標(biāo)題: Titlebook: Computer Networks; 22nd International C Piotr Gaj,Andrzej Kwiecień,Piotr Stera Conference proceedings 2015 Springer International Publishin [打印本頁(yè)] 作者: Dangle 時(shí)間: 2025-3-21 17:20
書目名稱Computer Networks影響因子(影響力)
書目名稱Computer Networks影響因子(影響力)學(xué)科排名
書目名稱Computer Networks網(wǎng)絡(luò)公開度
書目名稱Computer Networks網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Computer Networks被引頻次
書目名稱Computer Networks被引頻次學(xué)科排名
書目名稱Computer Networks年度引用
書目名稱Computer Networks年度引用學(xué)科排名
書目名稱Computer Networks讀者反饋
書目名稱Computer Networks讀者反饋學(xué)科排名
作者: 分開如此和諧 時(shí)間: 2025-3-21 21:16 作者: 愛好 時(shí)間: 2025-3-22 01:08
Energy Aware Object Localization in Wireless Sensor Network Based on Wi-Fi Fingerprinting,them is a localization method based on Wi-Fi (802.11) access point (AP) signal strength (RSSI) measurement. In this method, a RSSI map is constructed via Localization Fingerprinting (LF), which allows localizing object on the basis of a pattern similarity. The drawback of LF method is the need to cr作者: 預(yù)知 時(shí)間: 2025-3-22 06:34 作者: Keratin 時(shí)間: 2025-3-22 12:38
IF-MANET: Interoperable Framework for Mobile Ad Hoc Networks,ources of mobile devices. The mobile ad?hoc network (MANET), an infrastructure-less wireless network, is an emerging technology and is best suited to provide communication between wireless mobile devices. Due to the nature of MANET, the network topology changes frequently, unpredictably and has crea作者: 毗鄰 時(shí)間: 2025-3-22 16:42
Attractiveness Study of Honeypots and Honeynets in Internet Threat Detection,nto honeynets are the most efficient tool how to lure, detect and analyze threats from the Internet. The paper presents recent results in honeynet made of Dionaea (emulating Windows services), Kippo (emulating Linux services) and Glastopf (emulating website services) honeypots. The most important re作者: 毗鄰 時(shí)間: 2025-3-22 18:31
User Trust Levels and Their Impact on System Security and Usability,CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.作者: 存心 時(shí)間: 2025-3-22 23:38 作者: phlegm 時(shí)間: 2025-3-23 03:01
On the Balancing Security Against Performance in Database Systems,hieved on different levels. One can choose factors which have a different impact on the overall system security. Traditionally, security engineers configure IT systems with the strongest possible security mechanisms. Unfortunately, the strongest protection can lead to unreasoned increase of the syst作者: Insufficient 時(shí)間: 2025-3-23 07:49
Analysis of Objective Trees in Security Management of Distributed Computer Networks of Enterprises s, which can help to identify quickly and eliminate the causes of security breaches of these networks during their operation. The developed software allows to create a methodological basis for the creation of new information security management systems with cognitive functions, the use of which will作者: Galactogogue 時(shí)間: 2025-3-23 11:15 作者: 簡(jiǎn)略 時(shí)間: 2025-3-23 17:46 作者: 贊成你 時(shí)間: 2025-3-23 18:35
Automatic Scenario Selection of Cyclic Exchanges in Transmission via Two Buses, via two buses. The implemented method is the base for using the second (redundant) bus for data transmission. The main aim of this method is to build two-stream data transmission so that each data stream has similar, or even the same transmission time. The flexibility of the proposed solution resul作者: Amylase 時(shí)間: 2025-3-23 23:12 作者: Intractable 時(shí)間: 2025-3-24 04:55 作者: DAUNT 時(shí)間: 2025-3-24 10:09
Simulation-Based Analysis of a Platform as a Service Infrastructure Performance from a User Perspec-based infrastructure. Scientific, Petri net-based method was used to asses decisions taken by Heroku – the PaaS manager – and legitimacy of claims of the PaaS clients caused by not satisfying efficiency of the new solutions. Exhaustive information provided in the Internet by both parties of the con作者: Morsel 時(shí)間: 2025-3-24 14:42
Applying Software-Defined Networking Paradigm to Tenant-Perspective Optimization of Cloud Services load balancer designed in accordance with a unique set of requirements, stemming from taking the cloud tenant’s perspective on cloud service usage effectiveness. We developed a proof of concept implementation of the load balancer and drawn the conclusions regarding the system itself and its applicab作者: Small-Intestine 時(shí)間: 2025-3-24 16:04
Color-Aware Transmission of SVC Video over DiffServ Domain,heir importance to the quality of the video and the decoding process. This creates new challenges but also new opportunities for video streaming systems, especially those that use the Internet infrastructure. Therefore, mechanisms of the traffic engineering used in the IP network should as far as po作者: Outwit 時(shí)間: 2025-3-24 21:47 作者: 艱苦地移動(dòng) 時(shí)間: 2025-3-25 00:47 作者: irreparable 時(shí)間: 2025-3-25 05:33 作者: Brain-Imaging 時(shí)間: 2025-3-25 10:10 作者: magnanimity 時(shí)間: 2025-3-25 12:05 作者: Palpable 時(shí)間: 2025-3-25 18:24 作者: PAN 時(shí)間: 2025-3-26 00:04
Existence of phase transitions,flict were used in order to create model of the application and infrastructure corresponding to the real case. The model was then used to perform reliable simulations and show that while the client’s claims were well founded, but growth of the PaaS infrastructure forced and justified changes in the management algorithms.作者: invert 時(shí)間: 2025-3-26 01:28
https://doi.org/10.1007/3-540-10875-0ility to production environments. Our solution is more comprehensive than others available in contemporary SDN environments, and offers more functionality than just service chaining realized through flow reroutes.作者: THROB 時(shí)間: 2025-3-26 04:31 作者: 不出名 時(shí)間: 2025-3-26 11:20 作者: persistence 時(shí)間: 2025-3-26 14:59 作者: jocular 時(shí)間: 2025-3-26 19:12 作者: Hearten 時(shí)間: 2025-3-26 23:05 作者: 神刊 時(shí)間: 2025-3-27 03:39 作者: 陰謀 時(shí)間: 2025-3-27 06:57
Conference proceedings 2015 in June 2015. The 42 revised full papers presented were carefully reviewed and selected from 79 submissions. The papers in these proceedings cover the following topics: computer networks, distributed computer systems, communications and teleinformatics..作者: START 時(shí)間: 2025-3-27 10:49 作者: phlegm 時(shí)間: 2025-3-27 14:13
,Psychiatrische Ausblicke und Schlu?,g the time of the network cycle and also indicates the values of the times for acyclic transmissions. The presented method is only the introduction to designing, developing and controlling the two-stream transmission.作者: NAV 時(shí)間: 2025-3-27 19:10
J.F. Hancock,R. Scorza,G.A. Lobos the lack of standardization of monitoring of the industrial process in terms of Hadoop cluster utilization is especially perplexing. In this paper, authors propose the methodology of monitoring Hadoop in industrial environments, based on dedicated ontology and widely adopted standards: OPC Unified Architecture and RESTful Web Services.作者: blackout 時(shí)間: 2025-3-27 22:36 作者: 畫布 時(shí)間: 2025-3-28 03:11
Automatic Scenario Selection of Cyclic Exchanges in Transmission via Two Buses,g the time of the network cycle and also indicates the values of the times for acyclic transmissions. The presented method is only the introduction to designing, developing and controlling the two-stream transmission.作者: Decimate 時(shí)間: 2025-3-28 09:04
Ontology-Based Integrated Monitoring of Hadoop Clusters in Industrial Environments with OPC UA and the lack of standardization of monitoring of the industrial process in terms of Hadoop cluster utilization is especially perplexing. In this paper, authors propose the methodology of monitoring Hadoop in industrial environments, based on dedicated ontology and widely adopted standards: OPC Unified Architecture and RESTful Web Services.作者: 硬化 時(shí)間: 2025-3-28 13:38 作者: Meditate 時(shí)間: 2025-3-28 15:39 作者: Type-1-Diabetes 時(shí)間: 2025-3-28 21:21
LTE or WiFi? Client-Side Internet Link Selection for Smartphones,y probes the bandwidth available on both links and makes statistical predictions, while avoiding excessive data and battery usage. We experimentally validated our approach using a dedicated application for Android.作者: 允許 時(shí)間: 2025-3-29 01:04 作者: FLAIL 時(shí)間: 2025-3-29 05:03 作者: 寵愛 時(shí)間: 2025-3-29 08:55 作者: 陳列 時(shí)間: 2025-3-29 14:56
Applying Software-Defined Networking Paradigm to Tenant-Perspective Optimization of Cloud Services ility to production environments. Our solution is more comprehensive than others available in contemporary SDN environments, and offers more functionality than just service chaining realized through flow reroutes.作者: 縮影 時(shí)間: 2025-3-29 15:56
1865-0929 Networks, CN 2015, held in Brunów, Poland, in June 2015. The 42 revised full papers presented were carefully reviewed and selected from 79 submissions. The papers in these proceedings cover the following topics: computer networks, distributed computer systems, communications and teleinformatics..97作者: Tortuous 時(shí)間: 2025-3-29 23:00 作者: prostatitis 時(shí)間: 2025-3-30 02:21 作者: 牙齒 時(shí)間: 2025-3-30 04:08
The Functional Significance of Temperament,curacy was analyzed. Simulations were performed to compare the introduced solution with a?state-of-the-art approach. The experimental results show that the proposed energy aware method extends the lifetime of WSN and improves the localization accuracy.作者: Spinal-Fusion 時(shí)間: 2025-3-30 10:32
Perspectives on Individual Differencesous mobile devices cannot communicate with each other and thus are unable to facilitate the full exploitation of mobile resources. To overcome the above mentioned issues, this paper has proposed an Interoperable Framework for MANET, called an IF-MANET, which hides the complexities of heterogeneous r作者: 把…比做 時(shí)間: 2025-3-30 14:35
Energy Aware Object Localization in Wireless Sensor Network Based on Wi-Fi Fingerprinting,curacy was analyzed. Simulations were performed to compare the introduced solution with a?state-of-the-art approach. The experimental results show that the proposed energy aware method extends the lifetime of WSN and improves the localization accuracy.作者: Lipoprotein 時(shí)間: 2025-3-30 18:05
IF-MANET: Interoperable Framework for Mobile Ad Hoc Networks,ous mobile devices cannot communicate with each other and thus are unable to facilitate the full exploitation of mobile resources. To overcome the above mentioned issues, this paper has proposed an Interoperable Framework for MANET, called an IF-MANET, which hides the complexities of heterogeneous r作者: 滲透 時(shí)間: 2025-3-30 20:41 作者: 工作 時(shí)間: 2025-3-31 01:03 作者: Genistein 時(shí)間: 2025-3-31 08:51
The Functional Significance of Temperament,cally discern between flows generated by different traffic sources and gain a more informed view of the Internet..In this paper, we optimize Waterfall, a promising architecture for cascade traffic classification. We present a new heuristic approach to optimal design of cascade classifiers. On the ex作者: Legend 時(shí)間: 2025-3-31 10:54 作者: apropos 時(shí)間: 2025-3-31 13:48 作者: 健忘癥 時(shí)間: 2025-3-31 19:24 作者: 臭名昭著 時(shí)間: 2025-4-1 01:01
Perspectives on Individual Differencesources of mobile devices. The mobile ad?hoc network (MANET), an infrastructure-less wireless network, is an emerging technology and is best suited to provide communication between wireless mobile devices. Due to the nature of MANET, the network topology changes frequently, unpredictably and has crea作者: 秘密會(huì)議 時(shí)間: 2025-4-1 02:31
https://doi.org/10.1007/978-3-642-99510-1nto honeynets are the most efficient tool how to lure, detect and analyze threats from the Internet. The paper presents recent results in honeynet made of Dionaea (emulating Windows services), Kippo (emulating Linux services) and Glastopf (emulating website services) honeypots. The most important re作者: 秘密會(huì)議 時(shí)間: 2025-4-1 06:57 作者: famine 時(shí)間: 2025-4-1 10:51
Die psychopathischen Charaktere,f the technical and legal issues. It is very important to consider both issues together. Therefore, paper outlines technical aspects of honeynet and discusses the liability of honeypot’s and honeynet’s administrator. Paper deals with civil and criminal liability. Also paper focuses on cybercrime and