Picture 1 of 1
Picture 1 of 1
Networks and Communications (NetCom2013): Proceedings of the Fifth International
US $228.12
ApproximatelyAU $332.42
Condition:
Brand new
A new, unread, unused book in perfect condition with no missing or damaged pages. See the seller's listing for full details.
Postage:
Free Economy Shipping.
Located in: Fairfield, Ohio, United States
Delivery:
Estimated between Wed, 2 Oct and Mon, 7 Oct to 43230
Returns:
30-day returns. Buyer pays for return postage.
Payments:
Shop with confidence
Seller assumes all responsibility for this listing.
eBay item number:386706995871
Item specifics
- Condition
- ISBN-13
- 9783319036915
- Book Title
- Networks and Communications (NetCom2013)
- ISBN
- 9783319036915
- Subject Area
- Computers, Technology & Engineering
- Publication Name
- Networks and Communications (NetCom2013) : Proceedings of the Fifth International Conference on Networks and Communications
- Publisher
- Springer International Publishing A&G
- Item Length
- 9.3 in
- Subject
- Networking / General, Electrical, Telecommunications
- Publication Year
- 2014
- Series
- Lecture Notes in Electrical Engineering Ser.
- Type
- Textbook
- Format
- Hardcover
- Language
- English
- Item Weight
- 229.5 Oz
- Item Width
- 6.1 in
- Number of Pages
- Xv, 335 Pages
About this product
Product Identifiers
Publisher
Springer International Publishing A&G
ISBN-10
3319036912
ISBN-13
9783319036915
eBay Product ID (ePID)
175885164
Product Key Features
Number of Pages
Xv, 335 Pages
Language
English
Publication Name
Networks and Communications (NetCom2013) : Proceedings of the Fifth International Conference on Networks and Communications
Subject
Networking / General, Electrical, Telecommunications
Publication Year
2014
Type
Textbook
Subject Area
Computers, Technology & Engineering
Series
Lecture Notes in Electrical Engineering Ser.
Format
Hardcover
Dimensions
Item Weight
229.5 Oz
Item Length
9.3 in
Item Width
6.1 in
Additional Product Features
Intended Audience
Scholarly & Professional
Dewey Edition
23
Series Volume Number
284
Number of Volumes
1 vol.
Illustrated
Yes
Dewey Decimal
004.6
Table Of Content
Part I: Measurement and Performance Analysis.- An Evaluation of EpiChord in OverSim.- Enhanced back-off technique for IEEE 802.15.4 WSN standard.- Efficient Retransmission QoS-Aware MAC Scheme in Wireless Sensor Networks.- Performance Analysis of Correlated Channel for UWB-MIMO System.- Part II: Network Architectures, Protocols and Routing.- Node Failure Time Analysis for Maximum Stability vs. Minimum Distance.- Spanning Tree-based Data Gathering in Mobile Sensor Networks.- Wireless Networks: An Instance of Tandem Discrete-Time Queues.- An Equal Share Ant Colony Optimization Algorithm for Job Shop Scheduling adapted to Cloud Environments.- A Dynamic Trust Computation Model for Peer to Peer Network.- Road Traffic Management using Egyptian Vulture Optimization Algorithm - A New Graph Agent-Based Optimization Meta-Heuristic Algorithm.- Part III: Adhoc and Sensor Networks.- A Novel Bloom Filter Based Variant of Elliptic Curve Digital Signature Algorithm for Wireless Sensor Networks.- Energy Efficient Localization in Wireless Sensor Networks.- Part IV: Network Security, Trust and Privacy.- Data Integrity Verification in Hybrid Cloud using TTPA.- A Comparitive Study of Data Perturbation Using Fuzzy Logic in Preserving Privacy.- Vector Quantization in Language Independent Speaker Identification Using Mel-Frequency Cepstrum Co-Efficient.- Improved Technique for Data Confidentiality in Cloud Environment.- A Hybrid-Based Feature Selection Approach for IDS.- Reckoning Minutiae Points with RNA-FINNT Augments Trust and Privacy of Legitimate User and Ensures Network Security in the Public Network.- Empirical Study of Email Security Threats and Countermeasures.- Improving Business Intelligence based on Frequent Itemsets using k-means Clustering Algorithm.- Reputation-Based Trust Management for Distributed Spectrum Sensing.- Ontology Based Multi-Agent Intrusion Detection System for Web Service Attacks Using Self Learning.- A Novel Key ExchangeProtocol provably secure against Man-In-The-Middle Attack.- Neutralizing DoS attacks on Linux Servers.- Part V: Wireless and Mobile Networks.- Cache Coherency Algorithm to Optimize Bandwidth in Mobile Networks.- Connected Dominating Set based Scheduling for Publish-Subscribe Scenarios in WSN.- Ubiquitous Compaction Monitoring Interface for Soil compactor - A Web Based Approach.
Synopsis
Part I: Measurement and Performance Analysis.- An Evaluation of EpiChord in OverSim.- Enhanced back-off technique for IEEE 802.15.4 WSN standard.- Efficient Retransmission QoS-Aware MAC Scheme in Wireless Sensor Networks.- Performance Analysis of Correlated Channel for UWB-MIMO System.- Part II: Network Architectures, Protocols and Routing.- Node Failure Time Analysis for Maximum Stability vs. Minimum Distance.- Spanning Tree-based Data Gathering in Mobile Sensor Networks.- Wireless Networks: An Instance of Tandem Discrete-Time Queues.- An Equal Share Ant Colony Optimization Algorithm for Job Shop Scheduling adapted to Cloud Environments.- A Dynamic Trust Computation Model for Peer to Peer Network.- Road Traffic Management using Egyptian Vulture Optimization Algorithm - A New Graph Agent-Based Optimization Meta-Heuristic Algorithm.- Part III: Adhoc and Sensor Networks.- A Novel Bloom Filter Based Variant of Elliptic Curve Digital Signature Algorithm for Wireless Sensor Networks.- Energy Efficient Localization in Wireless Sensor Networks.- Part IV: Network Security, Trust and Privacy.- Data Integrity Verification in Hybrid Cloud using TTPA.- A Comparitive Study of Data Perturbation Using Fuzzy Logic in Preserving Privacy.- Vector Quantization in Language Independent Speaker Identification Using Mel-Frequency Cepstrum Co-Efficient.- Improved Technique for Data Confidentiality in Cloud Environment.- A Hybrid-Based Feature Selection Approach for IDS.- Reckoning Minutiae Points with RNA-FINNT Augments Trust and Privacy of Legitimate User and Ensures Network Security in the Public Network.- Empirical Study of Email Security Threats and Countermeasures.- Improving Business Intelligence based on Frequent Itemsets using k-means Clustering Algorithm.- Reputation-Based Trust Management for Distributed Spectrum Sensing.- Ontology Based Multi-Agent Intrusion Detection System for Web Service Attacks Using Self Learning.- A Novel Key Exchange Protocol provably secure against Man-In-The-Middle Attack.- Neutralizing DoS attacks on Linux Servers.- Part V: Wireless and Mobile Networks.- Cache Coherency Algorithm to Optimize Bandwidth in Mobile Networks.- Connected Dominating Set based Scheduling for Publish-Subscribe Scenarios in WSN.- Ubiquitous Compaction Monitoring Interface for Soil compactor - A Web Based Approach., This book covers theory, methodology and applications of computer networks, network protocols and wireless networks, data communication technologies, and network security. The book is based on the proceedings from the Fifth International Conference on Networks & Communications (NetCom). The proceedings will feature peer-reviewed papers that illustrate research results, projects, surveys and industrial experiences that describe significant advances in the diverse areas of computer networks & communications.
LC Classification Number
TK5101-5105.9
Item description from the seller
Seller Feedback (1,032,881)
- h***9 (3094)- Feedback left by buyer.Past 6 monthsVerified purchase🏆 SUPER STAR 🤩 AMAZING PHOTOS 🎯 ACCURATE DESCRIPTION ✏️ GENUINE PRODUCTS 💎 HIGH QUALITY 🍯 SUPER PRICES 💰 EASY TO WORK WITH 🍰 ECONOMY HANDLING ⏱️ FAST SHIPPING 🚀 BUBBLE PACKAGE 📦 ARRIVED WITHIN DAYS 🌎 EXCEPTIONAL COMMUNICATION 🎙️ OUTSTANDING CUSTOMER SERVICE 🛎️ GREAT SENSE OF HUMOR 🍿 TOTAL ASSET TO THE EBAY-ECO SYSTEM 🥇 SAVED SELLER 🎱 PROMT REPLY FOR RETURNS 🎯 WOULD BUY FROM AGAIN 🧲 UNDER PROMISES OVER DELIVERS ⛳️ MADE ME VERY HAPPY 🌈 LEFT POSITIVE FEEDBACK 🌼 THANK YOU! 😇 A+++The Trespasser's Companion by Nick Hayes (English) Hardcover Book (#395262922488)
- l***a (3592)- Feedback left by buyer.Past 6 monthsVerified purchaseExcellent seller. Great customer service and communication, timely shipping, fair prices, safe packing, as described. Thank you. A+++
- t***n (2908)- Feedback left by buyer.Past monthVerified purchaseI don't give negatives; However, description was not correct; No price guide was included in this book.As you will see in book pic shown; title states price guide included, no price guide inside. Communication poor, description, no communication price guide missing from this book. Shipping time was weeks before it was even shipped. Blamed the shipping on warehouse. You own & operate a business; your warehouse is not up to standards you change who you do business with. It's your responsibility.
Product ratings and reviews
More to explore:
- Communications Non-Fiction Hardcover Books,
- Paperbacks International Edition,
- Non-Fiction Commune Paperback Fiction & Books,
- Communications Non-Fiction Paperback Fiction & Books,
- International Edition Maps & Atlases,
- Non-Fiction Commune Fiction & Non-Fiction Books in French,
- International Law Non-Fiction Hardcover Books,
- International Edition School Textbooks & Study Guides,
- Non-Fiction Fiction Books & International Edition,
- The Bible Non-Fiction Fiction Books & International Edition