top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Home networking : first IFIP WG 6.2 home networking conference (IHN'2007), Paris, France, December 10-12, 2007 / / edited by Khaldoun Al Agha, Xavier Carcelle, Guy Pujolle
Home networking : first IFIP WG 6.2 home networking conference (IHN'2007), Paris, France, December 10-12, 2007 / / edited by Khaldoun Al Agha, Xavier Carcelle, Guy Pujolle
Edizione [1st ed. 2008.]
Pubbl/distr/stampa New York, New York : , : Springer, , [2008]
Descrizione fisica 1 online resource (349 p.)
Disciplina 004.68
Collana International Federation for Information Processing (Series)
Soggetto topico Home computer networks
ISBN 0-387-77216-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto WiMAX, Wi-Fi -- An emission/reception chain modelling of the WiMAX access network -- IEEE 802.11 Goodput Analysis for Mixed Real Time and Data Traffic -- An efficient trigger to improve intra-WiFi handover performance -- Very high throughput Home -- Ultra Wide Band over fibre transparent architecture for High Bit-rate Home Networks -- Home Networking at 60 GHz: Challenges and Research Issues -- Management, control & energy -- Energy Efficiency in Future Home Environments: A Distributed Approach -- Avoiding energy-compromised hotspots in resource-limited wireless networks -- QoS Management in Autonomic Home Networks -- Managing collaboration and competition of multiple WAN services in a residential network -- Autonomic management and discovery -- Coherence Bandwidth and its Relationship with the RMS delay spread for PLC channels using Measurements up to 100 MHz -- Time/Frequency Analysis of Impulsive Noise on Powerline Channels -- Autonomic and Routing -- New architecture for an Ultra Broadband Home Area Network with spread connectivity and autonomic functions -- Group Source Routing Protocol with Selective Forwarding for Mobile Ad Hoc Networks -- Intelligent Routing Scheme in Home Networks -- Autonomic and Routing 2 -- OpenPattern project: a comprehensive modular routing platform -- A Design of Context aware Smart Home Safety Management using by Networked RFID and Sensor -- Embedded Script-Driven Home-Automation with Sensor Networks -- Autonomic management and discovery 2 -- Next WSN applications using ZigBee -- Adding functionality to X10 networks with 802.15.4. Using 802.15.4 to communicate and add functionality to X10 wired networks -- Normalization -- IPv6 and Homenetworking -- Hand-around on Seamless Services and Mobility in Home Networking -- Dynamic Total Cost of Ownership Optimization for IPTV Service Provider -- Networked Appliances for Home Healthcare and Lifestyle Management -- Remote Access VPNs Performance Comparison between Windows Server 2003 and Fedora Core 6.
Record Nr. UNINA-9910484192403321
New York, New York : , : Springer, , [2008]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Network coding [[electronic resource] /] / edited by Khaldoun Al Agha
Network coding [[electronic resource] /] / edited by Khaldoun Al Agha
Pubbl/distr/stampa London, : ISTE
Descrizione fisica 1 online resource (306 p.)
Disciplina 004.6
Altri autori (Persone) Al AghaKhaldoun
Collana ISTE
Soggetto topico Coding theory
Data transmission systems
Computer networks - Mathematical models
Soggetto genere / forma Electronic books.
ISBN 1-118-56281-X
1-299-18862-1
1-118-56278-X
1-118-56310-7
Classificazione COM043000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright Page; Table of Contents; Chapter 1. Network Coding: From Theory to Practice; 1.1. Introduction; 1.2. Theoretical approach; 1.2.1. Max-flow min-cut; 1.2.2. Admissible code; 1.2.3. Linear code; 1.2.4. Algebraic resolution; 1.2.5. Random code; 1.3. Practical approach; 1.3.1. Topologies; 1.3.1.1. Multihop wireless networks; 1.3.1.2. Cellular networks; 1.3.2. Applications; 1.3.2.1. Network coding and TCP; 1.3.2.2. Network coding and P2P; 1.3.2.3. Network coding with priority; 1.4. Conclusion; 1.5. Bibliography; Chapter 2. Fountain Codes and Network Coding for WSNs
2.1. Introduction2.2. Fountain codes; 2.2.1. Generalities; 2.2.2. Families of fountain codes; 2.2.2.1. Random fountain codes; 2.2.2.2. Luby Transform (LT); 2.2.2.3. Raptor code; 2.2.2.4. Code complexity; 2.3. Fountain codes in WSNs; 2.3.1. Implementation; 2.3.2. Protocol of reliability enhancement: ARQs versus fountain codes; 2.3.3. Discharge and overflow; 2.4. Fountain codes and network code for sensor networks; 2.4.1. Impact of network coding on the degree distribution of an LT flow; 2.4.1.1. XOR network coding and LT code; 2.4.2. Design a network code for LT code
2.4.2.1. Solutions of network coding2.4.3. Application to multihop sensor networks; 2.4.3.1. Multihop linear networks; 2.4.3.2. Sensor networks; 2.5. Conclusion; 2.6. Bibliography; Chapter 3. Switched Code for Ad Hoc Networks: Optimizing the Diffusion by Using Network Coding; 3.1. Abstract; 3.2. Introduction; 3.3. Diffusion in ad hoc networks; 3.4. Diffusion and network coding; 3.5. Switched code: incorporate erasure codes with network coding; 3.5.1. Definitions; 3.5.2. Coding function of switched code; 3.6. Decoding function of switched code; 3.7. Design and analysis of a new distribution
