Computer Networks & Communications (NetCom) Proceedings of the Fourth International Conference on Networks & Communications

Computer Networks & Communications (NetCom) is the proceedings from the Fourth International Conference on Networks & Communications. This book covers theory, methodology and applications of computer networks, network protocols and wireless networks, data communication technologies, and netw...

Full description

Bibliographic Details
Other Authors: Chaki, Nabendu (Editor), Meghanathan, Natarajan (Editor), Nagamalai, Dhinaharan (Editor)
Format: eBook
Language:English
Published: New York, NY Springer New York 2013, 2013
Edition:1st ed. 2013
Series:Lecture Notes in Electrical Engineering
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • Overhead Analysis of AODV, TORA and AOMDV in MANET Using Various Energy Models.-Network Architectures, Protocols and Routing Low Power and High Speed Adders in Modified Gated Diffusion Input Technique
  • Guided Local Search for Optimal GPON/FTTP Network Design
  • Image Segmentation Using Variable Kernel Fuzzy C Means (VKFCM) Clustering on Modified Level Set Method
  • Comparison of SPIHT, Classical and Adaptive Lifting Scheme for Compression of Satellite Imageries
  • Comparison of Routing Protocols – Distance Vector and Fisheye State Routing
  • A Gene Expression Based Quality of Service Aware Routing Protocol for Mobile Adhoc Networks
  • User Behavior and Capability Based Access Control Model and Architecture
  • Congestion Adaptive Most Favorable Control Routing in Ad Hoc Networks
  • An Improved Blind Channel Estimation based on Subspace Approach for OFDM Systems Under Fast Time Varying Conditions
  • Adaptive Control and Synchronization Design for the Lu-Xiao Chaotic System
  • Cryptanalysis of Lo et al.’s password based authentication scheme
  • Intrusion Detection in Zero Knowledge System Using Model CheckingApproach
  • Detecting Malicious users in P2P Streaming Systems by Using Feedback Correlations
  • An Efficient Dual Text Steganographic Approach: Hiding Data in a List of Words
  • Secure Cryptosystem with Blind Authentication
  • An Effective Technique for Intrusion Detection Using Neuro-Fuzzy and Radial SVM Classifier
  • A Novel Octuple Images Encryption Algorithm Using Chaos in Wavelet Domain
  • The Fourth International Workshop on Network and Communications Security (NCS 2012)
  • A Strong Pvss Scheme
  • Secure Cosine Similarity Computation with Malicious Adversaries
  • Test Suite for Intrusion Detection by Layered Conditional Random Fields Using Mobile Phones
  • An Efficient Microaggregation Method for Protecting Mixed Data
  • Plus/Delta (+/∆) Evaluation to Help Organizations Deliver Projects Effectively
  • Supporting LTE Networks in Heterogeneous Environment using the Y-Comm Framework
  • A Call Admission Control Scheme for Cellular Network to Handle Sudden Influx in a Confined Area
  • Distributed Joint Optimal Network Scheduling and Controller Design for Wireless Networks
  • On the Estimation Capacity of Equal Gain Diversity Scheme Under Multi-Path Fading Channel
  • Low Overhead Time Coordinated Checkpointing Algorithm for Mobile Distributed Systems
  • Measurement and Performance Analysis
  • Performance evaluation of TCP NewVegas and TCP Newreno on Burstification in an OBS Network
  • Performance Enhancement through Optimization in FPGA Synthesis: Constraint Specific Approach
  • Performance Optimization of Vehicular Ad hoc Network (VANET) using Clustering Approach
  • Performance Evaluation of TCP Congestion Control variants using Ad Hoc On-Demand Distance Vector Routing
  • Performance Analysis of Dynamic Source Routing for Ad-hoc Networks Using Active Packet
  • Impact of Fix Cluster Head Selection (FCHS) Routing Protocol for Wireless Sensors Network
  • The Fourth International Workshop on Ad Hoc and Ubiquitous Computing (AUC- 2012)
  • Ontology Oriented Approach to Service Selection and Invocation in Complex Context Analysis
  • Compression of Ecg Signals Using A Novel Discrete Wavelet Transform Algorithm for Dynamic Arrythmia Database
  • Performance Analysis of ETX and ETT Routing Metrics over AODV Routing Protocol in WMNs
