1 - 17
Number of results to display per page
- Kranakis, Evangelos.
- Cham, Switzerland : Springer, ©2010.
- Description
- Book — 1 online resource (xvi, 106 pages) : illustrations (some color)
- Summary
-
- 1. Models for mobile agent computing
- Introduction
- What is a mobile agent
- Why mobile agents
- An algorithmic model for mobile agents
- Mobile agents
- Distributed networks
- Resource measures
- Mobile agent rendezvous
- Outline of the book
- Comments and bibliographic remarks.
- 2. Deterministic rendezvous in a ring
- Introduction
- A single stationary token
- The feasibility of rendezvous
- The time complexity of rendezvous
- Memory tradeoff for rendezvous with detection
- Limits to the memory trade-off
- Movable tokens
- Comments and bibliographic remarks.
- 3. Multiple agent rendezvous in a ring
- Introduction
- Impossibility of rendezvous
- Rendezvous with detection
- Conditional solutions
- Comments and bibliographic remarks.
- 4. Randomized rendezvous in a ring
- Introduction
- Random walk algorithm
- Randomization and tokens
- Time/memory trade-offs
- Coin half tour algorithm
- Approximate counting algorithm
- Comments and bibliographic remarks.
- 5. Other models
- Introduction
- Leader election and rendezvous
- Rendezvous with failing tokens
- Rendezvous when tokens fail upon release
- Rendezvous when tokens can fail at any time
- The cost of token failure
- Flickering tokens
- Asynchronous rendezvous
- Look-compute-move
- Model and terminology
- Impossibility results
- Gathering configurations with a single multiplicity
- Gathering rigid configurations
- Gathering an odd number of robots
- Dangerous networks
- Black-hole search in an asynchronous ring
- Rendezvous in asynchronous rings in spite of a black-hole
- Comments and bibliographic remarks.
- 6. Other topologies
- Introduction
- Synchronous torus
- Memory lower bounds for rendezvous
- Rendezvous algorithms
- Trees
- Arbitrary graphs
- Comments and bibliographic remarks.
- Bibliography
- Glossary
- Authors' biographies
- Index.
- Kranakis, Evangelos.
- San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA) : Morgan & Claypool, c2010.
- Description
- Book — 1 electronic text (xvi, 106 p.) : ill.
- Summary
-
- 1. Models for mobile agent computing
- Introduction
- What is a mobile agent
- Why mobile agents
- An algorithmic model for mobile agents
- Mobile agents
- Distributed networks
- Resource measures
- Mobile agent rendezvous
- Outline of the book
- Comments and bibliographic remarks --
- 2. Deterministic rendezvous in a ring
- Introduction
- A single stationary token
- The feasibility of rendezvous
- The time complexity of rendezvous
- Memory tradeoff for rendezvous with detection
- Limits to the memory trade-off
- Movable tokens
- Comments and bibliographic remarks --
- 3. Multiple agent rendezvous in a ring
- Introduction
- Impossibility of rendezvous
- Rendezvous with detection
- Conditional solutions
- Comments and bibliographic remarks --
- 4. Randomized rendezvous in a ring
- Introduction
- Random walk algorithm
- Randomization and tokens
- Time/memory trade-offs
- Coin half tour algorithm
- Approximate counting algorithm
- Comments and bibliographic remarks --
- 5. Other models
- Introduction
- Leader election and rendezvous
- Rendezvous with failing tokens
- Rendezvous when tokens fail upon release
- Rendezvous when tokens can fail at any time
- The cost of token failure
- Flickering tokens
- Asynchronous rendezvous
- Look-compute-move
- Model and terminology
- Impossibility results
- Gathering configurations with a single multiplicity
- Gathering rigid configurations
- Gathering an odd number of robots
- Dangerous networks
- Black-hole search in an asynchronous ring
- Rendezvous in asynchronous rings in spite of a black-hole
- Comments and bibliographic remarks --
- 6. Other topologies
- Introduction
- Synchronous torus
- Memory lower bounds for rendezvous
- Rendezvous algorithms
- Trees
- Arbitrary graphs
- Comments and bibliographic remarks --
- Bibliography
- Glossary
- Authors' biographies
- Index.
3. Selected Areas in Cryptography [1997]
- Kranakis, Evangelos.
- Boston, MA : Springer US : Imprint : Springer, 1997.
- Description
- Book — 1 online resource (108 pages) Digital: text file.PDF.
- Summary
-
- Introduction
- E. Kranakis, P. van Oorschot. On Some Methods for Unconditionally Secure Key Distribution and Broadcast Encryption
- D.R. Stinson. MD2 is not Secure Without the Checksum Byte
- N. Rogier, P. Chauvaud. On the Weaknesses of Non-Surjective Round Functions
- V. Rijmen, et al. Resistance of a CAST-Like Encryption Algorithm to Linear and Differential Cryptanalysis
- J. Lee, et al. Constructing Symmetric Ciphers Using the CAST Design Procedure
- C.M. Adams.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
4. Primality and cryptography [1986]
- Kranakis, Evangelos.
- Chichester [Sussex] ; New York : Wiley, c1986.
- Description
- Book — xv, 235 p. ; 24 cm.
- Summary
-
- Number Theory. Primality Tests. Probability Theory. Pseudorandom Generators. Public Key Cryptosystems. Towards a General Theory. References. Frequently Used Notation. Index.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Online
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
TK5102.5 .K66 1986 | Available |
- Heidelberg ; New York : Springer, ©2013.
- Description
- Book — 1 online resource (xvi, 409 pages) : illustrations Digital: text file.PDF.
- Summary
-
- FINANCIAL NETWORKS:
- 1. Mathematical modeling of systemic risk: H. Amini, A. Minca.-
- 2. Systemic risk in banking networks without Monte Carlo simulation: J. P. Gleeson, T. R. Hurd, S. Melnik, A. Hackett.-
- 3. Systemic Valuation of Banks - Interbank Equilibrium and Contagion: G. Halaj.-
- 4. An Open Problem: J. B. Walsh.- II SECURITY NETWORKS:
- 5. Dynamic Trust Management: Network Profiling for High Assurance Resilience: M. Burmester , W. O. Redwood.-
- 6. Security Issues in Link State Routing Protocols for MANETs: G.Cervera, M.Barbeau, J. Garcia-Alfaro, E.Kranakis.
- -7. TCHo: a Code-based Cryptosystem: A. Duc , S. Vaudenay.-
- 8. Formal Method for (k)-Neighborhood Discovery Protocols: R.Jamet, P.Lafourcade.-
- 9. A Tutorial on White-box AES: J. A. Muir.-
- 10. Efficient 1-Round Almost-Perfect Secure Message Transmission Protocols with Flexible Connectivity: R. Safavi-Naini, M. Ashraful Alam Tuhin.- III SOCIAL NETWORKS:
- 11. Mathematical modelling to evaluate measures and control the spread of illicit drug use: A. Bakhtiari, A. Rutherford.-
- 12. Complex Networks and Social Networks: A. Bonato, A. Tian.-
- 13. NAVEL Gazing: Studying a Networked Scholarly Organization: D. Dimitrova, A. Gruzd, Z.Hayat, G. Ying Mo, D.Mok, Th. Robbins, B.Wellman, X. Zhuo.-
- 14. How Al Qaeda can use order theory to evade or defeat U.S. Forces: J.D.Farley.-
- 15. The ABCs of Designing Social Networks for Health Behaviour Change: The VivoSpace Social Network: N. Kamal, S. Fels, M. Blackstock, K. Ho.-
- 16. Evolution of an Open Source Community Network: N. Saraf, A. Seary, D. Chandrasekaran, P.Monge.-
- 17. SociQL: A Query Language for the SocialWeb: D. Serrano, E. Stroulia, D. Barbosa, V. Guana.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
6. Principles of ad hoc networking [2007]
- Barbeau, Michel (Computer scientist)
- Chichester, England ; Hoboken, NJ : John Wiley & Sons Ltd., c2007.
- Description
- Book — xx, 254 p. : ill. ; 25 cm.
