Liebe Besucherinnen und Besucher,
heute ab 15 Uhr feiern wir unser Sommerfest und sind daher nicht erreichbar. Ab morgen sind wir wieder wie gewohnt für Sie da. Wir bitten um Ihr Verständnis – Ihr Team von Sack Fachmedien
E-Book, Englisch, Band 27, 272 Seiten, eBook
Reihe: Lecture Notes on Data Engineering and Communications Technologies
Woungang / Dhurandher 2nd International Conference on Wireless Intelligent and Distributed Environment for Communication
1. Auflage 2019
ISBN: 978-3-030-11437-4
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
WIDECOM 2019
E-Book, Englisch, Band 27, 272 Seiten, eBook
Reihe: Lecture Notes on Data Engineering and Communications Technologies
ISBN: 978-3-030-11437-4
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Chapter 1. Performance Evaluation of G.711 and GSM Codecs on VoIP Applications using OSPF and RIP Routing Protocols.- Chapter 2. Cyclic Redundancy Check based Data Authentication in Opportunistic Networks.- Chapter 3. Hybrid Cryptographic Based Approach for Privacy Preservation in Location Based Services.- Chapter 4. Design of Energy-Aware PRoPHET and Spray-and-Wait Routing Protocols for Opportunistic Networks.- Chapter 5.An Asymmetric RSA based Security Approach for Opportunistic IoT.- Chapter 6. Performance Analysis of A* Based Hop Selection Technique in Opportunistic Networks through Movement Mobility Models.- Chapter 7. Data Loss Prevention Using Document Semantic Signature.- Chapter 8. Data Loss Prevention Using Document Semantic Signature.- Chapter 9. PSARV: Particle Swarm Angular Routing in Vehicular Ad hoc Networks.- Chapter 10. A Reliable Firefly-based Routing Protocol for Efficient Communication in Vehicular Ad Hoc Networks.- Chapter 11. Exploring the Application of Random Sampling in Spectrum Sensing.- Chapter 12. White-box Cryptography: A Time-security Trade-off for the SPNbox Family.- Chapter 13. CESIS: Cost Effective and Self-regulating Irrigation System.- Chapter 14. Maximum Eigenvalue based detection using Jittered Random Sampling.- Chapter 15. Prevention of Flooding Attacks in Mobile Ad hoc Networks.- Chapter 16. Prevention of Flooding Attacks in Mobile Ad hoc Networks.- Chapter 17. Real Time Spectrum Occupancy Prediction.- Chapter 18. SCC-LBS: Secure Criss-Cross Location Based Service in Logistics.