Networking and Mobile Computing : Third International Conference, ICCNMC 2005, Zhangjiajie, China, August 2-4, 2005. Proceedings / edited by Xicheng Lu, Wei Zhao.
Tipo de material: TextoSeries Lecture Notes in Computer Science ; 3619Editor: Berlin, Heidelberg : Springer Berlin Heidelberg, 2005Descripción: xxiv, 1299 páginas Also available online. recurso en líneaTipo de contenido:- texto
- computadora
- recurso en línea
- 9783540318682
- TK5105.5-5105.9
Springer eBooks
Keynote Speech -- Session 1: Sensor Networks I -- Session 2: 3G/B3G Networks -- Session 3: Peer-to-Peer Systems -- Session 4: Caching and Routing -- Session 5: Wireless Networks -- Session 6: Multicast I -- Session 7: Ad Hoc Networks I -- Session 8: Algorithms I -- Session 9: Security I -- Session 10: Peer-to-Peer Systems and Web Service -- Session 11: Multicast II -- Session 12: Traffic and Network Management -- Session 13: QoS I -- Session 14: Ad Hoc Networks II -- Session 15: Routing -- Session 16: Algorithms II -- Session 17: Security II -- Session 18: Internet Application -- Session 19: QoS II -- Session 20: Security III -- Session 21: TCP/IP and Measurement -- Session 22: Algorithms III -- Session 23: Sensor Networks II -- Session 24: Design and Performance Analysis -- Session 25: Traffic and Network Management II -- Session 26: Agent-Based Algorithms -- Session 27: Security Algorithms.
This book constitutes the refereed proceedings of the 3rd International Conference on Computer Network and Mobile Computing held in Zhangjiajie, China, in August 2005. The 133 revised full papers and 2 keynote articles presented were carefully reviewed and selected from 662 submissions. They are organized in topical sections on sensor networks, 3G/B3G networks, peer-to-peer systems, caching and routing, wireless networks, multicast, ad hoc networks, algorithms, security, peer-to-peer systems and Web service, traffic and network management, QoS, routing, internet application, TCP/IP and measurement, design and performance analysis, agent-based algorithms, and security algorithms.
Para consulta fuera de la UANL se requiere clave de acceso remoto.