Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.
You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.
After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.
This book constitutes the refereed proceedings of the Second International Conference on Network-Based Information Systems, NBIS 2008, held in Turin, Italy, September 1-5, 2008 in conjunction with Dexa 2008.
The 32 revised full papers presented were carefully reviewed and selected from 81 submissions. The papers are organized in topical sections on wireless networks; heterogeneous networks; ad hoc networks; P2P, grid and internet computing; ad hoc and sensor networks; intelligent algorithms and systems; secure systems and applicatinos as well as network tools and architectures.
Content Level »Research
Keywords »Broadcast - Internet - Linux - P2P - QoS - Quality of Service - Quality of Service (QoS) - Routing - Wireless LAN - ad hoc network - database and data mining - fault tolerance - load balancing - sensor networks - wireless network
NBiS-2008 Keynote Talk.- Patterns in Internet Architecture.- Wireless Networks.- GAMesh: Automatic Placement of Wireless Mesh Nodes Via Genetic Algorithms.- Context-Aware Loading for Mobile Applications.- Performance Analysis of Angle Routing in MANETs.- Dynamic Network Reconfiguration by Combination of Different Wireless LANs.- Heterogeneous Networks.- Making an Agreement in an Order-Heterogeneous Group.- Performance Evaluation of Two Search Space Reduction Methods for a Distributed Network Architecture.- Prototype of a Workers’ Motion Trace System Using Terrestrial Magnetism and Acceleration Sensors.- Framework Design Supporting QoS-Power Trade-Offs for Heterogeneous Networked Systems.- Ad-Hoc Networks.- Route Cache Based Load Balancing Scheme for Mobile Ad-Hoc Networks.- Performance Evaluation of Load-Balancing Multi-path Routing Protocol for Mobile Ad-Hoc Networks.- A TCP Enhancement for QoS-Aware Mobile Ad-Hoc Networks.- Experimental and Simulation Evaluation of OLSR Protocol for Mobile Ad-Hoc Networks.- P2P, Grid and Internet Computing.- A Multi-Source Streaming Model for Mobile Peer-to-Peer (P2P) Overlay Networks.- Building a Linux Grid on a Virtual Machine Using a Windows Grid.- The Similarity Computing of Documents Based on VSM.- Case Study on the Recovery of a Virtual Large-Scale Disk.- Ad-Hoc and Sensor Networks.- Constant-Width Zones Broadcast Algorithm in Mobile Ad-Hoc Networks.- Orientation-Aware Indoor Localization Path Loss Prediction Model for Wireless Sensor Networks.- S-Web: An Efficient and Self-organizing Wireless Sensor Network Model.- Agent Based Analytical Model for Energy Consumption among Border Nodes in Wireless Sensor Networks.- Intelligent Algorithms and Systems.- A Self-organising Network Based on Lightweight Agents.- A Fuzzy-Based Handover System for Wireless Cellular Networks: A Case Study for Handover Enforcement.- Fault Tolerance for Small-World Cellular Neural Networks.- A 4+1 Bit Month-Scale Regularity Mining Algorithm with One-Path and Distributed Server Constraints for Mobile Internet.- Secure Systems and Applications.- Preventing Illegal Information Flow Based on Role-Based Access Control Model.- Authentication Binding between TLS and HTTP.- Embedding Legacy Keyword Search into Queries for the Ubiquitous ID Database.- Secure Ubiquitous Health Monitoring System.- Network Tools and Architectures.- COMANCHE: An Architecture for Software Configuration Management in the Home Environment.- Graphic Drawing Tools for Network Traffic Simulation.- A Methodology for the Enterprise Information and Communication Infrastructure Design Process.- A New Networked Surveillance Video System by Combination of Omni-Directional and Network Controlled Cameras.