top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in computing, informatics, networking and cybersecurity : a book honoring Professor Mohammad S. Obaidat's significant scientific contributions / / edited by Sudip Misra, [and four others]
Advances in computing, informatics, networking and cybersecurity : a book honoring Professor Mohammad S. Obaidat's significant scientific contributions / / edited by Sudip Misra, [and four others]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (812 pages) : illustrations (chiefly color)
Disciplina 004
Collana Lecture Notes in Networks and Systems
Soggetto topico Computer science
ISBN 3-030-87049-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- About Professor Mohammad S. Obaidat -- Contents -- Computing -- Workload Scheduling in Fog and Cloud Environments: Emerging Concepts and Research Directions -- 1 Introduction -- 2 Cloud Computing -- 2.1 Characteristics -- 2.2 Service Models -- 2.3 Deployment Models -- 3 The Internet of Things and Fog Computing -- 3.1 Fog Computing -- 4 Workloads in Fog and Cloud Environments -- 4.1 Fine-Grained Parallel Applications -- 4.2 Coarse-Grained Parallel Applications -- 4.3 Embarrassingly Parallel Applications -- 5 Scheduling Problem -- 5.1 Definition -- 5.2 Objectives in Cloud and Fog Platforms -- 6 Established Scheduling Techniques -- 6.1 Gang Scheduling -- 6.2 Workflow Scheduling -- 6.3 Bag-of-Tasks Scheduling -- 7 Scheduling Trends and Challenges -- 7.1 Hybrid Clouds -- 7.2 Fog and Cloud Collaboration -- 7.3 Real-Time Constraints -- 7.4 Energy Efficiency -- 7.5 Dynamic Scaling -- 8 Conclusions -- References -- A Comprehensive Survey of Estimator Learning Automata and Their Recent Convergence Results -- 1 Introduction -- 1.1 Learning Automata -- 1.2 Contributions of This Paper -- 2 Estimator Algorithms -- 2.1 Rationale and Motivation -- 2.2 Continuous Estimator Algorithms -- 2.3 The TSE Algorithm -- 2.4 The Generalized Pursuit Algorithm -- 2.5 Discretized Estimator Algorithms -- 2.6 The Use of Bayesian Estimates in PAs -- 3 Previously-Reported Inaccurate ``Proofs'' -- 4 The Proofs for the Pursuit Learning Paradigm -- 5 Proofs of Convergence of the Pursuit-Paradigm-Based LA -- 5.1 The Previous Erroneous ``Proof'' -- 5.2 The New State-of-The-Art Proofs -- 6 Conclusions -- References -- Multimodal Data Fusion -- 1 Introduction -- 2 Incomplete Multimodal Data Fusion Algorithm Based on Deep Semantic Matching -- 2.1 Problem Description -- 2.2 Incomplete Multimodal Non-negative Matrix Factorization.
2.3 Local Invariant Graph Regularization -- 2.4 Incomplete Multimodal Deep Semantic Matching Algorithm -- 2.5 Model Optimization -- 2.6 Algorithm Complexity Analysis -- 3 Incremental Co-clustering Fusion Algorithm for Parameter-Free Multimodal Data -- 3.1 Problem Description -- 3.2 Multimodal Feature Similarity Measurement and Learning Strategy -- 3.3 Incremental Cluster Update -- 3.4 Adaptive Modal Weight Adjustment -- 3.5 Multimodal Incremental Co-clustering Fusion Algorithm -- 4 Deep Heterogeneous Transfer Learning Model -- 4.1 Problem Formulation -- 4.2 Deep Semantic Mapping Mechanism -- 4.3 Training the DHTL Model -- 4.4 Prediction by Deep Transfer Model -- 5 Unsupervised Multi-View Non-Negative Correlated Feature Learning -- 5.1 Problem Formulation -- 5.2 Correlated and Uncorrelated Feature Learning -- 5.3 Optimization -- 6 Conclusion -- References -- Efficient Parallel Implementation of Cellular Automata and Stencil Computations in Current Processors -- 1 Introduction -- 2 Related Works -- 3 Cellular Automata Model -- 4 Current CPU Architecture -- 4.1 Roofline Model -- 5 Optimization -- 5.1 Reducing Memory Size -- 5.2 Reusing CA Elements -- 5.3 Matrices to Hold the Neighbor Information and the CA Input and Output -- 5.4 Eliminating Conditional Structures -- 5.5 Loop Unrolling -- 5.6 Vectorization and Packet Coding -- 5.7 Data Pipelining -- 5.8 Spatial Blocking -- 5.9 Temporal Blocking -- 6 Conclusions and Future Work -- References -- A Comprehensive Review on Edge Computing: Focusing on Mobile Users -- 1 Introduction -- 1.1 The Road to the Edge Computing -- 1.2 Trends -- 1.3 Motivation and Contribution -- 2 Overview of Basic Concepts -- 2.1 Mobile and Pervasive Computing -- 2.2 Cloud Computing, VMs and Containers -- 2.3 Mobile Cloud Computing -- 2.4 Edge Computing -- 3 The State-of-the Art of Edge Computing Paradigms -- 3.1 Cloudlets.
3.2 Fog Computing -- 3.3 Multi-access Edge Computing -- 3.4 A High-Level Comparison -- 4 Applications Categories and MEC Relation to Crowdsourcing -- 4.1 Categories -- 4.2 MEC Key Elements to Crowdsourcing Architecture -- 5 Issues and Open Research Challenges -- 6 Conclusion -- References -- Informatics -- Smart Healthcare: Rough Set Theory in Predicting Heart Disease -- 1 Introduction -- 2 Background Literature -- 3 Methods -- 3.1 Classical Rough Set Approach (CRSA) -- 3.2 Mathematical Preliminaries of CRSA -- 3.3 Dominance-Based Rough Set Approach (DRSA) -- 4 Problem Dataset -- 4.1 Data Preprocessing and Discretization -- 4.2 Rule Induction from CRSA and VC DRSA -- 5 Brief Overview of Machine Learning Tools -- 5.1 Statistical Classifier C4.5 -- 5.2 Random Forest -- 5.3 Naïve Bayes -- 5.4 Support Vector Machines (SVM) -- 5.5 Logistic Regression -- 5.6 Multilayer Perceptron -- 6 Performance Evaluation Metrics -- 7 Results -- 8 Discussion -- 8.1 Applicability of Decision Rules in Detecting Heart Disease -- 9 Conclusions -- Appendix: Description of the Variables in the Information Table -- References -- Healthcare Patient Flow Modeling and Analysis with Timed Petri Nets -- 1 Introduction -- 2 Petri Nets -- 2.1 Definition -- 2.2 Transition Firing Rules -- 2.3 Modeling Power -- 2.4 System Analysis with Petri Net Models -- 2.5 Timed Petri Nets -- 3 Patient Flow and Modeling -- 3.1 Patient Flow -- 3.2 Initial Petri Net Model of the Patient Flow -- 3.3 Modeling Resource Requirements -- 3.4 Modeling Time -- 3.5 Identify Resource Usage and Task Durations -- 4 Patient Flow Evaluation -- 4.1 STPN Simulation -- 4.2 Performance Evaluation -- 4.3 Simulation Set Up and Results -- 5 Refinement of Patient Flow Model -- 6 Conclusion -- References.
