|
Showing 1 - 4 of
4 matches in All Departments
The European Conference on Computer and Network Defense draws
contributions and participation both from academia and industry,
and addresses security from multiple perspectives, including
state-of-the-art research in computer network security, intrusion
detection, denial-of-service, privacy protection, security
policies, and incident response & management. The conference is
organized jointly by the Institute of Computer Science of the
Foundation for Research and Technology - Hellas (FORTH) and the
European Network and Information Security Agency (ENISA).
The current book provides a final report of activity performed by
the COST 290 Action, ''Traffic and QoS Management in Wireless
Multimedia Networks, '' which ran from March 10, 2004, until June
3, 2008. After an introduction to the COST framework and the
Action's survey time-frame and activities, the main part of the
book addresses a number of technical issues, which are structured
into several chapters. All those issues have been carefully
investigated by the COST 290 community during the course of the
project - the information presented in this book can be regarded as
ultimate for each particular topic; every open research issue
addressed in the book is described carefully, corresponding
existing studies are analyzed and results achieved by the COST 290
community are presented and compared, and further research
directions are defined and analyzed. Because the book covers a wide
area of research addressing issues of modern wired and wireless
networking at different layers, starting from the physical layer up
to the application layer, it can be recommended to be used by
researchers and students to obtain a comprehensive analysis on
particular research topics including related areas, to obtain broad
and ultimate referencing, and to be advised on current open issues.
COST 290 is one of the Actions of the European COST Program.
Founded in 1971, COST is an intergovernmental framework for
European Cooperation in the field of Scientific and Technical
Research, allowing the coordination of nationally funded research
on a European level.
WWIC2008wasorganizedbytheTechnicalUniversityofTampere, Finland, and
it was the sixth event in a series of InternationalConferenceson
Wired/Wireless Internet Communications. Previous events were held
in Coimbra (Portugal) in 2007, Berne (Switzerland) in 2006, Xanthi
(Greece) in 2005, Frankfurt (G- many) in 2004, and Las Vegas (USA)
in 2002. The WWIC 2008 call for papers attracted 67 submissions
from 33 co- tries, which were subject to thorough review work by
the Technical Program Committee members and additional reviewers.
The selection process resulted in acceptance of 18 papers,
organized into 6 single-track technical sessions. The WWIC 2008
main technical program covered studies on performance analysis of
wireless systems, topics on resource and QoS management, and issues
on implementation techniques, mobility, cross-layer design and
wireless sensor n- works. The technical program was complemented by
two keynote speeches, by Nestor Peccia (European Space Agency,
Darmstadt, Germany) on "Interpla- tary Internet," and Arto Karila
(Helsinki Institute of Information Technology, Finland),
on"Multi-Accessin RegionalNetworks."Inadditionto themainte-
nicalprogram, thelastdayoftheconferencewasdedicatedtotheSecondERCIM
workshop on eMobility. WWIC has been selected as the o?cial annual
conference by COST Action 290 (Wi-QoST-Tra?c and QoS Management in
Wireless Multimedia Networks) since 2005, and this time the
conference was co-located with the ?nal mana- ment committee
meeting of the Action. For that reason, two sessions of WWIC were
dedicated to the Action, and in those sessions a distinguished
selection of the results of COST Action 290 were presented. Those
papers were selected from the submissions to the general call for
papers according to the same strict criteria as the other accepted
papers.
The European Conference on Computer and Network Defense draws
contributions and participation both from academia and industry,
and addresses security from multiple perspectives, including
state-of-the-art research in computer network security, intrusion
detection, denial-of-service, privacy protection, security
policies, and incident response & management. The conference is
organized jointly by the Institute of Computer Science of the
Foundation for Research and Technology - Hellas (FORTH) and the
European Network and Information Security Agency (ENISA).
|
|