Novel Algorithms and Techniques in Telecommunications and Networking /

Detalles Bibliográficos
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Sobh, Tarek. (Editor ), Elleithy, Khaled. (Editor ), Mahmood, Ausif. (Editor )
Formato: eBook
Lenguaje:English
Publicado: Dordrecht : Springer Netherlands : Imprint: Springer, 2010.
Edición:1st ed. 2010.
Materias:
LEADER 08009nam a22003255i 4500
001 000290662
005 20210922132550.0
007 cr nn 008mamaa
008 100715s2010 ne | s |||| 0|eng d
020 |a 9789048136629 
024 7 |a 10.1007/978-90-481-3662-9  |2 doi 
040 |a Sistema de Bibliotecas del Tecnológico de Costa Rica 
245 1 0 |a Novel Algorithms and Techniques in Telecommunications and Networking /  |c edited by Tarek Sobh, Khaled Elleithy, Ausif Mahmood. 
250 |a 1st ed. 2010. 
260 # # |a Dordrecht :  |b Springer Netherlands :  |b Imprint: Springer,  |c 2010. 
300 |a XII, 517 p. :  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a IP Application Test Framework -- Cross-Layer Based Approach to Detect Idle Channels and Allocate Them Efficiently Using Markov Models -- Threshold Based Call Admission Control for QoS Provisioning in Cellular Wireless Networks with Spectrum Renting -- Ontology-Based Web Application Testing -- Preventing the “Worst Case Scenario:” Combating the Lost Laptop Epidemic with RFID Technology -- Information Security and System Development -- A Survey of Wireless Sensor Network Interconnection to External Networks -- Comparing the Performance of UMTS and Mobile WiMAX Convolutional Turbo Code -- Performance of Interleaved Cipher Block Chaining in CCMP -- Localization and Frequency of Packet Retransmission as Criteria for Successful Message Propagation in Vehicular Ad Hoc Networks -- Authentication Information Alignment for Cross-Domain Federations -- Formally Specifying Linux Protection -- Path Failure Effects on Video Quality in Multihomed Environments -- Reconfigurable Implementation of Karatsuba Multiplier for Galois Field in Elliptic Curves -- Nonlinear Congestion Control Scheme for Time Delayed Differentiated-Services Networks -- Effect of Packet Size and Channel Capacity on the performance of EADARP Routing Protocol for Multicast Wireless ad hoc Networks -- Improving BGP Convergence Time via MRAI Timer -- Error Reduction using TCP with Selective Acknowledgement and HTTP with Page Response Time over Wireless Link -- Enhanced Reconfigurability for MIMO Systems using Parametric Arrays -- Modified LEACH – Energy Efficient Wireless Networks Communication -- Intrusion Detection and Classification of Attacks in High-Level Network Protocols Using Recurrent Neural Networks -- Automatic Construction and Optimization of Layered Network Attack Graph -- Parallel Data Transmission: A Proposed Multilayered Reference Model -- Besides Tracking – Simulation of RFID Marketing and Beyond -- Light Path Provisioning using Connection Holding Time and Flexible Window -- Distributed Hybrid Research Network Operations Framework -- Performance of the Duo-Binary Turbo Codes in WiMAX Systems -- A unified event reporting solution for wireless sensor networks -- A Low Computational Complexity Multiple Description Image Coding Algorithm Based on JPEG Standard -- A General Method for Synthesis of Uniform Sequences with Perfect Periodic Autocorrelation -- Using Support Vector Machines for Passive Steady State RF Fingerprinting -- Genetic Optimization for Optimum 3G Network Planning: an Agent-Based Parallel Implementation -- A Survey about IEEE 802.11e for better QoS in WLANs -- Method of a Signal Analysis for Imitation Modeling in a Real-Time Network -- Simple yet efficient NMEA sentence generator for testing GPS reception firmware and hardware. -- Game Theoretic Approach for Discovering Vulnerable Links in Complex Networks -- Modeling Trust in Wireless Ad-Hoc Networks -- Address Management in MANETs Using an Ant Colony Metaphor -- Elitism Between Populations for the Improvement of the Fitness of a Genetic Algorithm Solution -- Adaptive Genetic