You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
Introduction -- Network coding Fundamentals -- Harnessing Network Coding in Wireless Systems -- Network Coding for Content Distribution and Multimedia Streaming in Peer-to-Peer Networks -- Network Coding in the Real World -- Network Coding and User Cooperation for Streaming and Download Services in LTE Networks -- CONCERTO: Experiences with a Real-World MANET System Based on Network Coding -- Secure Network Coding: Bounds and Algorithms for Secret and Reliable Communications -- Network Coding and Data Compression -- Scaling Laws with Network Coding -- Network Coding in Disruption Tolerant Networks.
This book constitutes the thoroughly refereed post- conference proceedings of the Ninth International Conference on Risks and Security of Internet Systems, CRiSIS 2014, held in Trento, Italy, in August 2014. The 13 full papers and 6 short papers presented were selected from 48 submissions. They explore risks and security issues in Internet applications, networks and systems covering topics such as trust, security risks and threats, intrusion detection and prevention, access control and security modeling.
The fusion between graph theory and combinatorial optimization has led to theoretically profound and practically useful algorithms, yet there is no book that currently covers both areas together. Handbook of Graph Theory, Combinatorial Optimization, and Algorithms is the first to present a unified, comprehensive treatment of both graph theory and c
This book constitutes the refereed proceedings of the 8th International Joint Conference on E-Business and Telecommunications, ICETE 2011, held in Seville, Spain in July 2011. The 118 revised full papers presented were carefully reviewed and selected from 409 submissions. The topics covered are data communication networking, e-business, optical communication systems, security and cryptography, signal processing and multimedia applications, and wireless networks and information systems. These are the main knowledge areas that define the six component conferences, namely: DCNET, ICE-B, OPTICS, SECRYPT, SIGMAP, and WINSYS which together form the ICETE joint conference.
Links information theory and digital communication through the language of lattice codes, featuring many advanced practical setups and techniques.
Cooperative and Graph Signal Processing: Principles and Applications presents the fundamentals of signal processing over networks and the latest advances in graph signal processing. A range of key concepts are clearly explained, including learning, adaptation, optimization, control, inference and machine learning. Building on the principles of these areas, the book then shows how they are relevant to understanding distributed communication, networking and sensing and social networks. Finally, the book shows how the principles are applied to a range of applications, such as Big data, Media and video, Smart grids, Internet of Things, Wireless health and Neuroscience. With this book readers wil...
This book constitutes the proceedings of the 8th International Conference on Ad Hoc Networks, ADHOCNETS 2016, held in Ottawa, Canada, September 26-17, 2016. The 34 revised full papers presented were carefully reviewed and selected from 46 submissions. The papers provide visions, trends, challenges and opportunities in the area of ad hoc networking and emerging applications. The conference also features two workshops on ad hoc network security and vulnerability, and convergence of wireless directional network systems and software defined networking, respectively.
This book constitutes the refereed proceedings of the 11th International Conference on Decision and Game Theory for Security, GameSec 2020,held in College Park, MD, USA, in October 2020. Due to COVID-19 pandemic the conference was held virtually The 21 full papers presented together with 2 short papers were carefully reviewed and selected from 29 submissions. The papers focus on machine learning and security; cyber deception; cyber-physical systems security; security of network systems; theoretic foundations of security games; emerging topics.
This book constitutes the proceedings of the 9th IFIP TC 6 International Conference on Wired/Wireless Internet Communications, WWIC 2011, held in Vilanova i la Geltrú, Spain, in June 2011. The 26 contributions included were carefully reviewed and selected from 50 submissions. In addition the book contains 15 invited papers. The contributions are structured in topical sections on mobility and LTE networks; performance and simulation analysis; adaptive approaches to guarantee E2E network services; energy efficiency and cooperation in wireless networks; transmission and management; quality through routing, naming and control; wireless multi-hop communications challenges in the future internet; and emerging contributions.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2010. The 37 revised full papers presented along with 7 papers from the allocated Dedicated Short Range Communications Workshop, DSRC 2010, were carefully selected from numerous submissions. Conference papers are organized into 9 technical sessions, covering the topics of cognitive radio networks, security, resource allocation, wireless protocols and algorithms, advanced networking systems, sensor networks, scheduling and optimization, routing protocols, multimedia and stream processing. Workshop papers are organized into two sessions: DSRC networks and DSRC security.