Sold Out
Book Categories |
Self-organizing wireless sensor networks in action | 1 | |
The Internet control architecture : successes and challenges | 2 | |
Distributed localization refinements for mobile sensor networks | 3 | |
Cooperative target localization method for heterogeneous sensor networks | 13 | |
Sensor network configuration under physical attacks | 23 | |
TPSS : a time-based positioning scheme for sensor networks with short range beacons | 33 | |
Energy-efficient connected coverage of discrete targets in wireless sensor networks | 43 | |
Coverage algorithm and protocol in heterogeneous sensor networks | 53 | |
Simplified message transformation for optimization of message processing in 3G-324M control protocol | 64 | |
Dynamic packet scheduling based on utility optimization in OFDM networks | 74 | |
Comb-pattern optimal pilot in MIMO-OFDM system | 84 | |
Channel-adaptive GPS scheduling for heterogeneous multimedia in CDMA networks | 93 | |
An adaptive scheduled transmission strategy for multimedia services in WCDMA systems | 102 | |
Semantic Web enabled VHE for 3rd generation telecommunications | 113 | |
An adaptive replication algorithm in overlay networking | 123 | |
Performance modeling of mobile peer-to-peer systems | 133 | |
A random walk based anonymous peer-to-peer protocol design | 143 | |
A system for power-aware agent-based intrusion detection (SPAID) in wireless ad hoc networks | 153 | |
BSMON : bandwidth-satisfied multicast in overlay network for large-scale live media applications | 163 | |
A routing and wavelength assignment algorithms based on the state level of links | 173 | |
Cooperative determination on cache replacement candidates for transcoding proxy caching | 178 | |
High performance embedded route lookup coprocessor for network processors | 188 | |
An efficient distributed dynamic multicast routing with delay and delay variation constraints | 198 | |
Data caching in selfish MANETs | 208 | |
Optimal scheduling for link assignment in traffic-sensitive STDMA wireless ad-hoc networks | 218 | |
Modeling and performance evaluation of handover service in wireless networks | 229 | |
The optimum parameter design for WCDMA intra-frequency handover initiation | 239 | |
A new location management scheme for the next-generation mobile cellular networks | 249 | |
Rapid mobility of mobile IP over WLAN | 259 | |
Least cost multicast spanning tree algorithm for local computer network | 268 | |
A new multicast group management scheme for IP mobility support | 276 | |
On the minimization of the number of forwarding nodes for multicast in wireless ad hoc networks | 286 | |
The impact of mobility modeling in mobile IP multicast research | 295 | |
Broadcast in the locally k-subcube-connected hypercube networks with faulty tolerance | 305 | |
Performance analysis of route discovery in wireless ad hoc networks : a unified model | 314 | |
A load-balancing control method considering energy consumption rate in ad-hoc networks | 324 | |
Efficient node forwarding strategies via non-cooperative game for wireless ad hoc networks | 334 | |
A cluster-based group rekeying algorithm in mobile ad hoc networks | 344 | |
Enhanced positioning probability system for wireless ad hoc networks | 354 | |
A virtual circle-based clustering algorithm with mobility prediction in large-scale MANETs | 364 | |
Mobility-aware on-demand global hosts for ad-hoc multicast | 375 | |
Bottom up algorithm to identify link-level transition probability | 385 | |
An extended GI[superscript X]/M/1/N queueing model for evaluating the performance of AQM algorithms with aggregate traffic | 395 | |
Fair and smooth scheduling for virtual output queuing switches achieving 100% throughput | 405 | |
Detour path optimization algorithm based on traffic duration time in MPLS network | 414 | |
HAWK : halting anomalies with weighted choking to rescue well-behaved TCP sessions from shrew DDoS attacks | 423 | |
Improved thumbprint and its application for intrusion detection | 433 | |
Performance enhancement of wireless cipher communication | 443 | |
SAS : a scalar anonymous communication system | 452 | |
Two new fast methods for simultaneous scalar multiplication in elliptic curve cryptosystems | 462 | |
Network-based anomaly detection using an Elman network | 471 | |
On mitigating network partitioning in peer-to-peer massively multiplayer games | 481 | |
P2P-based software engineering management | 491 | |
A computational reputation model in P2P networks based on trust and distrust | 501 | |
Web services peer-to-peer discovery service for automated Web service composition | 509 | |
Efficient mining of cross-transaction Web usage patterns in large database | 519 | |
Delay-constrained multicasting with power-control in wireless networks | 529 | |
Distributed hierarchical access control for secure group communications | 539 | |
Hierarchical multicast tree algorithms for application layer mesh networks | 549 | |