3.7.1. Analysis of switched distribution3.8. Conclusion; 3.9. Bibliography; Chapter 4. Security by Network Coding; 4.1. Introduction; 4.2. Attack models; 4.2.1. A type-II wiretap network; 4.2.2. A nice but curious attacker; 4.3. Security for a wiretap network; 4.4. Algebraic security criteria; 4.4.1. Note on random linear network coding; 4.4.2. Algebraic security; 4.4.3. The algebraic security criterion; 4.4.4. Algorithmic application of the criterion; 4.5. Conclusion; 4.6. Bibliography; Chapter 5. Security for Network Coding; 5.1. Introduction; 5.2. Attack models; 5.2.1. Eavesdroppers
5.2.1.1. Internal eavesdroppers5.2.1.2. External eavesdroppers; 5.2.2. Active attackers; 5.2.2.1. Pollution attacks; 5.2.2.2. Flooding attack; 5.2.3. Definition of homomorphic ciphering schemes; 5.2.3.1. Two specific schemes; 5.2.3.2. Completely homomorphic encryption schemes; 5.2.4. Homomorphic encryption and confidentiality in network coding; 5.2.4.1. The case of network coding using XOR; 5.2.4.2. The case of network coding in general; 5.3. Confidentiality; 5.3.1. Alternatives for confidentiality; 5.4. Integrity and authenticity solutions
5.4.1. Definitions of homomorphic MAC and homomorphic hash functions
Record Nr. UNINA-9910141498103321
London, : ISTE
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Network coding [[electronic resource] /] / edited by Khaldoun Al Agha
Network coding [[electronic resource] /] / edited by Khaldoun Al Agha
Pubbl/distr/stampa London, : ISTE
Descrizione fisica 1 online resource (306 p.)
Disciplina 004.6
Altri autori (Persone) Al AghaKhaldoun
Collana ISTE
Soggetto topico Coding theory
Data transmission systems
Computer networks - Mathematical models
ISBN 1-118-56281-X
1-299-18862-1
1-118-56278-X
1-118-56310-7
Classificazione COM043000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright Page; Table of Contents; Chapter 1. Network Coding: From Theory to Practice; 1.1. Introduction; 1.2. Theoretical approach; 1.2.1. Max-flow min-cut; 1.2.2. Admissible code; 1.2.3. Linear code; 1.2.4. Algebraic resolution; 1.2.5. Random code; 1.3. Practical approach; 1.3.1. Topologies; 1.3.1.1. Multihop wireless networks; 1.3.1.2. Cellular networks; 1.3.2. Applications; 1.3.2.1. Network coding and TCP; 1.3.2.2. Network coding and P2P; 1.3.2.3. Network coding with priority; 1.4. Conclusion; 1.5. Bibliography; Chapter 2. Fountain Codes and Network Coding for WSNs
2.1. Introduction2.2. Fountain codes; 2.2.1. Generalities; 2.2.2. Families of fountain codes; 2.2.2.1. Random fountain codes; 2.2.2.2. Luby Transform (LT); 2.2.2.3. Raptor code; 2.2.2.4. Code complexity; 2.3. Fountain codes in WSNs; 2.3.1. Implementation; 2.3.2. Protocol of reliability enhancement: ARQs versus fountain codes; 2.3.3. Discharge and overflow; 2.4. Fountain codes and network code for sensor networks; 2.4.1. Impact of network coding on the degree distribution of an LT flow; 2.4.1.1. XOR network coding and LT code; 2.4.2. Design a network code for LT code
2.4.2.1. Solutions of network coding2.4.3. Application to multihop sensor networks; 2.4.3.1. Multihop linear networks; 2.4.3.2. Sensor networks; 2.5. Conclusion; 2.6. Bibliography; Chapter 3. Switched Code for Ad Hoc Networks: Optimizing the Diffusion by Using Network Coding; 3.1. Abstract; 3.2. Introduction; 3.3. Diffusion in ad hoc networks; 3.4. Diffusion and network coding; 3.5. Switched code: incorporate erasure codes with network coding; 3.5.1. Definitions; 3.5.2. Coding function of switched code; 3.6. Decoding function of switched code; 3.7. Design and analysis of a new distribution
3.7.1. Analysis of switched distribution3.8. Conclusion; 3.9. Bibliography; Chapter 4. Security by Network Coding; 4.1. Introduction; 4.2. Attack models; 4.2.1. A type-II wiretap network; 4.2.2. A nice but curious attacker; 4.3. Security for a wiretap network; 4.4. Algebraic security criteria; 4.4.1. Note on random linear network coding; 4.4.2. Algebraic security; 4.4.3. The algebraic security criterion; 4.4.4. Algorithmic application of the criterion; 4.5. Conclusion; 4.6. Bibliography; Chapter 5. Security for Network Coding; 5.1. Introduction; 5.2. Attack models; 5.2.1. Eavesdroppers
5.2.1.1. Internal eavesdroppers5.2.1.2. External eavesdroppers; 5.2.2. Active attackers; 5.2.2.1. Pollution attacks; 5.2.2.2. Flooding attack; 5.2.3. Definition of homomorphic ciphering schemes; 5.2.3.1. Two specific schemes; 5.2.3.2. Completely homomorphic encryption schemes; 5.2.4. Homomorphic encryption and confidentiality in network coding; 5.2.4.1. The case of network coding using XOR; 5.2.4.2. The case of network coding in general; 5.3. Confidentiality; 5.3.1. Alternatives for confidentiality; 5.4. Integrity and authenticity solutions
5.4.1. Definitions of homomorphic MAC and homomorphic hash functions
Record Nr. UNINA-9910830906603321
London, : ISTE
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Network coding [[electronic resource] /] / edited by Khaldoun Al Agha
Network coding [[electronic resource] /] / edited by Khaldoun Al Agha
Pubbl/distr/stampa London, : ISTE
Descrizione fisica 1 online resource (306 p.)