  • Optimized CPU Frequency Scaling on Android Devices Based on Foreground Running Application
  • Message Efficient Ring Leader Election in Distributed Systems
  • RAW – A novel Reconfigurable Architecture design using Wireless for future generation Supercomputers
  • Interference Management Analysis of Double-ABBA and ABBA Quasi-Orthogonal Space Time Code
  • PHY Layer Considerations for Real Time Multimedia Signal Transmission in Wireless Medium
  • Approximate Minimum Spanning Tree for Points moving in a Euclidean Two-Dimensions Plane
  • Low Complexity Speech Enhancement Algorithmfor Improved Perception in Mobile Devices
  • Prolonging the Lifetime of Wireless Sensor Network by Exponential Node Distribution and Ant-colony Optimization Routing
  • Multimedia Traffic over MANETs: Evaluation and Performance Analysis
  • Web Accessibility : Designing and Testing of Web Based Application for Persons with Disabilities
  • CBADE - Hybrid Approach for Duplication detection and Elimination
  • Fourth Workshop on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC – 2012)
  • Energy Aware Multipath Routing Protocol for Wireless Sensor Networks
  • Virtual Classroom for E – Education in Rural Areas
  • Unsupervised Methods On Image Database Using Cluster Mean Average Methods For Image Searching
  • Adhoc and Sensor Networks
  • Perspectives of Sybil Attack in Routing Protocols of Mobile Ad Hoc Network
  • A Jini Based Implementation for Best Leader Node Selection in MANETs
  • A Novel Methodology for Securing Adhoc Network by Friendly Group Model
  • Energy Efficient Medium Access Protocol for Clustered Wireless Sensor Networks
  • A Design Mode of Streaming Media Transmission and Access in Wireless Video Sensor Network
  • PSO-PAC: An Intelligent Clustering Mechanism in Ad hoc Network
  • SEMSuS: Semantic Middleware For Dynamic Service –Oriented Sensor Network
  • CO2 Gas Sensor Using Resonant Frequency changes in Micro-Cantilever
  • Heterogeneous Wireless, WLAN and Mobile Networks
  • A mechanism for enhanced performance of Chord DHT in mobile environment
  • A Hybrid Model of CLMS and ACLMS Algorithms for Smart Antennas
  • Novel Protection from Internal Attacks in Wireless Sensor Networks
  • Channel-Usage Model in Underlay Cognitive Radio Networks
  • A Secure Routing Protocol for Manets Against Byzantine Attacks
  • Analysis of different Mobility Models for Ad Hoc On-Demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol
  • NIZKPDS to achieve Non-Repudiation
  • An Integrated Solution for both Monitoring and Controlling for Automization using Wireless Sensor Networks:A Case Study
  • A Secure Image Steganography Technique to Hide Multiple Secret Images
  • Source Code Analysis of a Connection-Oriented File Reader Server Socket Program in Java and Removal of the Security Vulnerabilities
  • Document Library System using RDF based inferences
  • The Fourth International workshop on Wireless and  Mobile Networks (WiMoNe-2012)
  • Spread and Erase: Efficient routing algorithm based on Anti-message Info Relay Hubs for Delay Tolerant Networks
  • Novel architecture of adaptive and optimized policy based handover in MANET
  • Trusted control information in the application of cold chain logistics
  • Network Operations and Management
  • Secure Patient Monitoring and Self-management Using Brain Expression Interpreter
  • Coverage and Connectivity Guaranteed Deterministic Deployment Pattern for WSN
  • Hybrid Deployment Schemes for Wireless Sensor Networks
  • Adaptive Optimal Distributed Power Allocation for Enhanced Cognitive Radio Network in the Presence of Channel Uncertainties
  • Secure Real Time Remote Video Monitoring System
  • Fully Self-organized Key Management Scheme in MANET and Its Applications
  • A Hierarchical Color Net Model for Smart Grid Security Monitoring
  • Chapter 6: Network Security, Trust and Privacy
  • A Comprehensive study on Two-factor Authentication with One Time Passwords
  • ITRANS encoded Marathi Literature Document Relevance Ranking for Natural Language Flexible Queries
  • AB-OR: Improving the efficiency in Onion Routing using Attribute Based Cryptography
  • PASIC: A Novel Approach for Page-Wise Web Application Security