Enabling and Enforcing Social Distancing Measures at Smart Parking Infrastructures Using Blockchain Technology in COVID-19 -- 1 Introduction -- 2 Related Work -- 2.1 COVID-19 Pandemic -- 2.2 Social Distancing -- 2.3 Smart Parking -- 2.4 Blockchain Technology -- 3 Blockchain-Based Framework with Social Distancing in Smart Parking -- 4 Features of Using Blockchain Technologies for Social Distancing in Smart Parking -- 5 Analysis of Proposed Model -- 5.1 Financial Analysis -- 5.2 Security Analysis -- 6 Conclusion -- References -- Using DEVS for Full Life Cycle Model-Based System Engineering in Complex Network Design -- 1 Introduction -- 2 Complex Network Design in Emergency Decision Making -- 2.1 Emergency Decision-Making and Requirements -- 2.2 Problems with Current MANET Modeling and Simulation -- 2.3 Towards DEVS-Based Methodology for Complex Network Modeling and Simulation -- 2.4 Summary -- 3 DEVS in Complex Network Design -- 4 Specification of Required Behaviors Using UML/SysML Metamodels that Map to Hierarchical DEVS Simulation Models -- 4.1 Enabling Implementation of Various Routing Infrastructures -- 5 High-Level Specification of Routing Mechanisms in DEVS -- 5.1 Routing Processes as Network Models -- 5.2 DEVS Modeling Levels -- 5.3 RDEVS as a Formalization of the Network Model -- 5.4 Computer Networks as a Domain-Specific Example -- 6 Co-simulation of Complex Networks -- 6.1 Co-simulation Principles -- 6.2 DEVS as Co-simulation Support -- 6.3 Network Co-simulation Example -- 6.4 Synthesis on Co-simulation -- 7 DEVS-Based Infrastructure to Design Complex Networks -- 7.1 DEVS-Based Architecture for MANET Simulation -- 7.2 OSI Model and Communication Stack -- 7.3 Virtual Communication Stack -- 7.4 Co-simulation Using the VCS and DEVS -- 7.5 Integrated Software-in-the-Loop and Hardware-in-the-Loop Paradigms -- 7.6 Summary.
8 Hybrid Modeling and Simulation of Complex Data Networks -- 8.1 Combining Packet and Fluid DEVS Network Models -- 8.2 Performance and Accuracy of Hybrid Topologies in PowerDEVS -- 8.3 Synthesis on Hybrid Simulation -- 9 Summary and Conclusions -- References -- Touchless Palmprint and Fingerprint Recognition -- 1 Introduction -- 2 Palmprint Recognition -- 2.1 Acquisition -- 2.2 Preprocessing -- 2.3 Feature Extraction and Matching -- 3 Fingerprint Recognition -- 3.1 Acquisition -- 3.2 Preprocessing -- 3.3 Feature Extraction and Matching -- 4 Conclusions -- References -- A Survey of IoT Software Platforms -- 1 Introduction -- 2 Research Methodology -- 2.1 IoT Platforms Selection -- 2.2 IoT Platforms Evaluation -- 3 Background and Evaluation Scheme -- 3.1 The Role of IoT Platforms -- 3.2 Evaluation Criteria -- 4 Survey of IoT Platforms -- 4.1 Research Sample -- 4.2 Comparative Analysis -- 4.3 Discussion -- 5 Challenges -- 6 Conclusions -- References -- Networking -- FLER: Fuzzy Logic-Based Energy Efficient Routing for Wireless Sensor Networks -- 1 Introduction -- 2 Related Work -- 3 FLER Protocol -- 3.1 Network Model -- 3.2 Energy Consumption Model -- 3.3 Proposed Routing Mechanism -- 3.4 Fuzzy Logic System -- 4 Performance Evaluation -- 4.1 Simulation Environment -- 4.2 Simulation Results and Discussion -- 5 Conclusion -- References -- Application of Device-to-Device Communication in Video Streaming for 5G Wireless Networks -- 1 Introduction -- 2 Background -- 3 DABAST: The Architecture -- 3.1 DABAST -- 3.2 The CSVD and DISCS Algorithms -- 4 Modeling DABAST with DEVS -- 5 Simulation Scenarios and Results -- 6 Conclusion -- References -- 5G Green Network -- 1 Introduction -- 2 Energy Efficiency of Random Cellular Networks -- 2.1 Related Work -- 2.2 System Model -- 2.3 Hard-Core Point Process Cellular Networks -- 2.4 Spectrum and Energy Efficiency.
2.5 Simulation Results.
Record Nr. UNINA-9910551832903321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cooperative networking / / [edited by] Mohammad Obaidat, Sudip Misra
Cooperative networking / / [edited by] Mohammad Obaidat, Sudip Misra
Autore Obaidat Mohammad S
Pubbl/distr/stampa Chichester, West Sussex, U.K. ; , : Wiley, , 2011
Descrizione fisica 1 online resource (354 p.)
Disciplina 004.6
621.384
Altri autori (Persone) ObaidatMohammad S <1952-> (Mohammad Salameh)
MisraSudip
Soggetto topico Ad hoc networks (Computer networks)
Internetworking (Telecommunication)
MIMO systems
Peer-to-peer architecture (Computer networks)
Radio relay systems
Wireless communication systems
Electrical & Computer Engineering
Engineering & Applied Sciences
Telecommunications
ISBN 1-283-20442-8
9786613204424
1-119-97358-9
1-61344-505-9
1-119-97359-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto About the Editors xiii -- List of Contributors xvii -- 1 Introduction 1 / Mohammad S. Obaidat and Sudip Misra -- 1.1 Major Features of the Book 4 -- 1.2 Target Audience 4 -- 1.3 Supplementary Resources 5 -- 1.4 Acknowledgements 5 -- 2 Fundamentals and Issues with Cooperation in Networking 7 / Mohammad S. Obaidat and Tarik Guelzim -- 2.1 Introduction 7 -- 2.2 Fundamentals of Cooperating Networks 7 -- 2.2.1 Cooperative Adhoc Network Services 8 -- 2.2.2 Cooperative Relaying Network Service 13 -- 2.3 Issues and Security Flaws with Cooperating Networks: -- Wireless Sensor Networks Case Study 15 -- 2.3.1 Limitations in Mobile Ad hoc Networks 16 -- 2.4 Conclusions 19 -- References 19 -- 3 To Cooperate or Not to Cooperate? That is the Question! 21 / Mohamed H. Ahmed and Salama S. Ikki -- 3.1 Introduction 21 -- 3.2 Overview of Cooperative-Diversity Systems 22 -- 3.2.1 Relaying Techniques 22 -- 3.2.2 Combining Techniques 23 -- 3.2.3 Other Cooperating Techniques 24 -- 3.3 Benefits of Cooperative-Diversity Systems 25 -- 3.3.1 Signal-Quality Improvement 25 -- 3.3.2 Reduced Power 28 -- 3.3.3 Better Coverage 28 -- 3.3.4 Capacity Gain 28 -- 3.4 Major Challenges of Cooperative-Diversity Systems 28 -- 3.4.1 Resources Over-Utilization 28 -- 3.4.2 Additional Delay 29 -- 3.4.3 Complexity 30 -- 3.4.4 Unavailability of Cooperating Nodes 32 -- 3.4.5 Security Threats 32 -- 3.5 Discussion and Conclusion 32 -- References 33 -- 4 Cooperation in Wireless Ad Hoc and Sensor Networks 35 / J. Barbancho, D. Cascado, J. L. Sevillano, C. Leƒon, A. Linares and F. J. Molina -- 4.1 Introduction 35 -- 4.2 Why Could Cooperation in WAdSN be Useful? 36 -- 4.2.1 Time Synchronization, Localization and Calibration 36 -- 4.2.2 Routing 41 -- 4.2.3 Data Aggregation and Fusion 43 -- 4.3 Research Directions for Cooperation in WAdSN 45 -- 4.3.1 Middleware for WAdSN 46 -- 4.3.2 Multi-Agent Systems in WAdSN 48 -- 4.3.3 Artificial Neural Networks in WAdSN 50 -- 4.4 Final Remarks 53 -- 4.5 Acknowledgements 53 -- References 53.
