Listing 1 - 10 of 19 | << page >> |
Sort by
|
Choose an application
Choose an application
Choose an application
Choose an application
NS-2 is an open-source discrete event network simulator which is widely used by both the research community as well as by the people involved in the standardization protocols of IETF. The goal of this book is twofold: on one hand to learn how to use the NS-2 simulator, and on the other hand, to become acquainted with and to understand the operation of some of the simulated objects using NS-2 simulations. The book is intended to help students, engineers or researchers who need not have much background in programming or who want to learn through simple examples how to analyse some simulated objects using NS-2. Simulations may differ from each other in many aspects: the applications, topologies, parameters of network objects (links, nodes) and protocols used, etc. The first chapter is a general introduction to the book, where the importance of NS-2 as a tool for a good comprehension of networks and protocols is stated. In the next chapters we present special topics as TCP, RED, etc., using NS-2 as a tool for better understanding the protocols. We provide in the appendices a review of Random Variables and Confidence Intervals, as well as a first sketch for using the new NS-3 simulator. Table of Contents: Introduction / NS-2 Simulator Preliminaries / How to work with trace files / Description and simulation of TCP/IP / Routing and network dynamics / RED: Random Early Discard / Differentiated Services / Mobile Networks and Wireless Local Area Networks / Classical queueing models / Tcl and C++ linkage.
Choose an application
Choose an application
This book constitutes the refereed proceedings of the Second Euro-NF International Conference, NET-COOP 2008 held in Paris, France, in September 2008. The 13 revised full papers presented were carefully reviewed and selected from a total of 27 submissions. The papers are organized in topical sections on economics and peer-to-peer networks; routing and measurements; scheduling; tcp and congestion control; as well as wireless networks.
Internet --- Wireless communication systems --- Telecommunications --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Automatic control --- Information Technology --- Computer Science (Hardware & Networks) --- Computer networks --- Computer science. --- Informatics --- Computer communication systems. --- Software engineering. --- Computer programming. --- Algorithms. --- Computer Science. --- Computer Communication Networks. --- Software Engineering/Programming and Operating Systems. --- Algorithm Analysis and Problem Complexity. --- Programming Techniques. --- Software Engineering. --- Information Systems Applications (incl. Internet). --- Science --- Algorism --- Algebra --- Arithmetic --- Computers --- Electronic computer programming --- Electronic data processing --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Computer software engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Foundations --- Programming --- Distributed processing --- Computer software. --- Software, Computer --- Computer systems --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This volume of LNICST is a collection of the papers of the 4th International Conference on Bio-Inspired Models of Network, Information, and Computing Systems (Bionetics). The event took place in the medieval city of Avignon, known also as the City of the Popes, during December 9 to 11, 2009. Bionetics main objective is to bring b- inspired paradigms into computer engineereing and networking, and to enhance the fruitful interactions between these fields and biology. The program of the conference indeed includes applications of various paradigms that have their origin in biology: population dynamics, branching processes, ant c- ony optimization. The proceedings include 19 papers covering a broad range of - portant issues in areas related to bio-inspired technologies. They correspond to pr- entations at 6 technical sessions. Four papers correspond to an invited session on the Epidemic-type forwarding in DTNs (sparse mobile ad-hoc wireless networks) org- ized by Dr Francesco De Pellegrini, (Italy, CREATE-NET). The following 9 papers (selected out of 15 submissions) correspond to contributions to regular sessions on Bio-inspired security, Bio-Inspired Networking, Bioinspired algorithms and software systems. The remaining 6 papers (selected out of a total of 9 submissions) are de- cated to work in progress. For each paper, we have provided at least two independent reviews, most of which were offered by members of the TPC.
