Buch, Englisch, 517 Seiten, Previously published in hardcover, Format (B × H): 193 mm x 260 mm, Gewicht: 1105 g
Buch, Englisch, 517 Seiten, Previously published in hardcover, Format (B × H): 193 mm x 260 mm, Gewicht: 1105 g
ISBN: 978-94-007-9658-4
Verlag: Springer Netherlands
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
IP Application Test Framework.- Cross-Layer Based Approach to Detect Idle Channels and Allocate Them Efficiently Using Markov Models.- Threshold Based Call Admission Control for QoS Provisioning in Cellular Wireless Networks with Spectrum Renting.- Ontology-Based Web Application Testing.- Preventing the “Worst Case Scenario:” Combating the Lost Laptop Epidemic with RFID Technology.- Information Security and System Development.- A Survey of Wireless Sensor Network Interconnection to External Networks.- Comparing the Performance of UMTS and Mobile WiMAX Convolutional Turbo Code.- Performance of Interleaved Cipher Block Chaining in CCMP.- Localization and Frequency of Packet Retransmission as Criteria for Successful Message Propagation in Vehicular Ad Hoc Networks.- Authentication Information Alignment for Cross-Domain Federations.- Formally Specifying Linux Protection.- Path Failure Effects on Video Quality in Multihomed Environments.- Reconfigurable Implementation of Karatsuba Multiplier for Galois Field in Elliptic Curves.- Nonlinear Congestion Control Scheme for Time Delayed Differentiated-Services Networks.- Effect of Packet Size and Channel Capacity on the performance of EADARP Routing Protocol for Multicast Wireless ad hoc Networks.- Improving BGP Convergence Time via MRAI Timer.- Error Reduction using TCP with Selective Acknowledgement and HTTP with Page Response Time over Wireless Link.- Enhanced Reconfigurability for MIMO Systems using Parametric Arrays.- Modified LEACH – Energy Efficient Wireless Networks Communication.- Intrusion Detection and Classification of Attacks in High-Level Network Protocols Using Recurrent Neural Networks.- Automatic Construction and Optimization of Layered Network Attack Graph.- Parallel Data Transmission: A ProposedMultilayered Reference Model.- Besides Tracking – Simulation of RFID Marketing and Beyond.- Light Path Provisioning using Connection Holding Time and Flexible Window.- Distributed Hybrid Research Network Operations Framework.- Performance of the Duo-Binary Turbo Codes in WiMAX Systems.- A unified event reporting solution for wireless sensor networks.- A Low Computational Complexity Multiple Description Image Coding Algorithm Based on JPEG Standard.- A General Method for Synthesis of Uniform Sequences with Perfect Periodic Autocorrelation.- Using Support Vector Machines for Passive Steady State RF Fingerprinting.- Genetic Optimization for Optimum 3G Network Planning: an Agent-Based Parallel Implementation.- A Survey about IEEE 802.11e for better QoS in WLANs.- Method of a Signal Analysis for Imitation Modeling in a Real-Time Network.- Simple yet efficient NMEA sentence generator for testing GPS reception firmware and hardware.- Game Theoretic Approach for Discovering Vulnerable Links in Complex Networks.- Modeling Trust in Wireless Ad-Hoc Networks.- Address Management in MANETs Using an Ant Colony Metaphor.- Elitism Between Populations for the Improvement of the Fitness of a Genetic Algorithm Solution.- Adaptive Genetic Algorithm for Neural Network Retraining.- A New Collaborative Approach for Intrusion Detection System on Wireless Sensor Networks.- A Dynamic Scheme for Authenticated Group Key Agreement Protocol.- Performance Evaluation of TCP Congestion Control Mechanisms.- Optimization and Job Scheduling in Heterogeneous Networks.- A New Methodology for Self Localization in Wireless Sensor Networks.- A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET).- A New Analytical Model for Maximizing the Capacity andMinimizing the Transmission Delay for MANET.- Faulty Links Optimization for Hypercube Networks via Stored and Forward One-Bit Round Robin Routing Algorithm.- Improving the Data Rate in Wireless Mesh Networks Using Orthogonal Frequency Code Division (OFCD).- A Novel Encrypted Database Technique to Develop a Secure Application for an Academic Institution.- A Mathematical Model for Reducing Handover Time at MAC Layer for Wireless Networks.- A Software Solution for Mobile Context Handoff in WLANs *.- Robust Transmission of Video Stream over Fading Channels.- An Attack Classification Tool Based On Traffic Properties and Machine Learning.- Browser based Communications Integration using Representational State Transfer.- Security Aspects of Internet based Voting.- Middleware-based distributed heterogeneous simulation.- Analysis of the flooding search algorithm with OPNET.- Efficient Self-Localization and Data Gathering Architecture for Wireless Sensor Networks.- Two Cross-Coupled H? Filters for Fading Channel Estimation in OFDM Systems.- An Architecture for Wireless Intrusion Detection Systems Using Artificial Neural Networks.- A highly parallel scheduling model for IT change management.- Design and Implementation of a Multi-sensor Mobile Platform.- Methods based on fuzzy sets to solve problems of Safe Ship control.- Network Topology Impact on Influence Spreading.- An Adaptive Combiner-Equalizer for Multiple-Input Receivers.- KSAm – An Improved RC4 Key-Scheduling Algorithm for Securing WEP.- Ubiquitous Media Communication Algorithms.- Balancing Streaming and Demand Accesses in a Network Based Storage Environment.- An Energy and Distance Based Clustering Protocol for Wireless Sensor Networks.- Encoding Forensic Multimedia Evidence from MARF Applications as Forensic LucidExpressions.- Distributed Modular Audio Recognition Framework (DMARF) and its Applications Over Web Services.- The Authentication Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement.- Performance Evaluation of MPLS Path Restoration Schemes using OMNET++.- FM Transmitter System for Telemetrized Temperature Sensing Project.- Enhancing Sensor Network Security with RSL Codes.- The Integrity Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement.- A Multi-layer GSM Network Design Model.- Performance Analysis of Multi Carrier CDMA and DSCDMA on the basis of different users and Modulation scheme.- Scalability Analysis of a Model for GSM Mobile Network Design.- Location Management in 4G Wireless Heterogeneous Networks using Mobile Data Mining Techniques.- A new clustered Directed Diffusion Algorithm based on credit of nodes for wireless sensor networks.- Multiview Media Transmission Algorithm for Next Generation Networks.- A 4 GHz Clock Synchronized Non Coherent Energy Collection UWB Transceiver.- Comparison of Cascaded LMS-RLS, LMS and RLS Adaptive Filters in Non-Stationary Environments.- Data Mining Based Network Intrusion Detection System: A Survey.- VDisaster recovery with the help of real time video streaming using MANET support.