Mobile Ad-hoc and Sensor Networks: First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005, ProceedingsXiaohua Jia, Jie Wu, Yanxiang He Springer, 2005. gada 6. dec. - 1136 lappuses This book constitutes the refereed proceedings of the First International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2005, held in Wuhan, China in December 2005. The volume also contains 12 papers of the MSN workshop on Modeling and the Security in the Next Generation Mobile Information Systems (MSNG 2005). The 112 revised full papers were carefully reviewed and selected from a total of 512 submissions. The papers address all current topical areas in mobile ad hoc and sensor networks such as network architecture and protocols, software platforms and development tools, self-organization and synchronization, routing and data dissemination, failure resilience and fault isolation, energy management, data, information, and signal processing, security and privacy, network planning, provisioning, and deployment, network modeling and performance evaluation, developments and applications, as well as integration with other systems. |
Saturs
1 | |
21 | |
42 | |
63 | |
83 | |
A Novel Energy Efficient Multicast Routing Algorithm | 103 |
A Zone Based Multicast Routing Protocol for Mobile Ad | 113 |
Minimum Data Aggregation Time Problem in Wireless Sensor Networks | 133 |
TrafficAdaptive Energy Efficient Medium Access Control for Wireless | 593 |
Experiments Study on a Dynamic Priority Scheduling for Wireless | 613 |
On the Problem of Channel Assignment for MultiNIC Multihop | 633 |
A Novel EnvironmentAware Mobility Model for Mobile Ad | 654 |
Recovering Extra Routes with the Path from Loop Recovery Protocol | 676 |
Quality of Coverage QoC in Integrated Heterogeneous Wireless | 689 |
Coverage Analysis for Wireless Sensor Networks | 711 |
Using MDS Codes for the Key Establishment of Wireless Sensor | 732 |
Accurate Time Synchronization for Wireless Sensor Networks | 153 |
Population Estimation for Resource Inventory Applications over Sensor | 175 |
Range Adjustment for Broadcast Protocols with a Realistic Radio | 197 |
An Energy Consumption Estimation Model for Disseminating Query | 219 |
Deployment Issues in Wireless Sensor Networks | 239 |
A Geographical CellularLike Architecture for Wireless Sensor Networks | 249 |
A Secure Routing Protocol SDSR for Mobile Ad Hoc Networks | 269 |
Secure AODV Routing Protocol Using OneTime Signature | 288 |
A Constant Time Optimal Routing Algorithm for Undirected | 308 |
Optimized Path Registration with Prefix Delegation in Nested Mobile | 327 |
A Local Repair Scheme with Adaptive Promiscuous Mode in Mobile | 351 |
Efficient Data Gathering Schemes for Wireless Sensor Networks | 370 |
Delay Efficient Data Gathering in Sensor Networks | 380 |
Asynchronous PowerSaving EventDelivery Protocols in Mobile | 400 |
LowComplexity Authentication Scheme Based on Cellular Automata | 413 |
Handling Sensed Data in Hostile Environments | 433 |
Network Capacity of Wireless Ad Hoc Networks with Delay Constraint | 453 |
LoadBased Dynamic Backoff Algorithm for QoS Support in Wireless | 466 |
A New Backoff Algorithm to Improve the Performance of IEEE 802 11 | 488 |
A Dynamic Interference Aware Routing Protocol for IEEE | 508 |
A LowComplexity Power Allocation Scheme for Distributed | 518 |
An Efficient Power Allocation Scheme for Ad Hoc Networks | 538 |
Integrating Multipath Routing DiffServ | 560 |
Power Aware Multihop Packet Relay MAC Protocol in UWB Based | 580 |
A Study on Efficient Key Management in Real Time Wireless Sensor | 745 |
Improvement of the Naive Group Key Distribution Approach | 763 |
Dual Binding Update with Additional Care of Address in Network | 783 |
BoundaryBased Time Partitioning with Flattened RTree for Indexing | 804 |
The Tentative and Early Binding Update for Mobile IPv6 Fast Handover | 825 |
Fast Handover Method for mSCTP Using FMIPv6 | 846 |
Maximum Throughput and Minimum Delay in IEEE 802 15 4 | 866 |
Performance Evaluation of Existing Approaches for Hybrid Ad | 886 |
A BackoffBased Energy Efficient Clustering Algorithm for Wireless | 907 |
A RingStructured EnergyEfficient Cluster Architecture | 927 |
A Novel MAC Protocol for Improving Throughput and Fairness | 950 |
Optimal Control of Packet Service Access State for Cdma20001x | 966 |
A Novel Media Access Control Algorithm Within Single Cluster | 986 |
A PeertoPeer Overlay Structure for Service and Application | 1006 |
Can P2P Benefit from MANET? Performance Evaluation from Users | 1026 |
Design of Wireless Sensors for Automobiles | 1043 |
Pitfall in Using Average Travel Speed in Traffic Signalized Intersection | 1059 |
Towards Security Analysis to Binding Update Protocol in Mobile IPv6 | 1073 |
A Mobile Multimedia Database System for Infants Education | 1088 |
Mobile AgentBased Framework for Healthcare Knowledge Management | 1103 |
FuzzyBased Prefetching Scheme for Effective Information Support | 1117 |
Author Index | 1133 |
Citi izdevumi - Skatīt visu
Mobile Ad-hoc and Sensor Networks: First International Conference, MSN 2005 ... Xiaohua Jia,Jie Wu,Yanxiang He Ierobežota priekšskatīšana - 2005 |
Mobile Ad-hoc and Sensor Networks: First International Conference, MSN 2005 ... Xiaohua Jia,Jie Wu,Yanxiang He Priekšskatījums nav pieejams - 2005 |
Mobile Ad-hoc and Sensor Networks: First International Conference, MSN 2005 ... Xiaohua Jia,Jie Wu,Yanxiang He Priekšskatījums nav pieejams - 2005 |
Bieži izmantoti vārdi un frāzes
ad hoc networks algorithm anycast AODV applications attack average backoff bandwidth Berlin Heidelberg 2005 broadcast bytes cache channel cluster head collision communication Computer cost coverage data packets delay denote destination distributed dynamic Dynamic Source Routing efficient energy consumption environment estimation evaluate FMIPv6 function grid handover hoc networks hop count IEEE IETF increases INFOCOM IP address latency layer MAC protocol malicious node MANETs maximum mechanism mobile ad hoc mobile nodes mode multi-hop multicast number of nodes OLSR optimal overhead paper parameters path performance piconet problem promiscuous mode proposed query R-Tree random ratio received relay request RFID route discovery routing protocol RREQ scenario scheduling scheme Section secure sensor nodes server simulation results sink slot source node throughput topology traffic transmit tree unicast update wireless ad hoc wireless networks wireless sensor networks WSNs