|刊登類別:
有類似物品要出售?

Networks and Communications (NetCom2013): Proceedings of the Fifth International

狀況:
全新
庫存 3 件
價格:
US $249.71
大約HK$ 1,949.40
運費:
免費 Economy Shipping. 查看詳情— 運送
所在地:Fairfield, Ohio, 美國
送達日期:
估計於 6月8日, 六6月20日, 四之間送達 運送地點 43230
估計送達日期 — 會在新視窗或分頁中開啟考慮到賣家的處理時間、寄出地郵遞區碼、目的地郵遞區碼、接收包裹時間,並取決於所選的運送方式以及收到全部款項全部款項 — 會在新視窗或分頁中開啟的時間。送達時間會因時而異,尤其是節日。
退貨:
30 日退貨. 由買家支付退貨運費. 查看詳情- 更多退貨相關資訊
保障:
請參閱物品說明或聯絡賣家以取得詳細資料。閱覽全部詳情查看保障詳情
(不符合「eBay 買家保障方案」資格)

安心購物

高度評價賣家
值得信賴的賣家,發貨快,輕鬆退貨。 

賣家資料

註冊為商業賣家
賣家必須承擔此刊登物品的所有責任。
eBay 物品編號:386717666217
上次更新時間: 2024-05-19 20:56:58查看所有版本查看所有版本

物品細節

物品狀況
全新: 全新,未閱讀過和使用過的書籍,狀況完好,不存在缺頁或內頁受損。 查看所有物品狀況定義會在新視窗或分頁中開啟
ISBN-13
9783319376769
Book Title
Networks and Communications (NetCom2013)
ISBN
9783319376769
Publication Name
Networks and Communications (Netcom2013) : Proceedings of the Fifth International Conference on Networks and Communications
Item Length
9.2in
Publisher
Springer International Publishing A&G
Publication Year
2016
Series
Lecture Notes in Electrical Engineering Ser.
Type
Textbook
Format
Trade Paperback
Language
English
Item Height
0.7in
Author
Dhinaharan Nagamalai
Item Width
6.1in
Item Weight
188 Oz
Number of Pages
Xv, 335 Pages

關於產品

Product Information

Part I: Measurement and Performance Analysis.- An Evaluation of EpiChord in OverSim.- Enhanced back-off technique for IEEE 802.15.4 WSN standard.- Efficient Retransmission QoS-Aware MAC Scheme in Wireless Sensor Networks.- Performance Analysis of Correlated Channel for UWB-MIMO System.- Part II: Network Architectures, Protocols and Routing.- Node Failure Time Analysis for Maximum Stability vs. Minimum Distance.- Spanning Tree-based Data Gathering in Mobile Sensor Networks.- Wireless Networks: An Instance of Tandem Discrete-Time Queues.- An Equal Share Ant Colony Optimization Algorithm for Job Shop Scheduling adapted to Cloud Environments.- A Dynamic Trust Computation Model for Peer to Peer Network.- Road Traffic Management using Egyptian Vulture Optimization Algorithm - A New Graph Agent-Based Optimization Meta-Heuristic Algorithm.- Part III: Adhoc and Sensor Networks.- A Novel Bloom Filter Based Variant of Elliptic Curve Digital Signature Algorithm for Wireless Sensor Networks.- Energy Efficient Localization in Wireless Sensor Networks.- Part IV: Network Security, Trust and Privacy.- Data Integrity Verification in Hybrid Cloud using TTPA.- A Comparitive Study of Data Perturbation Using Fuzzy Logic in Preserving Privacy.- Vector Quantization in Language Independent Speaker Identification Using Mel-Frequency Cepstrum Co-Efficient.- Improved Technique for Data Confidentiality in Cloud Environment.- A Hybrid-Based Feature Selection Approach for IDS.- Reckoning Minutiae Points with RNA-FINNT Augments Trust and Privacy of Legitimate User and Ensures Network Security in the Public Network.- Empirical Study of Email Security Threats and Countermeasures.- Improving Business Intelligence based on Frequent Itemsets using k-means Clustering Algorithm.- Reputation-Based Trust Management for Distributed Spectrum Sensing.- Ontology Based Multi-Agent Intrusion Detection System for Web Service Attacks Using Self Learning.- A Novel Key Exchange Protocol provably secure against Man-In-The-Middle Attack.- Neutralizing DoS attacks on Linux Servers.- Part V: Wireless and Mobile Networks.- Cache Coherency Algorithm to Optimize Bandwidth in Mobile Networks.- Connected Dominating Set based Scheduling for Publish-Subscribe Scenarios in WSN.- Ubiquitous Compaction Monitoring Interface for Soil compactor - A Web Based Approach.

