top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Multihop wireless networks : opportunistic routing / / Kai Zeng, Wenjing Lou, Ming Li
Multihop wireless networks : opportunistic routing / / Kai Zeng, Wenjing Lou, Ming Li
Autore Zeng Kai
Edizione [1st edition]
Pubbl/distr/stampa Hoboken, New Jersey : , : Wiley, , 2011
Descrizione fisica 1 online resource (307 p.)
Disciplina 621.387/82
Altri autori (Persone) LouWenjing
LiMing <1985->
Collana Wiley series on wireless communications and mobile computing
Soggetto topico Ad hoc networks (Computer networks)
Radio relay systems
ISBN 1-283-17782-X
9786613177827
1-119-97360-0
1-119-97361-9
Classificazione TEC041000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto About the Series Editors -- Preface -- List of Abbreviations -- 1 Introduction -- 1.1 Multihop wireless networks -- 1.2 Routing challenges in MWNs -- 1.3 Routing techniques in MWNs -- 1.4 Related work -- 1.5 Book contribution -- 1.6 System model and assumptions -- References -- 2 Taxonomy of opportunistic routing: principles and behaviors -- 2.1 EPA generalization -- 2.2 Principles of local behavior of GOR -- 2.3 Least cost opportunistic routing -- 2.4 Conclusions -- References -- 3 Energy efficiency of geographic opportunistic routing -- 3.1 EGOR problem formulation -- 3.2 Efficient localized node-selection algorithms -- 3.3 Energy-efficient geographic opportunistic routing -- 3.4 Performance evaluation -- 3.5 Conclusion -- References -- 4 Capacity of multirate opportunistic routing -- 4.1 Computing throughput bound of OR -- 4.2 Impact of transmission rate and forwarding strategy on throughput -- 4.3 Rate and candidate selection schemes -- 4.4 Performance evaluation -- 4.5 Conclusion -- References -- 5 Multiradio multichannel opportunistic routing -- 5.1 Introduction -- 5.2 System model and opportunistic routing primer -- 5.3 Problem formulation -- 5.4 Forwarding priority scheduling -- 5.5 Performance evaluation 1 -- 5.6 Conclusions and future work -- References -- 6 Medium access control for opportunistic routing - candidate coordination -- 6.1 Existing candidate coordination schemes -- 6.2 Design and analysis of FSA -- 6.3 Simulation results and evaluation -- 6.4 Conclusions -- References -- 7 Integration of opportunistic routing and network coding -- 7.1 A brief review of MORE -- 7.2 Mobile content distribution in VANETs -- 7.3 Related works on mobile content distribution in VANETs -- 7.4 Background on symbol-level network coding -- 7.5 CodeOn: a cooperative popular content broadcast scheme for VANETs based on SLNC -- 7.6 CodePlay: a live multimedia streaming scheme for VANETs based on SLNC -- 7.7 Conclusion -- References -- 8 Multirate geographic opportunistic routing protocol design.
8.1 System model -- 8.2 Impact of transmission rate and forwarding strategy on OR performance -- 8.3 Opportunistic effective one-hop throughput (OEOT) -- 8.4 Heuristic candidate selection algorithm -- 8.5 Multirate link-quality measurement -- 8.6 Performance evaluation -- 8.7 Conclusion -- References -- 9 Opportunistic routing security -- 9.1 Attack on link quality measurement -- 9.2 Attacks on opportunistic coordination protocols -- 9.3 Resilience to packet-dropping attack -- 9.4 Conclusion -- References -- 10 Opportunistic broadcasts in vehicular networks -- 10.1 Related works on broadcasts in general MWNs -- 10.2 Related works on broadcasts in VANETs -- 10.3 Problem statement -- 10.4 Overview of OppCast -- 10.5 OppCast: main design -- 10.6 Parameter optimization -- 10.7 Performance evaluation -- 10.8 Conclusion -- References -- 11 Conclusions and future research -- 11.1 Summary -- 11.2 Future research directions -- References -- Index.