5 Cooperation in Autonomous Vehicular Networks 57 / Sidi Mohammed Senouci, Abderrahim Benslimane and Hassnaa Moustafa -- 5.1 Introduction 57 -- 5.2 Overview on Vehicular Networks 58 -- 5.3 Cooperation at Different OSI Layers 59 -- 5.3.1 Cooperation at Lower Layers 59 -- 5.3.2 Cooperation at Network Layer 60 -- 5.3.3 Security and Authentication versus Cooperation 67 -- 5.3.4 Cooperation at Upper Layers 69 -- 5.4 Conclusion 73 -- References 73 -- 6 Cooperative Overlay Networking for Streaming Media Content 77 / F. Wang, J. Liu and K. Wu -- 6.1 Introduction 77 -- 6.2 Architectural Choices for Streaming Media Content over the Internet 78 -- 6.2.1 Router-Based Architectures: IP Multicast 79 -- 6.2.2 Architectures with Proxy Caching 80 -- 6.2.3 Peer-to-Peer Architectures 81 -- 6.3 Peer-to-Peer Media Streaming 82 -- 6.3.1 Comparisons with Other Peer-to-Peer Applications 82 -- 6.3.2 Design Issues 83 -- 6.3.3 Approaches for Overlay Construction 83 -- 6.4 Overview of mTreebone 85 -- 6.4.1 Treebone: A Stable Tree-Based Backbone 85 -- 6.4.2 Mesh: An Adaptive Auxiliary Overlay 86 -- 6.5 Treebone Construction and Optimization 87 -- 6.5.1 Optimal Stable Node Identification 87 -- 6.5.2 Treebone Bootstrapping and Evolution 88 -- 6.5.3 Treebone Optimization 89 -- 6.6 Collaborative Mesh-Tree Data Delivery 91 -- 6.6.1 Seamless Push/Pull Switching 91 -- 6.6.2 Handling Host Dynamics 91 -- 6.7 Performance Evaluation 92 -- 6.7.1 Large-Scale Simulations 92 -- 6.7.2 PlanetLab-Based Experiments 94 -- 6.8 Conclusion and Future Work 98 -- References 98 -- 7 Cooperation in DTN-Based Network Architectures 101 / Vasco N. G. J. Soares and Joel J. P. C. Rodrigues -- 7.1 Introduction 101 -- 7.2 Delay-Tolerant Networks 102 -- 7.2.1 DTN Application Domains 103 -- 7.2.2 Cooperation in Delay-Tolerant Networks 103 -- 7.3 Vehicular Delay-Tolerant Networks 106 -- 7.3.1 Cooperation in Vehicular-Delay Tolerant Networks 106 -- 7.3.2 Performance Assessment of Node Cooperation 108 -- 7.4 Conclusions 112 -- 7.5 Acknowledgements 113.
References 113 -- 8 Access Selection and Cooperation in Ambient Networks 117 / Ram'on Agüero -- 8.1 Leveraging the Cooperation in Heterogeneous Wireless Networks 117 -- 8.2 The Ambient Networks Philosophy 118 -- 8.2.1 Generic Link Layer 120 -- 8.2.2 Management of Heterogeneous Wireless Resources 120 -- 8.2.3 Additional Functional Entities 121 -- 8.2.4 Multi-Access Functions and Procedures 122 -- 8.3 Related Work 125 -- 8.4 Outlook 125 -- 8.4.1 Cognition 125 -- 8.4.2 Mesh Topologies 127 -- 8.5 Conclusions 127 -- References 128 -- 9 Cooperation in Intrusion Detection Networks 133 / Carol Fung and Raouf Boutaba -- 9.1 Overview of Network Intrusions 133 -- 9.1.1 Single-Host Intrusion and Malware 133 -- 9.1.2 Distributed Attacks and Botnets 134 -- 9.1.3 Cooperative Attacks and Phishing 134 -- 9.2 Intrusion Detection Systems 135 -- 9.2.1 Signature-Based and Anomaly-Based IDSs 135 -- 9.2.2 Host-Based and Network-Based IDSs 135 -- 9.3 Cooperation in Intrusion Detection Networks 136 -- 9.3.1 Cooperation Topology 136 -- 9.3.2 Cooperation Scope 137 -- 9.3.3 Specialization 137 -- 9.3.4 Cooperation Technologies and Algorithms 137 -- 9.3.5 Taxonomy 138 -- 9.4 Selected Intrusion Detection Networks 139 -- 9.4.1 Indra 139 -- 9.4.2 DOMINO 139 -- 9.4.3 DShield 140 -- 9.4.4 NetShield 140 -- 9.4.5 Gossip 141 -- 9.4.6 Worminator 142 -- 9.4.7 ABDIAS 142 -- 9.4.8 CRIM 142 -- 9.4.9 HBCIDS 143 -- 9.4.10 ALPACAS 143 -- 9.4.11 CDDHT 143 -- 9.4.12 SmartScreen Filter 143 -- 9.4.13 FFCIDN 144 -- 9.5 Open Challenges and Future Directions 144 -- 9.6 Conclusion 144 -- References 144 -- 10 Cooperation Link Level Retransmission in Wireless Networks 147 / Mehrdad Dianati, Xuemin (Sherman) Shen and Kshirasagar Naik -- 10.1 Introduction 147 -- 10.2 Background 149 -- 10.2.1 Modeling of Fading Channels 149 -- 10.2.2 Automatic Repeat Request 152 -- 10.3 System Model 154 -- 10.4 Protocol Model 155 -- 10.5 Node Cooperative SW Scheme 156 -- 10.6 Performance Analysis 157 -- 10.7 Delay Analysis 164 -- 10.8 Verification of Analytical Models 168.
