Networks and Communications (NetCom2013) Proceedings of the Fifth International Conference on Networks & Communications

This book covers theory, methodology and applications of computer networks, network protocols and wireless networks, data communication technologies, and network security. The book is based on the proceedings from the Fifth International Conference on Networks & Communications (NetCom). The proc...

Full description

Corporate Author: SpringerLink (Online service)
Other Authors: Meghanathan, Natarajan (Editor), Nagamalai, Dhinaharan (Editor), Rajasekaran, Sanguthevar (Editor)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2014, 2014
Edition:1st ed. 2014
Series:Lecture Notes in Electrical Engineering
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03893nmm a2200385 u 4500
001 EB000735810
003 EBX01000000000000000587242
005 00000000000000.0
007 cr|||||||||||||||||||||
008 140303 ||| eng
020 |a 9783319036922 
100 1 |a Meghanathan, Natarajan  |e [editor] 
245 0 0 |a Networks and Communications (NetCom2013)  |h Elektronische Ressource  |b Proceedings of the Fifth International Conference on Networks & Communications  |c edited by Natarajan Meghanathan, Dhinaharan Nagamalai, Sanguthevar Rajasekaran 
250 |a 1st ed. 2014 
260 |a Cham  |b Springer International Publishing  |c 2014, 2014 
300 |a XV, 335 p. 139 illus., 85 illus. in color  |b online resource 
505 0 |a Network Security, Trust and Privacy -- Data Integrity Verification in Hybrid Cloud using TTPA -- A Comparitive Study of Data Perturbation Using Fuzzy Logic in Preserving Privacy -- Vector Quantization in Language Independent Speaker Identification Using Mel-Frequency Cepstrum Co-Efficient -- Improved Technique for Data Confidentiality in Cloud Environment -- A Hybrid-Based Feature Selection Approach for IDS -- Reckoning Minutiae Points with RNA-FINNT Augments Trust and Privacy of Legitimate User and Ensures Network Security in the Public Network -- Empirical Study of Email Security Threats and Countermeasures -- Improving Business Intelligence based on Frequent Itemsets using k-means Clustering Algorithm -- Reputation-Based Trust Management for Distributed Spectrum Sensing --  
505 0 |a Measurement and Performance Analysis -- An Evaluation of EpiChord in OverSim -- Enhanced back-off technique for IEEE 802.15.4 WSN standard --  Efficient Retransmission QoS-Aware MAC Scheme in Wireless Sensor Networks -- Performance Analysis of Correlated Channel for UWB-MIMO System -- Part II: Network Architectures, Protocols and Routing -- Node Failure Time Analysis for Maximum Stability vs. Minimum Distance -- Spanning Tree-based Data Gathering in Mobile Sensor Networks -- Wireless Networks: An Instance of Tandem Discrete-Time Queues -- An Equal Share Ant Colony Optimization Algorithm for Job Shop Scheduling adapted to Cloud Environments -- A Dynamic Trust Computation Model for Peer to Peer Network -- Road Traffic Management using Egyptian Vulture Optimization Algorithm – A New Graph Agent-Based Optimization Meta-Heuristic Algorithm -- Part III: Adhoc and Sensor Networks --  
505 0 |a Wireless and Mobile Networks -- Cache Coherency Algorithm to Optimize Bandwidth in Mobile Networks -- Connected Dominating Set based Scheduling for Publish-Subscribe Scenarios in WSN -- Ubiquitous Compaction Monitoring Interface for Soil compactor – A Web Based Approach 
653 |a Communications Engineering, Networks 
653 |a Electrical Engineering 
653 |a Information systems 
653 |a Telecommunication 
653 |a Computer engineering 
653 |a Information Systems and Communication Service 
700 1 |a Nagamalai, Dhinaharan  |e [editor] 
700 1 |a Rajasekaran, Sanguthevar  |e [editor] 
710 2 |a SpringerLink (Online service) 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Lecture Notes in Electrical Engineering 
856 |u https://doi.org/10.1007/978-3-319-03692-2?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 621.382 
520 |a This book covers theory, methodology and applications of computer networks, network protocols and wireless networks, data communication technologies, and network security. The book is based on the proceedings from the Fifth International Conference on Networks & Communications (NetCom). The proceedings will feature peer-reviewed papers that illustrate research results, projects, surveys and industrial experiences that describe significant advances in the diverse areas of computer networks & communications