Buch, Englisch, 546 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 838 g
Reihe: Information Systems and Applications, incl. Internet/Web, and HCI
First International Conference, NBIS 2007, Regensburg, Germany, September 3-7, 2007, Proceedings
Buch, Englisch, 546 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 838 g
Reihe: Information Systems and Applications, incl. Internet/Web, and HCI
ISBN: 978-3-540-74572-3
Verlag: Springer Berlin Heidelberg
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Mathematik | Informatik EDV | Informatik Technische Informatik Externe Speicher & Peripheriegeräte
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Datenkompression, Dokumentaustauschformate
- Wirtschaftswissenschaften Betriebswirtschaft Bereichsspezifisches Management E-Commerce, E-Business, E-Marketing
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Zeichen- und Zahlendarstellungen
- Mathematik | Informatik EDV | Informatik Technische Informatik Systemverwaltung & Management
Weitere Infos & Material
Sensor and Ad-Hoc Networks.- A Simple Statistical Methodology for Testing Ad Hoc Networks.- Sensor-Actuator Communication Protocols in Wireless Networks.- The Effect of Routing Protocol Dynamics on TCP Performance in Mobile Ad Hoc Networks.- Battery and Power Aware Routing in Mobile Ad Hoc Networks.- Wireless Balloon Network for Disaster Information System.- Wireless Networks as an Infrastructure for Mission-Critical Business Applications.- Network Security.- The DecoyPort: Redirecting Hackers to Honeypots.- Network Security Improvement with Isolation Implementation Based on ISO-17799 Standard.- Positive and Negative Authorizations to Access Protected Web Resources.- An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions.- An Automatic Meta-revised Mechanism for Anti-malicious Injection.- SKEMON: A Simple Certificate-Less Method for Key Exchange by Using Mobile Network.- Secure System Applications.- A Secure Authentication Scheme for a Public Terminal Before a Transaction.- Development and Evaluation of New User Interface for Security Scanner with Usability in Human Interface Study.- A Key Predistribution Scheme for Wireless Sensor Networks Using the Small-World Concept.- Multigroup Rekeying for a Wireless Network.- Web Technologies and Middleware Systems.- Rich Internet Architectures for Browser-Based Multiplayer Real-Time Games – Design and Implementation Issues of virtual-kicker.com.- Distribution of Lecture Concepts and Relations in Digital Contents.- Design of the Middleware Enabling Context Awareness and Energy Optimizing for Smart Environment.- Multilayer Quality and Grade of Service Support for High Speed GMPLS IP/DWDM Networks.- Distributed Systems and Applications.- Implementing Range Queries with a Decentralized Balanced Tree over DistributedHash Tables.- Byzantine-Tolerant, Information Propagation in Untrustworthy and Unreliable Networks.- COMICS: A Global Constraint Manager for Interactive Component Database Systems.- Guidelines for Network Service Pricing: An Extended Model Considering Increase of Network Users.- Scheduling.- Role-Based Scheduling and Synchronization Algorithms to Prevent Illegal Information Flow.- A Probabilistic Multi-agent Scheduler Implemented in JXTA.- Scheduling Real-Time Requests in On-Demand Broadcast Environments.- A Fair Replica Placement for Parallel Download on Cluster Grid.- Network Analysis.- Querying Similarity in Metric Social Networks.- Performance Evaluation of Dynamic Probabilistic Flooding Using Local Density Information in MANETs.- A Token Bucket Model with Assured Forwarding for Web Traffic.- An Analytical Approach to the Efficient Real-Time Events/Services Handling in Converged Network Environment.- Command Transition Probability Analysis on Mobile Internet Command Sequences.- A Solution for Congestion and Performance Enhancement by Dynamic Packet Bursting in Mobile Ad Hoc Networks.- P2P Systems and Applications.- Empirical Study of Design Pattern Usage in Peer-to-Peer Systems.- Improvement of JXTA Protocols for Supporting Reliable Distributed Applications in P2P Systems.- A Ring Infrastructure for Neighbor-Centric Peer-to-Peer Applications.- Semantic Query Routing in SenPeer, a P2P Data Management System.- Jamjuree Cluster: A Peer-to-Peer Cluster Computing System.- Evaluations on Classified Selection of Dense Vectors for Vegetable Geographical Origin Identification System Using Trace Elements.- Pervasive and Ubiquitous Systems.- Integrated Biomedical System for Ubiquitous Health Monitoring.- Tree Graph Views for a Distributed Pervasive Environment.- A DistributedResource Furnishing to Offload Resource-Constrained Devices in Cyber Foraging Toward Pervasive Computing.- Trust Model for Mobile Devices in Ubiquitous Environment.- Network Applications and Protocols.- PoQBA: A New Path Admission Control for Diffserv Networks.- An Adaptive Call Admission Control Approach for Multimedia 3G Network.- Spatial Correlation Code Based Data Aggregation Scheme for Maximizing Network Lifetime.- A Mesh-Based QoS Aware Multicast Routing Protocol.- Embedded Systems.- Virtual Large-Scale Disk System for PC-Room.- Application of Default Logic in an Intelligent Tutoring System.- Consolidating with Media Streaming Server and Network Storage Card.- Design of the Tile-Based Embedded Multimedia Processor –TEMP–.- Fuzzy Systems and Their Applications.- A Fuzzy-Based Speed-Aware Handoff System for Wireless Cellular Networks.- WPS and Voice-XML-Based Multi-Modal Fusion Agent Using SNNR and Fuzzy Value.- A Fuzzy Neural Network Based Scheduling Algorithm for Job Assignment on Computational Grids.