynamic Service –Oriented Sensor Network -- CO2 Gas Sensor Using Resonant Frequency changes in Micro-Cantilever -- Heterogeneous Wireless, WLAN and Mobile Networks -- A mechanism for enhanced performance of Chord DHT in mobile environment -- A Hybrid Model of CLMS and ACLMS Algorithms for Smart Antennas -- Novel Protection from Internal Attacks in Wireless Sensor Networks -- Channel-Usage Model in Underlay Cognitive Radio Networks -- Supporting LTE Networks in Heterogeneous Environment using the Y-Comm Framework -- A Call Admission Control Scheme for Cellular Network to Handle Sudden Influx in a Confined Area -- Distributed Joint Optimal Network Scheduling and Controller Design for Wireless Networks -- On the Estimation Capacity of Equal Gain Diversity Scheme Under Multi-Path Fading Channel -- Low Overhead Time Coordinated Checkpointing Algorithm for Mobile Distributed Systems -- Measurement and Performance Analysis -- Performance evaluation of TCP NewVegas and TCP Newreno on Burstification in an OBS Network -- Performance Enhancement through Optimization in FPGA Synthesis: Constraint Specific Approach -- Performance Optimization of Vehicular Ad hoc Network (VANET) using Clustering Approach -- Performance Evaluation of TCP Congestion Control variants using Ad Hoc On-Demand Distance Vector Routing -- Performance Analysis of Dynamic Source Routing for Ad-hoc Networks Using Active Packet -- Overhead Analysis of AODV, TORA and AOMDV in MANET Using Various Energy Models -- Network Architectures, Protocols and Routing Low Power and High Speed Adders in Modified Gated Diffusion Input Technique -- Guided Local Search for Optimal GPON/FTTP Network Design -- Image Segmentation Using Variable Kernel Fuzzy C Means (VKFCM) Clustering on Modified Level Set Method -- Comparison of SPIHT, Classical and Adaptive Lifting Scheme for Compression of Satellite Imageries -- Comparison of Routing Protocols – Distance Vector and Fisheye State Routing -- A Gene Expression Based Quality of Service Aware Routing Protocol for Mobile Adhoc Networks -- User Behavior and Capability Based Access Control Model and Architecture -- Congestion Adaptive Most Favorable Control Routing in Ad Hoc Networks -- An Improved Blind Channel Estimation based on Subspace Approach for OFDM Systems Under Fast Time Varying Conditions -- Adaptive Control and Synchronization Design for the Lu-Xiao Chaotic System -- Network Operations and Management -- Secure Patient Monitoring and Self-management Using Brain Expression Interpreter -- Coverage and Connectivity Guaranteed Deterministic Deployment Pattern for WSN -- Hybrid Deployment Schemes for Wireless Sensor Networks -- Adaptive Optimal Distributed Power Allocation for Enhanced Cognitive Radio Network in the Presence of Channel Uncertainties -- Secure Real Time Remote Video Monitoring System -- Fully Self-organized Key Management Scheme in MANET and Its Applications -- A Hierarchical Color Net Model for Smart Grid Security Monitoring -- Chapter 6: Network Security, Trust and Privacy -- A Comprehensive study on Two-factor Authentication with One Time Passwords -- ITRANS encoded Marathi Literature Document Relevance Ranking for Natural Language Flexible Queries -- AB-OR: Improving the efficiency in Onion Routing using Attribute Based Cryptography -- PASIC: A Novel Approach for Page-Wise Web Application Security -- Cryptanalysis of Lo et al.’s password based authentication scheme -- Intrusion Detection in Zero Knowledge System Using Model Checking Approach -- Detecting Malicious users in P2P Streaming Systems by Using Feedback Correlations -- An Efficient Dual Text Steganographic Approach: Hiding Data in a List of Words -- Secure Cryptosystem with Blind Authentication -- An Effective Technique for Intrusion Detection Using Neuro-Fuzzy and Radial SVM Classifier -- A Novel Octuple Images Encryption Algorithm Using Chaos in Wavelet Domain -- The Fourth International Workshop on Network and Communications Security (NCS 2012) -- A Strong Pvss Scheme -- Secure Cosine Similarity Computation with Malicious Adversaries -- Test Suite for Intrusion Detection by Layered Conditional Random Fields Using Mobile Phones -- An Efficient Microaggregation Method for Protecting Mixed Data -- Plus/Delta (+/∆) Evaluation to Help Organizations Deliver Projects Effectively -- A Secure Routing Protocol for Manets Against Byzantine Attacks -- Analysis of different Mobility Models for Ad Hoc On-Demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol -- NIZKPDS to achieve Non-Repudiation -- An Integrated Solution for both Monitoring and Controlling for Automization using Wireless Sensor Networks:A Case Study -- A Secure Image Steganography Technique to Hide Multiple Secret Images -- Source Code Analysis of a Connection-Oriented File Reader Server Socket Program in Java and Removal of the Security Vulnerabilities -- Document Library System using RDF based inferences -- The Fourth International workshop on Wireless and  Mobile Networks (WiMoNe-2012) -- Spread and Erase: Efficient routing algorithm based on Anti-message Info Relay Hubs for Delay Tolerant Networks -- Novel architecture of adaptive and optimized policy based handover in MANET -- Trusted control information in the application of cold chain logistics -- PHY Layer Considerations for Real Time Multimedia Signal Transmission in Wireless Medium -- Approximate Minimum Spanning Tree for Points moving in a Euclidean Two-Dimensions Plane -- Low Complexity Speech Enhancement Algorithm for Improved Perception in Mobile Devices -- Prolonging the Lifetime of Wireless Sensor Network by Exponential Node Distribution and Ant-colony Optimization Routing -- Multimedia Traffic over MANETs: Evaluation and Performance Analysis -- Web Accessibility : Designing and Testing of Web Based Application for Persons with Disabilities -- CBADE - Hybrid Approach for Duplication detection and Elimination -- Fourth Workshop on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC – 2012) -- Energy Aware Multipath Routing Protocol for Wireless Sensor Networks -- Virtual Classroom for E – Education in Rural Areas -- Unsupervised Methods On Image Database Using Cluster Mean Average Methods For Image Searching -- Impact of Fix Cluster Head Selection (FCHS) Routing Protocol for Wireless Sensors Network -- The Fourth International Workshop on Ad Hoc and Ubiquitous Computing (AUC- 2012) -- Ontology Oriented Approach to Service Selection and Invocation in Complex Context Analysis -- Compression of Ecg Signals Using A Novel Discrete Wavelet Transform Algorithm for Dynamic Arrythmia Database -- Performance Analysis of ETX and ETT Routing Metrics over AODV Routing Protocol in WMNs -- Optimized CPU Frequency Scaling on Android Devices Based on Foreground Running Application -- Message Efficient Ring Leader Election in Distributed Systems -- RAW – A novel Reconfigurable Architecture design using Wireless for future generation Supercomputers -- Interference Management Analysis of Double-ABBA and ABBA Quasi-Orthogonal Space Time Code.
Notes:
Vendor supplied record for SpringerLink e-book 2013

Other Authors:
Meghanathan, Natarajan.

Nagamalai, Dhinaharan.

SpringerLink (Online service)
ISBN:
9781461461548
Online Access:
e-book

Available:*

Library
Material Type
Call Number
Status
Searching...
Electronic Book XX(1167798.1)
Searching...

On Order

Summary

Summary