Business data communications and networking a research perspective /

"This book addresses key issues for businesses utilizing data communications and the increasing importance of networking technologies in business; it covers a series of technical advances in the field while highlighting their respective contributions to business or organizational goals, and cen...

Full description

Bibliographic Details
Main Author: Gutiérrez, Jairo, 1960-
Corporate Author: IGI Global.
Format: Electronic
Language:English
Published: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2007.
Subjects:
Online Access:View fulltext via EzAccess
Table of Contents:
  • Section 1. Network Design and Application Issues
  • 1. Design of High Capacity Survivable Networks / Varadharajan Sridhar, June Park
  • 2. A data-mining driven approach for web classification and filtering based on multimodal content analysis / Mohamed Hammami, Youssef Chahir, Liming Chen
  • 3. Prevalent Factors involved in Delays Associated with Page Downloads / Kevin Curran, Noel Broderick
  • 4. Network Quality of Service for Enterprise Resource Planning Systems: A Case Study Approach / Ted Chia-Han Lo, Jairo A. Gutǐrrez
  • 5. Cost-based congestion pricing in network priority models using axiomatic cost allocation methods / Cesar Garcia-Diaz, Fernando Beltran
  • Section 2. Mobility
  • 6. Mobile Multimedia: Communication Technologies, Business Drivers, Service and Applications / Ismail Khalil Ibrahim, Ashraf Ahmad, David Taniar
  • 7. Mobile Information Systems in a Hospital Organization Setting / Agustinus Borgy Waluyo, David Taniar, Bala Srinivasan
  • 8. Data Caching in a Mobile Database Environment / Say Ying Lim, David Taniar, Bala Srinivasan
  • 9. Mining Walking Pattern from Mobile Users / John Goh, David Taniar
  • Section 3. Wireless Deployment and Applications
  • 10. Wi-Fi Deployment in Large New Zealand Organizations: a Survey / Bryan Houliston, Nurul Sarkar
  • 11. Applications and Future Trends in Mobile Ad Hoc Networks / Subhankar Dhar
  • Section 4. Network Security
  • 12. Addressing WiFi Security Concerns / Kevin Curran, Elaine Smyth
  • 13. A SEEP Protocol Design Using 3BC, ECC(F2m), and HECC Algorithm / Byung Kwan Lee, Seung Hae Yang, Tai-Chi Lee
  • 14. Fighting the Problem of Unsolicited E-mail using a Hashcash Proof-of-Work Approach / Kevin Curran, John Stephen Honan
  • About the Authors
  • Index.