Computer Networks and Distributed Systems: International by Amir Hossein Jahangir, Ali Movaghar, Hossein Asadi

By Amir Hossein Jahangir, Ali Movaghar, Hossein Asadi

This publication constitutes the refereed lawsuits of the foreign Symposium on laptop Networks and disbursed platforms, CNDS 2013, held in Tehran, Iran, in December 2013. The 14 complete papers awarded have been conscientiously reviewed and chosen from quite a few submissions. they're equipped in topical sections similar to cognitive and multimedia networks; instant sensor networks; defense; clouds and grids.

Show description

Read Online or Download Computer Networks and Distributed Systems: International Symposium, CNDS 2013, Tehran, Iran, December 25-26, 2013, Revised Selected Papers PDF

Best networks books

Computer Networks (4th Edition) - Problem Solutions

Entire options for laptop Networks (4th version) by means of Andrew Tanenbaum.

Advances in Neural Networks - ISNN 2010: 7th International Symposium on Neural Networks, ISNN 2010, Shanghai, China, June 6-9, 2010, Proceedings, Part I

This e-book and its sister quantity acquire refereed papers offered on the seventh Inter- tional Symposium on Neural Networks (ISNN 2010), held in Shanghai, China, June 6-9, 2010. development at the good fortune of the former six successive ISNN symposiums, ISNN has develop into a well-established sequence of renowned and fine quality meetings on neural computation and its functions.

Sensor Networks and Configuration: Fundamentals, Standards, Platforms, and Applications

Advances in networking impact many sorts of tracking and regulate structures within the so much dramatic method. Sensor community and configuration falls below the class of contemporary networking platforms. instant Sensor community (WSN) has emerged and caters to the necessity for real-world purposes. technique and layout of WSN represents a large study subject with functions in lots of sectors resembling undefined, domestic, computing, agriculture, surroundings, and so forth, in response to the adoption of basic rules and the state of the art expertise.

Additional info for Computer Networks and Distributed Systems: International Symposium, CNDS 2013, Tehran, Iran, December 25-26, 2013, Revised Selected Papers

Sample text

Authentication procedure in GBA and sends information from one network’s entity to another which can be done in different forms. We also designed a scenario that led to an impersonation attack. There can be some other scenarios resulting in severe information leakage which in turn causes other forms of attacks. Therefore, in order for the information leakage to be prevented, some prevention methods should be considered. References 1. 3GPP, Overview of 3GPP Release 5 - Summary of all Release 5 Features.

Netw. (TON) 20, 1054–1067 (2012) 16. : Generic prediction assisted single-copy routing in underwater delay tolerant sensor networks. Ad Hoc Netw. 11, 1136–1149 (2013) 17. : Maximizing the lifetime of wireless sensor networks with mobile sink in delay-tolerant applications. IEEE Trans. Mob. Comput. 9, 1308–1318 (2010) 18. : Energy-efficient communication protocol for wireless microsensor networks. In: 33rd Annual Hawaii International Conference on System Sciences, pp. 1–10. IEEE Press, New York (2000) 19.

Grid-based energy-efficient routing from multiple sources to multiple mobile sinks in wireless sensor networks. In: 4th International Symposium on Wireless Pervasive Computing, pp. 1–5. IEEE Press, New York (2009) 8. : Efficient integer programming formulations for optimum sink location and routing in heterogeneous wireless sensor networks. Comput. Netw. 54, 1805–1822 (2010) 9. : Data gathering protocols for wireless sensor networks with mobile sinks. In: Global Telecommunications Conference(GLOBECOM), pp.

Download PDF sample

Rated 4.54 of 5 – based on 15 votes