Biologically-inspired computing --- Physical Sciences & Mathematics --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Sciences - General --- Information Technology --- Computer Science (Hardware & Networks) --- Bionics --- Computer science --- Computer networks --- Information technology --- Bio-inspired computing --- Natural computing --- Intellectronics --- Computer science. --- Computer communication systems. --- Software engineering. --- Computer programming. --- Algorithms. --- Computer Science. --- Computer Communication Networks. --- Software Engineering/Programming and Operating Systems. --- Software Engineering. --- Information Systems Applications (incl. Internet). --- Programming Techniques. --- Algorithm Analysis and Problem Complexity. --- Electronic data processing --- Bioengineering --- Biophysics --- Cybernetics --- Simulation methods --- Systems engineering --- Computer software. --- Software, Computer --- Computer systems --- Informatics --- Science --- Computer software engineering --- Engineering --- Application software. --- Algorism --- Algebra --- Arithmetic --- Computers --- Electronic computer programming --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Foundations --- Programming --- Distributed processing
Choose an application
This book constitutes the refereed proceedings of the Second International Conference on Decision and Game Theory for Security, GameSec 2011, held in College Park, Maryland, USA, in November 2011. The 16 revised full papers and 2 plenary keynotes presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on attacks, adversaries, and game theory, wireless adhoc and sensor networks, network games, security insurance, security and trust in social networks and security investments.
Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer communication systems. --- Computer security. --- Algorithms. --- Management information systems. --- Game theory. --- Computer Science. --- Information Systems Applications (incl. Internet). --- Computer Communication Networks. --- Systems and Data Security. --- Algorithm Analysis and Problem Complexity. --- Management of Computing and Information Systems. --- Game Theory, Economics, Social and Behav. Sciences. --- Games, Theory of --- Theory of games --- Mathematical models --- Mathematics --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Algorism --- Algebra --- Arithmetic --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Foundations --- Protection --- Security measures --- Distributed processing --- Computer software. --- Information Systems. --- Mathematics. --- Math --- Software, Computer --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
Opening new directions in research in both discrete event dynamic systems as well as in stochastic control, this volume focuses on a wide class of control and of optimization problems over sequences of integer numbers. This is a counterpart of convex optimization in the setting of discrete optimization. The theory developed is applied to the control of stochastic discrete-event dynamic systems. Some applications are admission, routing, service allocation and vacation control in queueing networks. Pure and applied mathematicians will enjoy reading the book since it brings together many disciplines in mathematics: combinatorics, stochastic processes, stochastic control and optimization, discrete event dynamic systems, algebra.
Control theory. --- Queuing theory. --- Stochastic analysis. --- Discrete-time systems. --- Control theory --- Queuing theory --- Stochastic analysis --- Discrete-time systems --- Operations Research --- Mathematical Theory --- Civil & Environmental Engineering --- Mathematics --- Engineering & Applied Sciences --- Physical Sciences & Mathematics --- Probabilities. --- System theory. --- Combinatorics. --- Calculus of variations. --- Probability Theory and Stochastic Processes. --- Systems Theory, Control. --- Calculus of Variations and Optimal Control; Optimization. --- Isoperimetrical problems --- Variations, Calculus of --- Maxima and minima --- Combinatorics --- Algebra --- Mathematical analysis --- Systems, Theory of --- Systems science --- Science --- Probability --- Statistical inference --- Combinations --- Chance --- Least squares --- Mathematical statistics --- Risk --- Philosophy
Choose an application
This book constitutes the refereed proceedings of the Second Euro-NF International Conference, NET-COOP 2008 held in Paris, France, in September 2008. The 13 revised full papers presented were carefully reviewed and selected from a total of 27 submissions. The papers are organized in topical sections on economics and peer-to-peer networks; routing and measurements; scheduling; tcp and congestion control; as well as wireless networks.
Complex analysis --- Programming --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- complexe analyse (wiskunde) --- informatica --- programmeren (informatica) --- informatiesystemen --- software engineering --- computernetwerken
Listing 1 - 10 of 19 | << page >> |
Sort by
|