Computer networks & communications (NetCom) : proceedings of the fourth International Conference on Networks & Communications /

Computer Networks & Communications (NetCom) is the proceedings from the Fourth International Conference on Networks & Communications. This book covers theory, methodology and applications of computer networks, network protocols and wireless networks, data communication technologies, and netw...

Full description

Saved in:
Bibliographic Details
Corporate Authors: International Conference on Networks and Communications Chennai, India); SpringerLink (Online service)
Group Author: Chaki, Nabendu; Meghanathan, Natarajan; Nagamalai, Dhinaharan.
Published: Springer,
Publisher Address: New York :
Publication Dates: 2013.
Literature type: eBook
Language: English
Series: Lecture notes in electrical engineering ; v. 131
Subjects:
Online Access: http://dx.doi.org/10.1007/978-1-4614-6154-8
Summary: Computer Networks & Communications (NetCom) is the proceedings from the Fourth International Conference on Networks & Communications. This book covers theory, methodology and applications of computer networks, network protocols and wireless networks, data communication technologies, and network security. The proceedings will feature peer-reviewed papers that illustrate research results, projects, surveys and industrial experiences that describe significant advances in the diverse areas of computer networks & communications.
Item Description: International conference proceedings.
Carrier Form: 1 online resource (842 p.).
Bibliography: Includes bibliographical references and index.
ISBN: 9781461461548 (electronic bk.)
1461461545 (electronic bk.)
Index Number: TK5105
CLC: TP393-532
Contents: The Fourth International Conference on Networks & Communications (NETCOM-2012): Adhoc and Sensor Networks.
Perspectives of Sybil Attack in Routing Protocols of Mobile Ad Hoc Network /
A Jini Based Implementation for Best Leader Node Selection in MANETs /
A Novel Methodology for Securing Ad Hoc Network by Friendly Group Model /
Energy Efficient Medium Access Protocol for Clustered Wireless Sensor Networks /
A Design Mode of Streaming Media Transmission and Access in Wireless Video Sensor Network /
PSO-PAC: An Intelligent Clustering Mechanism in Ad Hoc Network /
SEMSuS: Semantic Middleware for Dynamic Service-Oriented Sensor Network /
CO 2 Gas Sensor Using Resonant Frequency Changes in Micro-Cantilever /
The Fourth International Conference on Networks & Communications (NETCOM-2012): Heterogeneous Wireless, WLAN and Mobile Networks.
A Mechanism for Enhanced Performance of Chord DHT in Mobile Environment /
A Hybrid Model of CLMS and ACLMS Algorithms for Smart Antennas /
Novel Protection from Internal Attacks in Wireless Sensor Networks /
Channel-Usage Model in Underlay Cognitive Radio Networks /
Supporting LTE Networks in Heterogeneous Environment Using the Y-Comm Framework /
A Call Admission Control Scheme for Cellular Network to Handle Sudden Influx in a Confined Area /
Distributed Joint Optimal Network Scheduling and Controller Design for Wireless Networks /
On the Estimation Capacity of Equal Gain Diversity Scheme Under Multi-path Fading Channel /
Low Overhead Time Coordinated Checkpointing Algorithm for Mobile Distributed Systems /
The Fourth International Conference on Networks & Communications (NETCOM-2012): Measurement and Performance Analysis.
Performance Evaluation of TCP NewVegas and TCP Newreno on Burstification in an OBS Network /
Performance Enhancement Through Optimization in FPGA Synthesis: Constraint Specific Approach /
Performance Optimization of Vehicular Ad Hoc Network (VANET) Using Clustering Approach /
Performance Evaluation of TCP Congestion Control Variants Using Ad Hoc On-Demand Distance Vector Routing /
Performance Analysis of Dynamic Source Routing for Ad-Hoc Networks Using Active Packet /
Overhead Analysis of AODV, TORA and AOMDV in MANET Using Various Energy Models /
The Fourth International Conference on Networks & Communications (NETCOM-2012): Network Architectures, Protocols and Routing.
Low Power and High Speed Adders in Modified Gated Diffusion Input Technique /
Guided Local Search for Optimal GPON/FTTP Network Design /
Image Segmentation Using Variable Kernel Fuzzy C Means (VKFCM) Clustering on Modified Level Set Method /
