000 03678nam a22005535i 4500
001 978-3-319-04105-6
003 DE-He213
005 20200420220213.0
007 cr nn 008mamaa
008 140103s2014 gw | s |||| 0|eng d
020 _a9783319041056
_9978-3-319-04105-6
024 7 _a10.1007/978-3-319-04105-6
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM075000
_2bisacsh
082 0 4 _a004.6
_223
245 1 0 _aAd Hoc Networks
_h[electronic resource] :
_b5th International ICST Conference, ADHOCNETS 2013, Barcelona, Spain, October 2013, Revised Selected Papers /
_cedited by Mostafa Hashem Sherif, Abdelhamid Mellouk, Jun Li, Paolo Bellavista.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2014.
300 _aX, 229 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
_x1867-8211 ;
_v129
505 0 _aNew Re-association Procedures for Reliable Handover in IEEE 802.15.4 Wireless Sensor Networks -- Mobile Data Collector Assignment and Scheduling for Minimizing Data Delay in Partitioned Wireless Sensor Networks -- HRTS: a Hierarchical Reactive Time Synchronization protocol for wireless sensor networks -- The Agony of Choice: Analysis of Routing Protocols in Chain Mesh Networks -- Traffic Modeling and Performance Evaluation in Vehicle to Infrastructure 802.11p Network Social-aware Opportunistic Routing Protocol based on User's Interactions and Interests -- Node Wake-Up via OVSF-Coded Bloom Filters in Wireless Sensor Networks -- To Eavesdrop or Jam, That is the Question Using Cluster Analysis to Detect Attackers in Vehicular Delay Tolerant Networks -- An Efficient and Secure ARP for Large-scale IEEE 802.11s-based Smart Grid Networks.
520 _aThis book constitutes the thoroughly refereed proceedings of the 5th International Conference on Ad Hoc Networks, ADHOCNETS 2013, held in Paris, Barcelona, Spain, in October 2013. The 14 revised full papers presented were carefully selected and reviewed from numerous submissions. The papers cover a wide range of applications, commercial and military, such as mobile ad hoc networks, sensor networks, vehicular networks, underwater networks, underground networks, personal area networks, home networks, and large-scale metropolitan networks for smart cities. They are organized in topical sections on Wireless Sensor Networks, Routing, Applications, and Security.
650 0 _aComputer science.
650 0 _aComputer communication systems.
650 0 _aSpecial purpose computers.
650 0 _aComputer security.
650 0 _aApplication software.
650 1 4 _aComputer Science.
650 2 4 _aComputer Communication Networks.
650 2 4 _aSpecial Purpose and Application-Based Systems.
650 2 4 _aComputer Applications.
650 2 4 _aSystems and Data Security.
700 1 _aSherif, Mostafa Hashem.
_eeditor.
700 1 _aMellouk, Abdelhamid.
_eeditor.
700 1 _aLi, Jun.
_eeditor.
700 1 _aBellavista, Paolo.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783319041049
830 0 _aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
_x1867-8211 ;
_v129
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-319-04105-6
912 _aZDB-2-SCS
942 _cEBK
999 _c51411
_d51411