Mobile Ad-hoc and Sensor Networks: Second International Conference, MSN 2006, Hong Kong, China, December 13-15, 2006, Proceedings / Edition 1

Paperback (Print)
Buy New
Buy New from BN.com
$179.55
Used and New from Other Sellers
Used and New from Other Sellers
from $28.00
Usually ships in 1-2 business days
(Save 85%)
Other sellers (Paperback)
  • All (8) from $28.00   
  • New (5) from $45.00   
  • Used (3) from $28.00   

Overview

This book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2006, held in Hong Kong, China in December 2006. The 73 revised full papers address all current issues in mobile ad hoc and sensor networks and are organized in topical sections on routing, network prools, security, energy efficiency, data processing, and deployment.

Read More Show Less

Product Details

Table of Contents

Routing.- Topology Control Made Practical: Increasing the Performance of Source Routing.- Routing Transient Traffic in Mobile Ad Hoc Networks.- Comparison of Two Self-organization and Hierarchical Routing Prools for Ad Hoc Networks.- Location-Based Multicast Routing Prool for Mobile Ad Hoc Networks.- Skipping Face Routing with Guaranteed Message Delivery for Wireless Ad Hoc and Sensor Networks.- An Anti-void Geographic Routing Algorithm for Wireless Sensor Networks.- A Correctness Proof of the DSR Prool.- Scalable Proxy Routing in Multi-hop Cellular Networks.- An On-Demand Routing Prool in Ad Hoc Network Using Label Switching.- Source-Based Multiple Gateway Selection Routing Prool in Ad-Hoc Networks.- Smart Path-Finding with Local Information in a Sensory Field.- An Efficient Fibonacci Series Based Hierarchical Application-Layer Multicast Prool.- Maximizing the Probability of Delivery of Multipoint Relay Broadcast Prool in Wireless Ad Hoc Networks with a Realistic Physical Layer.- On Improving Wireless Broadcast Reliability of Sensor Networks Using Erasure Codes.- Cost-Aware Route Selection in Wireless Mesh Networks.- Novel Route Metric for High-Throughput in Multi-rate Wireless Ad Hoc Networks.- Prool.- Joint Power Control and Proportional Fair Scheduling with Minimum Rate Constraints in Cluster Based MANET.- Network Coding Approach: Intra-cluster Information Exchange in Wireless Sensor Networks.- FNSCSDP: A Forward Node Selection Based Cross-Layer Service Discovery Prool for MANETs.- Service Discovery Prools for MANETs: A Survey.- A BDD-Based Heuristic Algorithm for Design of Reliable Networks with Minimal Cost.- Coverage-Enhancing Algorithm for Directional Sensor Networks.- Sensor Scheduling for k-Coverage in Wireless Sensor Networks.- A New Media Access Control Prool for Ad-Hoc Wireless Sensor Networks.- Performance Evaluation of Binary Negative-Exponential Backoff Algorithm in IEEE 802.11 WLAN.- An Application-Aware Event-Oriented MAC Prool in Multimodality Wireless Sensor Networks.- Monte-Carlo Localization for Mobile Wireless Sensor Networks.- Novel Sink-Oriented Approach for Efficient Sink Mobility Support in Wireless Sensor Networks.- Reduction of Signaling Cost and Handoff Latency with VMAPs in HMIPv6.- Adaptive Geographically Bound Mobile Agents.- Gradient-Driven Target Acquisition in Mobile Wireless Sensor Networks.- Performance Study of Robust Data Transfer Prool for VANETs.- A Multi-layer Approach to Support Multimedia Communication in Mesh Networks with QoS.- Security.- Trust Extended Dynamic Security Model and Its Application in Network.- An Improvement of Remote User Authentication Scheme Using Smart Cards.- A Secure Architecture for Mobile Ad Hoc Networks.- Interlayer Attacks in Mobile Ad Hoc Networks.- Mutual-Authentication Mechanism for RFID Systems.- Achieving Anonymity in Mobile Ad Hoc Networks Using Fuzzy Position Information.- Proxy Signature Without Random Oracles.- Building Hierarchical Public Key Infrastructures in Mobile Ad-Hoc Networks.- Key Exchange in 802.15.4 Networks and Its Performance Implications.- An Authenticated Key Agreement Prool for Mobile Ad Hoc Networks.- Efficient ID-Based Authenticated Group Key Agreement from Bilinear Pairings.- Efficient Augmented Password-Based Encrypted Key Exchange Prool.- Secure Relative Location Determination in Vehicular Network.- Energy Efficiency.- A Local-Control Algorithm to Prolong the Lifetime of Wireless Ad Hoc Networks.- Exploiting Local Knowledge to Enhance Energy-Efficient Geographic Routing.- A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks.- An Energy Efficient Event Processing Algorithm for Wireless Sensor Networks.- A Novel Energy-Efficient Backbone for Sensor Networks.- An Energy-Balanced Strategy for Clustering Prools in Wireless Sensor Networks.- QoS Topology Control with Minimal Total Energy Cost in Ad Hoc Wireless Networks.- An Energy Efficient TDMA Prool for Event Driven Applications in Wireless Sensor Networks.- Data Processing.- Self-organization Data Gathering for Wireless Sensor Networks.- Continuous Monitoring of kNN Queries in Wireless Sensor Networks.- History-Sensitive Based Approach to Optimizing Top-k Queries in Sensor Networks.- Data Replication in Mobile Ad Hoc Networks.- Zone-Based Replication Scheme for Mobile Ad Hoc Networks Using Cross-Layer Design.- Latency of Event Reporting in Duty-Cycled Wireless Sensor Networks.- Deployment.- Improving Bluetooth EDR Data Throughput Using FEC and Interleaving.- Information-Accuracy-Aware Jointly Sensing Nodes Selection in Wireless Sensor Networks.- Supporting Application-Oriented Kernel Functionality for Resource Constrained Wireless Sensor Nodes.- XMAS: An eXtraordinary Memory Allocation Scheme for Resource-Constrained Sensor Operating Systems.- An Adaptive Distributed Resource Allocation Scheme for Sensor Networks.- Sequential Approach for Type-Based Detection in Wireless Sensor Networks.- System Support for Cross-Layering in Sensor Network Stack.- A Topology Controllable Testing Environment for Mobile Ad Hoc Network Software.- Microcosm: A Low Cost 3-D Wireless Sensor Test-Bed Within a Controllable Environment.- System-Level WSN Application Software Test Using Multi-platform Hardware Abstraction Layers.- An Integrated Self-deployment and Coverage Maintenance Scheme for Mobile Sensor Networks.- A Power-Aware Peer-to-Peer System for Ad-Hoc Networks.- Load Balancing by Distributed Optimisation in Ad Hoc Networks.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)