This book constitutes the refereed proceedings of the 18th EUNICE 2012 conference on information and communication technologies, held in Budapest, in August 2012. The 23 oral papers demostrated together with 15 poster presentations were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on radio communications, security, management, protocols and performance, algorithms, models, and simulations.
Radio Communications.-Testbed Analysis of the Effects of IEEE 802.11s Power Save on Mesh Link Performance.-Path Selection and Adaptive Selection of Smart Antenna Transmission Schemes in Multi-hop Wireless Networks.-Receiver-Initiated vs. Short-Preamble Burst MAC Approaches for Multi-channel Wireless Sensor Networks.-White Spaces in UHF Band: Catalonia Case Study and Impact of the Digital Dividend.-Security.-A Framework for Security Context Migration in a Firewall Secured Virtual Machine Environment.-Enhancing Collaborative Intrusion Detection Methods Using a Kademlia Overlay Network.-Flow-Based Security Issue Detection in Building Automation and Control Networks.-Hash-Based Mutual Authentication Protocol for Low-Cost RFID Systems.-The Impact of IPv6 on Penetration Testing.-Management Linking Telecom Service High-Level Abstract Models to Simulators Based on Model Transformations: The IMS Case Study.-Network Migration Optimization Using Genetic Algorithms.-OWL-Based Node Capability Parameter Configuration.-Techno-Economic Comparison of Next-Generation Access Networks for the French Market.-The Design of a Single Funding Point Charging Architecture -Protocols and Performance A Two Layer Guaranteed and Sustained Rate Based Scheduler for IEEE 802.16-2009 Based WiMAX Networks.-Implementation and Evaluation of Coupled Congestion Control for Multipath TCP.-Improving Fairness for Adaptive HTTP Video Streaming.-Prototype of High Performance Scalable Advertising Server with Local Memory Storage and Centralised Processing.-Responsible Source Multicasting.-Algorithms, models and Simulations.-A Model for System Resources in Flexible Time-Triggered Middleware Architectures.-Modeling and Analysis of the Survivability of an Infrastructure-Based Wireless Network.-Private Quantum Coding for Quantum Relay Networks.-Target Surrounding Solution for Swarm Robots.-Poster Papers.-A Split Connection TCP Proxy in LTE Networks.-Adaptive Routing in Wireless Sensor Networks for Fire Fighting.-Automatic Handover Decision in Content Centric Networking.-Autonomous Sensor Network Architecture Model.-Efficient Multihop Broadcast with Distributed Protocol Evolution.-Finding Typical Internet User Behaviors.-Interoperability Description of Web Services Based Application Servers.Investigation of Quality of Experience for 3D Video in Wireless Network Environment.-Investigation of WLAN Access Point Placement for Indoor Positioning Improving the Efficiency of HTTP Caching by Hash Based Resource Identifiers.-Nonmonotonicity in Trust Management.-Radio Propagation Modeling on 433 MHz.-Semantic Intelligent Space for Ambient Assisted Living.-Simulating Network Coding for Accelerating Tit-for-Tat in Peer-to-Peer Content Sharing.-The Costs of Web Advertisements While Mobile Browsing.-
Show moreThis book constitutes the refereed proceedings of the 18th EUNICE 2012 conference on information and communication technologies, held in Budapest, in August 2012. The 23 oral papers demostrated together with 15 poster presentations were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on radio communications, security, management, protocols and performance, algorithms, models, and simulations.