Comparison of SPIHT, Classical and Adaptive Lifting Scheme for Compression of Satellite Imageries /
A Gene Expression Based Quality of Service Aware Routing Protocol for Mobile Ad Hoc Networks /
User Behavior and Capability Based Access Control Model and Architecture /
Congestion Adaptive Most Favorable Control Routing in Ad Hoc Networks /
An Improved Blind Channel Estimation Based on Subspace Approach for OFDM Systems Under Fast Time Varying Conditions /
Adaptive Control and Synchronization Design for the Lu-Xiao Chaotic System /
The Fourth International Conference on Networks & Communications (NETCOM-2012): Network Operations and Management.
Secure Patient Monitoring and Self-management Using Brain Expression Interpreter /
Coverage and Connectivity Guaranteed Deterministic Deployment Pattern for WSN /
Hybrid Deployment Schemes for Wireless Sensor Networks /
Adaptive Optimal Distributed Power Allocation for Enhanced Cognitive Radio Network in the Presence of Channel Uncertainties /
Secure Real Time Remote Video Monitoring System /
Fully Self-organized Key Management Scheme in MANET and Its Applications /
A Hierarchical Color Net Model for Smart Grid Security Monitoring /
The Fourth International Conference on Networks & Communications (NETCOM-2012): Network Security, Trust and Privacy.
A Comprehensive Study on Two-factor Authentication with One Time Passwords /
ITRANS Encoded Marathi Literature Document Relevance Ranking for Natural Language Flexible Queries /
AB-OR: Improving the Efficiency in Onion Routing Using Attribute Based Cryptography /
Pasic: A Novel Approach for Page-Wise Web Application Security /
Cryptanalysis of Lo et al.'s Password Based Authentication Scheme /
Intrusion Detection in Zero Knowledge System Using Model Checking Approach /
Detecting Malicious Users in P2P Streaming Systems by Using Feedback Correlations /
An Efficient Dual Text Steganographic Approach: Hiding Data in a List of Words /
Secure Cryptosystem with Blind Authentication /
An Effective Technique for Intrusion Detection Using Neuro-Fuzzy and Radial SVM Classifier /
A Novel Octuple Images Encryption Algorithm Using Chaos in Wavelet Domain /
Workshops: The Fourth International Workshop on Network and Communications Security (NCS 2012).
A Strong PVSS Scheme /
Secure Cosine Similarity Computation with Malicious Adversaries /
Test Suite for Intrusion Detection by Layered Conditional Random Fields Using Mobile Phones /
An Efficient Microaggregation Method for Protecting Mixed Data /
Plus/Delta (+/ ) Evaluation to Help Organizations Deliver Projects Effectively /
A Secure Routing Protocol for MANETs Against Byzantine Attacks /
Analysis of Different Mobility Models for Ad Hoc On-Demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol /
NIZKPDS to Achieve Non-repudiation /
An Integrated Solution for Both Monitoring and Controlling for Automization Using Wireless Sensor Networks: A Case Study /
A Secure Image Steganography Technique to Hide Multiple Secret Images /
Source Code Analysis of a Connection-Oriented File Reader Server Socket Program in Java and Removal of the Security Vulnerabilities /
Document Library System Using RDF Based Inferences /
Workshops: Fourth Workshop on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC - 2012).
Energy Aware Multipath Routing Protocol for Wireless Sensor Networks /
Virtual Classroom for E: Education in Rural Areas /
Unsupervised Methods on Image Database Using Cluster Mean Average Methods for Image Searching /
Impact of Fix Cluster Head Selection (FCHS) Routing Protocol for Wireless Sensors Network /
Workshops: The Fourth International Workshop on Ad Hoc and Ubiquitous Computing (AUC- 2012).
Ontology Oriented Approach to Service Selection and Invocation in Complex Context Analysis /
Compression of ECG Signals Using a Novel Discrete Wavelet Transform Algorithm for Dynamic Arrythmia Database /
Performance Analysis of ETX and ETT Routing Metrics Over AODV Routing Protocol in WMNs /
Optimized CPU Frequency Scaling on Android Devices Based on Foreground Running Application /
Message Efficient Ring Leader Election in Distributed Systems /
RAW: A Novel Reconfigurable Architecture Design Using Wireless for Future Generation Supercomputers /
Interference Management Analysis of Double-ABBA and ABBA Quasi-Orthogonal Space Time Code /