000 09159nam a22005775i 4500
001 u374091
003 SIRSI
005 20160812084217.0
007 cr nn 008mamaa
008 100301s2010 gw | s |||| 0|eng d
020 _a9783642117237
_9978-3-642-11723-7
040 _cMX-MeUAM
050 4 _aTK5105.5-5105.9
082 0 4 _a004.6
_223
100 1 _aZheng, Jun.
_eeditor.
245 1 0 _aAd Hoc Networks
_h[recurso electrónico] :
_bFirst International Conference, ADHOCNETS 2009, Niagara Falls, Ontario, Canada, September 22-25, 2009. Revised Selected Papers /
_cedited by Jun Zheng, Shiwen Mao, Scott F. Midkiff, Hua Zhu.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2010.
300 _aXVI, 915 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
_x1867-8211 ;
_v28
505 0 _a1st ICST International Conference on Ad Hoc Networks -- Supporting Proactive Application Event Notification to Improve Sensor Network Performance -- An Energy-Efficient Cluster-Head Selection Protocol for Energy-Constrained Wireless Sensor Networks -- Optimization of Cluster Heads for Energy Efficiency in Large-Scale Wireless Sensor Networks -- Optimal Cluster Sizes for Wireless Sensor Networks: An Experimental Analysis -- A Parallel Paths Communication Technique for Energy Efficient Wireless Sensor Networks -- Scalable Max-Min Fairness in Wireless Ad Hoc Networks -- Upper Bounding Service Capacity in Multihop Wireless SSMA-Based Ad Hoc Networks -- QoS over Real-Time Wireless Multi-hop Protocol -- Efficient Distribution of Large Files in UMTS Supported by Network Coded M2M Data Transfer with Multiple Generations -- Enhancement of Self-organisation in Wireless Networking through a Cross-Layer Approach -- SPECS: Secure and Privacy Enhancing Communications Schemes for VANETs -- Security and Privacy in a Sensor-Based Search and Rescue System -- Computationally Efficient Mutual Entity Authentication in Wireless Sensor Networks -- Distributed Detection of Wormhole Attacks in Wireless Sensor Networks -- Power-Aware Intrusion Detection in Mobile Ad Hoc Networks -- DHT-Based Detection of Node Clone in Wireless Sensor Networks -- Connectivity-Aware Minimum-Delay Geographic Routing with Vehicle Tracking in VANETs -- Buckshot Routing - A Robust Source Routing Protocol for Dense Ad-Hoc Networks -- Enhanced Route-Split Routing Tolerant to Multiple Concurrent Link Failure for Mobile Ad Hoc Networks -- A Simulation-Based Performance Analysis of Various Multipath Routing Techniques in ZigBee Sensor Networks -- Centralized Routing and Scheduling Using Multi-Channel System Single Transceiver in 802.16d -- Contact Time in Random Walk and Random Waypoint: Dichotomy in Tail Distribution -- Throughput Analysis of IEEE 802.11 DCF in the Presence of Transmission Errors -- Effects of Unintentional Denial of Service (DOS) Due to Push-to-Talk (PTT) Delays on Performance of CSMA/CA Based Adhoc Land Mobile Radio (LMR) Networks -- Achievable Region in Slotted ALOHA Throughput for One-Relay Two-Hop Wireless Network Coding -- Exact Models for the k-Connected Minimum Energy Problem -- Performance Evaluation of Quality of Service in IEEE 802.11e Wireless LANs -- Cooperative Localization in GPS-Limited Urban Environments -- Tracking a Vehicle Moving in a Wireless Sensor Network -- Improved Topology Control Algorithms for Simple Mobile Networks -- Reliable Coverage Area Based Link Expiration Time (LET) Routing Metric for Mobile Ad Hoc Networks -- Constructing Minimum Relay Connected Sensor Cover in Heterogeneous Wireless Sensor Networks -- Experimentation Made Easy -- Enhancing Learning Using Modular Wireless Sensor Networking (WSN) Hands-On Experiments -- Sensor Network in the Wireless UHF Band -- VoIP Implementation and Experiments on a Mobile Wireless AdHoc Network -- Relay Implementation in WiMAX System Level Simulator -- MeshMAC: Enabling Mesh Networking over IEEE 802.15.4 through Distributed Beacon Scheduling -- Compressing MAC Headers on Shared Wireless Media -- An RTS Based Data Channel Reservations and Access Scheme in Multi-Channel Systems -- Building Intrusion Detection with a Wireless Sensor Network -- Passive and Active Analysis in DSR-Based Ad Hoc Networks -- An E-Hospital Security Architecture -- Cooperative Certificate Revocation List Distribution Methods in VANETs -- Distributed Channel Selection for Ad-Hoc Networks