Computer Networks

20th International Conference, CN 2013, Lwówek Śląski, Poland, June 17-21, 2013. Proceedings

Editors:

ISBN: 978-3-642-38864-4 (Print) 978-3-642-38865-1 (Online)

Table of contents (58 chapters)

previous Page of 3
  1. Front Matter

    Pages -

  2. No Access

    Book Chapter

    Pages 1-10

    Synchronization Algorithm for Timed Colored Petri Nets and Ns-2 Simulators

  3. No Access

    Book Chapter

    Pages 11-20

    Experimental Results of Dynamic Load Scheduling in the CMS Data Acquisition System

  4. No Access

    Book Chapter

    Pages 21-30

    Client-Side Processing Environment Based on Component Platforms and Web Browsers

  5. No Access

    Book Chapter

    Pages 31-37

    Study of the Character of APRS Traffic in AX.25 Network

  6. No Access

    Book Chapter

    Pages 38-44

    Modelling the Pertubation of Traffic Based on Ateb-functions

  7. No Access

    Book Chapter

    Pages 45-54

    Spatial Econometrics Models in Web Server’s Performance

  8. No Access

    Book Chapter

    Pages 55-63

    Empirical Web Performance Evaluation with MWING System and Turning Bands Method

  9. No Access

    Book Chapter

    Pages 64-75

    A Note on the Local Minimum Problem in Wireless Sensor Networks

  10. No Access

    Book Chapter

    Pages 76-85

    Lessons Learned from the Deployment of Wireless Sensor Networks

  11. No Access

    Book Chapter

    Pages 86-94

    Analysis and Optimization of LEACH Protocol for Wireless Sensor Networks

  12. No Access

    Book Chapter

    Pages 95-104

    Performance Analysis of IEEE 802.11 EDCA for a Different Number of Access Categories and Comparison with DCF

  13. No Access

    Book Chapter

    Pages 105-113

    Simulation Comparison of LEACH-Based Routing Protocols for Wireless Sensor Networks

  14. No Access

    Book Chapter

    Pages 114-123

    Routing Protocols for Border Surveillance Using ZigBee-Based Wireless Sensor Networks

  15. No Access

    Book Chapter

    Pages 124-135

    Quantitative Risk Analysis for Data Storage Systems

  16. No Access

    Book Chapter

    Pages 136-145

    Onion Routing Efficiency for Web Anonymization in Various Configurations

  17. No Access

    Book Chapter

    Pages 146-156

    Multi-agent Based Approach for Botnet Detection in a Corporate Area Network Using Fuzzy Logic

  18. No Access

    Book Chapter

    Pages 157-165

    Monitoring System’s Network Activity for Rootkit Malware Detection

  19. No Access

    Book Chapter

    Pages 166-176

    Research of Failure Detection Algorithms of Transmission Line and Equipment in a Communication System with a Dual Bus

  20. No Access

    Book Chapter

    Pages 177-188

    The Concept of Using Multi-protocol Nodes in Real-Time Distributed Systems for Increasing Communication Reliability

  21. No Access

    Book Chapter

    Pages 189-199

    Bandwidth Optimization Method for Non-critical Data Transmission in Real-Time Communication Systems

previous Page of 3