10.8.1 Throughput 169 -- 10.8.2 Average Delay and Delay Jitter 171 -- 10.9 Discussion of the Related Works 172 -- 10.10 Summary 174 -- 10.11 Acknowledgement 174 -- References 175 -- 11 Cooperative Inter-Node and Inter-Layer Optimization of Network Protocols 177 / D. Kliazovich, F. Granelli and N. L. S. da Fonseca -- 11.1 Introduction 177 -- 11.2 A Framework for Cooperative Configuration and Optimization 178 -- 11.2.1 Tuning TCP/IP Parameters 178 -- 11.2.2 Cooperative Optimization Architecture 179 -- 11.3 Cooperative Optimization Design 181 -- 11.3.1 Inter-Layer Cooperative Optimization 181 -- 11.3.2 Inter-Node Cooperative Optimization 183 -- 11.4 A Test Case: TCP Optimization Using a Cooperative Framework 184 -- 11.4.1 Implementation 184 -- 11.4.2 Inter-Layer Cognitive Optimization 186 -- 11.4.3 Inter-Node Cognitive Optimization 187 -- 11.5 Conclusions 189 -- References 189 -- 12 Cooperative Network Coding 191 / H. Rashvand, C. Khirallah, V. Stankovic and L. Stankovic -- 12.1 Introduction 191 -- 12.2 Network Coding Concept 192 -- 12.2.1 Example 192 -- 12.3 Cooperative Relay 195 -- 12.4 Cooperation Strategies 196 -- 12.4.1 Performance Measures 197 -- 12.5 Cooperative Network Coding 206 -- 12.6 Conclusions 214 -- References 214 -- 13 Cooperative Caching for Chip Multiprocessors 217 / J. Chang, E. Herrero, R. Canal and G. Sohi -- 13.1 Caching and Chip Multiprocessors 217 -- 13.1.1 Caching Background 217 -- 13.1.2 CMP (Chip Multiprocessor) 218 -- 13.1.3 CMP Caching Challenges 218 -- 13.2 Cooperative Caching and CMP Caching 220 -- 13.2.1 Motivation for Cooperative Caching 220 -- 13.2.2 The Unique Aspects of Cooperative Caching 220 -- 13.2.3 CMP Cache Partitioning Schemes 225 -- 13.2.4 A Taxonomy of CMP Caching Techniques 226 -- 13.3 CMP Cooperative Caching Framework 226 -- 13.3.1 CMP Cooperative Caching Framework 227 -- 13.3.2 CC Mechanisms 229 -- 13.3.3 CC Implementations 234 -- 13.3.4 CC for Large Scale CMPs 241 -- 13.3.5 Distributed Cooperative Caching 243 -- 13.3.6 Summary 249.
13.4 CMP Cooperative Caching Applications 251 -- 13.4.1 CMP Cooperative Caching for Latency Reduction 252 -- 13.4.2 CMP Cooperative Caching for Adaptive Repartitioning 259 -- 13.4.3 CMP Cooperative Caching for Performance Isolation 262 -- 13.5 Summary 269 -- References 270 -- 14 Market-Oriented Resource Management and Scheduling: A Taxonomy and Survey 277 / Saurabh Kumar Garg and Rajkumar Buyya -- 14.1 Introduction 277 -- 14.2 Overview of Utility Grids and Preliminaries 277 -- 14.3 Requirements 279 -- 14.3.1 Consumer Side Requirements 279 -- 14.3.2 Resource Provider Side Requirements 280 -- 14.3.3 Market Exchange Requirements 280 -- 14.4 Utility Grid Infrastructural Components 282 -- 14.5 Taxonomy of Market-Oriented Scheduling 283 -- 14.5.1 Market Model 284 -- 14.5.2 Allocation Decision 288 -- 14.5.3 Participant Focus 288 -- 14.5.4 Application Type 288 -- 14.5.5 Allocation Objective 289 -- 14.6 Survey of Grid Resource Management Systems 289 -- 14.6.1 Survey of Market-Oriented Systems 289 -- 14.6.2 System-Oriented Schedulers 296 -- 14.7 Discussion and Gap Analysis 300 -- 14.7.1 Scheduling Mechanisms 300 -- 14.7.2 Market Based Systems 301 -- 14.8 Summary 302 -- References 303 -- Glossary 307 -- Index 319.
Record Nr. UNINA-9910139621003321
Obaidat Mohammad S  
Chichester, West Sussex, U.K. ; , : Wiley, , 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cooperative networking / / [edited by] Mohammad Obaidat, Sudip Misra
Cooperative networking / / [edited by] Mohammad Obaidat, Sudip Misra
Autore Obaidat Mohammad S
Pubbl/distr/stampa Chichester, West Sussex, U.K. ; , : Wiley, , 2011
Descrizione fisica 1 online resource (354 p.)
Disciplina 004.6
621.384
Altri autori (Persone) ObaidatMohammad S <1952-> (Mohammad Salameh)
MisraSudip
Soggetto topico Ad hoc networks (Computer networks)
Internetworking (Telecommunication)
MIMO systems
Peer-to-peer architecture (Computer networks)
Radio relay systems
Wireless communication systems
Electrical & Computer Engineering
Engineering & Applied Sciences
Telecommunications
ISBN 1-283-20442-8
9786613204424
1-119-97358-9
1-61344-505-9
1-119-97359-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto About the Editors xiii -- List of Contributors xvii -- 1 Introduction 1 / Mohammad S. Obaidat and Sudip Misra -- 1.1 Major Features of the Book 4 -- 1.2 Target Audience 4 -- 1.3 Supplementary Resources 5 -- 1.4 Acknowledgements 5 -- 2 Fundamentals and Issues with Cooperation in Networking 7 / Mohammad S. Obaidat and Tarik Guelzim -- 2.1 Introduction 7 -- 2.2 Fundamentals of Cooperating Networks 7 -- 2.2.1 Cooperative Adhoc Network Services 8 -- 2.2.2 Cooperative Relaying Network Service 13 -- 2.3 Issues and Security Flaws with Cooperating Networks: -- Wireless Sensor Networks Case Study 15 -- 2.3.1 Limitations in Mobile Ad hoc Networks 16 -- 2.4 Conclusions 19 -- References 19 -- 3 To Cooperate or Not to Cooperate? That is the Question! 21 / Mohamed H. Ahmed and Salama S. Ikki -- 3.1 Introduction 21 -- 3.2 Overview of Cooperative-Diversity Systems 22 -- 3.2.1 Relaying Techniques 22 -- 3.2.2 Combining Techniques 23 -- 3.2.3 Other Cooperating Techniques 24 -- 3.3 Benefits of Cooperative-Diversity Systems 25 -- 3.3.1 Signal-Quality Improvement 25 -- 3.3.2 Reduced Power 28 -- 3.3.3 Better Coverage 28 -- 3.3.4 Capacity Gain 28 -- 3.4 Major Challenges of Cooperative-Diversity Systems 28 -- 3.4.1 Resources Over-Utilization 28 -- 3.4.2 Additional Delay 29 -- 3.4.3 Complexity 30 -- 3.4.4 Unavailability of Cooperating Nodes 32 -- 3.4.5 Security Threats 32 -- 3.5 Discussion and Conclusion 32 -- References 33 -- 4 Cooperation in Wireless Ad Hoc and Sensor Networks 35 / J. Barbancho, D. Cascado, J. L. Sevillano, C. Leƒon, A. Linares and F. J. Molina -- 4.1 Introduction 35 -- 4.2 Why Could Cooperation in WAdSN be Useful? 36 -- 4.2.1 Time Synchronization, Localization and Calibration 36 -- 4.2.2 Routing 41 -- 4.2.3 Data Aggregation and Fusion 43 -- 4.3 Research Directions for Cooperation in WAdSN 45 -- 4.3.1 Middleware for WAdSN 46 -- 4.3.2 Multi-Agent Systems in WAdSN 48 -- 4.3.3 Artificial Neural Networks in WAdSN 50 -- 4.4 Final Remarks 53 -- 4.5 Acknowledgements 53 -- References 53.
