This brief provides an overview of the requirements, challenges, design issues and major techniques for seamless and secure communications over heterogeneous wireless networks. It summarizes and provides detailed insights into the latest research on handoff management, mobility management, fast authentication and security management to support seamless and secure roaming for mobile clients. The reader will also learn about the challenges in developing relevant technologies and providing ubiquitous Internet access over heterogeneous wireless networks. The authors have extensive experience in...
This brief provides an overview of the requirements, challenges, design issues and major techniques for seamless and secure communications over hetero...
This Springer Brief focuses on the current state-of-the-art research on spectrum sensing by using energy detection, a low-complexity and low-cost technique. It includes a comprehensive summary of recent research, fundamental theories, possible architectures, useful performance measurements of energy detection and applications of energy detection. Concise, practical chapters explore conventional energy detectors, alternative forms of energy detectors, performance measurements, diversity techniques and cooperative networks. The careful analysis enables reader to identify the most efficient...
This Springer Brief focuses on the current state-of-the-art research on spectrum sensing by using energy detection, a low-complexity and low-cost tech...
This brief presents a peer-to-peer (P2P) web-hosting infrastructure (named pWeb) that can transform networked, home-entertainment devices into lightweight collaborating Web servers for persistently storing and serving multimedia and web content. The issues addressed include ensuring content availability, Plexus routing and indexing, naming schemes, web ID, collaborative web search, network architecture and content indexing. In pWeb, user-generated voluminous multimedia content is proactively uploaded to a nearby network location (preferably within the same LAN or at least, within the same...
This brief presents a peer-to-peer (P2P) web-hosting infrastructure (named pWeb) that can transform networked, home-entertainment devices into lightwe...
This SpringerBrief explains how to create a Rails web application with JRuby, a 100% Java implementation for Ruby. This brief demonstrates how Oracle(R) WebLogic servers and JBoss(R) application servers deploy the JRuby application, how JRuby runs on the Java(R) Virtual Machine, and how JRuby is the basis for popular websites including LinkedIn, Oracle Mix, and Mingle. The Oracle(R) database and Oracle(R) MySQL database are used as the basis for the JRuby Rails application. Chapters also cover enabling Flash, developing the JRuby application using Ruby syntax, and deploying applications...
This SpringerBrief explains how to create a Rails web application with JRuby, a 100% Java implementation for Ruby. This brief demonstrates how Oracle(...
This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in securing networks and presents system models. The authors introduce mechanisms to reduce the overhead and identify malicious nodes that drop packets intentionally. Also included is a new, efficient cooperation incentive scheme to stimulate the selfish nodes to relay information packets and enforce fairness. Many examples are provided, along with predictions for future directions of the field....
This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requiremen...
This Springer Brief examines the tools based on attack graphs that help reveal network hardening threats. Existing tools detail all possible attack paths leading to critical network resources. Though no current tool provides a direct solution to remove the threats, they are a more efficient means of network defense than relying solely on the experience and skills of a human analyst. Key background information on attack graphs and network hardening helps readers understand the complexities of these tools and techniques. A common network hardening technique generates hardening solutions...
This Springer Brief examines the tools based on attack graphs that help reveal network hardening threats. Existing tools detail all possible attack pa...
This Springer Brief investigates the voice and elastic/interactive data service support over cognitive radio networks (CRNs), in terms of their delay requirements. The increased demand for wireless communication conflicts with the scarcity of the radio spectrum, but CRNS allow for more efficient use of the networks. The authors review packet level delay requirements of the voice service and session level delay requirements of the elastic/interactive data services, particularly constant-rate and on-off voice traffic capacities in CRNs with centralized and distributed network...
This Springer Brief investigates the voice and elastic/interactive data service support over cognitive radio networks (CRNs), in terms of their delay ...
This Springer Brief presents recent research results on area coverage for intruder detection from an energy-efficient perspective. These results cover a variety of topics, including environmental surveillance and security monitoring. The authors also provide the background and range of applications for area coverage and elaborate on system models such as the formal definition of area coverage and sensing models. Several chapters focus on energy-efficient intruder detection and intruder trapping under the well-known binary sensing model, along with intruder trapping under the probabilistic...
This Springer Brief presents recent research results on area coverage for intruder detection from an energy-efficient perspective. These results cover...
The reliable detection of low-level image structures is an old and still challenging problem in computer vision. This book leads a detailed tour through the LSD algorithm, a line segment detector designed to be fully automatic. Based on the a contrario framework, the algorithm works efficiently without the need of any parameter tuning. The design criteria are thoroughly explained and the algorithm's good and bad results are illustrated on real and synthetic images. The issues involved, as well as the strategies used, are common to many geometrical structure detection problems and some...
The reliable detection of low-level image structures is an old and still challenging problem in computer vision. This book leads a detailed tour throu...
There are two main approaches in the theory of network error correction coding. In this SpringerBrief, the authors summarize some of the most important contributions following the classic approach, which represents messages by sequences similar to algebraic coding, and also briefly discuss the main results following the other approach, that uses the theory of rank metric codes for network error correction of representing messages by subspaces. This book starts by establishing the basic linear network error correction (LNEC) model and then characterizes two equivalent descriptions. Distances...
There are two main approaches in the theory of network error correction coding. In this SpringerBrief, the authors summarize some of the most importan...