Wonder Club world wonders pyramid logo
×

Networking and mobile computing Book

Networking and mobile computing
Networking and mobile computing, This book constitutes the refereed proceedings of the 3rd International Conference on Computer Network and Mobile Computing held in Zhangjiajie, China, in August 2005.
The 133 revised full papers and 2 keynote articles presented were carefully reviewed, Networking and mobile computing has a rating of 3 stars
   2 Ratings
X
Networking and mobile computing, This book constitutes the refereed proceedings of the 3rd International Conference on Computer Network and Mobile Computing held in Zhangjiajie, China, in August 2005. The 133 revised full papers and 2 keynote articles presented were carefully reviewed, Networking and mobile computing
3 out of 5 stars based on 2 reviews
5
0 %
4
0 %
3
100 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Networking and mobile computing
  • Written by author Xicheng Lu
  • Published by Berlin ; Springer, c2005., 2005
  • This book constitutes the refereed proceedings of the 3rd International Conference on Computer Network and Mobile Computing held in Zhangjiajie, China, in August 2005. The 133 revised full papers and 2 keynote articles presented were carefully reviewed
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Self-organizing wireless sensor networks in action 1
The Internet control architecture : successes and challenges 2
Distributed localization refinements for mobile sensor networks 3
Cooperative target localization method for heterogeneous sensor networks 13
Sensor network configuration under physical attacks 23
TPSS : a time-based positioning scheme for sensor networks with short range beacons 33
Energy-efficient connected coverage of discrete targets in wireless sensor networks 43
Coverage algorithm and protocol in heterogeneous sensor networks 53
Simplified message transformation for optimization of message processing in 3G-324M control protocol 64
Dynamic packet scheduling based on utility optimization in OFDM networks 74
Comb-pattern optimal pilot in MIMO-OFDM system 84
Channel-adaptive GPS scheduling for heterogeneous multimedia in CDMA networks 93
An adaptive scheduled transmission strategy for multimedia services in WCDMA systems 102
Semantic Web enabled VHE for 3rd generation telecommunications 113
An adaptive replication algorithm in overlay networking 123
Performance modeling of mobile peer-to-peer systems 133
A random walk based anonymous peer-to-peer protocol design 143
A system for power-aware agent-based intrusion detection (SPAID) in wireless ad hoc networks 153
BSMON : bandwidth-satisfied multicast in overlay network for large-scale live media applications 163
A routing and wavelength assignment algorithms based on the state level of links 173
Cooperative determination on cache replacement candidates for transcoding proxy caching 178
High performance embedded route lookup coprocessor for network processors 188
An efficient distributed dynamic multicast routing with delay and delay variation constraints 198
Data caching in selfish MANETs 208
Optimal scheduling for link assignment in traffic-sensitive STDMA wireless ad-hoc networks 218
Modeling and performance evaluation of handover service in wireless networks 229
The optimum parameter design for WCDMA intra-frequency handover initiation 239
A new location management scheme for the next-generation mobile cellular networks 249
Rapid mobility of mobile IP over WLAN 259
Least cost multicast spanning tree algorithm for local computer network 268
A new multicast group management scheme for IP mobility support 276
On the minimization of the number of forwarding nodes for multicast in wireless ad hoc networks 286
The impact of mobility modeling in mobile IP multicast research 295
Broadcast in the locally k-subcube-connected hypercube networks with faulty tolerance 305
Performance analysis of route discovery in wireless ad hoc networks : a unified model 314
A load-balancing control method considering energy consumption rate in ad-hoc networks 324
Efficient node forwarding strategies via non-cooperative game for wireless ad hoc networks 334
A cluster-based group rekeying algorithm in mobile ad hoc networks 344
Enhanced positioning probability system for wireless ad hoc networks 354
A virtual circle-based clustering algorithm with mobility prediction in large-scale MANETs 364
Mobility-aware on-demand global hosts for ad-hoc multicast 375
Bottom up algorithm to identify link-level transition probability 385
An extended GI[superscript X]/M/1/N queueing model for evaluating the performance of AQM algorithms with aggregate traffic 395
Fair and smooth scheduling for virtual output queuing switches achieving 100% throughput 405
Detour path optimization algorithm based on traffic duration time in MPLS network 414
HAWK : halting anomalies with weighted choking to rescue well-behaved TCP sessions from shrew DDoS attacks 423
Improved thumbprint and its application for intrusion detection 433
Performance enhancement of wireless cipher communication 443
SAS : a scalar anonymous communication system 452
Two new fast methods for simultaneous scalar multiplication in elliptic curve cryptosystems 462
Network-based anomaly detection using an Elman network 471
On mitigating network partitioning in peer-to-peer massively multiplayer games 481
P2P-based software engineering management 491
A computational reputation model in P2P networks based on trust and distrust 501
