Computer Networks and Distributed Systems: International by Amir Hossein Jahangir, Ali Movaghar, Hossein Asadi
By Amir Hossein Jahangir, Ali Movaghar, Hossein Asadi
This publication constitutes the refereed lawsuits of the foreign Symposium on laptop Networks and disbursed platforms, CNDS 2013, held in Tehran, Iran, in December 2013. The 14 complete papers awarded have been conscientiously reviewed and chosen from quite a few submissions. they're equipped in topical sections similar to cognitive and multimedia networks; instant sensor networks; defense; clouds and grids.
Read Online or Download Computer Networks and Distributed Systems: International Symposium, CNDS 2013, Tehran, Iran, December 25-26, 2013, Revised Selected Papers PDF
Best networks books
Entire options for laptop Networks (4th version) by means of Andrew Tanenbaum.
This e-book and its sister quantity acquire refereed papers offered on the seventh Inter- tional Symposium on Neural Networks (ISNN 2010), held in Shanghai, China, June 6-9, 2010. development at the good fortune of the former six successive ISNN symposiums, ISNN has develop into a well-established sequence of renowned and fine quality meetings on neural computation and its functions.
Advances in networking impact many sorts of tracking and regulate structures within the so much dramatic method. Sensor community and configuration falls below the class of contemporary networking platforms. instant Sensor community (WSN) has emerged and caters to the necessity for real-world purposes. technique and layout of WSN represents a large study subject with functions in lots of sectors resembling undefined, domestic, computing, agriculture, surroundings, and so forth, in response to the adoption of basic rules and the state of the art expertise.
- [(The Role of Labour Mobility and Informal Networks for Knowledge Transfer )] [Author: Dirk Fornahl] [Jan-2005]
- Packet Guide to Voice Over IP: A system administrator's guide to VoIP technologies
- Optical Fiber Telecommunications. Volume VIB: Systems and Networks
- Polymer Alloys: Blends, Blocks, Grafts, and Interpenetrating Networks
Additional info for Computer Networks and Distributed Systems: International Symposium, CNDS 2013, Tehran, Iran, December 25-26, 2013, Revised Selected Papers
Authentication procedure in GBA and sends information from one network’s entity to another which can be done in different forms. We also designed a scenario that led to an impersonation attack. There can be some other scenarios resulting in severe information leakage which in turn causes other forms of attacks. Therefore, in order for the information leakage to be prevented, some prevention methods should be considered. References 1. 3GPP, Overview of 3GPP Release 5 - Summary of all Release 5 Features.
Netw. (TON) 20, 1054–1067 (2012) 16. : Generic prediction assisted single-copy routing in underwater delay tolerant sensor networks. Ad Hoc Netw. 11, 1136–1149 (2013) 17. : Maximizing the lifetime of wireless sensor networks with mobile sink in delay-tolerant applications. IEEE Trans. Mob. Comput. 9, 1308–1318 (2010) 18. : Energy-efﬁcient communication protocol for wireless microsensor networks. In: 33rd Annual Hawaii International Conference on System Sciences, pp. 1–10. IEEE Press, New York (2000) 19.
Grid-based energy-efﬁcient routing from multiple sources to multiple mobile sinks in wireless sensor networks. In: 4th International Symposium on Wireless Pervasive Computing, pp. 1–5. IEEE Press, New York (2009) 8. : Efﬁcient integer programming formulations for optimum sink location and routing in heterogeneous wireless sensor networks. Comput. Netw. 54, 1805–1822 (2010) 9. : Data gathering protocols for wireless sensor networks with mobile sinks. In: Global Telecommunications Conference(GLOBECOM), pp.