Logo - springer
Slogan - springer

Computer Science - Communication Networks | Information and Communication Technologies - 18th EUNICE/IFIP WG 6.2, 6.6 International Conference,

Information and Communication Technologies

18th EUNICE/IFIP WG 6.2, 6.6 International Conference, EUNICE 2012, Budapest, Hungary, August 29-31, 2012, Proceedings

Szabo, Robert, Vidacs, Attila (Eds.)

2012, X, 450 p. 164 illus.

Available Formats:
eBook
Information

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.

 
$99.00

(net) price for USA

ISBN 978-3-642-32808-4

digitally watermarked, no DRM

Included Format: PDF

download immediately after purchase


learn more about Springer eBooks

add to marked items

Softcover
Information

Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$124.00

(net) price for USA

ISBN 978-3-642-32807-7

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days


add to marked items

  • Fast-track conference proceedings
  • State-of-the-art research
  • Up-to-date results
This book constitutes the refereed proceedings of the 18th EUNICE 2011 conference on information and communication technologies, held in Budapest, in August 2012.
The 23 oral papers demostrated together with 15 poster presentations were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on radio communications, security, management, protocols and performance, algorithms, models, and simulations.

Content Level » Research

Keywords » HTTP - authentication - information retrieval - middleware architectures - wireless sensor networks

Related subjects » Communication Networks - Database Management & Information Retrieval - Security and Cryptology - Software Engineering - Theoretical Computer Science

Table of contents 

Radio Communications.-Testbed Analysis of the Effects of IEEE 802.11s Power Save on Mesh Link Performance.-Path Selection and Adaptive Selection of Smart Antenna Transmission Schemes in Multi-hop Wireless Networks.-Receiver-Initiated vs. Short-Preamble Burst MAC Approaches for Multi-channel Wireless Sensor Networks.-White Spaces in UHF Band: Catalonia Case Study and Impact of the Digital Dividend.-Security.-A Framework for Security Context Migration in a Firewall Secured Virtual Machine Environment.-Enhancing Collaborative Intrusion Detection Methods Using a Kademlia Overlay Network.-Flow-Based Security Issue Detection in Building Automation and Control Networks.-Hash-Based Mutual Authentication Protocol for Low-Cost RFID Systems.-The Impact of IPv6 on Penetration Testing.-Management Linking Telecom Service High-Level Abstract Models to Simulators Based on Model Transformations: The IMS Case Study.-Network Migration Optimization Using Genetic Algorithms.-OWL-Based Node Capability Parameter Configuration.-Techno-Economic Comparison of Next-Generation Access Networks for the French Market.-The Design of a Single Funding Point Charging Architecture -Protocols and Performance A Two Layer Guaranteed and Sustained Rate Based Scheduler for IEEE 802.16-2009 Based WiMAX Networks.-Implementation and Evaluation of Coupled Congestion Control for Multipath TCP.-Improving Fairness for Adaptive HTTP Video Streaming.-Prototype of High Performance Scalable Advertising Server with Local Memory Storage and Centralised Processing.-Responsible Source Multicasting.-Algorithms, models and Simulations.-A Model for System Resources in Flexible Time-Triggered Middleware Architectures.-Modeling and Analysis of the Survivability of an Infrastructure-Based Wireless Network.-Private Quantum Coding for Quantum Relay Networks.-Target Surrounding Solution for Swarm Robots.-Poster Papers.-A Split Connection TCP Proxy in LTE Networks.-Adaptive Routing in Wireless Sensor Networks for Fire Fighting.-Automatic Handover Decision in Content Centric Networking.-Autonomous Sensor Network Architecture Model.-Efficient Multihop Broadcast with Distributed Protocol Evolution.-Finding Typical Internet User Behaviors.-Interoperability Description of Web Services Based Application Servers.Investigation of Quality of Experience for 3D Video in Wireless Network Environment.-Investigation of WLAN Access Point Placement for Indoor Positioning Improving the Efficiency of HTTP Caching by Hash Based Resource Identifiers.-Nonmonotonicity in Trust Management.-Radio Propagation Modeling on 433 MHz.-Semantic Intelligent Space for Ambient Assisted Living.-Simulating Network Coding for Accelerating Tit-for-Tat in Peer-to-Peer Content Sharing.-The Costs of Web Advertisements While Mobile Browsing.-

Popular Content within this publication 

 

Articles

Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Computer Communication Networks.