![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Smart Contract Based Decentralized Parking Management in ITS
-
Chapter and Conference Paper
Managing Smart Home Appliances with Proof of Authority and Blockchain
With the advance in technology and growth in standard of living, smart homes have become a reality. Smart homes consist of home appliances and devices that communicate with each other to address the needs of t...
-
Chapter and Conference Paper
Incremental Approach for Detecting Arbitrary and Embedded Cluster Structures
In this paper, we present a new incremental clustering approach (InDEC) capable of detecting arbitrary cluster structures. Cluster may contain embedded structures. Available methods do not address this importa...
-
Chapter and Conference Paper
Exploiting Bhattacharyya Similarity Measure to Diminish User Cold-Start Problem in Sparse Data
Collaborative Filtering (CF) is one of the most successful approaches for personalized product recommendations. Neighborhood based collaborative filtering is an important class of CF, which is simple and effic...
-
Chapter and Conference Paper
Consistent Coordination Decoupling in Tuple Space Based Mobile Middleware: Design and Formal Specifications
Tuple Space based Mobile Middleware (TSMM), with tuple space as its coordination medium, provides multiple decoupled behaviors for coordinating interactions between different agents of supported applications. ...
-
Chapter and Conference Paper
Multi-density Clustering Algorithm for Anomaly Detection Using KDD’99 Dataset
Anomaly detection is currently an important and active research problem in many fields and involved in numerous application. Handle huge amount of data or traffic over the network is most challenge full task i...
-
Chapter and Conference Paper
Adaptation of MAC Layer for QoS in WSN
In this paper, we propose QoS aware MAC protocol for Wireless Sensor Networks. In WSNs, there can be two types of traffic one is event driven traffic which requires immediate attention and another is periodic ...
-
Chapter and Conference Paper
NDoT: Nearest Neighbor Distance Based Outlier Detection Technique
In this paper, we propose a nearest neighbor based outlier detection algorithm, NDoT. We introduce a parameter termed as $ Nearest \mb...
-
Chapter and Conference Paper
Copyright Protection in Digital Multimedia
Copyright protection has become a need in today’s world. We have analyzed various spatial domain watermarking techniques and after having a good understanding of the same we have proposed a novel algorithm nam...
-
Chapter and Conference Paper
A Scalable Rekeying Scheme for Secure Multicast in IEEE 802.16 Network
IEEE 802.16e is the next generation wireless metropolitan area network (WMAN) that provides wide coverage and higher bandwidth than conventional wireless networks. Multicast or group communication is an effici...
-
Chapter and Conference Paper
Context Aware Mobile Initiated Handoff for Performance Improvement in IEEE 802.11 Networks
IEEE 802.11 is a widely used wireless LAN standard which offers a good bandwidth at low cost In an ESS, multiple APs can co-exist with overlap** coverage area. A mobile node connects to the AP from which it ...
-
Chapter and Conference Paper
An Efficient Decentralized Rekeying Scheme to Secure Hierarchical Geographic Multicast Routing in Wireless Sensor Networks
Wireless Sensor Networks consist of several autonomous sensors deployed in a distributed fashion for different purposes like that of wildlife tracing, detection of intruders, environment monitoring etc. Effici...
-
Chapter and Conference Paper
Distance Based Fast Hierarchical Clustering Method for Large Datasets
Average-link (AL) is a distance based hierarchical clustering method, which is not sensitive to the noisy patterns. However, like all hierarchical clustering methods AL also needs to scan the dataset many time...
-
Chapter and Conference Paper
Seamless Handoff between IEEE 802.11 and GPRS Networks
In this paper we propose a scheme which provides seamless mobility between GPRS and IEEE 802.11 (WiFi) networks. In the proposed scheme, we envision a single Service Provider, who provides Cellular (GPRS), WLA...
-
Chapter and Conference Paper
An Active Intrusion Detection System for LAN Specific Attacks
Local Area Network (LAN) based attacks are due to compromised hosts in the network and mainly involve spoofing with falsified IP-MAC pairs. Since Address Resolution Protocol (ARP) is a stateless protocol such ...
-
Chapter and Conference Paper
Fast Single-Link Clustering Method Based on Tolerance Rough Set Model
The single-link (SL) clustering method is not scalable with the size of the dataset and needs many database scans. This is potentially a severe problem for large datasets. One way to speed up the SL method is ...
-
Chapter and Conference Paper
Detecting ARP Spoofing: An Active Technique
The Address Resolution Protocol (ARP) due to its statelessness and lack of an authentication mechanism for verifying the identity of the sender has a long history of being prone to spoofing attacks. ARP spoofi...