5 Cooperation in Autonomous Vehicular Networks 57 / Sidi Mohammed Senouci, Abderrahim Benslimane and Hassnaa Moustafa -- 5.1 Introduction 57 -- 5.2 Overview on Vehicular Networks 58 -- 5.3 Cooperation at Different OSI Layers 59 -- 5.3.1 Cooperation at Lower Layers 59 -- 5.3.2 Cooperation at Network Layer 60 -- 5.3.3 Security and Authentication versus Cooperation 67 -- 5.3.4 Cooperation at Upper Layers 69 -- 5.4 Conclusion 73 -- References 73 -- 6 Cooperative Overlay Networking for Streaming Media Content 77 / F. Wang, J. Liu and K. Wu -- 6.1 Introduction 77 -- 6.2 Architectural Choices for Streaming Media Content over the Internet 78 -- 6.2.1 Router-Based Architectures: IP Multicast 79 -- 6.2.2 Architectures with Proxy Caching 80 -- 6.2.3 Peer-to-Peer Architectures 81 -- 6.3 Peer-to-Peer Media Streaming 82 -- 6.3.1 Comparisons with Other Peer-to-Peer Applications 82 -- 6.3.2 Design Issues 83 -- 6.3.3 Approaches for Overlay Construction 83 -- 6.4 Overview of mTreebone 85 -- 6.4.1 Treebone: A Stable Tree-Based Backbone 85 -- 6.4.2 Mesh: An Adaptive Auxiliary Overlay 86 -- 6.5 Treebone Construction and Optimization 87 -- 6.5.1 Optimal Stable Node Identification 87 -- 6.5.2 Treebone Bootstrapping and Evolution 88 -- 6.5.3 Treebone Optimization 89 -- 6.6 Collaborative Mesh-Tree Data Delivery 91 -- 6.6.1 Seamless Push/Pull Switching 91 -- 6.6.2 Handling Host Dynamics 91 -- 6.7 Performance Evaluation 92 -- 6.7.1 Large-Scale Simulations 92 -- 6.7.2 PlanetLab-Based Experiments 94 -- 6.8 Conclusion and Future Work 98 -- References 98 -- 7 Cooperation in DTN-Based Network Architectures 101 / Vasco N. G. J. Soares and Joel J. P. C. Rodrigues -- 7.1 Introduction 101 -- 7.2 Delay-Tolerant Networks 102 -- 7.2.1 DTN Application Domains 103 -- 7.2.2 Cooperation in Delay-Tolerant Networks 103 -- 7.3 Vehicular Delay-Tolerant Networks 106 -- 7.3.1 Cooperation in Vehicular-Delay Tolerant Networks 106 -- 7.3.2 Performance Assessment of Node Cooperation 108 -- 7.4 Conclusions 112 -- 7.5 Acknowledgements 113.
References 113 -- 8 Access Selection and Cooperation in Ambient Networks 117 / Ram'on Agüero -- 8.1 Leveraging the Cooperation in Heterogeneous Wireless Networks 117 -- 8.2 The Ambient Networks Philosophy 118 -- 8.2.1 Generic Link Layer 120 -- 8.2.2 Management of Heterogeneous Wireless Resources 120 -- 8.2.3 Additional Functional Entities 121 -- 8.2.4 Multi-Access Functions and Procedures 122 -- 8.3 Related Work 125 -- 8.4 Outlook 125 -- 8.4.1 Cognition 125 -- 8.4.2 Mesh Topologies 127 -- 8.5 Conclusions 127 -- References 128 -- 9 Cooperation in Intrusion Detection Networks 133 / Carol Fung and Raouf Boutaba -- 9.1 Overview of Network Intrusions 133 -- 9.1.1 Single-Host Intrusion and Malware 133 -- 9.1.2 Distributed Attacks and Botnets 134 -- 9.1.3 Cooperative Attacks and Phishing 134 -- 9.2 Intrusion Detection Systems 135 -- 9.2.1 Signature-Based and Anomaly-Based IDSs 135 -- 9.2.2 Host-Based and Network-Based IDSs 135 -- 9.3 Cooperation in Intrusion Detection Networks 136 -- 9.3.1 Cooperation Topology 136 -- 9.3.2 Cooperation Scope 137 -- 9.3.3 Specialization 137 -- 9.3.4 Cooperation Technologies and Algorithms 137 -- 9.3.5 Taxonomy 138 -- 9.4 Selected Intrusion Detection Networks 139 -- 9.4.1 Indra 139 -- 9.4.2 DOMINO 139 -- 9.4.3 DShield 140 -- 9.4.4 NetShield 140 -- 9.4.5 Gossip 141 -- 9.4.6 Worminator 142 -- 9.4.7 ABDIAS 142 -- 9.4.8 CRIM 142 -- 9.4.9 HBCIDS 143 -- 9.4.10 ALPACAS 143 -- 9.4.11 CDDHT 143 -- 9.4.12 SmartScreen Filter 143 -- 9.4.13 FFCIDN 144 -- 9.5 Open Challenges and Future Directions 144 -- 9.6 Conclusion 144 -- References 144 -- 10 Cooperation Link Level Retransmission in Wireless Networks 147 / Mehrdad Dianati, Xuemin (Sherman) Shen and Kshirasagar Naik -- 10.1 Introduction 147 -- 10.2 Background 149 -- 10.2.1 Modeling of Fading Channels 149 -- 10.2.2 Automatic Repeat Request 152 -- 10.3 System Model 154 -- 10.4 Protocol Model 155 -- 10.5 Node Cooperative SW Scheme 156 -- 10.6 Performance Analysis 157 -- 10.7 Delay Analysis 164 -- 10.8 Verification of Analytical Models 168.
10.8.1 Throughput 169 -- 10.8.2 Average Delay and Delay Jitter 171 -- 10.9 Discussion of the Related Works 172 -- 10.10 Summary 174 -- 10.11 Acknowledgement 174 -- References 175 -- 11 Cooperative Inter-Node and Inter-Layer Optimization of Network Protocols 177 / D. Kliazovich, F. Granelli and N. L. S. da Fonseca -- 11.1 Introduction 177 -- 11.2 A Framework for Cooperative Configuration and Optimization 178 -- 11.2.1 Tuning TCP/IP Parameters 178 -- 11.2.2 Cooperative Optimization Architecture 179 -- 11.3 Cooperative Optimization Design 181 -- 11.3.1 Inter-Layer Cooperative Optimization 181 -- 11.3.2 Inter-Node Cooperative Optimization 183 -- 11.4 A Test Case: TCP Optimization Using a Cooperative Framework 184 -- 11.4.1 Implementation 184 -- 11.4.2 Inter-Layer Cognitive Optimization 186 -- 11.4.3 Inter-Node Cognitive Optimization 187 -- 11.5 Conclusions 189 -- References 189 -- 12 Cooperative Network Coding 191 / H. Rashvand, C. Khirallah, V. Stankovic and L. Stankovic -- 12.1 Introduction 191 -- 12.2 Network Coding Concept 192 -- 12.2.1 Example 192 -- 12.3 Cooperative Relay 195 -- 12.4 Cooperation Strategies 196 -- 12.4.1 Performance Measures 197 -- 12.5 Cooperative Network Coding 206 -- 12.6 Conclusions 214 -- References 214 -- 13 Cooperative Caching for Chip Multiprocessors 217 / J. Chang, E. Herrero, R. Canal and G. Sohi -- 13.1 Caching and Chip Multiprocessors 217 -- 13.1.1 Caching Background 217 -- 13.1.2 CMP (Chip Multiprocessor) 218 -- 13.1.3 CMP Caching Challenges 218 -- 13.2 Cooperative Caching and CMP Caching 220 -- 13.2.1 Motivation for Cooperative Caching 220 -- 13.2.2 The Unique Aspects of Cooperative Caching 220 -- 13.2.3 CMP Cache Partitioning Schemes 225 -- 13.2.4 A Taxonomy of CMP Caching Techniques 226 -- 13.3 CMP Cooperative Caching Framework 226 -- 13.3.1 CMP Cooperative Caching Framework 227 -- 13.3.2 CC Mechanisms 229 -- 13.3.3 CC Implementations 234 -- 13.3.4 CC for Large Scale CMPs 241 -- 13.3.5 Distributed Cooperative Caching 243 -- 13.3.6 Summary 249.