Disciplina 004.6
Altri autori (Persone) Al AghaKhaldoun
Collana ISTE
Soggetto topico Coding theory
Data transmission systems
Computer networks - Mathematical models
ISBN 1-118-56281-X
1-299-18862-1
1-118-56278-X
1-118-56310-7
Classificazione COM043000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright Page; Table of Contents; Chapter 1. Network Coding: From Theory to Practice; 1.1. Introduction; 1.2. Theoretical approach; 1.2.1. Max-flow min-cut; 1.2.2. Admissible code; 1.2.3. Linear code; 1.2.4. Algebraic resolution; 1.2.5. Random code; 1.3. Practical approach; 1.3.1. Topologies; 1.3.1.1. Multihop wireless networks; 1.3.1.2. Cellular networks; 1.3.2. Applications; 1.3.2.1. Network coding and TCP; 1.3.2.2. Network coding and P2P; 1.3.2.3. Network coding with priority; 1.4. Conclusion; 1.5. Bibliography; Chapter 2. Fountain Codes and Network Coding for WSNs
2.1. Introduction2.2. Fountain codes; 2.2.1. Generalities; 2.2.2. Families of fountain codes; 2.2.2.1. Random fountain codes; 2.2.2.2. Luby Transform (LT); 2.2.2.3. Raptor code; 2.2.2.4. Code complexity; 2.3. Fountain codes in WSNs; 2.3.1. Implementation; 2.3.2. Protocol of reliability enhancement: ARQs versus fountain codes; 2.3.3. Discharge and overflow; 2.4. Fountain codes and network code for sensor networks; 2.4.1. Impact of network coding on the degree distribution of an LT flow; 2.4.1.1. XOR network coding and LT code; 2.4.2. Design a network code for LT code
2.4.2.1. Solutions of network coding2.4.3. Application to multihop sensor networks; 2.4.3.1. Multihop linear networks; 2.4.3.2. Sensor networks; 2.5. Conclusion; 2.6. Bibliography; Chapter 3. Switched Code for Ad Hoc Networks: Optimizing the Diffusion by Using Network Coding; 3.1. Abstract; 3.2. Introduction; 3.3. Diffusion in ad hoc networks; 3.4. Diffusion and network coding; 3.5. Switched code: incorporate erasure codes with network coding; 3.5.1. Definitions; 3.5.2. Coding function of switched code; 3.6. Decoding function of switched code; 3.7. Design and analysis of a new distribution
3.7.1. Analysis of switched distribution3.8. Conclusion; 3.9. Bibliography; Chapter 4. Security by Network Coding; 4.1. Introduction; 4.2. Attack models; 4.2.1. A type-II wiretap network; 4.2.2. A nice but curious attacker; 4.3. Security for a wiretap network; 4.4. Algebraic security criteria; 4.4.1. Note on random linear network coding; 4.4.2. Algebraic security; 4.4.3. The algebraic security criterion; 4.4.4. Algorithmic application of the criterion; 4.5. Conclusion; 4.6. Bibliography; Chapter 5. Security for Network Coding; 5.1. Introduction; 5.2. Attack models; 5.2.1. Eavesdroppers
5.2.1.1. Internal eavesdroppers5.2.1.2. External eavesdroppers; 5.2.2. Active attackers; 5.2.2.1. Pollution attacks; 5.2.2.2. Flooding attack; 5.2.3. Definition of homomorphic ciphering schemes; 5.2.3.1. Two specific schemes; 5.2.3.2. Completely homomorphic encryption schemes; 5.2.4. Homomorphic encryption and confidentiality in network coding; 5.2.4.1. The case of network coding using XOR; 5.2.4.2. The case of network coding in general; 5.3. Confidentiality; 5.3.1. Alternatives for confidentiality; 5.4. Integrity and authenticity solutions
5.4.1. Definitions of homomorphic MAC and homomorphic hash functions
Record Nr. UNINA-9910841102603321
London, : ISTE
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui