[ns] [NS] implement protocol MAODV in ns-2.35

2014-06-11 Thread Shiva Ramezanian

hello

i am a new user to ns2 . i want to simulate the protocol MAODV in ns-2.35
i need step by step information for simulate MAODV
please if somebody know help

thanks

shiva


[ns] Deadline Extension, July 16 || SENSORCOMM 2014 || November 16 - 20, 2014 - Lisbon, Portugal

2014-06-11 Thread Jaime Lloret Mauri


INVITATION:
 
=
 Please consider to contribute to and/or forward to the appropriate groups the 
following 
opportunity to submit and publish original scientific results to SENSORCOMM 
2014.
 The submission deadline is extended to July 16, 2014.
 Authors of selected papers will be invited to submit extended article versions 
to one of the 
IARIA Journals: http://www.iariajournals.org
 =
 

== SENSORCOMM 2014 | Call for Papers ===
 
CALL FOR PAPERS, TUTORIALS, PANELS
 
SENSORCOMM 2014, The Eighth International Conference on Sensor Technologies and 
Applications
 November 16 - 20, 2014 - Lisbon, Portugal
 
General page: http://www.iaria.org/conferences2014/SENSORCOMM14.html
 
Call for Papers: http://www.iaria.org/conferences2014/CfPSENSORCOMM14.html
 
Submission page: http://www.iaria.org/conferences2014/SubmitSENSORCOMM14.html
 

Contributions:
 - regular papers
 - short papers (work in progress)
 - posters
 - ideas
 - presentations
 - demos
 - doctoral forum submissions
 
Proposals for:
 - symposia
 - workshops
 
Submission deadline: July 16, 2014
 
Sponsored by IARIA, www.iaria.org
 Extended versions of selected papers will be published in IARIA Journals:  
http://www.iariajournals.org
 Print proceedings will be available via Curran Associates, Inc.: 
http://www.proceedings.com/9769.html
 Articles will be archived in the free access ThinkMind Digital Library: 
http://www.thinkmind.org
 
The topics suggested by the conference can be discussed in term of concepts, 
state of the art, 
research, standards, implementations, running experiments, applications, and 
industrial case 
studies. Authors are invited to submit complete unpublished papers, which are 
not under review in 
any other conference or journal in the following, but not limited to, topic 
areas.
 
All tracks are open to both research and industry contributions, in terms of 
Regular papers, 
Posters, Work in progress, Technical/marketing/business presentations, Demos, 
Tutorials, and 
Panels.
 
Before submission, please check and comply with the Editorial rules: 
http://www.iaria.org/editorialrules.html
 
SENSORCOMM 2014 Topics (topics and submission details: see CfP on the site)
 
APASN: Architectures, protocols and algorithms of sensor networks
 
Network planning, provisioning and deployment; Network Architectures for 
Sensor Networks; 
Network Protocols for Sensor Networks; Structural design; Distributed Sensor 
Networks; Dynamic 
sensor networks; Scalable and heterogeneous architectures; Hierarchical 
clustering architectures; 
Group-based Architectures; Network topologies; Mesh networking; Device centric 
sensor networks; 
Distributed coordination algorithms; Topology construction; Routing protocols; 
Routing Metrics; 
Distributed Algorithms; Attribute-based named nets; Mobility and Scalability; 
Attribute-based 
named Sensor Networks; Query optimization; Self-organization and 
self-configuration algorithms; 
Reconfigurability; Time Synchronization; MAC protocols for sensor networks 
(801.11, 802.15.4, 
UWB, etc); Location and time service; Integration with other systems; 
Distributed inference and 
fusion; Cross-layer design and optimization; Complexity analysis of algorithms; 
Sensor networks 
and the Web; Integration with other syste
 ms (e.g., Web-based information systems, process control, enterprise software, 
etc.); Target 
tracking; RFID tags; Traffic scheduling
 
MECSN: Energy, management and control of sensor networks
 
Energy models; Energy optimization; Energy management; Power-aware and 
energy-efficient 
design; Power sources in sensor networks; Battery technology; Power management; 
Algorithms and 
theories for management; Communication strategies for topology control; 
Algorithms and theories 
for supervisory control; Sensor tasking and control; Distributed control and 
actuation; Location 
and mobility management; Bandwidth management; Distributed networked sensing; 
Resource 
provisioning; Resource management and dynamic resource management; Schemes to 
maximize accuracy 
and minimize false alarms; Online self-calibration and self-testing; Handoff 
and mobility 
management and seamless internetworking; Distributed actuation and control; 
Topology control
 
RASQOFT: Resource allocation, services, QoS and fault tolerance in sensor 
networks
 
Algorithms to support quality of service in sensor networks; Protocols to 
support quality of 
service in sensor networks; QoS/SLA in sensor networks; Provisioning of QoS in 
terms of bandwidth 
and delay assurance; System services and distributed services in sensor 
networks; Delay tolerant 
networks and opportunistic networking; Failure resilience and fault isolation; 
Information 
assurance in sensor networks; Fault tolerance and reliability; Admission 
control; Resource 
allocation and fairness; Real-time resource scheduling; Scheduling and 
optimisation; Capacity 
planning
 
PESMOSN: Performance, simulation and mod

[ns] Deadline Extension, July 16 || SECURWARE 2014 || November 16 - 20, 2014 - Lisbon, Portugal

2014-06-11 Thread Cristina Pascual


INVITATION:
 
=
 
Please consider to contribute to and/or forward to the appropriate groups the 
following opportunity to submit and publish original scientific results to 
SECURWARE 2014.
 
The submission deadline is extended to July 16, 2014.
 
Authors of selected papers will be invited to submit extended article versions 
to one of the IARIA Journals: http://www.iariajournals.org
 
=
 

== SECURWARE 2014 | Call for Papers ===
 
CALL FOR PAPERS, TUTORIALS, PANELS
 
SECURWARE 2014, The Eighth International Conference on Emerging Security 
Information, Systems and Technologies
 
November 16 - 20, 2014 - Lisbon, Portugal
 

General page: http://www.iaria.org/conferences2014/SECURWARE14.html
 
Call for Papers: http://www.iaria.org/conferences2014/CfPSECURWARE14.html
 
Submission page: http://www.iaria.org/conferences2014/SubmitSECURWARE14.html
 

Contributions:
 
- regular papers
 
- short papers (work in progress)
 
- posters
 
- ideas
 
- presentations
 
- demos
 
- doctoral forum submissions
 

Proposals for:
 
- symposia
 
- workshops
 

Submission deadline: July 16, 2014
 
Sponsored by IARIA, www.iaria.org
 

Extended versions of selected papers will be published in IARIA Journals:  
http://www.iariajournals.org
 
Print proceedings will be available via Curran Associates, Inc.: 
http://www.proceedings.com/9769.html
 
Articles will be archived in the free access ThinkMind Digital Library: 
http://www.thinkmind.org
 

Please note the Poster and Work in Progress options.
 
The topics suggested by the conference can be discussed in term of concepts, 
state of the art, research, standards, implementations, running experiments, 
applications, and industrial case studies. Authors are invited to submit 
complete unpublished papers, which are not under review in any other conference 
or journal in the following, but not limited to, topic areas.
 
All tracks are open to both research and industry contributions, in terms of 
Regular papers, Posters, Work in progress, Technical/marketing/business 
presentations, Demos, Tutorials, and Panels.
 
Before submission, please check and conform with the Editorial rules: 
http://www.iaria.org/editorialrules.html
 

SECURWARE 2014 Topics (topics and submission details: see CfP on the site)
 

SERVICES:  Cyber  Laboratory Services
 
Cyber intelligence systems; Global defense; Security-awareness; Data 
sanitization and end-of-lifecycle solutions; Compliance solutions  with PCI DSS 
standard from PCI DSS certified datacenters; Mobile Device Management (MDM) and 
Mobile Application Management (MAM); Identity and Access Management (IAM); Risk 
and security management; IT-Governance, Risks and compliance; Public safety and 
professional communications and solutions for situational awareness, command 
and control; Data security services
 
SOLUTIONS: Cyber Laboratory Solutions
 
Cyber intelligence technologies; Global threat correlation and reputation 
services; credentials, expiration time for client installations, feature 
restrictions, Web-console audit logging, etc.; Advanced testing software, for 
known and unknown flaws in software; identifying the weaknesses and 
vulnerabilities; E-mail communication confidentiality protection; Protect of 
enterprises and government agencies for their confidential data against leaks; 
Internet security and content cloud services; Risk and security management; 
IT-Governance, Risks and compliance; SCADA-based information security systems; 
Guideline on advising, building, developing and inspecting/auditing; 
information security practices and systems
 
ARCH: Security frameworks, architectures and protocols
 
Formal aspects of security; Security analysis methodologies; Security 
verification; Security protocols; Security architectures and formalisms; 
Security and design vulnerability; Security and privacy protection; Performance 
and security; Secure group communication/multicast; Software design security; 
Middleware security; Security for nomadic code; Intrusion detection systems; 
Static analysis for software security; Security modeling
 
METRICS: Security, trust and privacy measurement
 
Security, trust and privacy metrics; Security assurance metrics; Security 
measurement architectures; Metrics for adaptive security systems; Taxonomical 
and ontological support of security metrics; Experiments and benchmarks for 
security measurements; Embedding security measurability in software and service 
architectures; Risk-driven assessment of security; Assessment of effectiveness, 
efficiency and correctness of security; Mapping security metrics and security 
assurance metrics; Mapping security measurements and non-functional requirements
 
SECMAN: Security management
 
Identity management; Security law enforcement; PKI; PKI Key management; 
Incident response planning; Intrusion detection and event correlation; 
Firewalls; Trust management; Software security assurance
 
S