Muutke küpsiste eelistusi

E-raamat: Recent Trends in Wireless and Mobile Networks: Third International Conferences, WiMo 2011 and CoNeCo 2011, Ankara, Turkey, June 26-28, 2011. Proceedings

Edited by , Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 110,53 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the refereed proceedings of the Third International Conference on Wireless, Mobile Networks, WiMo 2011, and of The Third International Conference on Computer Networks and Communications, CoNeCo 2011, held in Ankara, Turkey, in June 2011. The 40 revised full papers presented were carefully reviewed and selected from 202 submissions.
The Third International Conference on Wireless and Mobile Networks (WiMo-2011)
A Survey of Reinforcement Learning Based Routing Protocols for Mobile Ad-Hoc Networks
1(13)
Saloua Chettibi
Salim Chikhi
Detection of Denial of Service Attack Due to Selfish Node in MANET by Mobile Agent
14(10)
Debdutta Barman Roy
Rituparna Chaki
A Novel Power-Balancing Routing Scheme for WSN
24(11)
Ayan Kumar Das
Rituparna Chaki
SRCHS - A Stable Reliable Cluster Head Selection Protocol
35(10)
Ditipriya Sinha
Rituparna Chaki
Handover Latency Reduction Using Integrated Solution Scheme for Proxy Mobile IPv6
45(12)
Md. Mahedi Hassan
Kuan Hoong Poo
Modeling and Simulation Analysis of QPSK System with Channel Coding
57(8)
T.P. Surekha
T. Ananthapadmanabha
C. Puttamadappa
A.P. Suma
Combating Sybil Attacks in Vehicular Ad Hoc Networks
65(8)
Khaled Mohamed Rabieh
Marianne Amir Azer
TCSAP: A New Secure and Robust Modified MANETconf Protocol
73(10)
Abdelhafid Abdelrnalek
Zohra Slimane
Mohamed Feham
Abdelmalik Taleb-Ahrned
Highly Resilient Communication Using Affine Planes for Key Predistribution and Reed Muller Codes for Connectivity in Wireless Sensor Network
83(12)
Samiran Bag
Amrita Saha
Pinaki Sarkar
A Cyclic-Translation-Based Grid-Quadtree Index for Continuous Range Queries over Moving Objects
95(15)
Hao Chen
Guangcun Luo
Aiguo Chen
Ke Qin
Caihui Qu
Two-Stage Clustering with k-Meaus Algorithm
110(13)
Raied Salman
Vojislav Kecman
Qi Li
Robert Strack
Erick Test
An Energy and Delay-Aware Routing Protocol for Mobile Ad-Hoc Networks
123(12)
Jihen Drira Rekik
Leila Baccouche
Henda Ben Ghezala
Energy-Aware Transmission Scheme for Wireless Sensor Networks
135(10)
Abdullahi Ibrahim Abdu
Muhammed Salamah
PRWSN: A Hybrid Routing Algorithm with Special Parameters in Wireless Sensor Network
145(14)
Arash Ghorbannia Delavar
Javad Artin
Mohammad Mahdi Tajari
Cone Tessellation Model for Three-Dimensional Networks
159(11)
Gozde Sarisin
Muhammed Salamah
Post Disaster Management Using Delay Tolerant Network
170(15)
Sujoy Saha
Sushovan
Anirudh Sheldekar
Rijo Joseph C.
Amartya Mukherjee
Subrata Nandi
The Performance Comparison between Hybrid and Conventional Beamforming Receivers in a Multipath Channel
185(12)
Rim Haddad
Ridha Bouallegue
A Qualitative Survey on Multicast Routing in Delay Tolerant Networks
197(10)
Sushovan Patra
Sujoy Saha
Vijay Shah
Satadal Sengupta
Konsam Gojendra Singh
Subrata Nandi
The Third International Conference on Computer Networks and Communications (CoNeCo-2011)
Integrating RFID Technology in Internet Applications
207(10)
Simon Fong
BPSO Algorithms for Knapsack Problem
217(11)
Amira Gherboudj
Salim Chikhi
Systematic Selection of CRC Generator Polynomials to Detect Double Bit Errors in Ethernet Networks
228(8)
Behrouz Zolfaghari
Hamed Sheidaeian
Saadat Pour Mozafari
Security Analysis of Ultra-lightweight Protocol for Low-Cost RFID Tags: SSL-MAP
236(10)
Mehrdad Kianersi
Mahmoud Gardeshi
Hamed Yousefi
File Distribution Algorithm from Multiple Road Side Units in Vehicular Networks
246(10)
Saleh Yousefi
Amin Amini Maleki
Reza Hashemi
SMART-IP: A Multi-Agent System for Network Analysis and IP Addressing Resolution
256(10)
Samia Boucherkha
Mohamed Nadjib Djeghri
Adaptive QoS Resource Management by Using Hierarchical Distributed Classification for Future Generation Networks
266(13)
Simon Fong
0.18um CMOS Technology in Implementation of S Box and a Modified S Box
279(9)
K. Rahimunnisa
K. Rajeshkumar
S. Sureshkumar
A Survey of Middleware for Internet of Things
288(9)
Soma Bandyopadhyay
Munmun Sengupta
Souvik Maiti
Subhajit Dutta
New Framework for Dynamic: Policy Management in Grid Environments
297(8)
Tariq Alwada'n
Helge Janicke
Omer Aldabbas
Hamza Aldabbas
Zone Based Seamless Vertical Haudoff Technique between WiFi and WiMax
305(10)
Abhijit Sarma
Sukumar Nandi
The Third International Workshop on Grid Computing (GridCom-2011)
A Cluster-Based Dynamic Load Balancing Protocol for Grids
315(10)
Res Umit Payli
Kayhan Erciyes
Orhan Dagdeviren
A P2P Based Scheduler for Home Grids
325(12)
Erick Lopes da Silva
Peter Linington
A Multi-Agent System-Based Resource Advertisement Model for Grid Environments
337(11)
Muntasir Al-Asfoor
Maria Fasli
Salah Al-Majeed
Grid-Enabled Framework for Large-Scale Aualysis of Gene-Gene Interactions
348(10)
Moez Ben Haj Hmida
Yahya Slimani
A Context-Based Cyber Foraging Approach to Mobile Computing Empowerment
358(10)
Somayeh Kafaie
Omid Kashefi
Molisen Sharifi
Model Driven Prototyping with Modelibra
368(10)
Dzenan Ridjanovic
The Second International Workshop on Communications Security and Information Assurance (CSIA 2011)
An Implementation of Axml(T): An Answer Set Programming Based Formal Language of Authorisation for XML Documents
378(10)
Sean Policarpio
Yun Bai
On Cloud Computing Security
388(9)
Yun Bai
Sean Policarpio
PAPR Reduction in OFDM by Using Modernize SLM Technique
397(9)
Ashutosh K. Dubey
Yogeshver Khandagre
Ganesh Raj Kushwaha
Khushboo Hemnani
Ruby Tiwari
Nishant Shrivastava
Application of Integrated Decision Support Model in Tendering
406(8)
Fadhilah Ahmad
M. Yazid
M. Saman
Query and Update Support for Indexed and Compressed XML (QUICX)
414(15)
Radha Senthilkumar
A. Kannan
Author Index 429