Radio Communications.-Testbed Analysis of the Effects of IEEE 802.11s Power Save on Mesh Link Performance.-Path Selection and Adaptive Selection of Smart Antenna Transmission Schemes in Multi-hop Wireless Networks.-Receiver-Initiated vs. Short-Preamble Burst MAC Approaches for Multi-channel Wireless Sensor Networks.-White Spaces in UHF Band: Catalonia Case Study and Impact of the Digital Dividend.-Security.-A Framework for Security Context Migration in a Firewall Secured Virtual Machine Environment.-Enhancing Collaborative Intrusion Detection Methods Using a Kademlia Overlay Network.-Flow-Based Security Issue Detection in Building Automation and Control Networks.-Hash-Based Mutual Authentication Protocol for Low-Cost RFID Systems.-The Impact of IPv6 on Penetration Testing.-Management Linking Telecom Service High-Level Abstract Models to Simulators Based on Model Transformations: The IMS Case Study.-Network Migration Optimization Using Genetic Algorithms.-OWL-Based Node Capability Parameter Configuration.-Techno-Economic Comparison of Next-Generation Access Networks for the French Market.-The Design of a Single Funding Point Charging Architecture -Protocols and Performance A Two Layer Guaranteed and Sustained Rate Based Scheduler for IEEE 802.16-2009 Based WiMAX Networks.-Implementation and Evaluation of Coupled Congestion Control for Multipath TCP.-Improving Fairness for Adaptive HTTP Video Streaming.-Prototype of High Performance Scalable Advertising Server with Local Memory Storage and Centralised Processing.-Responsible Source Multicasting.-Algorithms, models and Simulations.-A Model for System Resources in Flexible Time-Triggered Middleware Architectures.-Modeling and Analysis of the Survivability of an Infrastructure-Based Wireless Network.-Private Quantum Coding for Quantum Relay Networks.-Target Surrounding Solution for Swarm Robots.-Poster Papers.-A Split Connection TCP Proxy in LTE Networks.-Adaptive Routing in Wireless Sensor Networks for Fire Fighting.-Automatic Handover Decision in Content Centric Networking.-Autonomous Sensor Network Architecture Model.-Efficient Multihop Broadcast with Distributed Protocol Evolution.-Finding Typical Internet User Behaviors.-Interoperability Description of Web Services Based Application Servers.Investigation of Quality of Experience for 3D Video in Wireless Network Environment.-Investigation of WLAN Access Point Placement for Indoor Positioning Improving the Efficiency of HTTP Caching by Hash Based Resource Identifiers.-Nonmonotonicity in Trust Management.-Radio Propagation Modeling on 433 MHz.-Semantic Intelligent Space for Ambient Assisted Living.-Simulating Network Coding for Accelerating Tit-for-Tat in Peer-to-Peer Content Sharing.-The Costs of Web Advertisements While Mobile Browsing.-
Show moreRadio Communications.-Testbed Analysis of the Effects of IEEE 802.11s Power Save on Mesh Link Performance.-Path Selection and Adaptive Selection of Smart Antenna Transmission Schemes in Multi-hop Wireless Networks.-Receiver-Initiated vs. Short-Preamble Burst MAC Approaches for Multi-channel Wireless Sensor Networks.-White Spaces in UHF Band: Catalonia Case Study and Impact of the Digital Dividend.-Security.-A Framework for Security Context Migration in a Firewall Secured Virtual Machine Environment.-Enhancing Collaborative Intrusion Detection Methods Using a Kademlia Overlay Network.-Flow-Based Security Issue Detection in Building Automation and Control Networks.-Hash-Based Mutual Authentication Protocol for Low-Cost RFID Systems.-The Impact of IPv6 on Penetration Testing.-Management Linking Telecom Service High-Level Abstract Models to Simulators Based on Model Transformations: The IMS Case Study.-Network Migration Optimization Using Genetic Algorithms.-OWL-Based Node Capability Parameter Configuration.-Techno-Economic Comparison of Next-Generation Access Networks for the French Market.-The Design of a Single Funding Point Charging Architecture -Protocols and Performance A Two Layer Guaranteed and Sustained Rate Based Scheduler for IEEE 802.16-2009 Based WiMAX Networks.-Implementation and Evaluation of Coupled Congestion Control for Multipath TCP.-Improving Fairness for Adaptive HTTP Video Streaming.-Prototype of High Performance Scalable Advertising Server with Local Memory Storage and Centralised Processing.-Responsible Source Multicasting.-Algorithms, models and Simulations.-A Model for System Resources in Flexible Time-Triggered Middleware Architectures.-Modeling and Analysis of the Survivability of an Infrastructure-Based Wireless Network.-Private Quantum Coding for Quantum Relay Networks.-Target Surrounding Solution for Swarm Robots.-Poster Papers.-A Split Connection TCP Proxy in LTE Networks.-Adaptive Routing in Wireless Sensor Networks for Fire Fighting.-Automatic Handover Decision in Content Centric Networking.-Autonomous Sensor Network Architecture Model.-Efficient Multihop Broadcast with Distributed Protocol Evolution.-Finding Typical Internet User Behaviors.-Interoperability Description of Web Services Based Application Servers.Investigation of Quality of Experience for 3D Video in Wireless Network Environment.-Investigation of WLAN Access Point Placement for Indoor Positioning Improving the Efficiency of HTTP Caching by Hash Based Resource Identifiers.-Nonmonotonicity in Trust Management.-Radio Propagation Modeling on 433 MHz.-Semantic Intelligent Space for Ambient Assisted Living.-Simulating Network Coding for Accelerating Tit-for-Tat in Peer-to-Peer Content Sharing.-The Costs of Web Advertisements While Mobile Browsing.-
![]() |
Ask a Question About this Product More... |
![]() |