Business data communications and networking a research perspective /
"This book addresses key issues for businesses utilizing data communications and the increasing importance of networking technologies in business; it covers a series of technical advances in the field while highlighting their respective contributions to business or organizational goals, and cen...
Main Author: | |
---|---|
Corporate Author: | |
Format: | Electronic |
Language: | English |
Published: |
Hershey, Pa. :
IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
c2007.
|
Subjects: | |
Online Access: | View fulltext via EzAccess |
Table of Contents:
- Section 1. Network Design and Application Issues
- 1. Design of High Capacity Survivable Networks / Varadharajan Sridhar, June Park
- 2. A data-mining driven approach for web classification and filtering based on multimodal content analysis / Mohamed Hammami, Youssef Chahir, Liming Chen
- 3. Prevalent Factors involved in Delays Associated with Page Downloads / Kevin Curran, Noel Broderick
- 4. Network Quality of Service for Enterprise Resource Planning Systems: A Case Study Approach / Ted Chia-Han Lo, Jairo A. Gutǐrrez
- 5. Cost-based congestion pricing in network priority models using axiomatic cost allocation methods / Cesar Garcia-Diaz, Fernando Beltran
- Section 2. Mobility
- 6. Mobile Multimedia: Communication Technologies, Business Drivers, Service and Applications / Ismail Khalil Ibrahim, Ashraf Ahmad, David Taniar
- 7. Mobile Information Systems in a Hospital Organization Setting / Agustinus Borgy Waluyo, David Taniar, Bala Srinivasan
- 8. Data Caching in a Mobile Database Environment / Say Ying Lim, David Taniar, Bala Srinivasan
- 9. Mining Walking Pattern from Mobile Users / John Goh, David Taniar
- Section 3. Wireless Deployment and Applications
- 10. Wi-Fi Deployment in Large New Zealand Organizations: a Survey / Bryan Houliston, Nurul Sarkar
- 11. Applications and Future Trends in Mobile Ad Hoc Networks / Subhankar Dhar
- Section 4. Network Security
- 12. Addressing WiFi Security Concerns / Kevin Curran, Elaine Smyth
- 13. A SEEP Protocol Design Using 3BC, ECC(F2m), and HECC Algorithm / Byung Kwan Lee, Seung Hae Yang, Tai-Chi Lee
- 14. Fighting the Problem of Unsolicited E-mail using a Hashcash Proof-of-Work Approach / Kevin Curran, John Stephen Honan
- About the Authors
- Index.