A novel dual-key management protocol based on a hierarchical multicast infrastructure in mobile Internet | 560 | |
Interdomain traffic control over multiple links based on genetic algorithm | 570 | |
Congestion management of IP traffic using adaptive exponential RED | 580 | |
An analysis and evaluation of policy-based network management approaches | 590 | |
An end-to-end QoS provisioning architecture in IPv6 networks | 600 | |
Introducing public E-mail gateways : an effective hardening strategy against spam | 610 | |
A protection tree schemes for first-failure protection and second-failure restoration in optical networks | 620 | |
Distributed dynamic resource management for the AF traffic of the differentiated services networks | 632 | |
Constructing correlations of perturbed connections under packets loss and disorder | 642 | |
An enhanced packet scheduling algorithm for QoS support in IEEE 802.16 wireless network | 652 | |
A novel core stateless virtual clock scheduling algorithm | 662 | |
Proportional differentiated services for end-to-end traffic control | 672 | |
Probability based dynamic load-balancing tree algorithm for wireless sensor networks | 682 | |
A prediction-based location updated algorithm in wireless mobile ad-hoc networks | 692 | |
Combining power management and power control in multihop IEEE 802.11 ad hoc networks | 702 | |
Minimum disc cover set construction in mobile ad hoc networks | 712 | |
A study on dynamic load balanced routing techniques in time-slotted optical burst switched networks | 722 | |
A novel multi-path routing protocol | 732 | |
A simplified routing and simulating scheme for the LEO/MEO two-layered satellite network | 742 | |
ARS : an synchronization algorithm maintaining single image among nodes' forwarding tables of clustered router | 752 | |
Design and implementation of control-extensible router | 762 | |
Dependable propagating routing information in MANET | 772 | |
Data structure optimization of ASöPATH in BGP | 781 | |
A framework for designing adaptive AQM schemes | 789 | |
Designing adaptive PI algorithm based on single neuron | 800 | |
An optimal componet distribution algorithm based on MINLP | 808 | |
An efficient anomaly detection algorithm for vector-based intrusion detection systems | 817 | |
Applying mining fuzzy association rules to intrusion detection based on sequences of system calls | 826 | |
A novel and secure non-designated proxy signature scheme for mobile agents | 836 | |
Identity based conference key distribution scheme from parings | 845 | |
Some remarks on universal re-encryption and a novel practical anonymous tunnel | 853 | |
An integrated information retrieval support system for multiple distributed heterogeneous cross-lingual information sources | 863 | |
DHAI : dynamic, hierarchical, agent-based infrastructure for supporting large-scale distributed information processing | 873 | |
Server-assisted bandwidth negotiation mechanism for parallel segment retrieval of Web objects | 883 | |
Multiple schema based XML indexing | 891 | |
A linked-list data structure for advance reservation admission control | 901 | |
An adaptive gateway discovery algorithm for the integrated network of Internet and MANET | 911 | |
A sender-oriented back-track enabled resource reservation scheme | 921 | |
Available bandwidth measurement schemes over networks | 931 | |
Chaotic dynamic analysis of MPEG-4 video traffic and its influence on packet loss ratio | 941 | |
A simple streaming media transport protocols based on IPv6 QoS mechanism | 951 | |
An aided congestion avoidance mechanism for TCP vegas | 961 | |
On the design of probably secure identity-based authentication and key exchange protocol for heterogeneous wireless access | 972 | |
Efficient identity base proxy-signcryption schemes with forward security and public verifiability | 982 | |
PKM : a pairwise key management scheme for wireless sensor networks | 992 | |
Secure group instant messaging using cryptographic primitives | 1002 | |
A privacy enhanced role-based access control model for enterprises | 1012 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionNetworking and mobile computing
X
This Item is in Your InventoryNetworking and mobile computing
X
You must be logged in to review the productsX
X
X
Add Networking and mobile computing, This book constitutes the refereed proceedings of the 3rd International Conference on Computer Network and Mobile Computing held in Zhangjiajie, China, in August 2005. The 133 revised full papers and 2 keynote articles presented were carefully reviewed, Networking and mobile computing to the inventory that you are selling on WonderClubX
X
Add Networking and mobile computing, This book constitutes the refereed proceedings of the 3rd International Conference on Computer Network and Mobile Computing held in Zhangjiajie, China, in August 2005. The 133 revised full papers and 2 keynote articles presented were carefully reviewed, Networking and mobile computing to your collection on WonderClub |