By Haibo Zhou,Lin Gui,Quan Yu,Xuemin (Sherman) Shen
Read or Download Cooperative Vehicular Communications in the Drive-thru Internet (SpringerBriefs in Electrical and Computer Engineering) PDF
Similar internet & networking books
The improved inside Gateway Protocol (EIGRP) from Cisco platforms is likely one of the most generally used intra-domain routing protocols in todayis company networks. even if EIGRP is well configured, the interior workings are ordinarily no longer good understood. the outcome: nonoptimized networks that bring about continual and dear difficulties requiring time and effort to unravel.
This short examines present learn on enhancing Vehicular Networks (VANETs), reading spectrum shortage as a result of dramatic progress of cellular info site visitors and the restricted bandwidth of committed vehicular verbal exchange bands and using opportunistic spectrum bands to mitigate congestion. It stories latest literature at the use of opportunistic spectrum bands for VANETs, together with authorized and unlicensed spectrum bands and various comparable applied sciences, similar to cognitive radio, WiFi and device-to-device communications.
This quantity comprises the post-conference court cases of the tenth Doctoral Workshop on Mathematical and Engineering equipment in desktop Science, MEMICS 2015, held in Telč, Czech Republic, in October 2015. the ten completely revised complete papers have been rigorously chosen out of 25 submissions and are offered including three invited papers.
This paintings makes significant contributions to the thriving quarter of social, communique, and allotted networks through introducing novel methodologies and instruments towards the learn of the evolutionary behaviors of those networks, in addition to their computational complexity and charges of convergence. through departing from the classical techniques and leads to the literature, this paintings indicates that it truly is attainable to deal with extra advanced and reasonable nonlinear types the place both the normal techniques fail or bring about vulnerable effects.
- Solving Large Scale Learning Tasks. Challenges and Algorithms: Essays Dedicated to Katharina Morik on the Occasion of Her 60th Birthday (Lecture Notes in Computer Science)
- Sicherheit und Vertrauen in der mobilen Informations- und Kommunikationstechnologie: Tagungsband zur EICT-Konferenz IT-Sicherheit (German Edition)
- Internet of Things. User-Centric IoT: First International Summit, IoT360 2014, Rome, Italy, October 27-28, 2014, Revised Selected Papers, Part I (Lecture ... and Telecommunications Engineering)
- Security in Network Coding (Wireless Networks)
- Radio Resource Management Using Geometric Water-Filling (SpringerBriefs in Computer Science)
- Smart Cards, Tokens, Security and Applications
Additional resources for Cooperative Vehicular Communications in the Drive-thru Internet (SpringerBriefs in Electrical and Computer Engineering)