13.4 CMP Cooperative Caching Applications 251 -- 13.4.1 CMP Cooperative Caching for Latency Reduction 252 -- 13.4.2 CMP Cooperative Caching for Adaptive Repartitioning 259 -- 13.4.3 CMP Cooperative Caching for Performance Isolation 262 -- 13.5 Summary 269 -- References 270 -- 14 Market-Oriented Resource Management and Scheduling: A Taxonomy and Survey 277 / Saurabh Kumar Garg and Rajkumar Buyya -- 14.1 Introduction 277 -- 14.2 Overview of Utility Grids and Preliminaries 277 -- 14.3 Requirements 279 -- 14.3.1 Consumer Side Requirements 279 -- 14.3.2 Resource Provider Side Requirements 280 -- 14.3.3 Market Exchange Requirements 280 -- 14.4 Utility Grid Infrastructural Components 282 -- 14.5 Taxonomy of Market-Oriented Scheduling 283 -- 14.5.1 Market Model 284 -- 14.5.2 Allocation Decision 288 -- 14.5.3 Participant Focus 288 -- 14.5.4 Application Type 288 -- 14.5.5 Allocation Objective 289 -- 14.6 Survey of Grid Resource Management Systems 289 -- 14.6.1 Survey of Market-Oriented Systems 289 -- 14.6.2 System-Oriented Schedulers 296 -- 14.7 Discussion and Gap Analysis 300 -- 14.7.1 Scheduling Mechanisms 300 -- 14.7.2 Market Based Systems 301 -- 14.8 Summary 302 -- References 303 -- Glossary 307 -- Index 319.
Record Nr. UNINA-9910811956403321
Obaidat Mohammad S  
Chichester, West Sussex, U.K. ; , : Wiley, , 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of International Conference on Advanced Communications and Machine Intelligence : MICA 2022 / / edited by Rajkumar Buyya, Sudip Misra, Yiu-Wing Leung, Ayan Mondal
Proceedings of International Conference on Advanced Communications and Machine Intelligence : MICA 2022 / / edited by Rajkumar Buyya, Sudip Misra, Yiu-Wing Leung, Ayan Mondal
Autore Buyya Rajkumar
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (449 pages)
Disciplina 006.3
Altri autori (Persone) MisraSudip
LeungYiu-Wing
MondalAyan
Collana Studies in Autonomic, Data-driven and Industrial Computing
Soggetto topico Computational intelligence
Artificial intelligence
Telecommunication
Computational Intelligence
Artificial Intelligence
Communications Engineering, Networks
ISBN 981-9927-68-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Study on Interval Valued Intuitionistic Fuzzy Oscillatory Region -- Face Mask Detection using Keras/Tensorflow -- Simulation based Comparative Study for Effective Cell Selection in Cellular Networks -- Comparative Analysis of Detection of Network Attacks Using Deep Learning Algorithms -- Multi-criteria Decision-making Problems in an Interval Number Based on TOPSIS method -- Sentiment Analysis of Twitter data by Natural Language Processing and Machine Learning -- A Generalized Fuzzy TOPSIS Technique in Multi-Criteria Decision-Making for Evaluation of Temperature -- UWB FR4-Based CPW-Fed Equilateral Triangular Slot Antenna for CubeSat Communication -- Comparative study of Support Vector Machine based Intrusion Detection System and Convolution Neural Network based Intrusion Detection System -- Association Rules Generation for Injuries in National Football League (NFL) -- A Supplier Selection Using Multicriteria Decision Analysis Method Under Probabilistic Approach -- Proactive Public Healthcare Solution Based on Blockchain for Covid-19 -- A TOPSIS Technique for Multi-Attribute Group Decision making in Fuzzy Environment -- Design and Implementation of Fuzzy Controller Based DC to DC Converter for PV System -- A Multi-Objective Task Scheduling Approach Using Improved Max-Min algorithm in Cloud Computing.
Record Nr. UNINA-9910735791903321
Buyya Rajkumar  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Progress in Advanced Computing and Intelligent Engineering [[electronic resource] ] : Proceedings of ICACIE 2017, Volume 2 / / edited by Chhabi Rani Panigrahi, Arun K. Pujari, Sudip Misra, Bibudhendu Pati, Kuan-Ching Li
Progress in Advanced Computing and Intelligent Engineering [[electronic resource] ] : Proceedings of ICACIE 2017, Volume 2 / / edited by Chhabi Rani Panigrahi, Arun K. Pujari, Sudip Misra, Bibudhendu Pati, Kuan-Ching Li
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XVI, 609 p. 272 illus., 188 illus. in color.)
Disciplina 621.382
Collana Advances in Intelligent Systems and Computing
Soggetto topico Engineering
Telecommunication
Signal, Image and Speech Processing
Computational Intelligence
Communications Engineering, Networks
ISBN 981-13-0224-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Secured Cloud-based Federation for EHR using Multi-Authority ABE -- A Brief Study on Build Failures in Continuous Integration: Causation and Effect -- Web Services Regression Testing through Automated Approach -- Challenges to Cloud PLM Adoption -- Evaluation of Neuropsychological Tests in Classification of Alzheimer’s Disease -- Brain Tumor Classification for MR Imaging Using Support Vector Machine -- Intelligent Mobile Agent Framework for Searching popular e-Advertisements -- Medicinal Plant Information Extraction System: A Text Mining Based Approach -- Population Dynamics Indicators for Evolutionary Many-Objective Optimization -- Order Reduction of Discrete System Models Employing Mixed Conventional Techniques and Evolutionary Techniques -- MCC and Big Data Integration for Various Technological Frameworks -- Mobility Predication for Dynamic Location Area in Cellular Network Using Super Vector Regression -- Improved SLReduct Framework for Stress Detection using Mobile Phone Sensing -- A Non-autonomous Ecological Model with Some Applications -- On the Category of Quantale Semimodules.
