Printer Friendly

Networks security, wireless communications and trusted computing; proceedings; 2v.


Networks security, wireless communications and trusted computing; proceedings; 2v.

Int'l Conference on Networks Security, Wireless Communications and Trusted Computing (2009: Hubei, China) Ed. by Zhengbing Hu et al.

Computer Society Press


1666 pages




This two-volume set collects papers, mainly by contributors in Asia, from an April 2009 conference, presented in no discernable topical order. Some subjects covered include auto extraction of interested regions in fire image compression, a probabilistic drop scheme for mitigating SYN flooding attacks, a call admission control routing mechanism using a Bloom filter in MANET, application of Boolean kernel function SVM in face recognition, a sequence encoding scheme for multi-match packet classification, and energy consumption and lifetime analysis in cluster-based wireless sensor networks for periodic monitoring applications. Other subjects explored include traffic-energy balanced routing protocols with two-direction routing, credit status in China's e-commerce market, intrusion detection based on fuzzy support vector machines, research on web mining technology based on XML, and modeling and performance analysis on a delay tolerant, differentiated, wireless sensor web-service framework. There is no subject index.

([c]2009 Book News, Inc., Portland, OR)

COPYRIGHT 2009 Book News, Inc.
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2009 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Publication:SciTech Book News
Article Type:Brief article
Date:Jun 1, 2009
Previous Article:Information and financial engineering; proceedings.
Next Article:Association of Computer Science and Information Technology; proceedings.

Terms of use | Copyright © 2017 Farlex, Inc. | Feedback | For webmasters