Project Report from the year 2015 in the subject Computer Science - IT-Security, Central Queensland University (Theory Lab), language: English, abstract: Graph theory has become a very critical component in many applications in the computing field including networking and security. Unfortunately, it is also amongst the most complex topics to understand and apply. In this paper, we review some of the key applications of graph theory in network security. We first cover some algorithmic aspects, then present network coding and its relation to routing. The rapid growth in Global mobile communication networks demands new solutions for existing problems. Such problems include reduced bandwidth in mobile devices and the constant change in their associated network topologies. This creates a need for network algorithms with: 1. least possible communication traffic 2. High speed execution. The two challenges can be overcome by application of graph theory in developing local algorithms (Algorithms that require low rounds of communication). In this paper we explore applications of graph theory in cellular networks with an emphasis on the 'four-color' theorem and network coding and their relevant applications in wireless mobile networks.
"Sinopsis" puede pertenecer a otra edición de este libro.
Project Report from the year 2015 in the subject Computer Science - IT-Security, Central Queensland University (Theory Lab), language: English, abstract: Graph theory has become a very critical component in many applications in the computing field including networking and security. Unfortunately, it is also amongst the most complex topics to understand and apply. In this paper, we review some of the key applications of graph theory in network security. We first cover some algorithmic aspects, then present network coding and its relation to routing. The rapid growth in Global mobile communication networks demands new solutions for existing problems. Such problems include reduced bandwidth in mobile devices and the constant change in their associated network topologies. This creates a need for network algorithms with: 1. least possible communication traffic 2. High speed execution. The two challenges can be overcome by application of graph theory in developing local algorithms (Algorithms that require low rounds of communication). In this paper we explore applications of graph theory in cellular networks with an emphasis on the 'four-color' theorem and network coding and their relevant applications in wireless mobile networks.
"Sobre este título" puede pertenecer a otra edición de este libro.
EUR 11,00 gastos de envío desde Alemania a España
Destinos, gastos y plazos de envíoLibrería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
Taschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Project Report from the year 2015 in the subject Computer Science - IT-Security, Central Queensland University (Theory Lab), language: English, abstract: Graph theory has become a very critical component in many applications in the computing field including networking and security. Unfortunately, it is also amongst the most complex topics to understand and apply.In this paper, we review some of the key applications of graph theory in network security. We first cover some algorithmic aspects, then present network coding and its relation to routing.The rapid growth in Global mobile communication networks demands new solutions for existing problems. Such problems include reduced bandwidth in mobile devices and the constant change in their associated network topologies. This creates a need for network algorithms with:1. least possible communication traffic2. High speed execution.The two challenges can be overcome by application of graph theory in developing local algorithms (Algorithms that require low rounds of communication). In this paper we explore applications of graph theory in cellular networks with an emphasis on the 'four-color' theorem and network coding and their relevant applications in wireless mobile networks. 12 pp. Englisch. Nº de ref. del artículo: 9783668208940
Cantidad disponible: 2 disponibles
Librería: AHA-BUCH GmbH, Einbeck, Alemania
Taschenbuch. Condición: Neu. Druck auf Anfrage Neuware - Printed after ordering - Project Report from the year 2015 in the subject Computer Science - IT-Security, Central Queensland University (Theory Lab), language: English, abstract: Graph theory has become a very critical component in many applications in the computing field including networking and security. Unfortunately, it is also amongst the most complex topics to understand and apply.In this paper, we review some of the key applications of graph theory in network security. We first cover some algorithmic aspects, then present network coding and its relation to routing.The rapid growth in Global mobile communication networks demands new solutions for existing problems. Such problems include reduced bandwidth in mobile devices and the constant change in their associated network topologies. This creates a need for network algorithms with:1. least possible communication traffic2. High speed execution.The two challenges can be overcome by application of graph theory in developing local algorithms (Algorithms that require low rounds of communication). In this paper we explore applications of graph theory in cellular networks with an emphasis on the 'four-color' theorem and network coding and their relevant applications in wireless mobile networks. Nº de ref. del artículo: 9783668208940
Cantidad disponible: 1 disponibles
Librería: preigu, Osnabrück, Alemania
Taschenbuch. Condición: Neu. Graph Theory Applications in Network Security | Fernando Docemmilli (u. a.) | Taschenbuch | 12 S. | Englisch | 2016 | GRIN Verlag | EAN 9783668208940 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu Print on Demand. Nº de ref. del artículo: 103702489
Cantidad disponible: 5 disponibles