Proceedings of the 2009 International Conference on Computer and Network Technology, Chennai, India, 24-26 July 2009 [electronic resource] / editors, V. Mahadevan, J. Zhou.

New Jersey : World Scientific, 2010.
Conference Name:
International Conference on Computer and Network Technology.
1 online resource (375 p.)
Computer networks -- Congresses.
Information technology -- Congresses.
Electronic books.
ICCNT is the main annual computer and network research conference in Chennai that presents cutting edge research work. It will act as a platform for scientists, scholars, engineers and students from universities all around the world to present ongoing research and hence foster better research relations between universities and the computer and networking industry. Sample Chapter(s)
Chapter 1: Analysis of a Mathematical Model for Worm Virus Propagation (174 KB)

  • Analysis of a Mathematical Model for Worm Virus Propagation (S-J Wang et al.)
  • <
Contents; Organizing Committee; Technical Committee; Preface; Session 1; Analysis of a Mathematical Model for Worm Virus Propagation S.-I. Wang, C. Liang and Q.-M. Liu; 1. Introduction; 2. Mathematical Modeling; 3. Simulation; 4. Conclusion; References; SABAD: Self Assured Black-hole Attack Detection on AODV Protocol in MANET K. S. Chaudhary, S. Tripathy and K. V. Arya; 1. Introduction; 2. Network Assumption; 3. SABAD: The proposed mechanism; 3.1. Neighborhood data collection; 3.2. Trust Value calculation; 3.3. Route discovery; 3.4. Alarm Phase; 3.5. Route Maintenance; 4. Parameter Prediction
4.1 Estimation of Battery Energy4.2. Prediction of Signal Strength; 4.4. Prediction of Node Mobility; 5. Discussion; 6. Conclusion; References; LIC-based Fast Forwarding towards Scalability, Simplicity, Flexibility and Security K. Xiong, Z.-D. Qiu, Y. Zhang, Y.-c. Guo and H-K. Zhang; 1. Introduction; 2. Related Work; 3. LIe-based Forwarding; 3.1. OLIC-based Forwarding; 3.2. TUe-based forwarding; 4. Analysis of Lie-Based Forwarding; 5. Experiment Results; 6. Conclusion; Acknowledgments; References
Push Technology with Location Tracking & Data Filtering for Wireless C. P. Reddy, K. Prakhya and T. R. RaoI. INTRODUCTION; II. ELATED WORK; IV. IMPLEMENTATION; V. RESULTS & ANALYSIS; VI. CONCLUSIONS; ACKNOWLEDGEMENT; REFERENCES; Dynamic Speed Response of the Internal Model Controller with Dither Injection N. Amuthan, R. Mohan and N. Sivakumar; 1. Introduction; 2. Internal model controller; 2.1. Controller design; 3. Dynamic speed response; 4. Dither injection; 5. Conclusiou; Acknowledgment; References; Biographics
An Ownership Sharing Protocol for RFID without a Trusted Third Party G. Kapoor and S. Piramuthu1. Introduction; 2. The Proposed Ownership Sharing Protocol; 2.1. Notation; 3. Security Analysis; 3.1. Secrecy/Authentication; 3.2. DoS/Synchronization problem; 3.3. Forward Security; 3.4. Passive ReplaylTracking; 4. Discussion; References; Queuing Analysis of IEEE 802.11 WLAN O. Bhat, N. S. Shankar and K. Venkataramaniah; 1. Introduction; 2. Mathematical Model of Backoff Process; 3. Queuing Model for Individual WSTA; 4. Numerical Results; 5. Conclusions; Acknowledgments; References
A Localization Algorithm for a GPS-Free System with Static Parameter Tuning K. Padia, G. A. Vikas, H S. lyer, V. R. Darshan, N. P. G. Prasad, A. Srinivas, H Khan, A. Gupta and S. Olariu1. Introduction; 2. Related Work; 3. Prediction-Interpolation with Static Parameter Tuning; 4. Implementation and Results; 5. Future Work; References; Session 2; HELLO Expired Time Based Greedy Routing Scheme for Mobile Ad Hoc Networks S. Sharma; 1. Introduction; 2. Background; 2.1. Geographical Routing; 2.2. Research on HELLO protocol; 3. Analysis on HELLO Protocol; 4. Our Methodology; 4.1. Our Proposed Metric
4.2. Metric for Greedy Routing
Description based upon print version of record.
Includes bibliographical references.
Mahadevan, V.
Zhou, J.
Location Notes Your Loan Policy
Description Status Barcode Your Loan Policy