in the Presence of Jamming Sources -- Joint Random Access and Power Control Game in Ad Hoc Networks with Noncooperative Users -- Graph Marginalization for Rapid Assignment in Wide-Area Surveillance -- Error Correction with the Implicit Encoding Capability of Random Network Coding -- An End-to-End Loss Discrimination Scheme for Multimedia Transmission over Wireless IP Networks -- International Workshop on Advanced Sensor Integration Technology -- Architecture for WSN Nodes Integration in Context Aware Systems Using Semantic Messages -- Performance Analysis of ZigBee Technology for Wireless Body Area Sensor Networks -- Analytical Models of Cross-Layer Protocol Optimization in Real-Time Wireless Sensor Ad Hoc Networks -- Programmable Re-tasking of Wireless Sensor Networks Using WISEMAN -- Oxybuoy: Constructing a Real-Time Inexpensive Hypoxia Monitoring Platform -- An Energy-Efficient, Application-Oriented Control Algorithm for MAC Protocols in WSN -- An Integrated RFID and Sensor System for Emergency Handling in Underground Coal Mines Environments -- An Area-Based Overlay Architecture for Scalable Integration of Sensor Networks -- International Workshop on Cross-Layer Design in Wireless Mobile Ad Hoc Networks -- Outage Probability for ARQ Decode-and-Forward Relaying under Packet-Rate Fading -- Distributed Spectrum Sharing for Video Streaming in Cognitive Radio Ad Hoc Networks -- The Cognitive Radio Channel: From Spectrum Sensing to Message Cribbing -- AM-AOMDV: Adaptive Multi-metric Ad-Hoc On-Demand Multipath Distance Vector Routing -- A Low-Latency TDMA Scheduler for Multi-hop Cluster Based MANETs with Directional Antennas.
520 _aAd hoc networks refer to the wireless networking paradigm that covers a variety of network forms for specific purposes, such as mobile ad hoc networks, sensor n- works, vehicular networks, underwater networks, underground networks, personal area networks, and home networks. The various forms of ad hoc networks promise a broad scope of applications in civilian, commercial, and military areas, which have led to significant new research problems and challenges, and have attracted great efforts from academia, industry, and government. This unique networking paradigm neces- tates re-examination of many established wireless networking concepts and protocols, and calls for developing new fundamental understanding of problems such as interf- ence, mobility, connectivity, capacity, and security, among others. While it is ess- tial to advance theoretical research on fundamentals and practical research on efficient algorithms and protocols, it is also critical to develop useful applications, experim- tal prototypes, and real-world deployments to achieve a practical impact on our so- ety for the success of this networking paradigm. The annual International Conference on Ad Hoc Networks (AdHocNets) is a new event that aims at providing a forum to bring together researchers from academia as well as practitioners from industry and government to meet and exchange ideas and recent research work on all aspects of ad hoc networks. As the first edition of this event, AdHocNets 2009 was successfully held in Niagara Falls, Ontario, Canada, during September 22–25, 2009.
650 0 _aComputer science.
650 0 _aComputer network architectures.
650 0 _aComputer Communication Networks.
650 0 _aComputer system performance.
650 0 _aSoftware engineering.
650 0 _aData protection.
650 0 _aData structures (Computer science).
650 1 4 _aComputer Science.
650 2 4 _aComputer Communication Networks.
650 2 4 _aComputer Systems Organization and Communication Networks.
650 2 4 _aSoftware Engineering/Programming and Operating Systems.
650 2 4 _aSystem Performance and Evaluation.
650 2 4 _aData Structures, Cryptology and Information Theory.
650 2 4 _aSystems and Data Security.
700 1 _aMao, Shiwen.
_eeditor.
700 1 _aMidkiff, Scott F.
_eeditor.
700 1 _aZhu, Hua.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642117220
830 0 _aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
_x1867-8211 ;
_v28
856 4 0 _zLibro electrónico
_uhttp://148.231.10.114:2048/login?url=http://link.springer.com/book/10.1007/978-3-642-11723-7
596 _a19
942 _cLIBRO_ELEC
999 _c201971
_d201971