Record Nr. UNINA-9910139634303321
Zeng Kai  
Hoboken, New Jersey : , : Wiley, , 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Multihop wireless networks : opportunistic routing / / Kai Zeng, Wenjing Lou, Ming Li
Multihop wireless networks : opportunistic routing / / Kai Zeng, Wenjing Lou, Ming Li
Autore Zeng Kai
Edizione [1st edition]
Pubbl/distr/stampa Hoboken, New Jersey : , : Wiley, , 2011
Descrizione fisica 1 online resource (307 p.)
Disciplina 621.387/82
Altri autori (Persone) LouWenjing
LiMing <1985->
Collana Wiley series on wireless communications and mobile computing
Soggetto topico Ad hoc networks (Computer networks)
Radio relay systems
ISBN 1-283-17782-X
9786613177827
1-119-97360-0
1-119-97361-9
Classificazione TEC041000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto About the Series Editors -- Preface -- List of Abbreviations -- 1 Introduction -- 1.1 Multihop wireless networks -- 1.2 Routing challenges in MWNs -- 1.3 Routing techniques in MWNs -- 1.4 Related work -- 1.5 Book contribution -- 1.6 System model and assumptions -- References -- 2 Taxonomy of opportunistic routing: principles and behaviors -- 2.1 EPA generalization -- 2.2 Principles of local behavior of GOR -- 2.3 Least cost opportunistic routing -- 2.4 Conclusions -- References -- 3 Energy efficiency of geographic opportunistic routing -- 3.1 EGOR problem formulation -- 3.2 Efficient localized node-selection algorithms -- 3.3 Energy-efficient geographic opportunistic routing -- 3.4 Performance evaluation -- 3.5 Conclusion -- References -- 4 Capacity of multirate opportunistic routing -- 4.1 Computing throughput bound of OR -- 4.2 Impact of transmission rate and forwarding strategy on throughput -- 4.3 Rate and candidate selection schemes -- 4.4 Performance evaluation -- 4.5 Conclusion -- References -- 5 Multiradio multichannel opportunistic routing -- 5.1 Introduction -- 5.2 System model and opportunistic routing primer -- 5.3 Problem formulation -- 5.4 Forwarding priority scheduling -- 5.5 Performance evaluation 1 -- 5.6 Conclusions and future work -- References -- 6 Medium access control for opportunistic routing - candidate coordination -- 6.1 Existing candidate coordination schemes -- 6.2 Design and analysis of FSA -- 6.3 Simulation results and evaluation -- 6.4 Conclusions -- References -- 7 Integration of opportunistic routing and network coding -- 7.1 A brief review of MORE -- 7.2 Mobile content distribution in VANETs -- 7.3 Related works on mobile content distribution in VANETs -- 7.4 Background on symbol-level network coding -- 7.5 CodeOn: a cooperative popular content broadcast scheme for VANETs based on SLNC -- 7.6 CodePlay: a live multimedia streaming scheme for VANETs based on SLNC -- 7.7 Conclusion -- References -- 8 Multirate geographic opportunistic routing protocol design.
8.1 System model -- 8.2 Impact of transmission rate and forwarding strategy on OR performance -- 8.3 Opportunistic effective one-hop throughput (OEOT) -- 8.4 Heuristic candidate selection algorithm -- 8.5 Multirate link-quality measurement -- 8.6 Performance evaluation -- 8.7 Conclusion -- References -- 9 Opportunistic routing security -- 9.1 Attack on link quality measurement -- 9.2 Attacks on opportunistic coordination protocols -- 9.3 Resilience to packet-dropping attack -- 9.4 Conclusion -- References -- 10 Opportunistic broadcasts in vehicular networks -- 10.1 Related works on broadcasts in general MWNs -- 10.2 Related works on broadcasts in VANETs -- 10.3 Problem statement -- 10.4 Overview of OppCast -- 10.5 OppCast: main design -- 10.6 Parameter optimization -- 10.7 Performance evaluation -- 10.8 Conclusion -- References -- 11 Conclusions and future research -- 11.1 Summary -- 11.2 Future research directions -- References -- Index.