- Summary
-
- Preface.Glossary
- .1. Wireless Data Communications.1.1 Signal Representation.1.2 Analog to Digital Conversion.1.3 Digital to Analog Conversion.1.4 Architecture of an SDR Application.1.5 Quadrature Modulation and Demodulation.1.6 Spread Spectrum.1.7 Antenna.1.8 Propagation.1.9 Ultrawideband.1.10 Energy Management.1.11 Exercise
- .2. Medium Access Control.2.1 Fundamentals of Probability and Statistics.2.2 Modeling Traffic.2.3 Multiple Access.2.4 Demand Assigned Multiple Access.2.5 Carrier Sense Multiple Access in IEEE 802.11.2.6 Medium Access Control in ad hov Networks.2.7 Bibliographic Comments.2.8 Exercises
- .3. Ad Hov Wireless Access.3.1 Management of Bluetooth Networks.3.2 Model for Node Discovery in Bluetooth.3.3 Bluetooth Formation Algorithms.3.4 Mesh Mode of WiMAX/802.16.3.5 Bibliographic Comments.Exercises
- .4. Wireless Network Programming.4.1 Structure of Information.4.2 Socket.4.3 Parameters and Control.4.4 Receiving Frames.4.5 Sending Frames.4.6 Exercises
- .5. Ad Hov Networks Protocols.5.1 Normal IP Routing.5.2 The Reactive Approach.5.3 The Proactive Approach.5.4 The Hybrid Approach.5.5 Clustering.5.6 Quality of Service.5.7 Sensor Network Protocols.5.8 Exercises
- .6. Location Awareness.6.1 Geographic Proximity.6.2 Constructing Spanners of ad hov Networks.6.3 Information Dissemination.6.4 Geographic Location Determination.6.5 Random Unit Disc Graphs.6.6 Coverage and Connectivity with Directional Sensors.6.7 Bibliographic Comments.6.8 Exercises
- .7. Ad Hov Networks Security.7.1 Authentication Techniques.7.2 Physical Layer Attacks.7.3 Security of Application Protocols.7.4 Biometrics-based Key Establishment.7.5 Routing Security.7.6 Broadcast Security.7.7 Secure Location Verification.7.8 Security in Directional Antenna Systems.7.9 Bibliographic Comments.7.10 Exercises.Bibliography.Index.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
TK5103.2 .B367 2007 | Available |
7. Boolean functions and computation models [2002]
- Clote, Peter.
- Berlin ; New York : Springer, c2002.
- Description
- Book — xiv, 601 p. : ill. ; 25 cm.
- Summary
-
- 1. Boolean Functions
- 2. Circuit Lower Bounds
- Circuit Upper Bounds
- 4. Randomness and Satisfiability
- 5. Propositional Proof Systems
- 6. Machine Models and Function Algebras
- 7. Higher Types
- References.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Online
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
QA267.7 .C58 2002 | Available |
- ADHOC-NOW (Conference) (6th : 2007 : Morelia, Michoacán de Ocampo, Mexico)
- Berlin ; New York : Springer, ©2007.
- Description
- Book — 1 online resource (x, 284 pages) : illustrations Digital: text file.PDF.
- Summary
-
- Routing.- Local Routing on Tori.- Topology Control and Geographic Routing in Realistic Wireless Networks.- Routing in Wireless Networks with Position Trees.- Statistical Monitoring to Control a Proactive Routing Protocol.- Topology Control.- A Faster Distributed Approximation Scheme for the Connected Dominating Set Problem for Growth-Bounded Graphs.- Coordinating Concurrent Transmissions: A Constant-Factor Approximation of Maximum-Weight Independent Set in Local Conflict Graphs.- Information Brokerage Via Location-Free Double Rulings.- Level Set Estimation Using Uncoordinated Mobile Sensors.- The Impact of Delay in Dominating Set and Neighbor Elimination Based Broadcasting in Ad Hoc Networks.- Security and Privacy.- Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation.- Dependable and Secure Distributed Storage System for Ad Hoc Networks.- An Energy and Communication Efficient Group Key in Sensor Networks Using Elliptic Curve Polynomial.- Protocols.- A Cooperative CDMA-Based Multi-channel MAC Protocol for Ad Hoc Networks.- FDAR: A Load-Balanced Routing Scheme for Mobile Ad-Hoc Networks.- TOLB: A Traffic-Oblivious Load-Balancing Protocol for Next-Generation Sensornets.- A Comparative Analysis of Multicast Protocols for Small MANET Groups.- ODCP: An On-Demand Clustering Protocol for Directed Diffusion.- Quality of Service and Performance.- Quality of Service Support for ODMRP Multicast Routing in Ad Hoc Networks.- The Analysis of Fault Tolerance in Triangular Topology Sensor Networks.- Performance Modeling of Mobile Sensor Networks.- Electronic-Oriented IP Address Auto-Configuration Protocol for MANET.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Latin American Symposium on Theoretical Informatics (12th : 2016 : Ensenada, Mexico)
- Berlin : Springer, 2016.
- Description
- Book — 1 online resource (xxvi, 714 pages) : illustrations Digital: text file.PDF.
- Summary
-
- Reversible Figures and Solids
- Simplicity is in Vogue (again)
- Subgame Perfect Equilibrium: Computation and Efficiency
- Buying Stuff Online
- Data Crowdsourcing: Is It for Real
- A Faster FPT Algorithm and a Smaller Kernel for Block Graph Vertex Deletion
- A Middle Curve Based on Discrete Fréchet Distance
- Comparison-Based FIFO Buffer Management in QoS Switches
- Scheduling on Power-Heterogeneous Processors
- Period Recovery over the Hamming and Edit Distances
- Chasing Convex Bodies and Functions
- Parameterized Lower Bounds and Dichotomy Results for the NP-Completeness of H-Free Edge Modification Problems
- Parameterized Complexity of Red Blue Set Cover for lines
- Tight Bounds for Beacon-Based Coverage in Simple Rectilinear Polygons
- On Mobile Agent Verifiable Problems
- Computing Maximal Layers Of Points In Ef(n)
- On the Total Number of Bends for Planar Octilinear Drawings
- Bidirectional BWT-Based De Bruijn Graphs
- The Read/Write Protocol Complex is Collapsible
- The I/O Complexity of Computing Prime Tables.-Increasing Diamonds
- Scheduling Transfers of Resources over Time: Towards Car-Sharing with Flexible Drop-Offs
- A 0.821-Ratio Purely Combinatorial Algorithm for Maximum k-Vertex Cover in Bipartite Graphs
- Improved Spanning Ratio for Low Degree Spanners
- Constructing Consistent Digital Line Segments
- Faster Information Gathering in Ad-Hoc Radio Tree Networks
- Stabbing circles for Sets of Segments in the Plane
- Faster Algorithms to Enumerate Hypergraph Transversals
- Listing Acyclic Orientations of Graphs with Single and Multiple Sources
- Linear-Time Sequence Comparison Using Minimal Absent Words
- The Grandmama de Bruijn Sequence for Binary Strings
- Compressing Bounded Degree Graphs
- Random Partial Match Queries in Quad-K-d Trees
- From Discrepancy to Majority
- On the Planar Split Thickness of Graphs
- A Bounded-Risk Mechanism for the Kidney Exchange Game
- Tight Approximations of Degeneracy in Large Graphs
- Improved Approximation Algorithms for Capacitated Fault-Tolerant k-Center
- Bundled Crossings in Embedded Graphs
- Probabilistic Analysis of the Dual Next-Fit Algorithm for Bin Covering
- Deterministic Sparse Suffix Sorting on Rewritable Texts
- Minimizing the Number of Opinions for Fault-Tolerant Distributed Decision Using Well-Quasi Ordering
- Unshuffling Permutations
- Generating Random Spanning Trees via Fast Matrix Multiplication
- Routing in Unit Disk Graphs
- Graph Drawings with One Bend and Few Slopes
- Edge-Editing to a Dense and a Sparse Graph Class
- Containment and Evasion in Stochastic Point Data
- Tree Compression Using String Grammars
- Trees and Languages with Periodic Signature
- Rank Reduction of Directed Graphs by Vertex and Edge Deletions
- New Deterministic Algorithms for Solving Parity Games
- Computing a Geodesic Two-Center of Points in a Simple Polygon
- Simple Approximation Algorithms for Balanced MAX 2SAT
- A Parameterized Algorithm for Mixed-Cut
- (k; n
- k)-MAX-CUT: An O*(2p)-Time Algorithm and a Polynomial Kernel
- Independent set of convex polygons: from nƐ to 1 + Ɛ via shrinking.
- ADHOC-NOW (Conference) (6th : 2007 : Morelia, Michoacán de Ocampo, Mexico)
- Berlin ; New York : Springer, c2007.
- Description
- Book — x, 284 p. : ill.
- Summary
-
- Routing.- Local Routing on Tori.- Topology Control and Geographic Routing in Realistic Wireless Networks.- Routing in Wireless Networks with Position Trees.- Statistical Monitoring to Control a Proactive Routing Protocol.- Topology Control.- A Faster Distributed Approximation Scheme for the Connected Dominating Set Problem for Growth-Bounded Graphs.- Coordinating Concurrent Transmissions: A Constant-Factor Approximation of Maximum-Weight Independent Set in Local Conflict Graphs.- Information Brokerage Via Location-Free Double Rulings.- Level Set Estimation Using Uncoordinated Mobile Sensors.- The Impact of Delay in Dominating Set and Neighbor Elimination Based Broadcasting in Ad Hoc Networks.- Security and Privacy.- Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation.- Dependable and Secure Distributed Storage System for Ad Hoc Networks.- An Energy and Communication Efficient Group Key in Sensor Networks Using Elliptic Curve Polynomial.- Protocols.- A Cooperative CDMA-Based Multi-channel MAC Protocol for Ad Hoc Networks.- FDAR: A Load-Balanced Routing Scheme for Mobile Ad-Hoc Networks.- TOLB: A Traffic-Oblivious Load-Balancing Protocol for Next-Generation Sensornets.- A Comparative Analysis of Multicast Protocols for Small MANET Groups.- ODCP: An On-Demand Clustering Protocol for Directed Diffusion.- Quality of Service and Performance.- Quality of Service Support for ODMRP Multicast Routing in Ad Hoc Networks.- The Analysis of Fault Tolerance in Triangular Topology Sensor Networks.- Performance Modeling of Mobile Sensor Networks.- Electronic-Oriented IP Address Auto-Configuration Protocol for MANET.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- ADHOC-NOW (Conference) (2nd : 2003 : Montréal, Québec)
- Berlin ; New York : Springer-Verlag, c2003.
- Description
- Book — x, 292 p. : ill. ; 24 cm.
- Summary
-
This book constitutes the refereed proceedings of the Second International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2003, held in Montreal, Canada in October 2003.The 23 revised full papers and 4 revised short papers presented were carefully reviewed and selected from 42 submissions. All current aspects of ad-hoc networking, mobile, wireless, and cooperating communication systems are addressed including network architectures, access control and discovery, multicasting protocols, performance, quality of service, QoS, routing protocols, scalability, security, and self-configuration.
(source: Nielsen Book Data)
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
TK6570 .M6 A34 2003 | Available |
- FPS (Symposium) (8th : 2015 : Clermont-Ferrand, France)
- Switzerland : Springer, 2016.
- Description
- Book — 1 online resource (xii, 323 pages) : illustrations
- Summary
-
- RFID, sensors and secure computation
- Security policies and biometrics
- Evaluation of protocols and obfuscation security
- Spam emails, botnets and malware.
- FUN (Conference) (6th : 2012 : Venice, Italy)
- Berlin ; New York : Springer, ©2012.
- Description
- Book — 1 online resource
- Summary
-
- Distributed Algorithms by Forgetful Mobile Robots / Paola Flocchini
- Stability and Metastability of the Logit Dynamics of Strategic Games / Giuseppe Persiano
- Art Galleries, k-modems, and k-convexity / Jorge Urrutia
- The Vulcan Game of Kal-Toh: Finding or Making Triconnected Planar Subgraphs / Terry Anderson and Therese Biedl
- Scandinavian Thins on Top of Cake: On the Smallest One-Size-Fits-All Box / Esther M. Arkin, Alon Efrat, George Hart, Irina Kostitsyna and Alexander Kröller, et al.
- The Kissing Problem: How to End a Gathering When Everyone Kisses Everyone Else Goodbye / Michael A. Bender, Ritwik Bose, Rezaul Chowdhury and Samuel McCauley
- Mad at Edge Crossings? Break the Edges! / Till Bruckdorfer and Michael Kaufmann
- Train Marshalling Is Fixed Parameter Tractable / Leo Brueggeman, Michael Fellows, Rudolf Fleischer, Martin Lackner and Christian Komusiewicz, et al.
- Conflict-Free Graph Orientations with Parity Constraints / Sarah Cannon, Mashhood Ishaque and Csaba D. Tóth
- The Multi-interval Ulam-Rényi Game / Ferdinando Cicalese
- Picture-Hanging Puzzles / Erik D. Demaine, Martin L. Demaine, Yair N. Minsky, Joseph S.B. Mitchell and Ronald L. Rivest, et al.
- Optimal Sensor Networks for Area Monitoring Using Rotating and Beam Sensors / Stefan Dobrev, Lata Narayanan and Jaroslav Opatrny
- The Byzantine Brides Problem / Swan Dubois, Sébastien Tixeuil and Nini Zhu
- Lean Programs, Branch Mispredictions, and Sorting / Amr Elmasry and Jyrki Katajainen
- On Computer Integrated Rationalized Crossword Puzzle Manufacturing / Jakob Engel, Markus Holzer, Oliver Ruepp and Frank Sehnke
- Solving Single-Digit Sudoku Subproblems / David Eppstein
- Finding Good Coffee in Paris / Paola Flocchini, Matthew Kellett, Peter C. Mason and Nicola Santoro
- To Satisfy Impatient Web Surfers Is Hard / Fedor V. Fomin, Frédéric Giroire, Alain Jean-Marie, Dorian Mazauric and Nicolas Nisse
- Making Life Easier for Firefighters / Fedor V. Fomin, Pinar Heggernes and Erik Jan van Leeuwen
- Counting Perfect Matchings in Graphs of Degree 3 / Martin Fürer
- M.C. Escher Wrap Artist: Aesthetic Coloring of Ribbon Patterns / Ellen Gethner, David G. Kirkpatrick and Nicholas J. Pippenger
- On the Complexity of Rolling Block and Alice Mazes / Markus Holzer and Sebastian Jakobi
- Grid Graphs with Diagonal Edges and the Complexity of Xmas Mazes / Markus Holzer and Sebastian Jakobi.
- Algorithms and Complexity of Generalized River Crossing Problems / Hiro Ito, Stefan Langerman and Yuichi Yoshida
- Solving Tantrix via Integer Programming / Fumika Kino and Yushi Uno
- Scrabble Is PSPACE-Complete / Michael Lampis, Valia Mitsou and Karolina Sołtys
- Practical Algorithms for Generating a Random Ordering of the Elements of a Weighted Set / Kevin J. Lang
- Spanning Trees and the Complexity of Flood-Filling Games / Kitty Meeks and Alexander Scott
- Tron, a Combinatorial Game on Abstract Graphs / Tillmann Miltzow
- Divorcing Made Easy / Kirk Pruhs and Gerhard J. Woeginger
- A New Analysis of Best Fit Bin Packing / Jiří Sgall
- The Coolest Order of Binary Strings / Brett Stevens and Aaron Williams
- Hitori Number / Akira Suzuki, Kei Uchizawa and Takeaki Uno
- Computing Maximum Hamiltonian Paths in Complete Graphs with Tree Metric / Wojciech Rytter and Bartosz Szreder
- Gaming Is a Hard Job, But Someone Has to Do It! / Giovanni Viglietta
- Hardness of Mastermind / Giovanni Viglietta
- Scienceography: The Study of How Science Is Written / Graham Cormode, S. Muthukrishnan and Jinyun Yan.
- ADHOC-NOW (Conference) (3rd : 2004 : Vancouver, B.C.)
- Berlin : Springer, 2004.
- Description
- Book — ix, 344 p. : ill. ; 24 cm.
- Summary
-
This book constitutes the refereed proceedings of the Third International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2004, held in Vancouver, Canada in July 2004. The 22 revised full papers and 8 revised short papers presented were carefully reviewed and selected from more than 150 submissions. All current aspects of ad-hoc networking, sensor networks, mobile, wireless, and cooperating communication systems are addressed including, multicast, broadcast, performance, QoS, routing protocols, scalability, security, hybrid networks, self-organization, auto-configuration, energy consumption, peer-to-peer systems, and MAC protocols.
(source: Nielsen Book Data)
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
TK6570 .M6 A34 2004 | Available |
- Canadian Conference on Computational Geometry (8th : 1996 : Carleton University)
- [Ottawa, Ont.] : Carleton University Press, ©1996.
- Description
- Book — 344 pages : illustrations ; 28 cm.
- Summary
-
- Invited Lecture by Roberto Tamassia Robust proximity queries in implicit Voronoi diagrams / R. Tamassia, G. Liotta and F.P. Preparata
- O-Convexity: Computing hulls, approximations, and orientation sets / V. Martynchik, N. Metelski and D. Wood
- Efficient algorithms for counting and reporting pairwise intersections between convex polygons / P. Gupta, R. Janardan and M.I. Smid
- Convex hulls of bounded curvature / J.-D. Boissonnat and S. Lazard
- Enclosing k points in the smallest axis parallel rectangle / M. Segal and K. Kedem
- Finding the set of all minimal nested convex polygons / J. Bhadury and R. Chandrasekaran
- Optimizing a corridor between two polygons with an application to polyhedral interpolation / G. Barequet and B. Wolfers.
