Network-Based Information Systems 2nd Internatonal Conference, NBiS 2008, Turin, Italy, September 1-5, 2008, Proceedings /

Network-Based Information Systems 2nd Internatonal Conference, NBiS 2008, Turin, Italy, September 1-5, 2008, Proceedings / [electronic resource] : edited by Makoto Takizawa, Leonard Barolli, Tomoya Enokido. - 1st ed. 2008. - XII, 324 p. online resource. - Information Systems and Applications, incl. Internet/Web, and HCI, 5186 2946-1642 ; . - Information Systems and Applications, incl. Internet/Web, and HCI, 5186 .

NBiS-2008 Keynote Talk -- Patterns in Internet Architecture -- Wireless Networks -- GAMesh: Automatic Placement of Wireless Mesh Nodes Via Genetic Algorithms -- Context-Aware Loading for Mobile Applications -- Performance Analysis of Angle Routing in MANETs -- Dynamic Network Reconfiguration by Combination of Different Wireless LANs -- Heterogeneous Networks -- Making an Agreement in an Order-Heterogeneous Group -- Performance Evaluation of Two Search Space Reduction Methods for a Distributed Network Architecture -- Prototype of a Workers’ Motion Trace System Using Terrestrial Magnetism and Acceleration Sensors -- Framework Design Supporting QoS-Power Trade-Offs for Heterogeneous Networked Systems -- Ad-Hoc Networks -- Route Cache Based Load Balancing Scheme for Mobile Ad-Hoc Networks -- Performance Evaluation of Load-Balancing Multi-path Routing Protocol for Mobile Ad-Hoc Networks -- A TCP Enhancement for QoS-Aware Mobile Ad-Hoc Networks -- Experimental and Simulation Evaluation of OLSR Protocol for Mobile Ad-Hoc Networks -- P2P, Grid and Internet Computing -- A Multi-Source Streaming Model for Mobile Peer-to-Peer (P2P) Overlay Networks -- Building a Linux Grid on a Virtual Machine Using a Windows Grid -- The Similarity Computing of Documents Based on VSM -- Case Study on the Recovery of a Virtual Large-Scale Disk -- Ad-Hoc and Sensor Networks -- Constant-Width Zones Broadcast Algorithm in Mobile Ad-Hoc Networks -- Orientation-Aware Indoor Localization Path Loss Prediction Model for Wireless Sensor Networks -- S-Web: An Efficient and Self-organizing Wireless Sensor Network Model -- Agent Based Analytical Model for Energy Consumption among Border Nodes in Wireless Sensor Networks -- Intelligent Algorithms and Systems -- A Self-organising Network Based on Lightweight Agents -- A Fuzzy-BasedHandover System for Wireless Cellular Networks: A Case Study for Handover Enforcement -- Fault Tolerance for Small-World Cellular Neural Networks -- A 4+1 Bit Month-Scale Regularity Mining Algorithm with One-Path and Distributed Server Constraints for Mobile Internet -- Secure Systems and Applications -- Preventing Illegal Information Flow Based on Role-Based Access Control Model -- Authentication Binding between TLS and HTTP -- Embedding Legacy Keyword Search into Queries for the Ubiquitous ID Database -- Secure Ubiquitous Health Monitoring System -- Network Tools and Architectures -- COMANCHE: An Architecture for Software Configuration Management in the Home Environment -- Graphic Drawing Tools for Network Traffic Simulation -- A Methodology for the Enterprise Information and Communication Infrastructure Design Process -- A New Networked Surveillance Video System by Combination of Omni-Directional and Network Controlled Cameras.

This book constitutes the refereed proceedings of the Second International Conference on Network-Based Information Systems, NBIS 2008, held in Turin, Italy, September 1-5, 2008 in conjunction with Dexa 2008. The 32 revised full papers presented were carefully reviewed and selected from 81 submissions. The papers are organized in topical sections on wireless networks; heterogeneous networks; ad hoc networks; P2P, grid and internet computing; ad hoc and sensor networks; intelligent algorithms and systems; secure systems and applicatinos as well as network tools and architectures.

9783540856931

10.1007/978-3-540-85693-1 doi


Computer networks .
Computer engineering.
Data protection.
Application software.
Computer Communication Networks.
Computer Engineering and Networks.
Data and Information Security.
Computer and Information Systems Applications.

TK5105.5-5105.9

004.6
© 2024 IIIT-Delhi, library@iiitd.ac.in