Record Nr. UNINA-9910350317003321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Progress in Advanced Computing and Intelligent Engineering [[electronic resource] ] : Proceedings of ICACIE 2017, Volume 1 / / edited by Bibudhendu Pati, Chhabi Rani Panigrahi, Sudip Misra, Arun K. Pujari, Sambit Bakshi
Progress in Advanced Computing and Intelligent Engineering [[electronic resource] ] : Proceedings of ICACIE 2017, Volume 1 / / edited by Bibudhendu Pati, Chhabi Rani Panigrahi, Sudip Misra, Arun K. Pujari, Sambit Bakshi
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (607 pages)
Disciplina 004
Collana Advances in Intelligent Systems and Computing
Soggetto topico Engineering
Telecommunication
Signal, Image and Speech Processing
Computational Intelligence
Communications Engineering, Networks
ISBN 981-13-1708-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Patch Based feature extraction algorithm for mammographic cancer images -- Segmentation and Detection of Lung Cancer Using Image Processing and Clustering Techniques -- A Correlative Study of Contrary Image Segmentation Methods Appending Dental Panoramic Xray Images to Detect Jawbone Disorders -- Image quilting for texture synthesis of Gray-scale images using Gray Level Co-occurrence Matrix and Restricted Cross-correlation -- Tongue Recognition and Detection -- Sample Entropy based Selection of Wavelet Decomposition Level for Finger Movement Recognition using EMG -- Skin Detection using Hybrid Colour Space of RGB-HCMYK -- GPU based approach for Human Action Recognition in Video.
Record Nr. UNINA-9910350307003321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Selected topics in communication networks and distributed systems [[electronic resource] /] / editors, Sudip Misra, Subhas Chandra Misra, Isaac Woungang
Selected topics in communication networks and distributed systems [[electronic resource] /] / editors, Sudip Misra, Subhas Chandra Misra, Isaac Woungang
Pubbl/distr/stampa Hackensack, N.J., : World Scientific, 2010
Descrizione fisica 1 online resource (808 p.)
Disciplina 006.32
Altri autori (Persone) MisraSudip
MisraSubhas Chandra
WoungangIsaac
Soggetto topico Telecommunication systems
Computer networks
Electronic data processing - Distributed processing
Distributed operating systems (Computers)
Soggetto genere / forma Electronic books.
ISBN 1-282-75776-8
9786612757761
981-283-944-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CONTENTS; Chapter 1 Mobility in Wireless Communication Networks Ronan Skehill, Padraig Scully, Eduardo Cano, Joseph Johnson, Sean McGrath and John Nelson; Chapter 2 The Multimedia Broadcast/Multicast Service of the Universal Mobile Telecommunications System Antonios Alexiou, Christos Bouras, Vasileios Kokkinos and Evangelos Rekkas; Chapter 3 WIMAX/802.16 Broadband Wireless Networks Michel Barbeau, Paul Boone and Evangelos Kranakis; Chapter 4 The System Framework and Its Application in a Mobile RFID Service Network Namje Park, Rajit Gadh, Seungjoo Kim and Dongho Won
Chapter 5 Using Neural Networks in Wireless Man QoS Architectures Manjunath RamachandraChapter 6 Using a Statistical Learning Model and SVM for Location Management in WLANS Abhishek Sisodia, Amit Gupta, Kunal Kapoor and Shashikala Tapaswi; Chapter 7 Transmission Power Control for Mobile Ad Hoc Networks Basel Alawieh, Chadi Assi and Hussein Mouftah; Chapter 8 Collision Avoidance Aware MAC Protocols for Multi-hop Ad Hoc Networks: Challenges, Solutions and Open Issues Basel Alawieh, Chadi Assi and Hussein Mouftah
Chapter 9 A Cross Layer DOA Routing Protocol for Mobile Ad Hoc Networks C. Mala, S. Vikram and N. P. GopalanChapter 10 Pervasive Service Discovery Protocol for Power Optimization in an Ad Hoc Network C. Mala, S. Sandeep Kumar and N. P. Gopalan; Chapter 11 Area Coverage Problems in Wireless Sensor Networks Bang Wang, Cheng Fu, Hock Beng Lim, Minghui Li and Di Ma; Chapter 12 Cognitive Networks Manuel Peralta, Supratik Mukhopadhyay, Ramesh Bharadwaj and Krishna Shenai; Chapter 13 Routing and Traffic Management El-Sayed M. El-Alfy
Chapter 14 Network Management: A Tutorial and Survey Hui Xu and Debao XiaoChapter 15 The Principles of Network Monitoring Monica Brockmeyer and Jawwad Shamsi; Chapter 16 Network Information Flow and its Wireless Applications Jiaqing Huang and Tegegne Gobana; Chapter 17 A Theoretical Model for Grid, Cluster and Internet Computing Mark Burgin and Marc L. Smith; Chapter 18 Dataflow Computations on Enterprise Grids Chao Jin and Rajkumar Buyya; Chapter 19 Grid-Based Computing Platform for Large-Scale Online Applications K. L. Eddie Law and Y. C. Allen Yu
Chapter 20 Adaptive Multimedia Transmission over the Internet Christos Bouras and Apostolos GkamasChapter 21 Analyzing Bandwidth usage in a Distributed Processing Environment Dennis Guster, Mark B. Schmidt, Renat Sultanov and Charles Hall; Chapter 22 Intrusion Detection in Networks and Applications Kapil Kumar Gupta, Baikunth Nath and Kotagiri Ramamohanarao; Chapter 23 Security in Mobile Ad Hoc Networks Venkat Balakrishnan, Vijay Varadharajan and Uday Tupakula; Chapter 24 Identity Management in Mobile Communication Systems Silke Holtmanns, Guenther Horn and Wolf-Dietrich Moeller
Chapter 25 Proactive Models for Mitigating Internet Denial-of-Service/Distributed Denial-of-Service Attacks H. R. Nagesh and K. Chandra Sekaran
Record Nr. UNINA-9910456211703321
Hackensack, N.J., : World Scientific, 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Selected topics in communication networks and distributed systems [[electronic resource] /] / editors, Sudip Misra, Subhas Chandra Misra, Isaac Woungang
Selected topics in communication networks and distributed systems [[electronic resource] /] / editors, Sudip Misra, Subhas Chandra Misra, Isaac Woungang
Pubbl/distr/stampa Hackensack, N.J., : World Scientific, 2010
Descrizione fisica 1 online resource (808 p.)
