×







We sell 100% Genuine & New Books only!

Network-Based Information Systems 2Nd Internatonal Conference Nbis 2008 Turin Italy September 1-5 2008 Proceedings 2008 Edition at Meripustak

Network-Based Information Systems 2Nd Internatonal Conference Nbis 2008 Turin Italy September 1-5 2008 Proceedings 2008 Edition by TAKIZAWA,M., BAROLLI,L., SPRINGER

Books from same Author: TAKIZAWA,M., BAROLLI,L.

Books from same Publisher: SPRINGER

Related Category: Author List / Publisher List


  • Price: ₹ 6317.00/- [ 5.00% off ]

    Seller Price: ₹ 6001.00

Estimated Delivery Time : 4-5 Business Days

Sold By: Meripustak      Click for Bulk Order

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

We deliver across all postal codes in India

Orders Outside India


Add To Cart


Outside India Order Estimated Delivery Time
7-10 Business Days


  • We Deliver Across 100+ Countries

  • MeriPustak’s Books are 100% New & Original
  • General Information  
    Author(s)TAKIZAWA,M., BAROLLI,L.
    PublisherSPRINGER
    ISBN9783540856924
    Pages324
    BindingSoftbound
    LanguageEnglish
    Publish YearSeptember 2008

    Description

    SPRINGER Network-Based Information Systems 2Nd Internatonal Conference Nbis 2008 Turin Italy September 1-5 2008 Proceedings 2008 Edition by TAKIZAWA,M., BAROLLI,L.

    This book constitutes the refereed proceedings of the Second International Conference on Network-Based Information Systems, NBIS 2008, held in Turin, Italy, September 1-5, 2008 in conjunction with Dexa 2008. The 32 revised full papers presented were carefully reviewed and selected from 81 submissions. The papers are organized in topical sections on wireless networks; heterogeneous networks; ad hoc networks; P2P, grid and internet computing; ad hoc and sensor networks; intelligent algorithms and systems; secure systems and applicatinos as well as network tools and architectures. NBiS-2008 Keynote Talk.- Patterns in Internet Architecture.- Wireless Networks.- GAMesh: Automatic Placement of Wireless Mesh Nodes Via Genetic Algorithms.- Context-Aware Loading for Mobile Applications.- Performance Analysis of Angle Routing in MANETs.- Dynamic Network Reconfiguration by Combination of Different Wireless LANs.- Heterogeneous Networks.- Making an Agreement in an Order-Heterogeneous Group.- Performance Evaluation of Two Search Space Reduction Methods for a Distributed Network Architecture.- Prototype of a Workers' Motion Trace System Using Terrestrial Magnetism and Acceleration Sensors.- Framework Design Supporting QoS-Power Trade-Offs for Heterogeneous Networked Systems.- Ad-Hoc Networks.- Route Cache Based Load Balancing Scheme for Mobile Ad-Hoc Networks.- Performance Evaluation of Load-Balancing Multi-path Routing Protocol for Mobile Ad-Hoc Networks.- A TCP Enhancement for QoS-Aware Mobile Ad-Hoc Networks.- Experimental and Simulation Evaluation of OLSR Protocol for Mobile Ad-Hoc Networks.- P2P, Grid and Internet Computing.- A Multi-Source Streaming Model for Mobile Peer-to-Peer (P2P) Overlay Networks.- Building a Linux Grid on a Virtual Machine Using a Windows Grid.- The Similarity Computing of Documents Based on VSM.- Case Study on the Recovery of a Virtual Large-Scale Disk.- Ad-Hoc and Sensor Networks.- Constant-Width Zones Broadcast Algorithm in Mobile Ad-Hoc Networks.- Orientation-Aware Indoor Localization Path Loss Prediction Model for Wireless Sensor Networks.- S-Web: An Efficient and Self-organizing Wireless Sensor Network Model.- Agent Based Analytical Model for Energy Consumption among Border Nodes in Wireless Sensor Networks.- Intelligent Algorithms and Systems.- A Self-organising Network Based on Lightweight Agents.- A Fuzzy-Based Handover System for Wireless Cellular Networks: A Case Study for Handover Enforcement.- Fault Tolerance for Small-World Cellular Neural Networks.- A 4+1 Bit Month-Scale Regularity Mining Algorithm with One-Path and Distributed Server Constraints for Mobile Internet.- Secure Systems and Applications.- Preventing Illegal Information Flow Based on Role-Based Access Control Model.- Authentication Binding between TLS and HTTP.- Embedding Legacy Keyword Search into Queries for the Ubiquitous ID Database.- Secure Ubiquitous Health Monitoring System.- Network Tools and Architectures.- COMANCHE: An Architecture for Software Configuration Management in the Home Environment.- Graphic Drawing Tools for Network Traffic Simulation.- A Methodology for the Enterprise Information and Communication Infrastructure Design Process.- A New Networked Surveillance Video System by Combination of Omni-Directional and Network Controlled Cameras.



    Book Successfully Added To Your Cart