Networking and Mobile Computing
3rd International Conference, ICCNMC 2005, Zhangjiajie, China, August 2-4, 2005, Proceedings
(Sprache: Englisch)
Welcome to Zhangjiajie for the 3rd International Conference on Computer Network and Mobile Computing (ICCNMC 2005). We are currently witnessing a proliferation in mobile/wireless technologies and applications. However, these new technologies have ushered in...
Leider schon ausverkauft
versandkostenfrei
Buch
144.40 €
Produktdetails
Produktinformationen zu „Networking and Mobile Computing “
Klappentext zu „Networking and Mobile Computing “
Welcome to Zhangjiajie for the 3rd International Conference on Computer Network and Mobile Computing (ICCNMC 2005). We are currently witnessing a proliferation in mobile/wireless technologies and applications. However, these new technologies have ushered in unprecedented challenges for the research community across the range of networking, mobile computing, network security and wireless web applications, and optical network topics. ICCNMC 2005 was sponsored by the China Computer Federation, in cooperation with the Institute for Electrical and Electronics Engineers (IEEE) Computer Society. The objective of this conference was to address and capture highly innovative and stateof-the-art research and work in the networks and mobile computing industries. ICCNMC 2005 allowed sharing of the underlying theories and applications, and the establishment of new and long-term collaborative channels aimed at developing innovative concepts and solutions geared to future markets. The highly positive response to ICCNMC 2001 and ICCNMC 2003, held in Beijing and Shanghai, respectively, encouraged us to continue this international event. In its third year, ICCNMC 2005 continued to provide a forum for researchers, professionals, and industrial practitioners from around the world to report on new advances in computer network and mobile computing, as well as to identify issues and directions for research and development in the new era of evolving technologies.
Inhaltsverzeichnis zu „Networking and Mobile Computing “
Keynote Speech.- Self-organizing Wireless Sensor Networks in Action.- The Internet Control Architecture: Successes and Challenges.- Session 1: Sensor Networks I.- Distributed Localization Refinements for Mobile Sensor Networks.- Cooperative Target Localization Method for Heterogeneous Sensor Networks.- Sensor Network Configuration Under Physical Attacks.- TPSS: A Time-Based Positioning Scheme for Sensor Networks with Short Range Beacons.- Energy-Efficient Connected Coverage of Discrete Targets in Wireless Sensor Networks.- Coverage Algorithm and Protocol in Heterogeneous Sensor Networks.- Session 2: 3G/B3G Networks.- Simplified Message Transformation for Optimization of Message Processing in 3G-324M Control Protocol.- Dynamic Packet Scheduling Based on Utility Optimization in OFDM Networks.- Comb-Pattern Optimal Pilot in MIMO-OFDM System.- Channel-Adaptive GPS Scheduling for Heterogeneous Multimedia in CDMA Networks.- An Adaptive Scheduled Transmission Strategy for Multimedia Services in WCDMA Systems.- Semantic Web Enabled VHE for 3rd Generation Telecommunications.- Session 3: Peer-to-Peer Systems.- An Adaptive Replication Algorithm in Overlay Networking.- Performance Modeling of Mobile Peer-to-Peer Systems.- A Random Walk Based Anonymous Peer-to-Peer Protocol Design.- A System for Power-Aware Agent-Based Intrusion Detection (SPAID) in Wireless Ad Hoc Networks.- BSMON: Bandwidth-Satisfied Multicast in Overlay Network for Large-Scale Live Media Applications.- Session 4: Caching and Routing.- A Routing and Wavelength Assignment Algorithms Based on the State Level of Links.- Cooperative Determination on Cache Replacement Candidates for Transcoding Proxy Caching.- High Performance Embedded Route Lookup Coprocessor for Network Processors.- An Efficient Distributed Dynamic Multicast Routing with Delay and Delay Variation Constraints.- Data Caching in Selfish MANETs.- Session 5: Wireless Networks.- Optimal Scheduling for Link Assignment in Traffic-Sensitive STDMA Wireless
... mehr
