Buch, Englisch, Band 284, 335 Seiten, Previously published in hardcover, Format (B × H): 155 mm x 235 mm, Gewicht: 5329 g
Proceedings of the Fifth International Conference on Networks & Communications
Buch, Englisch, Band 284, 335 Seiten, Previously published in hardcover, Format (B × H): 155 mm x 235 mm, Gewicht: 5329 g
Reihe: Lecture Notes in Electrical Engineering
ISBN: 978-3-319-37676-9
Verlag: Springer International Publishing
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Part I: Measurement and Performance Analysis.- An Evaluation of EpiChord in OverSim.- Enhanced back-off technique for IEEE 802.15.4 WSN standard.- Efficient Retransmission QoS-Aware MAC Scheme in Wireless Sensor Networks.- Performance Analysis of Correlated Channel for UWB-MIMO System.- Part II: Network Architectures, Protocols and Routing.- Node Failure Time Analysis for Maximum Stability vs. Minimum Distance.- Spanning Tree-based Data Gathering in Mobile Sensor Networks.- Wireless Networks: An Instance of Tandem Discrete-Time Queues.- An Equal Share Ant Colony Optimization Algorithm for Job Shop Scheduling adapted to Cloud Environments.- A Dynamic Trust Computation Model for Peer to Peer Network.- Road Traffic Management using Egyptian Vulture Optimization Algorithm – A New Graph Agent-Based Optimization Meta-Heuristic Algorithm.- Part III: Adhoc and Sensor Networks.- A Novel Bloom Filter Based Variant of Elliptic Curve Digital Signature Algorithm for Wireless Sensor Networks.- Energy Efficient Localization in Wireless Sensor Networks.- Part IV: Network Security, Trust and Privacy.- Data Integrity Verification in Hybrid Cloud using TTPA.- A Comparitive Study of Data Perturbation Using Fuzzy Logic in Preserving Privacy.- Vector Quantization in Language Independent Speaker Identification Using Mel-Frequency Cepstrum Co-Efficient.- Improved Technique for Data Confidentiality in Cloud Environment.- A Hybrid-Based Feature Selection Approach for IDS.- Reckoning Minutiae Points with RNA-FINNT Augments Trust and Privacy of Legitimate User and Ensures Network Security in the Public Network.- Empirical Study of Email Security Threats and Countermeasures.- Improving Business Intelligence based on Frequent Itemsets using k-means Clustering Algorithm.- Reputation-Based Trust Management for Distributed Spectrum Sensing.- Ontology Based Multi-Agent Intrusion Detection System for Web Service Attacks Using Self Learning.- A Novel Key ExchangeProtocol provably secure against Man-In-The-Middle Attack.- Neutralizing DoS attacks on Linux Servers.- Part V: Wireless and Mobile Networks.- Cache Coherency Algorithm to Optimize Bandwidth in Mobile Networks.- Connected Dominating Set based Scheduling for Publish-Subscribe Scenarios in WSN.- Ubiquitous Compaction Monitoring Interface for Soil compactor – A Web Based Approach.