Product Identifiers

Publisher
Springer International Publishing A&G
ISBN-10
3319376764
ISBN-13
9783319376769
eBay Product ID (ePID)
237898784

Product Key Features

Author
Dhinaharan Nagamalai
Publication Name
Networks and Communications (Netcom2013) : Proceedings of the Fifth International Conference on Networks and Communications
Format
Trade Paperback
Language
English
Publication Year
2016
Series
Lecture Notes in Electrical Engineering Ser.
Type
Textbook
Number of Pages
Xv, 335 Pages

Dimensions

Item Length
9.2in
Item Height
0.7in
Item Width
6.1in
Item Weight
188 Oz

Additional Product Features

Series Volume Number
284
Number of Volumes
1 Vol.
Lc Classification Number
Tk5101-5105.9
Table of Content
Part I: Measurement and Performance Analysis.- An Evaluation of EpiChord in OverSim.- Enhanced back-off technique for IEEE 802.15.4 WSN standard.- Efficient Retransmission QoS-Aware MAC Scheme in Wireless Sensor Networks.- Performance Analysis of Correlated Channel for UWB-MIMO System.- Part II: Network Architectures, Protocols and Routing.- Node Failure Time Analysis for Maximum Stability vs. Minimum Distance.- Spanning Tree-based Data Gathering in Mobile Sensor Networks.- Wireless Networks: An Instance of Tandem Discrete-Time Queues.- An Equal Share Ant Colony Optimization Algorithm for Job Shop Scheduling adapted to Cloud Environments.- A Dynamic Trust Computation Model for Peer to Peer Network.- Road Traffic Management using Egyptian Vulture Optimization Algorithm - A New Graph Agent-Based Optimization Meta-Heuristic Algorithm.- Part III: Adhoc and Sensor Networks.- A Novel Bloom Filter Based Variant of Elliptic Curve Digital Signature Algorithm for Wireless Sensor Networks.- Energy Efficient Localization in Wireless Sensor Networks.- Part IV: Network Security, Trust and Privacy.- Data Integrity Verification in Hybrid Cloud using TTPA.- A Comparitive Study of Data Perturbation Using Fuzzy Logic in Preserving Privacy.- Vector Quantization in Language Independent Speaker Identification Using Mel-Frequency Cepstrum Co-Efficient.- Improved Technique for Data Confidentiality in Cloud Environment.- A Hybrid-Based Feature Selection Approach for IDS.- Reckoning Minutiae Points with RNA-FINNT Augments Trust and Privacy of Legitimate User and Ensures Network Security in the Public Network.- Empirical Study of Email Security Threats and Countermeasures.- Improving Business Intelligence based on Frequent Itemsets using k-means Clustering Algorithm.- Reputation-Based Trust Management for Distributed Spectrum Sensing.- Ontology Based Multi-Agent Intrusion Detection System for Web Service Attacks Using Self Learning.- A Novel Key ExchangeProtocol provably secure against Man-In-The-Middle Attack.- Neutralizing DoS attacks on Linux Servers.- Part V: Wireless and Mobile Networks.- Cache Coherency Algorithm to Optimize Bandwidth in Mobile Networks.- Connected Dominating Set based Scheduling for Publish-Subscribe Scenarios in WSN.- Ubiquitous Compaction Monitoring Interface for Soil compactor - A Web Based Approach.
Copyright Date
2014
Topic
Networking / General, Electrical, Telecommunications
Intended Audience
Trade
Illustrated
Yes
Genre
Computers, Technology & Engineering

賣家提供的物品說明

grandeagleretail

grandeagleretail

98.2% 正面信用評價
已賣出 269.75 萬 件物品
瀏覽商店聯絡
通常在 24 小時內回覆

詳盡賣家評級

過去 12 個月的平均評級

說明準確
4.9
運費合理
5.0
運送速度
4.9
溝通
4.9

賣家信用評價 (1,023,501)

b***t (274)- 買家留下的信用評價。
過去 1 個月
購買已獲認證
Great Seller!!!! A+A+A+A+A+A+
6***k (2205)- 買家留下的信用評價。
過去 1 個月
購買已獲認證
I am very happy with my purchase! Fast Shipping, Swift Delivery, Nice Price, Good Quality and Condition, and no need for any communication with seller. Pretty cool! Book is totally BLANK! LOL! But I love it because I can write my thoughts about inventions & business ideas & things that I don't want anyone to see, and it is deceptively hidden inside of the book. Very Happy with this BLANK Book!
u***l (2573)- 買家留下的信用評價。
過去 1 個月
購買已獲認證
Excellent - great new book and arrived quickly for out of country - great experience - thank you!