Ad-Hoc Networks.- Modeling and Performance Evaluation of Handover Service in Wireless Networks.- The Optimum Parameter Design for WCDMA Intra-frequency Handover Initiation.- A New Location Management Scheme for the Next-Generation Mobile Cellular Networks.- Rapid Mobility of Mobile IP over WLAN.- Session 6: Multicast I.- Least Cost Multicast Spanning Tree Algorithm for Local Computer Network.- A New Multicast Group Management Scheme for IP Mobility Support.- On the Minimization of the Number of Forwarding Nodes for Multicast in Wireless Ad Hoc Networks.- The Impact of Mobility Modeling in Mobile IP Multicast Research.- Broadcast in the Locally k-Subcube-Connected Hypercube Networks with Faulty Tolerance.- Session 7: Ad Hoc Networks I.- Performance Analysis of Route Discovery in Wireless Ad Hoc Networks: A Unified Model.- A Load-Balancing Control Method Considering Energy Consumption Rate in Ad-Hoc Networks.- Efficient Node Forwarding Strategies via Non-cooperative Game for Wireless Ad Hoc Networks.- A Cluster-Based Group Rekeying Algorithm in Mobile Ad Hoc Networks.- Enhanced Positioning Probability System for Wireless Ad Hoc Networks.- A Virtual Circle-Based Clustering Algorithm with Mobility Prediction in Large-Scale MANETs.- Mobility-Aware On-demand Global Hosts for Ad-Hoc Multicast.- Session 8: Algorithms I.- Bottom Up Algorithm to Identify Link-Level Transition Probability.- An Extended GIX/M/1/N Queueing Model for Evaluating the Performance of AQM Algorithms with Aggregate Traffic.- Fair and Smooth Scheduling for Virtual Output Queuing Switches Achieving 100% Throughput.- Detour Path Optimization Algorithm Based on Traffic Duration Time in MPLS Network.- Session 9: Security I.- HAWK: Halting Anomalies with Weighted Choking to Rescue Well-Behaved TCP Sessions from Shrew DDoS Attacks.- Improved Thumbprint and Its Application for Intrusion Detection.- Performance Enhancement of Wireless Cipher Communication.- SAS: A Scalar Anonymous Communication System.- Two New Fast Methods for Simultaneous Scalar Multiplication in Elliptic Curve Cryptosystems.- Network-Based Anomaly Detection Using an Elman Network.- Session 10: Peer-to-Peer Systems and Web Service.- On Mitigating Network Partitioning in Peer-to-Peer Massively Multiplayer Games.- P2P-Based Software Engineering Management.- A Computational Reputation Model in P2P Networks Based on Trust and Distrust.- Web Services Peer-to-Peer Discovery Service for Automated Web Service Composition.- Efficient Mining of Cross-Transaction Web Usage Patterns in Large Database.- Session 11: Multicast II.- Delay-Constrained Multicasting with Power-Control in Wireless Networks.- Distributed Hierarchical Access Control for Secure Group Communications.- Hierarchical Multicast Tree Algorithms for Application Layer Mesh Networks.- A Novel Dual-Key Management Protocol Based on a Hierarchical Multicast Infrastructure in Mobile Internet.- Session 12: Traffic and Network Management.- Interdomain Traffic Control over Multiple Links Based on Genetic Algorithm.- Congestion Management of IP Traffic Using Adaptive Exponential RED.- An Analysis and Evaluation of Policy-Based Network Management Approaches.- An End-to-End QoS Provisioning Architecture in IPv6 Networks.- Introducing Public E-Mail Gateways: An Effective Hardening Strategy Against Spam.- Session 13: QoS I.- A Protection Tree Scheme for First-Failure Protection and Second-Failure Restoration in Optical Networks.- Distributed Dynamic Resource Management for the AF Traffic of the Differentiated Services Networks.- Constructing Correlations of Perturbed Connections Under Packets Loss and Disorder.- An Enhanced Packet Scheduling Algorithm for QoS Support in IEEE 802.16 Wireless Network.- A Novel Core Stateless Virtual Clock Scheduling Algorithm.- Proportional Differentiated Services for End-to-End Traffic Control.- Session 14: Ad Hoc Networks II.- Probability Based Dynamic Load-Balancing Tree Algorithm for Wireless Sensor Networks.- A Prediction-Based Location Update Algorithm in Wireless Mobile Ad-Hoc Networks.- Combining Power Management and Power Control in Multihop IEEE 802.11 Ad Hoc Networks.- Minimum Disc Cover Set Construction in Mobile Ad Hoc Networks.- Session 15: Routing.- A Study on Dynamic Load Balanced Routing Techniques in Time-Slotted Optical Burst Switched Networks.- A Novel Multi-path Routing Protocol.- A Simplified Routing and Simulating Scheme for the LEO/MEO Two-Layered Satellite Network.- ARS: An Synchronization Algorithm Maintaining Single Image Among Nodes' Forwarding Tables of Clustered Router.- Design and Implementation of Control-Extensible Router.- Dependable Propagating Routing Information in MANET.- Data Structure Optimization of AS_PATH in BGP.- Session 16: Algorithms II.- A Framework for Designing Adaptive AQM Schemes.- Designing Adaptive PI Algorithm Based on Single Neuron.- An Optimal Component Distribution Algorithm Based on MINLP.- Session 17: Security II.- An Efficient Anomaly Detection Algorithm for Vector-Based Intrusion Detection Systems.- Applying Mining Fuzzy Association Rules to Intrusion Detection Based on Sequences of System Calls.- A Novel and Secure Non-designated Proxy Signature Scheme for Mobile Agents.- Identity Based Conference Key Distribution Scheme from Parings.- Some Remarks on Universal Re-encryption and A Novel Practical Anonymous Tunnel.- Session 18: Internet Application.- An Integrated Information Retrieval Support System for Multiple Distributed Heterogeneous Cross-Lingual Information Sources.