Analysis of Informal Communication Networks - A Case Study
Significance of Social Media Optimization in SEO
Wireless Security Market Industry in LTE Networks 2013 to 2018
An RSS Based Localization Algorithm in Cellular Networks
The Effect of Network Topology on Geographic Routing Performance in Localized Networks
Fast Katz and Commuters: Efficient Estimation of Social Relatedness in Large Networks
Issues in WiFi Networks
A Quality of Service Strategy to Optimize Bandwidth Utilization in Mobile Networks
Fees and Surcharging in ATM Networks: The Role of Nonbanks and Depositor Base
Capacitor Placement In Distribution Systems Using Artificial Intelligent Techniques
Modelling and Control of Dynamic Flows in Communication Networks
Channel Coding in Communication Networks: From Theory to Turbocodes
Utility-based Resource and Qos Optimization in Packet Networks - Link and Network Level Optimization
Dissemination Of Information In Communication Networks: Broadcasting, Gossiping, LEader Election, and Fault-Tolerance
Presents the background and context of all ideas, concepts, algorithms, analyses and arguments before discussing details.Accessible to both beginners as well as specialists.
A Single Source on Parallel Synthesis for Lead OptimizationThe end of the previous millennium saw an explosion in the application of parallel synthesis techniques for making compounds for ...
This book constitutes the refereed proceedings of the 10th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2009, held in Thessaloniki, Greece, in October 2009.The 84 revised ...
Features surveys of the research areas in combinatorial optimization in the broad sense, ranging from applied graph theory to mathematical programming. This book contains various results and shows ...
Organized into three parts, Resource, Mobility, and Security Management in Wireless Networks and Mobile Communications examines the inherent constraint of limited bandwidth and unreliable ...
Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security ...