Algorithm for Neural Network Retraining -- A New Collaborative Approach for Intrusion Detection System on Wireless Sensor Networks -- A Dynamic Scheme for Authenticated Group Key Agreement Protocol -- Performance Evaluation of TCP Congestion Control Mechanisms -- Optimization and Job Scheduling in Heterogeneous Networks -- A New Methodology for Self Localization in Wireless Sensor Networks -- A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET) -- A New Analytical Model for Maximizing the Capacity and Minimizing the Transmission Delay for MANET -- Faulty Links Optimization for Hypercube Networks via Stored and Forward One-Bit Round Robin Routing Algorithm -- Improving the Data Rate in Wireless Mesh Networks Using Orthogonal Frequency Code Division (OFCD) -- A Novel Encrypted Database Technique to Develop a Secure Application for an Academic Institution -- A Mathematical Model for Reducing Handover Time at MAC Layer for Wireless Networks -- A Software Solution for Mobile Context Handoff in WLANs * -- Robust Transmission of Video Stream over Fading Channels -- An Attack Classification Tool Based On Traffic Properties and Machine Learning -- Browser based Communications Integration using Representational State Transfer -- Security Aspects of Internet based Voting -- Middleware-based distributed heterogeneous simulation -- Analysis of the flooding search algorithm with OPNET -- Efficient Self-Localization and Data Gathering Architecture for Wireless Sensor Networks -- Two Cross-Coupled H? Filters for Fading Channel Estimation in OFDM Systems -- An Architecture for Wireless Intrusion Detection Systems Using Artificial Neural Networks -- A highly parallel scheduling model for IT change management -- Design and Implementation of a Multi-sensor Mobile Platform -- Methods based on fuzzy sets to solve problems of Safe Ship control -- Network Topology Impact on Influence Spreading -- An Adaptive Combiner-Equalizer for Multiple-Input Receivers -- KSAm – An Improved RC4 Key-Scheduling Algorithm for Securing WEP -- Ubiquitous Media Communication Algorithms -- Balancing Streaming and Demand Accesses in a Network Based Storage Environment -- An Energy and Distance Based Clustering Protocol for Wireless Sensor Networks -- Encoding Forensic Multimedia Evidence from MARF Applications as Forensic Lucid Expressions -- Distributed Modular Audio Recognition Framework (DMARF) and its Applications Over Web Services -- The Authentication Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement -- Performance Evaluation of MPLS Path Restoration Schemes using OMNET++ -- FM Transmitter System for Telemetrized Temperature Sensing Project -- Enhancing Sensor Network Security with RSL Codes -- The Integrity Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement -- A Multi-layer GSM Network Design Model -- Performance Analysis of Multi Carrier CDMA and DSCDMA on the basis of different users and Modulation scheme -- Scalability Analysis of a Model for GSM Mobile Network Design -- Location Management in 4G Wireless Heterogeneous Networks using Mobile Data Mining Techniques -- A new clustered Directed Diffusion Algorithm based on credit of nodes for wireless sensor networks -- Multiview Media Transmission Algorithm for Next Generation Networks -- A 4 GHz Clock Synchronized Non Coherent Energy Collection UWB Transceiver -- Comparison of Cascaded LMS-RLS, LMS and RLS Adaptive Filters in Non-Stationary Environments -- Data Mining Based Network Intrusion Detection System: A Survey -- VDisaster recovery with the help of real time video streaming using MANET support. 
650 0 |a Electrical engineering. 
650 0 |a Computer communication systems. 
650 1 4 |a Communications Engineering, Networks. 
650 2 4 |a Computer Communication Networks. 
700 1 |a Sobh, Tarek.  |e editor. 
700 1 |a Elleithy, Khaled.  |e editor. 
700 1 |a Mahmood, Ausif.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
900 |a Libro descargado a ALEPH en bloque (proveniente de proveedor)