Amazon cover image
Image from Amazon.com

Ad Hoc Networks [electronic resource] : 5th International ICST Conference, ADHOCNETS 2013, Barcelona, Spain, October 2013, Revised Selected Papers / edited by Mostafa Hashem Sherif, Abdelhamid Mellouk, Jun Li, Paolo Bellavista.

By: Contributor(s): Material type: TextTextSeries: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; 129Publisher: Cham : Springer International Publishing : Imprint: Springer, 2014Description: X, 229 p. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783319041056
Subject(s): Additional physical formats: Printed edition:: No titleDDC classification:
  • 004.6 23
LOC classification:
  • TK5105.5-5105.9
Online resources:
Contents:
New Re-association Procedures for Reliable Handover in IEEE 802.15.4 Wireless Sensor Networks -- Mobile Data Collector Assignment and Scheduling for Minimizing Data Delay in Partitioned Wireless Sensor Networks -- HRTS: a Hierarchical Reactive Time Synchronization protocol for wireless sensor networks -- The Agony of Choice: Analysis of Routing Protocols in Chain Mesh Networks -- Traffic Modeling and Performance Evaluation in Vehicle to Infrastructure 802.11p Network Social-aware Opportunistic Routing Protocol based on User’s Interactions and Interests -- Node Wake-Up via OVSF-Coded Bloom Filters in Wireless Sensor Networks -- To Eavesdrop or Jam, That is the Question Using Cluster Analysis to Detect Attackers in Vehicular Delay Tolerant Networks -- An Efficient and Secure ARP for Large-scale IEEE 802.11s-based Smart Grid Networks.
In: Springer eBooksSummary: This book constitutes the thoroughly refereed proceedings of the 5th International Conference on Ad Hoc Networks, ADHOCNETS 2013, held in Paris, Barcelona, Spain, in October 2013. The 14 revised full papers presented were carefully selected and reviewed from numerous submissions. The papers cover a wide range of applications, commercial and military, such as mobile ad hoc networks, sensor networks, vehicular networks, underwater networks, underground networks, personal area networks, home networks, and large-scale metropolitan networks for smart cities. They are organized in topical sections on Wireless Sensor Networks, Routing, Applications, and Security.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
E-Book E-Book Central Library Available E-41437

New Re-association Procedures for Reliable Handover in IEEE 802.15.4 Wireless Sensor Networks -- Mobile Data Collector Assignment and Scheduling for Minimizing Data Delay in Partitioned Wireless Sensor Networks -- HRTS: a Hierarchical Reactive Time Synchronization protocol for wireless sensor networks -- The Agony of Choice: Analysis of Routing Protocols in Chain Mesh Networks -- Traffic Modeling and Performance Evaluation in Vehicle to Infrastructure 802.11p Network Social-aware Opportunistic Routing Protocol based on User’s Interactions and Interests -- Node Wake-Up via OVSF-Coded Bloom Filters in Wireless Sensor Networks -- To Eavesdrop or Jam, That is the Question Using Cluster Analysis to Detect Attackers in Vehicular Delay Tolerant Networks -- An Efficient and Secure ARP for Large-scale IEEE 802.11s-based Smart Grid Networks.

This book constitutes the thoroughly refereed proceedings of the 5th International Conference on Ad Hoc Networks, ADHOCNETS 2013, held in Paris, Barcelona, Spain, in October 2013. The 14 revised full papers presented were carefully selected and reviewed from numerous submissions. The papers cover a wide range of applications, commercial and military, such as mobile ad hoc networks, sensor networks, vehicular networks, underwater networks, underground networks, personal area networks, home networks, and large-scale metropolitan networks for smart cities. They are organized in topical sections on Wireless Sensor Networks, Routing, Applications, and Security.

There are no comments on this title.

to post a comment.

Maintained by VTU Library