Disciplina 006.32
Altri autori (Persone) MisraSudip
MisraSubhas Chandra
WoungangIsaac
Soggetto topico Telecommunication systems
Computer networks
Electronic data processing - Distributed processing
Distributed operating systems (Computers)
ISBN 1-282-75776-8
9786612757761
981-283-944-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CONTENTS; Chapter 1 Mobility in Wireless Communication Networks Ronan Skehill, Padraig Scully, Eduardo Cano, Joseph Johnson, Sean McGrath and John Nelson; Chapter 2 The Multimedia Broadcast/Multicast Service of the Universal Mobile Telecommunications System Antonios Alexiou, Christos Bouras, Vasileios Kokkinos and Evangelos Rekkas; Chapter 3 WIMAX/802.16 Broadband Wireless Networks Michel Barbeau, Paul Boone and Evangelos Kranakis; Chapter 4 The System Framework and Its Application in a Mobile RFID Service Network Namje Park, Rajit Gadh, Seungjoo Kim and Dongho Won
Chapter 5 Using Neural Networks in Wireless Man QoS Architectures Manjunath RamachandraChapter 6 Using a Statistical Learning Model and SVM for Location Management in WLANS Abhishek Sisodia, Amit Gupta, Kunal Kapoor and Shashikala Tapaswi; Chapter 7 Transmission Power Control for Mobile Ad Hoc Networks Basel Alawieh, Chadi Assi and Hussein Mouftah; Chapter 8 Collision Avoidance Aware MAC Protocols for Multi-hop Ad Hoc Networks: Challenges, Solutions and Open Issues Basel Alawieh, Chadi Assi and Hussein Mouftah
Chapter 9 A Cross Layer DOA Routing Protocol for Mobile Ad Hoc Networks C. Mala, S. Vikram and N. P. GopalanChapter 10 Pervasive Service Discovery Protocol for Power Optimization in an Ad Hoc Network C. Mala, S. Sandeep Kumar and N. P. Gopalan; Chapter 11 Area Coverage Problems in Wireless Sensor Networks Bang Wang, Cheng Fu, Hock Beng Lim, Minghui Li and Di Ma; Chapter 12 Cognitive Networks Manuel Peralta, Supratik Mukhopadhyay, Ramesh Bharadwaj and Krishna Shenai; Chapter 13 Routing and Traffic Management El-Sayed M. El-Alfy
Chapter 14 Network Management: A Tutorial and Survey Hui Xu and Debao XiaoChapter 15 The Principles of Network Monitoring Monica Brockmeyer and Jawwad Shamsi; Chapter 16 Network Information Flow and its Wireless Applications Jiaqing Huang and Tegegne Gobana; Chapter 17 A Theoretical Model for Grid, Cluster and Internet Computing Mark Burgin and Marc L. Smith; Chapter 18 Dataflow Computations on Enterprise Grids Chao Jin and Rajkumar Buyya; Chapter 19 Grid-Based Computing Platform for Large-Scale Online Applications K. L. Eddie Law and Y. C. Allen Yu
Chapter 20 Adaptive Multimedia Transmission over the Internet Christos Bouras and Apostolos GkamasChapter 21 Analyzing Bandwidth usage in a Distributed Processing Environment Dennis Guster, Mark B. Schmidt, Renat Sultanov and Charles Hall; Chapter 22 Intrusion Detection in Networks and Applications Kapil Kumar Gupta, Baikunth Nath and Kotagiri Ramamohanarao; Chapter 23 Security in Mobile Ad Hoc Networks Venkat Balakrishnan, Vijay Varadharajan and Uday Tupakula; Chapter 24 Identity Management in Mobile Communication Systems Silke Holtmanns, Guenther Horn and Wolf-Dietrich Moeller
Chapter 25 Proactive Models for Mitigating Internet Denial-of-Service/Distributed Denial-of-Service Attacks H. R. Nagesh and K. Chandra Sekaran
Record Nr. UNINA-9910780878503321
Hackensack, N.J., : World Scientific, 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Selected topics in communication networks and distributed systems / / editors, Sudip Misra, Subhas Chandra Misra, Isaac Woungang
Selected topics in communication networks and distributed systems / / editors, Sudip Misra, Subhas Chandra Misra, Isaac Woungang
Edizione [1st ed.]
Pubbl/distr/stampa Hackensack, N.J., : World Scientific, 2010
Descrizione fisica 1 online resource (808 p.)
Disciplina 006.32
Altri autori (Persone) MisraSudip
MisraSubhas Chandra
WoungangIsaac
Soggetto topico Telecommunication systems
Computer networks
Electronic data processing - Distributed processing
Distributed operating systems (Computers)
ISBN 1-282-75776-8
9786612757761
981-283-944-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CONTENTS; Chapter 1 Mobility in Wireless Communication Networks Ronan Skehill, Padraig Scully, Eduardo Cano, Joseph Johnson, Sean McGrath and John Nelson; Chapter 2 The Multimedia Broadcast/Multicast Service of the Universal Mobile Telecommunications System Antonios Alexiou, Christos Bouras, Vasileios Kokkinos and Evangelos Rekkas; Chapter 3 WIMAX/802.16 Broadband Wireless Networks Michel Barbeau, Paul Boone and Evangelos Kranakis; Chapter 4 The System Framework and Its Application in a Mobile RFID Service Network Namje Park, Rajit Gadh, Seungjoo Kim and Dongho Won
Chapter 5 Using Neural Networks in Wireless Man QoS Architectures Manjunath RamachandraChapter 6 Using a Statistical Learning Model and SVM for Location Management in WLANS Abhishek Sisodia, Amit Gupta, Kunal Kapoor and Shashikala Tapaswi; Chapter 7 Transmission Power Control for Mobile Ad Hoc Networks Basel Alawieh, Chadi Assi and Hussein Mouftah; Chapter 8 Collision Avoidance Aware MAC Protocols for Multi-hop Ad Hoc Networks: Challenges, Solutions and Open Issues Basel Alawieh, Chadi Assi and Hussein Mouftah
Chapter 9 A Cross Layer DOA Routing Protocol for Mobile Ad Hoc Networks C. Mala, S. Vikram and N. P. GopalanChapter 10 Pervasive Service Discovery Protocol for Power Optimization in an Ad Hoc Network C. Mala, S. Sandeep Kumar and N. P. Gopalan; Chapter 11 Area Coverage Problems in Wireless Sensor Networks Bang Wang, Cheng Fu, Hock Beng Lim, Minghui Li and Di Ma; Chapter 12 Cognitive Networks Manuel Peralta, Supratik Mukhopadhyay, Ramesh Bharadwaj and Krishna Shenai; Chapter 13 Routing and Traffic Management El-Sayed M. El-Alfy
Chapter 14 Network Management: A Tutorial and Survey Hui Xu and Debao XiaoChapter 15 The Principles of Network Monitoring Monica Brockmeyer and Jawwad Shamsi; Chapter 16 Network Information Flow and its Wireless Applications Jiaqing Huang and Tegegne Gobana; Chapter 17 A Theoretical Model for Grid, Cluster and Internet Computing Mark Burgin and Marc L. Smith; Chapter 18 Dataflow Computations on Enterprise Grids Chao Jin and Rajkumar Buyya; Chapter 19 Grid-Based Computing Platform for Large-Scale Online Applications K. L. Eddie Law and Y. C. Allen Yu
Chapter 20 Adaptive Multimedia Transmission over the Internet Christos Bouras and Apostolos GkamasChapter 21 Analyzing Bandwidth usage in a Distributed Processing Environment Dennis Guster, Mark B. Schmidt, Renat Sultanov and Charles Hall; Chapter 22 Intrusion Detection in Networks and Applications Kapil Kumar Gupta, Baikunth Nath and Kotagiri Ramamohanarao; Chapter 23 Security in Mobile Ad Hoc Networks Venkat Balakrishnan, Vijay Varadharajan and Uday Tupakula; Chapter 24 Identity Management in Mobile Communication Systems Silke Holtmanns, Guenther Horn and Wolf-Dietrich Moeller
Chapter 25 Proactive Models for Mitigating Internet Denial-of-Service/Distributed Denial-of-Service Attacks H. R. Nagesh and K. Chandra Sekaran
Record Nr. UNINA-9910820440203321
Hackensack, N.J., : World Scientific, 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui