Quality, reliability, security and robustness in heterogeneous networks: 9th 9th international conference, QShine 2013, Greader Noida, India, January 11-12, 2013 ; revised selected papers
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Tagungsbericht Buch |
Sprache: | English |
Veröffentlicht: |
Heidelberg [u.a.]
Springer
2013
|
Schriftenreihe: | Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
115 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis Inhaltsverzeichnis |
Beschreibung: | XVII, 1011 S. Ill., graph. Darst. |
ISBN: | 9783642379482 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV041462473 | ||
003 | DE-604 | ||
005 | 20140408 | ||
007 | t| | ||
008 | 131205s2013 xx ad|| |||| 00||| eng d | ||
016 | 7 | |a 1032794712 |2 DE-101 | |
020 | |a 9783642379482 |9 978-3-642-37948-2 | ||
035 | |a (OCoLC)859018873 | ||
035 | |a (DE-599)DNB1032794712 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-11 | ||
082 | 0 | |a 004 | |
084 | |a 54.32 |2 bkl | ||
084 | |a 53.70 |2 bkl | ||
245 | 1 | 0 | |a Quality, reliability, security and robustness in heterogeneous networks |b 9th 9th international conference, QShine 2013, Greader Noida, India, January 11-12, 2013 ; revised selected papers |c Karan Singh ... (ed.) |
264 | 1 | |a Heidelberg [u.a.] |b Springer |c 2013 | |
300 | |a XVII, 1011 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |v 115 | |
650 | 0 | 7 | |a Sensorsystem |0 (DE-588)4307964-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Funknetz |0 (DE-588)4216130-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Netzwerktopologie |0 (DE-588)4208537-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Heterogenes Netzwerk |0 (DE-588)4620176-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Dienstgüte |0 (DE-588)4496068-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zuverlässigkeit |0 (DE-588)4059245-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Robustheit |0 (DE-588)4126481-2 |2 gnd |9 rswk-swf |
655 | 7 | |8 1\p |0 (DE-588)1071861417 |a Konferenzschrift |y 2013 |z Greater Noida |2 gnd-content | |
689 | 0 | 0 | |a Heterogenes Netzwerk |0 (DE-588)4620176-2 |D s |
689 | 0 | 1 | |a Netzwerktopologie |0 (DE-588)4208537-8 |D s |
689 | 0 | 2 | |a Funknetz |0 (DE-588)4216130-7 |D s |
689 | 0 | 3 | |a Sensorsystem |0 (DE-588)4307964-7 |D s |
689 | 0 | 4 | |a Robustheit |0 (DE-588)4126481-2 |D s |
689 | 0 | 5 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 6 | |a Zuverlässigkeit |0 (DE-588)4059245-5 |D s |
689 | 0 | 7 | |a Dienstgüte |0 (DE-588)4496068-2 |D s |
689 | 0 | |8 2\p |5 DE-604 | |
700 | 1 | |a Singh, Karan |4 edt | |
711 | 2 | |a QShine |n 9 |d 2013 |c Greater Noida |j Sonstige |0 (DE-588)1038769043 |4 oth | |
830 | 0 | |a Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |v 115 |w (DE-604)BV035393800 |9 115 | |
856 | 4 | |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4283916&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext | |
856 | 4 | |m DE-601 |q pdf/application |u http://www.gbv.de/dms/tib-ub-hannover/739915061.pdf |3 Inhaltsverzeichnis | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026908807&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-026908807 |
Datensatz im Suchindex
_version_ | 1820882541108789248 |
---|---|
adam_text |
IMAGE 1
TABLE OF CONTENTS
NETWORK
DSG-PC: DYNAMIC SOCIAL GROUPING BASED ROUTING FOR NON-UNIFORM BUFFER
CAPACITIES IN DTN SUPPORTED WITH PERIODIC CARRIERS 1
RAHUL JOHARI, NEELIMA GUPTA, AND SANDHYA ANEJA
INTEGRATED APPROACH FOR MULTICAST SOURCE AUTHENTICATION AND CONGESTION
CONTROL 16
KARAN SINGH AND RAMA SHANKAR YADAV
NETWORK SELECTION FOR REMOTE HEALTHCARE SYSTEMS THROUGH MAPPING BETWEEN
CLINICAL AND NETWORK PARAMETER 31
R.AJEEV AGRAWAL AND AMIT SEHGAL
PERFORMANCE ANALYSIS OF SMAC PROTOCOL IN WIRELESS SENSOR NETWORKS USING
NETWORK SIMULATOR (NS-2) 42
GAYATRI SAKYA AND VIDUSHI SHARMA
ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORK: A REVIEW 52
BAHUGUNA R.ENU, MANDORIA HARDWARI LAL, AND TAYAL PRANAVI
CARRIER AGGREGATION FOR ENHANCEMENT OF BANDWIDTH IN 4G SYSTEMS 61
JOLLY PARIKH AND ANURADHA BASU
A STABLE ENERGY-EFFICIENT LOCATION BASED CLUSTERING SCHEME FOR AD HOC
NETWORKS 75
ANUBHUTI RODA MOHINDRA AND CHARU KUMAR
COMPARATIVE ANALYSIS OF CONTENTION BASED MEDIUM ACCESS CONTROL PROTOCOLS
FOR WIRELESS SENSOR NETWORKS 86
CHANDAN KUMAR SONKAR, OM PRAKASH SANGWAN, AND ARUN MANI TRIPATHI
SEP-E (RCH): ENHANCED STABLE ELECTION PROTOCOL BASED ON REDUNDANT
CLUSTER HEAD SELECTION FOR HWSNS 104
R.AJU PAL, R.ITU SINDHU, AND AJAY K SHARMA
MOBILITY BASED ENERGY EFFICIENT COVERAGE HOLE MAINTENANCE FOR WIRELESS
SENSOR NETWORK 115
ANIL KUMAR SAGAR AND D.K. LOBIYAL
HASL: HIGH-SPEED AUV-BASED SILENT LOCALIZATION FOR UNDERWATER SENSOR
NETWORKS 128
TAMOGHNA OJHA AND SUDIP MISRA
HTTP://D-NB.INFO/1032794712
IMAGE 2
XIJ TABLE OF CONTENTS
CLUSTERHEAD SELECTION USING MULTIPLE ATTRIBUTE DECISION MAKING (MADM)
APPROACH IN WIRELESS SENSOR NETWORKS 141
PUNEET AZAD AND VIDUSHI SHARRNA
KEY PRE-DISTRIBUTION IN A NON-UNIFORM NETWORK USING COMBINATORIAL DESIGN
155
SARBARI MITRA AND SOURAV MUKHOPADHYAY
FLAME: A FLEXIBLE AND LOW-POWER ARCHITECTURE FOR WIRELESS MESH NETWORKS
171
SEYED, DA,WOOD SAJJADI TORSHIZI, SADRA' MOHAMMADALIAN, FAZIRULHISYAM
HASHIM, AND, SUBRAMANIAM SHAMALA
SCHEME FOR ASSIGNING SECURITY AUTOMATICALLY FOR REAL-TIME WIRELESS NODES
VIA AR.SA 185
R.AJESH DUVVURU, SUNIL KUMAR SINGH, GUDIKHANDULA NARASIMHA RAO, ASHOK
KOTE, BANGA.RU BALA, KRISHNA, AND MOTURU VIJAYA R.AJU,
THE OUTAGE ANALYSIS OF INTER-RELAY CODED COOPERATION OVER NAKAGAMI-M
FADING CHANNELS 197
PRABHAT KUMAR SHARMA AND PARUL GARG
POWER EFFICIENT MAC PROTOCOL FOR MOBILE AD HOC NETWORKS 207
SOHAN KUMAR YADAV AND D.K. LOBIYAL
FAULT TOLERANT RANGE GROUPING R.OUTING IN DYNAMIC NETWORKS 218
AKANKSHA BHARDWAJ, PRACHI BADERA, AND K. RAJA.LAK.SHMI
DEPLOYMENT OF SENSORS IN REGULAR TERRAIN IN FORM OF INTERCONNECTED WSN
UNITS 228
ARWP KR. CHATTOPADLIYAY AND CHANDA.N KR. BHATTACHARYYA
3-TIER HETEROGENEOUS NETWORK MODEL FOR INCREASING LIFETIME IN THREE
DIMENSIONAL WSNS 238
SAMAYVEER SINGH, SATISH C'H.AND, AND. BIJENDRA, KUMAR
A COMPARATIVE STUDY OF REACTIVE R.OUTING PROTOCOLS FOR INDUSTRIAL
WIRELESS SENSOR NETWORKS 248
MANISH KUMAR, ITIKA GUPTA, SUDARSHA.N TIWARI, AND R.AJEEV TRIPATHI
MOBILE BASED ATTENDANCE SYSTEM IN DISTRIBUTED LAN SERVER 261
R.ATNESH PRASAD SRIVA.STA.VA, HARDWARI LAI MANDORIA, AND R.AJESH
NAUTIYAL
ROBUSTNESS
AN IMPROVED METHOD FOR CONTRAST ENHANCEMENT OF REAL WORLD HYPERSPECTRAL
IMAGES 273
SHY AM LAI, RAHUL KUMAR, AND, MAHESH CHANDRA
IMAGE 3
TABLE OF CONTENTS XIII
WAVELET ANALYSIS OF ELECTRICAL SIGNALS FROM BRAIN: THE
ELECTROENCEPHALOGRAM 283
ROHTASH DHIMAN, PRIYANKA, AND ,J.S. SAINI
DESIGN AND ANALYSIS OF SMALL PLANAR ANTENNA BASED ON CR.LH METARNATERIAL
FOR WSN APPLICATION 290
SANJEEV JAIN, INDRASEN SINGH, VIJAY SHANKER TRIPATHI, AND SUDARSHAN
TIWARI
CLASSIFICATION OF SPEECH DYSFLUENCIES USING SPEECH PARAMETERIZATION
TECHNIQUES AND MULTICLASS SVM 298
P. MAHESHA AND D.S. VINOD
R.OBOGARDNER: A LOW-COST SYSTEM WITH AUTOMATIC PLANT IDENTIFICATION
USING MARKERS 309
REEMA, ASWANI AND N. HERRIA
6H-SIC BASED POWER VJFET AND ITS TEMPERATURE DEPENDENCE 325
AMIR KHAN, MOHD. HASAN, ANWAR SADAT, AND SHAMSUZ Z. USMANI
CHANGE DETECTION FROM SATELLITE LINAGES USING PNN 333
AKANSHA MEHROTRA, KRISHNA KANT SINGH, KIRAT PAL, AND M.J. NIG AM
OPTIMAL LOCATION AND SIZE OF DIFFERENT TYPE OF DISTRIBUTED GENERATION
WITH VOLTAGE STEP CONSTRAINT AND MIXED LOAD MODELS 341
RAJENDRA P. PAYASI, ASHEESH K. SINGH, AND DEVENDER SINGH
MICROSTRIP PATCH ANTENNA MINIATURIZATION USING PLANAR METARNATERIAL UNIT
CELL 358
INDRASEN SINGH, SANJEEV JAIN, VIJAY SHANKER TRIPATHI, AND SUDARSHAN
TIWARI
SIMULATION AND MODELING OF A CONSTANT VOLTAGE CONTROLLER BASED SOLAR
POWERED WATER PUMPING SYSTEM 365
BHAVNESH KUMAR, YOGESH K. CHAUHAN, AND VIVEK SHRIVASTAVA
DESIGN OF LOW POWER FSM USING VERILOG IN VLSI 377
HIMANI MITTAL, DINESH CHANDRA, AND ARVIND TIWARI,
PRUNING SEARCH SPACES OF RATA MODEL FOR THE JOB-SHOP SCHEDULING . 387
FARID ARFI, JEAN-MICHEL ILIE, AND DJAMEL-EDDINE SAIDOUNI
FUZZY APPROACH FOR IMAGE NEAR-DUPLICATE DETECTION USING GRAY LEVEL
VERTEX MATCHING IN ATTRIBUTE RELATIONAL BIPARTITE GRAPHS 402
GOUTAM DATTA AND BUSHAN L. R.AINA
FORMAL MODELING OF MOBILE MIDDLEWARE FOR TUPLE SPACE COORDINATION OVER
MULTIPLE HETEROGENEOUS NETWORKS 415
SUDDHASIL DE, DIGANTA GOSWAMI, AND SUKUMAR NANDI
IMAGE 4
XIV
TABLE OF CONTENTS
SIMPLIFIED CONTROL ALGORITHM BASED ON IRP THEORY FOR THREE PHASE SHUNT
ACTIVE POWER FILTER 431
A JAY KUMAR MAURYA AND YOGESH K. CHAUHAN
REAL TIME OBJECT TRACKING: SIMULATION AND IMPLEMENTATION ON FPGA BASED
SOFT PROCESSOR 441
MANOJ PANDEY, DOROTHI BORGOHAIN, GARGI BARUAH, J.S. UBHI, AND KOTA
SOLOMON B.AJU
REDUCED COMPLEXITY PSEUDO-FRACTIONAL ADAPTIVE ALGORITHM WITH VARIABLE
TAP-LENGTH SELECTION 451
ASUTOSH KAR AND MAHESH CHANDRA
SECURITY
AN EFFICIENT AND SECURE MICRO-PAYMENT TRANSACTION USING SHELL
CRYPTOGRAPHY 461
MAYANK TIWARI, B.AJESHWAR KUMAR, SHAIVYA JINDAI, PANKAJ SHARMA, AND
PRIYANSHU
HIGH SPEED RECONFIGURABLE FPGA BASED DIGITAL FILTER 470
NAVAID Z. B.IZVI, B.AAZIYAH SHAMIM, B.AJESH MISHRA, AND SANDEEP SHARMA
APPLICABILITY OF ROUGH SET TECHNIQUE FOR DATA INVESTIGATION AND
OPTIMIZATION OF INTRUSION DETECTION SYSTEM 479
SANJIBAN SEKHAR B.OY, V. MADHU VISWANATHAM, B. VENKATA KRISHNA, N.
SARAF, A. GUPTA, AND B.AJESH MISHRA
NTTM: NOVEL TRANSMISSION TIME BASED MECHANISM TO DETECT WORMHOLE ATTACK
485
KUMAR CHANCHAL AND D.K. LOBIYAL
A PRIVACY PRESERVING REPRESENTATION FOR WEB SERVICE COMMUNICATORS' IN
THE CLOUD 496
D. CHANDRAMOHAN, T. VENGATTARAMAN, D. B.AJAGURU, B,. BASKARAN, AND B.
DHAVACHELVAN
DETAILED DOMINANT APPROACH CLOUD COMPUTING INTEGRATION WITH WSN 507
NIRANJAN LAI, SHAMIMUL QAMAR, AND MAYANK SINGH
SECRET IMAGE SHARING SCHEME BASED ON PIXEL REPLACEMENT 517
TAPASI BHATTACLIARJEE AND JYOTI BRAKASH SINGH
AN APPLICATION OF DEFEASIBLE LOGIC PROGRAMMING FOR FIREWALL VERIFICATION
AND RECONFIGURATION 527
BRITOM RAJKHOWA, SHYAMANTA M. HAZARIKA, AND GUILLERMO R. SIMARI,
IMAGE 5
TABLE OF CONTENTS XV
THREATS AND CHALLENGES TO SECURITY OF ELECTRONIC HEALTH RECORDS 543
SHALINI BHARTIYA AND DEEPTI MEHROTRA
ON SECOND-ORDER NONLINEARITIES OF TWO CLASSES OF CUBIC BOOLEAN FUNCTIONS
560
DEEP SINGH AND MAHESHANAND BHAINTWAL
A CERTIFICATELESS AUTHENTICATED KEY AGREEMENT PROTOCOL FOR DIGITAL
RIGHTS MANAGEMENT SYSTEM 568
DHEERENDRA MISHRA AND SOURAV MUKHOPADHYAY
GAS: A NOVEL GRID BASED AUTHENTICATION SYSTEM 578
NARAYAN GOWRAJ, SRINIVAS AVIREDDY, AND SRUTHI PRABHU
MULTIPLICATIVE WATERMARKING OF AUDIO IN SPECTRAL DOMAIN 591
JYOTSNA SINGH, PARUL GARG, AND ALOK NATH DE
A COMPARATIVE ANALYSIS OF VARIOUS DEPLOYMENT BASED DDOS DEFENSE SCHEMES
606
KARANBIR SINGH, NAVDEEP KAUR, AND DEEPA NEHRA
WG-8: A LIGHTWEIGHT STREAM CIPHER FOR RESOURCE-CONSTRAINED SMART DEVICES
617
XINXIN FAN, KALIKINKAR MANDAL, AND GUANG GONG
PROTECTING PLM DATA THROUGHOUT THEIR LIFECYCLE 633
ROHIT B.ANCHAL AND BHARAT BHARGAVA
FILTERING NONLINEAR FEEDBACK SHIFT REGISTERS USING WELCH-GONG
TRANSFORMATIONS FOR SECURING RFID APPLICATIONS 643
KALIKINKAR MANDAL AND GUANG GONG
PERFORMANCE ANALYSIS OF CRYPTOGRAPHIC ACCELERATION IN MULTICORE
ENVIRONMENT 658
YASHPAL DUTTA AND VARUN SETHI
A REVIEW ON WIRELESS NETWORK SECURITY 668
SANDEEP SHARMA, RAJESH MISHRA, AND KARAN SINGH
IMPROVED PROXY SIGNATURE SCHEME WITHOUT BILINEAR PAIRINGS 682
SAHADEO PADHYE AND NARNITA TIWARI
ENHANCED BLOCK PLAYFAIR CIPHER 689
ARVIND KUMAR, PAWAN SINGH MEHRA, GAGAN GUPTA, AND MANIKA SHARMA
CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION WITH USER REVOCATION
SUPPORT 696
A. BALU AND K. KUPPUSAMY
IMAGE 6
XVI TABLE OF CONTENTS
A PROPOSAL FOR SMS SECURITY USING NTR.U CRYPTOSYSTEM 706
ASHOK KUMAR NANDO, AND LALIT KUMAR AWASTHI
ANALYSIS AND IMPROVEMENT OF AN AUTHENTICATION SCHEME USING SMART CARDS
719
SONAM DEVGAN KANL AND AMIT K. AWASTHI
A REVIEW ON REMOTE USER AUTHENTICATION SCHEMES USING SMART CARDS 729
KEERTI SRIVASTAVA, AMIT K. AWASTHI, AND R.C. MITTAL
OUTLIER DETECTION AND TREATMENT FOR LIGHTWEIGHT MOBILE AD HOC NETWORKS
750 ADARSH KUMAR, KRISHNA GOPAL, AND ALOK AGGARWAL
IMAGE SECRET SHARING IN STEGO-IMAGES WITH AUTHENTICATION 764
ARNITAVA NAG, SUSHANTA BISWAS, DEBASREE SARKAR, AND PARTHA PRATIM SARKAR
ON GENERALIZED NEGA-HADAMARD TRANSFORM 771
ANKITA CHATURVEDI AND ADITI KAR GANGOPADHYAY
DESIGN OF HIGH PERFORMANCE MIPS CRYPTOGRAPHY PROCESSOR 778
KIRAT PAL SINGH, SHIVANI PARRRIAR, AND, DILIP KUMAR
DESIGN OF AN EDGE DETECTION BASED IMAGE STEGANOGRAPHV WITH HIGH
EMBEDDING CAPACITY 794
ARUP KUMAR PA,I AND TAROK PRAMANIK
TRUST MANAGEMENT METHOD FOR VEHICULAR AD HOC NETWORKS 801
R.IAZ AHMED SHAIKH AND AHMED SAEED ALZAHRANI
FEATURE AND FUTURE OF VISUAL CRYPTOGRAPHY BASED SCHEMES 816
DHIRAJ PANDEY, ANIL KUMAR, AND, YUDHVIR SINGH
A NOVEL FRAMEWORK FOR USERS' ACCOUNTABILITY ON ONLINE SOCIAL NETWORKS
831
GAMBHIR MOHIT, DOJA M.N., AND MOINUDDIN
NETWORK SECURITY USING ECC WITH BIOMETRIC 842
DINDAYAL MAHTO AND DILIP KUMAR YADAV
HYBRID KEY MANAGEMENT TECHNIQUE FOR WSN'S 854
RAVI KISHORE KODALI AND SUSHANT CHOUGULE
DR.MWSN-DETECTING REPLICA NODES USING MULTIPLE IDENTITIES IN WIRELESS
SENSOR NETWORK 866
NAGARAJ AMBIKA AND G. T. R.AJU
SECURITY IMPROVEMENT IN GROUP KEY MANAGEMENT 879
MANISHA MANJUL, RAKESH KUMAR, AND R.AJESH MISHRA
IMAGE 7
TABLE OF CONTENTS XVII
DETAILED DOMINANT APPROACH CLOUD COMPUTING INTEGRATION
WITH WSN 894
NIRANJAN LAI, SHAMIMUL QAMAR, AND MAYANK SINGH
RELIABILITY
SECURE REAL TIME SCHEDULING ON CLUSTER WITH ENERGY MINIMIZATION 904
R.UDRA PRATAP OJHA, RAMA SHANKA.R YADAV, AND SARSIJ TRIPATHI
WIRELESS SENSOR NODE PLACEMENT DUE TO POWER LOSS EFFECTS FROM
SURROUNDING VEGETATION 915
B.S. PAUL AND S. RIMER
INCREASING THE RELIABILITY OF FUZZY ANGLE ORIENTED CLUSTER USING
PEER-TO-PEER 928
R.EMANI NAGA VENKATA JAG AN MOHAN, VEGI SRINIVAS, AND KURRA RAJASEKHARA
RAO
EXTENDED ANT COLONY OPTIMIZATION ALGORITHM (EACO) FOR EFFICIENT DESIGN
OF NETWORKS AND IMPROVED RELIABILITY 939
MOLID ASHRAF AND R.AJESH MISHRA
EVALUATION OF UNDERSTANDABILITV OF OBJECT-ORIENTED DESIGN 951
DEVPRIYA SONI
SAFETY ANALYSIS OF AUTOMATIC DOOR OPERATION FOR METRO TRAIN: A CASE
STUDY 962
AJEET KUMAR PANDEY, SRINIVAS PANCHANGAM, AND JESSY GEORGE SMITH
A GENERALIZED MODEL FOR INTERNET-BASED ACCESS CONTROL SYSTEMS WITH
DELEGATION SUPPORT 975
UTHARN BURANASAKSEE, KRIENGKRAI PORKAEW, AND UMAPORN SUPASITTHIMETHEE
QUALITY OF SERVICE
QOS SUPPORT DOWNLINK FOR WIMAX NETWORK 989
POOJA GUPTA, BRIJESH KUMAR, AND BUSHAN L. R.AINA
A FRAMEWORK OF SERVICE SELECTION AND COMPOSITION FOR FLEXIBLE NETWORK
ARCHITECTURE 998
AKHILENDRA PRATAP SINGH, O.P. VYAS, AND SHIRSHU VARMA
AUTHOR INDEX 1009 |
any_adam_object | 1 |
author2 | Singh, Karan |
author2_role | edt |
author2_variant | k s ks |
author_facet | Singh, Karan |
building | Verbundindex |
bvnumber | BV041462473 |
classification_rvk | SS 2013 |
ctrlnum | (OCoLC)859018873 (DE-599)DNB1032794712 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV041462473</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140408</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">131205s2013 xx ad|| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1032794712</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642379482</subfield><subfield code="9">978-3-642-37948-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)859018873</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1032794712</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.32</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">53.70</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Quality, reliability, security and robustness in heterogeneous networks</subfield><subfield code="b">9th 9th international conference, QShine 2013, Greader Noida, India, January 11-12, 2013 ; revised selected papers</subfield><subfield code="c">Karan Singh ... (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Heidelberg [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVII, 1011 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering</subfield><subfield code="v">115</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sensorsystem</subfield><subfield code="0">(DE-588)4307964-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Funknetz</subfield><subfield code="0">(DE-588)4216130-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerktopologie</subfield><subfield code="0">(DE-588)4208537-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Heterogenes Netzwerk</subfield><subfield code="0">(DE-588)4620176-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Dienstgüte</subfield><subfield code="0">(DE-588)4496068-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zuverlässigkeit</subfield><subfield code="0">(DE-588)4059245-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Robustheit</subfield><subfield code="0">(DE-588)4126481-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2013</subfield><subfield code="z">Greater Noida</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Heterogenes Netzwerk</subfield><subfield code="0">(DE-588)4620176-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Netzwerktopologie</subfield><subfield code="0">(DE-588)4208537-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Funknetz</subfield><subfield code="0">(DE-588)4216130-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Sensorsystem</subfield><subfield code="0">(DE-588)4307964-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Robustheit</subfield><subfield code="0">(DE-588)4126481-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="6"><subfield code="a">Zuverlässigkeit</subfield><subfield code="0">(DE-588)4059245-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="7"><subfield code="a">Dienstgüte</subfield><subfield code="0">(DE-588)4496068-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Singh, Karan</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">QShine</subfield><subfield code="n">9</subfield><subfield code="d">2013</subfield><subfield code="c">Greater Noida</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1038769043</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering</subfield><subfield code="v">115</subfield><subfield code="w">(DE-604)BV035393800</subfield><subfield code="9">115</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4283916&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="m">DE-601</subfield><subfield code="q">pdf/application</subfield><subfield code="u">http://www.gbv.de/dms/tib-ub-hannover/739915061.pdf</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026908807&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026908807</subfield></datafield></record></collection> |
genre | 1\p (DE-588)1071861417 Konferenzschrift 2013 Greater Noida gnd-content |
genre_facet | Konferenzschrift 2013 Greater Noida |
id | DE-604.BV041462473 |
illustrated | Illustrated |
indexdate | 2025-01-10T17:08:31Z |
institution | BVB |
institution_GND | (DE-588)1038769043 |
isbn | 9783642379482 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026908807 |
oclc_num | 859018873 |
open_access_boolean | |
owner | DE-11 |
owner_facet | DE-11 |
physical | XVII, 1011 S. Ill., graph. Darst. |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
series2 | Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
spelling | Quality, reliability, security and robustness in heterogeneous networks 9th 9th international conference, QShine 2013, Greader Noida, India, January 11-12, 2013 ; revised selected papers Karan Singh ... (ed.) Heidelberg [u.a.] Springer 2013 XVII, 1011 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 115 Sensorsystem (DE-588)4307964-7 gnd rswk-swf Funknetz (DE-588)4216130-7 gnd rswk-swf Netzwerktopologie (DE-588)4208537-8 gnd rswk-swf Heterogenes Netzwerk (DE-588)4620176-2 gnd rswk-swf Dienstgüte (DE-588)4496068-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Zuverlässigkeit (DE-588)4059245-5 gnd rswk-swf Robustheit (DE-588)4126481-2 gnd rswk-swf 1\p (DE-588)1071861417 Konferenzschrift 2013 Greater Noida gnd-content Heterogenes Netzwerk (DE-588)4620176-2 s Netzwerktopologie (DE-588)4208537-8 s Funknetz (DE-588)4216130-7 s Sensorsystem (DE-588)4307964-7 s Robustheit (DE-588)4126481-2 s Computersicherheit (DE-588)4274324-2 s Zuverlässigkeit (DE-588)4059245-5 s Dienstgüte (DE-588)4496068-2 s 2\p DE-604 Singh, Karan edt QShine 9 2013 Greater Noida Sonstige (DE-588)1038769043 oth Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 115 (DE-604)BV035393800 115 text/html http://deposit.dnb.de/cgi-bin/dokserv?id=4283916&prov=M&dok_var=1&dok_ext=htm Inhaltstext DE-601 pdf/application http://www.gbv.de/dms/tib-ub-hannover/739915061.pdf Inhaltsverzeichnis DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026908807&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Quality, reliability, security and robustness in heterogeneous networks 9th 9th international conference, QShine 2013, Greader Noida, India, January 11-12, 2013 ; revised selected papers Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Sensorsystem (DE-588)4307964-7 gnd Funknetz (DE-588)4216130-7 gnd Netzwerktopologie (DE-588)4208537-8 gnd Heterogenes Netzwerk (DE-588)4620176-2 gnd Dienstgüte (DE-588)4496068-2 gnd Computersicherheit (DE-588)4274324-2 gnd Zuverlässigkeit (DE-588)4059245-5 gnd Robustheit (DE-588)4126481-2 gnd |
subject_GND | (DE-588)4307964-7 (DE-588)4216130-7 (DE-588)4208537-8 (DE-588)4620176-2 (DE-588)4496068-2 (DE-588)4274324-2 (DE-588)4059245-5 (DE-588)4126481-2 (DE-588)1071861417 |
title | Quality, reliability, security and robustness in heterogeneous networks 9th 9th international conference, QShine 2013, Greader Noida, India, January 11-12, 2013 ; revised selected papers |
title_auth | Quality, reliability, security and robustness in heterogeneous networks 9th 9th international conference, QShine 2013, Greader Noida, India, January 11-12, 2013 ; revised selected papers |
title_exact_search | Quality, reliability, security and robustness in heterogeneous networks 9th 9th international conference, QShine 2013, Greader Noida, India, January 11-12, 2013 ; revised selected papers |
title_full | Quality, reliability, security and robustness in heterogeneous networks 9th 9th international conference, QShine 2013, Greader Noida, India, January 11-12, 2013 ; revised selected papers Karan Singh ... (ed.) |
title_fullStr | Quality, reliability, security and robustness in heterogeneous networks 9th 9th international conference, QShine 2013, Greader Noida, India, January 11-12, 2013 ; revised selected papers Karan Singh ... (ed.) |
title_full_unstemmed | Quality, reliability, security and robustness in heterogeneous networks 9th 9th international conference, QShine 2013, Greader Noida, India, January 11-12, 2013 ; revised selected papers Karan Singh ... (ed.) |
title_short | Quality, reliability, security and robustness in heterogeneous networks |
title_sort | quality reliability security and robustness in heterogeneous networks 9th 9th international conference qshine 2013 greader noida india january 11 12 2013 revised selected papers |
title_sub | 9th 9th international conference, QShine 2013, Greader Noida, India, January 11-12, 2013 ; revised selected papers |
topic | Sensorsystem (DE-588)4307964-7 gnd Funknetz (DE-588)4216130-7 gnd Netzwerktopologie (DE-588)4208537-8 gnd Heterogenes Netzwerk (DE-588)4620176-2 gnd Dienstgüte (DE-588)4496068-2 gnd Computersicherheit (DE-588)4274324-2 gnd Zuverlässigkeit (DE-588)4059245-5 gnd Robustheit (DE-588)4126481-2 gnd |
topic_facet | Sensorsystem Funknetz Netzwerktopologie Heterogenes Netzwerk Dienstgüte Computersicherheit Zuverlässigkeit Robustheit Konferenzschrift 2013 Greater Noida |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4283916&prov=M&dok_var=1&dok_ext=htm http://www.gbv.de/dms/tib-ub-hannover/739915061.pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026908807&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV035393800 |
work_keys_str_mv | AT singhkaran qualityreliabilitysecurityandrobustnessinheterogeneousnetworks9th9thinternationalconferenceqshine2013greadernoidaindiajanuary11122013revisedselectedpapers AT qshinegreaternoida qualityreliabilitysecurityandrobustnessinheterogeneousnetworks9th9thinternationalconferenceqshine2013greadernoidaindiajanuary11122013revisedselectedpapers |