Record Nr. UNINA-9910815410103321
Zeng Kai  
Hoboken, New Jersey : , : Wiley, , 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security and Privacy in Communication Networks : 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I / / edited by Songqing Chen, Kim-Kwang Raymond Choo, Xinwen Fu, Wenjing Lou, Aziz Mohaisen
Security and Privacy in Communication Networks : 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I / / edited by Songqing Chen, Kim-Kwang Raymond Choo, Xinwen Fu, Wenjing Lou, Aziz Mohaisen
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (592 pages)
Disciplina 005.8
005.8 (edition:23)
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Data protection
Computer engineering
Computer networks
Computers
Application software
Data and Information Security
Computer Engineering and Networks
Computing Milieux
Computer and Information Systems Applications
ISBN 3-030-37228-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Trustless Framework for Iterative Double Auction based on Blockchain -- Towards a Multi-Chain Future of Proof-of-Space -- Secure Consistency Verification for Untrusted CloudStorage by Public Blockchains -- 4 An Enhanced Verifiable Inter-domain Routing Protocol based on Blockchain -- Edge-Assisted CNN Inference over Encrypted Data forInternet of Things -- POKs Based Secure and Energy-Efficient Access Control for Implantable Medical Devices -- USB-Watch: A Dynamic Hardware-Assisted USB ThreatDetection Framework -- Automated IoT Device Fingerprinting Through Encrypted Stream Classification -- Catching Malware.-DeepCG: Classifying Metamorphic Malware through Deep Learning of Call Graphs -- ChaffyScript: Vulnerability-Agnostic Defense of JavaScript Exploits via Memory Perturbation.-Obfusifier: Obfuscation-Resistant Android Malware Detection System -- Closing the Gap with APTs through Semantic Clusters and Automated CybergamesMachine Learning -- Stochastic ADMM Based Distributed Machine Learning with Differential Privacy -- Topology-Aware Hashing for Effective Control Flow GraphSimilarity Analysis -- Trojan Attack on Deep Generative Models in Autonomous Driving -- FuncNet: A Euclidean Embedding Approach forLightweight Cross-platform Binary Recognition Everything Traffic Security -- Towards Forward Secure Internet Traffic -- Traffic-based Automatic Detection of BrowserFingerprinting -- Measuring Tor Relay Popularity -- SoK: ATT&CK Techniques and Trends in Windows -- MalwareCommunicating Covertly -- Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts -- Victim-Aware Adaptive Covert Channels.-Random Allocation Seed-DSSS Broadcast Communication against Jamming Attacks -- Loss-tolerant Mechanism of Message Segmentation and Reconstruction in Multi-path Communication ofAnti-tracking Network -- Ticket Transparency: Accountable Single Sign-On with Privacy-Preserving Public Logs -- Decentralized Privacy-Preserving Reputation Managementfor Mobile Crowdsensing -- Location Privacy Issues in the OpenSky Network Crowdsourcing Platform -- Privacy-Preserving Genomic Data Publishing viaDifferentially-Private Suffix Tree -- Deep Analytics -- TL;DR Hazard: A Comprehensive Study of Levelsquatting Scams.-Account Lockouts: Characterizing and Preventing Account Denial-of-Service Attacks -- Application Transiency: Towards a Fair Trade of Personal Information for Application Services.
Record Nr. UNINA-9910364952503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security and Privacy in Communication Networks : 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23–25, 2019, Proceedings, Part II / / edited by Songqing Chen, Kim-Kwang Raymond Choo, Xinwen Fu, Wenjing Lou, Aziz Mohaisen
Security and Privacy in Communication Networks : 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23–25, 2019, Proceedings, Part II / / edited by Songqing Chen, Kim-Kwang Raymond Choo, Xinwen Fu, Wenjing Lou, Aziz Mohaisen
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (514 pages)
Disciplina 005.8
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Data protection
Computer engineering
Computer networks
Computers
Application software
Data and Information Security
Computer Engineering and Networks
Computing Milieux
Computer and Information Systems Applications
ISBN 3-030-37231-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910364952403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui