Computer Networks & Communications (NetCom): Proceedings of the Fourth International Conference on Networks & Communications

Author:   Nabendu Chaki ,  Natarajan Meghanathan ,  Dhinaharan Nagamalai
Publisher:   Springer-Verlag New York Inc.
Edition:   Softcover reprint of the original 1st ed. 2013
Volume:   131
ISBN:  

9781493946037


Pages:   865
Publication Date:   23 August 2016
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $871.17 Quantity:  
Add to Cart

Share |

Computer Networks & Communications (NetCom): Proceedings of the Fourth International Conference on Networks & Communications


Add your own review!

Overview

Computer Networks & Communications (NetCom) is the proceedings from the Fourth International Conference on Networks & Communications. This book covers theory, methodology and applications of computer networks, network protocols and wireless networks, data communication technologies, and network security. The proceedings will feature peer-reviewed papers that illustrate research results, projects, surveys and industrial experiences that describe significant advances in the diverse areas of computer networks & communications.

Full Product Details

Author:   Nabendu Chaki ,  Natarajan Meghanathan ,  Dhinaharan Nagamalai
Publisher:   Springer-Verlag New York Inc.
Imprint:   Springer-Verlag New York Inc.
Edition:   Softcover reprint of the original 1st ed. 2013
Volume:   131
Dimensions:   Width: 15.50cm , Height: 4.50cm , Length: 23.50cm
Weight:   1.341kg
ISBN:  

9781493946037


ISBN 10:   149394603
Pages:   865
Publication Date:   23 August 2016
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Adhoc and Sensor Networks.- Perspectives of Sybil Attack in Routing Protocols of Mobile Ad Hoc Network.- A Jini Based Implementation for Best Leader Node Selection in MANETs.- A Novel Methodology for Securing Adhoc Network by Friendly Group Model.- Energy Efficient Medium Access Protocol for Clustered Wireless Sensor Networks.- A Design Mode of Streaming Media Transmission and Access in Wireless Video Sensor Network.- PSO-PAC: An Intelligent Clustering Mechanism in Ad hoc Network.- SEMSuS: Semantic Middleware For Dynamic Service -Oriented Sensor Network.- CO2 Gas Sensor Using Resonant Frequency changes in Micro-Cantilever.- Heterogeneous Wireless, WLAN and Mobile Networks.- A mechanism for enhanced performance of Chord DHT in mobile environment.- A Hybrid Model of CLMS and ACLMS Algorithms for Smart Antennas.- Novel Protection from Internal Attacks in Wireless Sensor Networks.- Channel-Usage Model in Underlay Cognitive Radio Networks.- Supporting LTE Networks in Heterogeneous Environment using the Y-Comm Framework.- A Call Admission Control Scheme for Cellular Network to Handle Sudden Influx in a Confined Area.- Distributed Joint Optimal Network Scheduling and Controller Design for Wireless Networks.- On the Estimation Capacity of Equal Gain Diversity Scheme Under Multi-Path Fading Channel.- Low Overhead Time Coordinated Checkpointing Algorithm for Mobile Distributed Systems.- Measurement and Performance Analysis.- Performance evaluation of TCP NewVegas and TCP Newreno on Burstification in an OBS Network.- Performance Enhancement through Optimization in FPGA Synthesis: Constraint Specific Approach.- Performance Optimization of Vehicular Ad hoc Network (VANET) using Clustering Approach.- Performance Evaluation of TCP Congestion Control variants using Ad Hoc On-Demand Distance Vector Routing.- Performance Analysis of Dynamic Source Routing for Ad-hoc Networks Using Active Packet.- Overhead Analysis of AODV, TORA and AOMDV in MANET Using Various Energy Models.- Network Architectures, Protocols and Routing Low Power and High Speed Adders in Modified Gated Diffusion Input Technique.- Guided Local Search for Optimal GPON/FTTP Network Design.- Image Segmentation Using Variable Kernel Fuzzy C Means (VKFCM) Clustering on Modified Level Set Method.- Comparison of SPIHT, Classical and Adaptive Lifting Scheme for Compression of Satellite Imageries.- Comparison of Routing Protocols - Distance Vector and Fisheye State Routing.- A Gene Expression Based Quality of Service Aware Routing Protocol for Mobile Adhoc Networks.- User Behavior and Capability Based Access Control Model and Architecture.- Congestion Adaptive Most Favorable Control Routing in Ad Hoc Networks.- An Improved Blind Channel Estimation based on Subspace Approach for OFDM Systems Under Fast Time Varying Conditions.- Adaptive Control and Synchronization Design for the Lu-Xiao Chaotic System.- Network Operations and Management.- Secure Patient Monitoring and Self-management Using Brain Expression Interpreter.- Coverage and Connectivity Guaranteed Deterministic Deployment Pattern for WSN.- Hybrid Deployment Schemes for Wireless Sensor Networks.- Adaptive Optimal Distributed Power Allocation for Enhanced Cognitive Radio Network in the Presence of Channel Uncertainties.- Secure Real Time Remote Video Monitoring System.- Fully Self-organized Key Management Scheme in MANET and Its Applications.- A Hierarchical Color Net Model for Smart Grid Security Monitoring.- Chapter 6: Network Security, Trust and Privacy.- A Comprehensive study on Two-factor Authentication with One Time Passwords.- ITRANS encoded Marathi Literature Document Relevance Ranking for Natural Language Flexible Queries.- AB-OR: Improving the efficiency in Onion Routing using Attribute Based Cryptography.- PASIC: A Novel Approach for Page-Wise Web Application Security.- Cryptanalysis of Lo et al.'s password based authentication scheme.- Intrusion Detection in Zero Knowledge System Using Model Checking Approach.- Detecting Malicious users in P2P Streaming Systems by Using Feedback Correlations.- An Efficient Dual Text Steganographic Approach: Hiding Data in a List of Words.- Secure Cryptosystem with Blind Authentication.- An Effective Technique for Intrusion Detection Using Neuro-Fuzzy and Radial SVM Classifier.- A Novel Octuple Images Encryption Algorithm Using Chaos in Wavelet Domain.- The Fourth International Workshop on Network and Communications Security (NCS 2012).- A Strong Pvss Scheme.- Secure Cosine Similarity Computation with Malicious Adversaries.- Test Suite for Intrusion Detection by Layered Conditional Random Fields Using Mobile Phones.- An Efficient Microaggregation Method for Protecting Mixed Data.- Plus/Delta (+/ ) Evaluation to Help Organizations Deliver Projects Effectively.- A Secure Routing Protocol for Manets Against Byzantine Attacks.- Analysis of different Mobility Models for Ad Hoc On-Demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol.- NIZKPDS to achieve Non-Repudiation.- An Integrated Solution for both Monitoring and Controlling for Automization using Wireless Sensor Networks:A Case Study.- A Secure Image Steganography Technique to Hide Multiple Secret Images.- Source Code Analysis of a Connection-Oriented File Reader Server Socket Program in Java and Removal of the Security Vulnerabilities.- Document Library System using RDF based inferences.- The Fourth International workshop on Wireless and Mobile Networks (WiMoNe-2012).- Spread and Erase: Efficient routing algorithm based on Anti-message Info Relay Hubs for Delay Tolerant Networks.- Novel architecture of adaptive and optimized policy based handover in MANET.- Trusted control information in the application of cold chain logistics.- PHY Layer Considerations for Real Time Multimedia Signal Transmission in Wireless Medium.- Approximate Minimum Spanning Tree for Points moving in a Euclidean Two-Dimensions Plane.- Low Complexity Speech Enhancement Algorithm for Improved Perception in Mobile Devices.- Prolonging the Lifetime of Wireless Sensor Network by Exponential Node Distribution and Ant-colony Optimization Routing.- Multimedia Traffic over MANETs: Evaluation and Performance Analysis.- Web Accessibility : Designing and Testing of Web Based Application for Persons with Disabilities.- CBADE - Hybrid Approach for Duplication detection and Elimination.- Fourth Workshop on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC - 2012).- Energy Aware Multipath Routing Protocol for Wireless Sensor Networks.- Virtual Classroom for E - Education in Rural Areas.- Unsupervised Methods On Image Database Using Cluster Mean Average Methods For Image Searching.- Impact of Fix Cluster Head Selection (FCHS) Routing Protocol for Wireless Sensors Network.- The Fourth International Workshop on Ad Hoc and Ubiquitous Computing (AUC- 2012).- Ontology Oriented Approach to Service Selection and Invocation in Complex Context Analysis.- Compression of Ecg Signals Using A Novel Discrete Wavelet Transform Algorithm for Dynamic Arrythmia Database.- Performance Analysis of ETX and ETT Routing Metrics over AODV Routing Protocol in WMNs.- Optimized CPU Frequency Scaling on Android Devices Based on Foreground Running Application.- Message Efficient Ring Leader Election in Distributed Systems.- RAW - A novel Reconfigurable Architecture design using Wireless for future generation Supercomputers.- Interference Management Analysis of Double-ABBA and ABBA Quasi-Orthogonal Space Time Code.

Reviews

Author Information

Dr. Nabendu Chaki is Head and Associate Professor of the Deptartment of CSE at the University of Calcutta, India. Dr. Natarajan Meghanathan is an Associate Professor at Jackson State University, Jackson, Mississippi, USA. Dr. Dhinaharan Nagamalai is a Network Architect & Security Expert at Wireilla Net Solutions PTY Ltd in Australia.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Shopping Cart
Your cart is empty
Shopping cart
Mailing List