Cargando…

Proceedings of the 2009 International Conference on Computer and Network Technology, Chennai, India, 24-26 July 2009 /

ICCNT is the main annual computer and network research conference in Chennai that presents cutting edge research work. It will act as a platform for scientists, scholars, engineers and students from universities all around the world to present ongoing research and hence foster better research relati...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: International Conference on Computer and Network Technology
Otros Autores: Mahadevan, Venkatesh, Zhou, Jianhong
Formato: Electrónico Congresos, conferencias eBook
Idioma:Inglés
Publicado: Singapore ; Hackensack, NJ : World Scientific, ©2009.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Organizing Committee; Technical Committee; Preface; Contents; Session 1; Analysis of a Mathematical Model for Worm Virus Propagation S.-I. Wang, C. Liang and Q.-M. Liu; 1. Introduction; 2. Mathematical Modeling; 3. Simulation; 4. Conclusion; References; SABAD: Self Assured Black-hole Attack Detection on AODV Protocol in MANET K.S. Chaudhary, S. Tripathy and K.V. Arya; 1. Introduction; 2. Network Assumption; 3. SABAD: The proposed mechanism; 3.1. Neighborhood data collection; 3.2. Trust Value calculation; 3.3. Route discovery; 3.4. Alarm Phase; 3.5. Route Maintenance; 4. Parameter Prediction.
  • 4.1 Estimation of Battery Energy4.2. Prediction of Signal Strength; 4.4. Prediction of Node Mobility; 5. Discussion; 6. Conclusion; References; LIC-based Fast Forwarding towards Scalability, Simplicity, Flexibility and Security K. Xiong, Z.-D. Qiu, Y. Zhang, Y.-c. Guo and H-K. Zhang; 1. Introduction; 2. Related Work; 3. LIe-based Forwarding; 3.1. OLIC-based Forwarding; 3.2. TUe-based forwarding; 4. Analysis of Lie-Based Forwarding; 5. Experiment Results; 6. Conclusion; Acknowledgments; References.
  • Push Technology with Location Tracking & Data Filtering for Wireless C.P. Reddy, K. Prakhya and T.R. RaoI. INTRODUCTION; II. ELATED WORK; IV. IMPLEMENTATION; V. RESULTS & ANALYSIS; VI. CONCLUSIONS; ACKNOWLEDGEMENT; REFERENCES; Dynamic Speed Response of the Internal Model Controller with Dither Injection N. Amuthan, R. Mohan and N. Sivakumar; 1. Introduction; 2. Internal model controller; 2.1. Controller design; 3. Dynamic speed response; 4. Dither injection; 5. Conclusiou; Acknowledgment; References; Biographics.
  • An Ownership Sharing Protocol for RFID without a Trusted Third Party G. Kapoor and S. Piramuthu1. Introduction; 2. The Proposed Ownership Sharing Protocol; 2.1. Notation; 3. Security Analysis; 3.1. Secrecy/Authentication; 3.2. DoS/Synchronization problem; 3.3. Forward Security; 3.4. Passive ReplaylTracking; 4. Discussion; References; Queuing Analysis of IEEE 802.11 WLAN O. Bhat, N.S. Shankar and K. Venkataramaniah; 1. Introduction; 2. Mathematical Model of Backoff Process; 3. Queuing Model for Individual WSTA; 4. Numerical Results; 5. Conclusions; Acknowledgments; References.
  • A Localization Algorithm for a GPS-Free System with Static Parameter Tuning K. Padia, G.A. Vikas, H S. lyer, V.R. Darshan, N.P.G. Prasad, A. Srinivas, H Khan, A. Gupta and S. Olariu1. Introduction; 2. Related Work; 3. Prediction-Interpolation with Static Parameter Tuning; 4. Implementation and Results; 5. Future Work; References; Session 2; HELLO Expired Time Based Greedy Routing Scheme for Mobile Ad Hoc Networks S. Sharma; 1. Introduction; 2. Background; 2.1. Geographical Routing; 2.2. Research on HELLO protocol; 3. Analysis on HELLO Protocol; 4. Our Methodology; 4.1. Our Proposed Metric.