- DHAI: Dynamic Hierarchical Agent-Based Infrastructure for Supporting Large-Scale Distributed Information Processing.- Server-Assisted Bandwidth Negotiation Mechanism for Parallel Segment Retrieval of Web Objects.- Multiple Schema Based XML Indexing.- Session 19: QoS II.- A Linked-List Data Structure for Advance Reservation Admission Control.- An Adaptive Gateway Discovery Algorithm for the Integrated Network of Internet and MANET.- A Sender-Oriented Back-Track Enabled Resource Reservation Scheme.- Available Bandwidth Measurement Schemes over Networks.- Chaotic Dynamic Analysis of MPEG-4 Video Traffic and Its Influence on Packet Loss Ratio.- A Simple Streaming Media Transport Protocols Based on IPv6 QoS Mechanism.- An Aided Congestion Avoidance Mechanism for TCP Vegas.- Session 20: Security III.- On the Design of Provably Secure Identity-Based Authentication and Key Exchange Protocol for Heterogeneous Wireless Access.- Efficient Identity Based Proxy-Signcryption Schemes with Forward Security and Public Verifiability.- PKM: A Pairwise Key Management Scheme for Wireless Sensor Networks.- Secure Group Instant Messaging Using Cryptographic Primitives.- A Privacy Enhanced Role-Based Access Control Model for Enterprises.- Text Categorization Using SVMs with Rocchio Ensemble for Internet Information Classification.- Session 21: TCP/IP and Measurement.- OpenRouter: A TCP-Based Lightweight Protocol for Control Plane and Forwarding Plane Communication.- Efficient Approach to Merge and Segment IP Packets.- Measuring Internet Bottlenecks: Location, Capacity, and Available Bandwidth.- Experiment and Analysis of Active Measurement for Packet Delay Dynamics.- Session 22: Algorithms III.- A New Steganalytic Algorithm for Detecting Jsteg.- Packet Classification Algorithm Using Multiple Subspace Intersecting.- RSA Extended Modulus Attacks and Their Solutions in a Kind of Fair Exchange Protocols.- Using Ambient in Computational Reflection Semantics Description.- Session 23: Sensor Networks II.- Energy Aware Routing Based on Adaptive Clustering Mechanism for Wireless Sensor Networks.- Curve-Based Greedy Routing Algorithm for Sensor Networks.- Traffic Adaptive MAC Protocol for Wireless Sensor Network.- Semantic Sensor Net: An Extensible Framework.- Loop-Based Topology Maintenance in Wireless Sensor Networks.- Session 24: Design and Performance Analysis.- Generating Minimal Synchronizable Test Sequence That Detects Output-Shifting Faults.- Considering Network Context for Efficient Simulation of Highly Parallel Network Processors.- On the Placement of Active Monitor in IP Network.- Session 25: Traffic and Network Management II.- An Adaptive Edge Marking Based Hierarchical IP Traceback System.- FAOM: A Novel Active Queue Management with Fuzzy Logic for TCP-Based Interactive Communications.- A CORBA-Based Dynamic Reconfigurable Middleware.- An Integrated Architecture for QoS-Enable Router and Grid-Oriented Supercomputer.- Session 26: Agent-Based Algorithms.- APA: An Interior-Oriented Intrusion Detection System Based on Multi-agents.- Implementation of Ant Colony Algorithm Based-On Multi-agent System.- Load Balancing Using Mobile Agent and a Novel Algorithm for Updating Load Information Partially.- Session 27: Security Algorithms.- Online Internet Traffic Prediction Models Based on MMSE.- Mobile Code Security on Destination Platform.- A Publicly Verifiable Authenticated Encryption Scheme with Message Linkages.- Provable Security of ID-Based Proxy Signature Schemes.- A Practical Scheme of Merging Multiple Public Key Infrastructures in E-commerce.
... weniger
Autoren-Porträt
This book constitutes the refereed proceedings of the 3rd InternationalConference on Computer Network and Mobile Computing held inZhangjiajie, China, in August 2005.The 133 revised full papers and 2 keynote articles presented were carefully reviewed and selected from 662 submissions. They are organized in topical sections on sensor networks, 3G/B3G networks, peer-to-peer systems, caching and routing, wireless networks, multicast, ad hoc networks, algorithms, security, peer-to-peer systems and Web service, traffic and network management, QoS, routing, internet application, TCP/IP and measurement, design and performance analysis, agent-based algorithms, and security algorithms.
Bibliographische Angaben
- 2005, 2005., 1299 Seiten, Maße: 15,6 x 24,1 cm, Kartoniert (TB), Englisch
- Herausgegeben von Lu, Xicheng; Zhao, Wei
- Herausgegeben: Xicheng Lu, Wei Zhao
- Verlag: Springer
- ISBN-10: 3540281029
- ISBN-13: 9783540281023
- Erscheinungsdatum: 20.07.2005
Sprache:
Englisch
Kommentar zu "Networking and Mobile Computing"
0 Gebrauchte Artikel zu „Networking and Mobile Computing“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "Networking and Mobile Computing".
Kommentar verfassen