Web services peer-to-peer discovery service for automated Web service composition 509
Efficient mining of cross-transaction Web usage patterns in large database 519
Delay-constrained multicasting with power-control in wireless networks 529
Distributed hierarchical access control for secure group communications 539
Hierarchical multicast tree algorithms for application layer mesh networks 549
A novel dual-key management protocol based on a hierarchical multicast infrastructure in mobile Internet 560
Interdomain traffic control over multiple links based on genetic algorithm 570
Congestion management of IP traffic using adaptive exponential RED 580
An analysis and evaluation of policy-based network management approaches 590
An end-to-end QoS provisioning architecture in IPv6 networks 600
Introducing public E-mail gateways : an effective hardening strategy against spam 610
A protection tree schemes for first-failure protection and second-failure restoration in optical networks 620
Distributed dynamic resource management for the AF traffic of the differentiated services networks 632
Constructing correlations of perturbed connections under packets loss and disorder 642
An enhanced packet scheduling algorithm for QoS support in IEEE 802.16 wireless network 652
A novel core stateless virtual clock scheduling algorithm 662
Proportional differentiated services for end-to-end traffic control 672
Probability based dynamic load-balancing tree algorithm for wireless sensor networks 682
A prediction-based location updated algorithm in wireless mobile ad-hoc networks 692
Combining power management and power control in multihop IEEE 802.11 ad hoc networks 702
Minimum disc cover set construction in mobile ad hoc networks 712
A study on dynamic load balanced routing techniques in time-slotted optical burst switched networks 722
A novel multi-path routing protocol 732
A simplified routing and simulating scheme for the LEO/MEO two-layered satellite network 742
ARS : an synchronization algorithm maintaining single image among nodes' forwarding tables of clustered router 752
Design and implementation of control-extensible router 762
Dependable propagating routing information in MANET 772
Data structure optimization of ASöPATH in BGP 781
A framework for designing adaptive AQM schemes 789
Designing adaptive PI algorithm based on single neuron 800
An optimal componet distribution algorithm based on MINLP 808
An efficient anomaly detection algorithm for vector-based intrusion detection systems 817
Applying mining fuzzy association rules to intrusion detection based on sequences of system calls 826
A novel and secure non-designated proxy signature scheme for mobile agents 836
Identity based conference key distribution scheme from parings 845
Some remarks on universal re-encryption and a novel practical anonymous tunnel 853
An integrated information retrieval support system for multiple distributed heterogeneous cross-lingual information sources 863
DHAI : dynamic, hierarchical, agent-based infrastructure for supporting large-scale distributed information processing 873
Server-assisted bandwidth negotiation mechanism for parallel segment retrieval of Web objects 883
Multiple schema based XML indexing 891
A linked-list data structure for advance reservation admission control 901
An adaptive gateway discovery algorithm for the integrated network of Internet and MANET 911
A sender-oriented back-track enabled resource reservation scheme 921
Available bandwidth measurement schemes over networks 931
Chaotic dynamic analysis of MPEG-4 video traffic and its influence on packet loss ratio 941
A simple streaming media transport protocols based on IPv6 QoS mechanism 951
An aided congestion avoidance mechanism for TCP vegas 961
On the design of probably secure identity-based authentication and key exchange protocol for heterogeneous wireless access 972
Efficient identity base proxy-signcryption schemes with forward security and public verifiability 982
PKM : a pairwise key management scheme for wireless sensor networks 992
Secure group instant messaging using cryptographic primitives 1002
A privacy enhanced role-based access control model for enterprises 1012


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Networking and mobile computing, This book constitutes the refereed proceedings of the 3rd International Conference on Computer Network and Mobile Computing held in Zhangjiajie, China, in August 2005.
The 133 revised full papers and 2 keynote articles presented were carefully reviewed, Networking and mobile computing

X
WonderClub Home

This item is in your Collection

Networking and mobile computing, This book constitutes the refereed proceedings of the 3rd International Conference on Computer Network and Mobile Computing held in Zhangjiajie, China, in August 2005.
The 133 revised full papers and 2 keynote articles presented were carefully reviewed, Networking and mobile computing

Networking and mobile computing

X
WonderClub Home

This Item is in Your Inventory

Networking and mobile computing, This book constitutes the refereed proceedings of the 3rd International Conference on Computer Network and Mobile Computing held in Zhangjiajie, China, in August 2005.
The 133 revised full papers and 2 keynote articles presented were carefully reviewed, Networking and mobile computing

Networking and mobile computing

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: