Table of contents : Preface Contents About the Editors Algorithms A Framework for Solution to Nurse Assignment Problem in Health Care with Variable Demand 1 Introduction 2 Review Work 2.1 Heuristic Search 3 Research Scope 4 Proposed Work 4.1 Framework 4.2 Description of Proposed Nurse Assignment Methods 5 Experimental Results and Discussion 5.1 Performance Evaluation of Home Care Nursing Service 5.2 Results of Hospital Care Nursing Service in Emergency Scheduling 5.3 Results of Combined GA for Regular Scheduling 6 Conclusion References A Novel Bio-inspired Algorithm for Increasing Throughput in Wireless Body Area Network (WBAN) by Mitigating Inter-WBAN Interference 1 Introduction 2 Related Work 3 WBAN Design Model 3.1 System Model 3.2 Optimization Problem Formulation 4 Problem Solving Based on Particle Swarm Optimization (PSO) Technique 4.1 Notation 4.2 PSO Based Spectrum Allocation Algorithm 5 Simulation Results 6 Conclusion References Cloud Computing Paving the Way for Autonomic Clouds: State-of-the-Art and Future Directions 1 Introduction 2 Review of Existing Approaches in the Literature 2.1 Metaheuristic-Based Approaches 2.2 Machine Learning Based Approaches 2.3 Market-Based Approaches 2.4 Cryptography-Based Approaches 2.5 Hybrid Approaches 2.6 Miscellaneous Approaches 3 Discussion 4 Future Directions 5 Conclusion References Toward Efficient Autonomic Management of Clouds: A CDS-Based Hierarchical Approach 1 Introduction 2 Motivation 3 Related Work 4 Proposed Framework 4.1 Preliminaries 4.2 Details of the Proposed Framework 5 Results and Discussion 6 Conclusion References Delta Authorization Concept for Dynamic Access Control Model in Cloud Environment 1 Introduction 2 Background Details 2.1 Authentication 2.2 Authorization 2.3 Context-Based Authorization 3 Proposed Model 3.1 Session Data Management in Different Authorization Model 3.2 Structuring the Different Context Conditions 4 Implementation Details 4.1 Different Phases 5 Comparison 5.1 Time for Reaction 5.2 Message Overhead 5.3 Session Management 6 Conclusion References Wireless Sensor Networks Two-Hop-Based Geographic Opportunistic Routing in WSNs 1 Introduction 2 Literature Survey 3 Background 4 System Model and Problem Definition 4.1 Definitions of Node's Neighbor and Its Relationships 4.2 Terminology: One-Hop and Two-Hop Receivers 4.3 Definition of Forwarding Area 5 Mathematical Model 6 Proposed Algorithm 7 Simulation Setup 8 Performance Analysis 9 Conclusions References Data Gathering from Path-Constrained Mobile Sensors Using Data MULE 1 Introduction 1.1 Contribution 2 Related Works 3 Problem Statement and Complexity Analysis 4 Algorithm to Find Minimum Data Mules and Their Paths 4.1 Example of Execution of Algorithm DGPCMS 4.2 Analysis 5 Conclusions References Localization in 3D Wireless Sensor Network 1 Introduction 2 Related Work 3 Network Model and Assumptions 3.1 Assumptions 3.2 Energy Consumption Model 4 Proposed Work 4.1 Mathematical Prerequisites 4.2 Region Identification 4.3 Abscissa and Ordinates Computation 4.4 Height Computation 4.5 Algorithm for Localization 5 Analysis 6 Conclusions and Future Works References Security Systems EAER-AODV: Enhanced Trust Model Based on Average Encounter Rate for Secure Routing in MANET 1 Introduction 2 Related Works 3 Trust Model 3.1 Average Encounter Rate 3.2 Successful Cooperation Frequency (SCF) 3.3 Modified D-S Evidence Theory for Recommended Trust 3.4 Opinion Evaluation 4 Trust-Based Secure Routing Protocol 4.1 Route Discovery 4.2 Trusted Route Selection 5 Results and Analysis 5.1 Simulation Environment 5.2 Performance Metrics 5.3 Simulation Results 6 Conclusion References Representation and Validation of Enterprise Security Requirements—A Multigraph Model 1 Introduction 2 Physical Interconnection Graph (PIG) 2.1 Graph Constraint Specification Language for Multigraph Structure 3 Policy Specification and Multigraph 4 Realization of Multigraph and Experimental Setup 5 Conclusion and Future Work References Author Index