(source: Nielsen Book Data)
- Online
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
QA447 .C36 1996 | Available |
- ALGOSENSORS (Symposium) (9th : 2013 : Sophia Antipolis, France)
- Berlin : Springer, 2014.
- Description
- Book — 1 online resource (x, 307 pages) : illustrations Digital: text file; PDF.
- Summary
-
- Modeling Reality Algorithmically: The Case of Wireless Communication.- Autonomous Mobile Robots: A Distributed Computing.- Token Dissemination in Geometric Dynamic Networks.- The Wake Up Dominating Set.- Reconfiguring Massive Particle Swarms with Limited, Global Control.- Polygon-Constrained motion planning problems.- Fast Localized Sensor Self-Deployment for Focused Coverage.- Minimal Solvers for Unsynchronized TDOA Sensor Network Calibration.- Data-Delivery by Energy-Constrained Mobile Robots.- Approximation Bounds for the Minimum k-Storage Problem.- Counting in Anonymous Dynamic Networks: An Experimental Perspective.- Station Assignment with Applications to Sensing.- On Local Broadcasting Schedules and CONGEST Algorithms in the SINR Model.- The Effect of Forgetting on the Performance of a Synchronizer.- On the Complexity of Barrier Resilience for Fat Regions.- A Distributed Approximation Algorithm for Strongly Connected Dominating-Absorbent Sets in Asymmetric Wireless Ad-Hoc Networks.- Uniform Dispersal of Asynchronous Finite-State Mobile Robots in Presence of Holes.- On the Complexity of Fixed-Schedule Neighbourhood Learning in Wireless Ad Hoc Radio Networks.- Optimal Nearest Neighbor Queries in Sensor Networks.- Conflict Graphs and the Capacity of the Mean Power Scheme.- Rendezvous of Two Robots with Visible Bits.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
17. Aspects of network and information security [2008]
- NATO Advanced Study Institute on Network Security and Intrusion Detection (2005 : Yerevan, Armenia)
- Amsterdam ; Washington D.C. : IOS Press, ©2008.
- Description
- Book — 1 online resource (ix, 355 pages) : illustrations Digital: data file.
- Summary
-
- Preface -- Section I: Network security: Network security and survivability: using wireless overlay networks for critical infrastructure protection / M. Bermester
- Security when routers are taken over by the adversary / Y. Desmedt
- Security in quantum cryptography and quantum networks / J. Gruska
- The case for self-healing software / A.D. Keromytis
- Multi-agent modeling and the simulation of computer network security processes: "a game of network cats and mice" / I. Kotenko
- Formal treatment of secure protocols: an introduction / D. Krizanc, J. Lipton
- Behavioral and structural properties of malicious code / C. Kruegel
- Security from the practitioner's point of view / M. Oit
- Mobile and wireless communications security / B. Preneel
- Humanitarian problems in information security / V. Tairyan [and others]
- Multimedia security: open problems and solutions / S. Voloshynovskiy [and others]
- A selective introduction to border gateway protocol (BGP) security issues / T. Wan, P.C. van Oorschot, E. Kranakis
- Section II: Information security: Steganography & steganalysis an overview of research & challenges / S.S. Agaian
- Guessing and cryptography / E. Arikan
- The exact approximate encryption of quantum information / J. Bouda
- A new approach to stochastic quantum processes, their manipulation and control / A. Gevorkyan
- Reliability approach in Wiretapper guessing theory / E.A. Haroutunian
- E-capacity of information hiding systems / M.E. Haroutunian
- Quasicrystals in cryptography / J. Patera, M. Nesterenko
- Asymptotic investigation of mutual information and capacity of certain communication channels / V. Prelov
- Information theory of covert timing channels / A.B Wagner, V. Anantharam
- Section III: Coding: A survey of new results in coding with feedback and searching with lies / C. Deppe
- Remarks on e-optimal rate function in DMS coding / A. Harutyunyan
- Reconstruction of data distorted by some errors / E. Konstantinova
- On (w, r) cover-free codes / V. Lebedev
- Switching methods for error-correcting codes / F. Solovéva
- On reconstruction of functions on the hypercube / A. Vasiléva.
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.