派博傳思國(guó)際中心

標(biāo)題: Titlebook: Computer Networks; 24th International C Piotr Gaj,Andrzej Kwiecień,Micha? Sawicki Conference proceedings 2017 Springer International Publis [打印本頁(yè)]

作者: genial    時(shí)間: 2025-3-21 18:23
書(shū)目名稱(chēng)Computer Networks影響因子(影響力)




書(shū)目名稱(chēng)Computer Networks影響因子(影響力)學(xué)科排名




書(shū)目名稱(chēng)Computer Networks網(wǎng)絡(luò)公開(kāi)度




書(shū)目名稱(chēng)Computer Networks網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書(shū)目名稱(chēng)Computer Networks被引頻次




書(shū)目名稱(chēng)Computer Networks被引頻次學(xué)科排名




書(shū)目名稱(chēng)Computer Networks年度引用




書(shū)目名稱(chēng)Computer Networks年度引用學(xué)科排名




書(shū)目名稱(chēng)Computer Networks讀者反饋




書(shū)目名稱(chēng)Computer Networks讀者反饋學(xué)科排名





作者: perjury    時(shí)間: 2025-3-21 23:26
Secure and Reliable Localization in Wireless Sensor Network Based on RSSI Mappingtime restrictions in some real-time applications. Nevertheless, the existence of insecure protocol in hostile environment is unacceptable. To achieve a better efficiency, we suggest to use the hardware encryption provided in CC2420 radio chip.
作者: Insufficient    時(shí)間: 2025-3-22 02:43
A Comparative Analysis of N-Nearest Neighbors (N3) and Binned Nearest Neighbors (BNN) Algorithms forludes multi-building and multi floor signal information while different from this RFKON includes a single-building single floor signal information. N-Nearest Neighbors (N3) and Binned Nearest Neighbors (BNN) algorithms are presented comparatively with respect to success of finding user position.
作者: FUSE    時(shí)間: 2025-3-22 04:54
Evaluation of Connectivity Gaps Impact on TCP Transmissions in Maritime Communications, assuming the use of Reno algorithm, together with F-RTO enhancement (Forward RTO-Recovery), Cubic algorithm, and further adjustments proposed by the authors. The results show significant increase of the average throughput (up?to 3 times) and decrease of the average download time (up?to 53%), as co
作者: cravat    時(shí)間: 2025-3-22 10:33
Günter Effenberg,Svitlana Ilyenkoor detailed analysis of the system. Thus, the case study was used to improve the simulation method in order to more accurately model data transmissions over the network. After modifications were implemented in the simulation tool, significantly better results have been received, as discussed in the
作者: Alienated    時(shí)間: 2025-3-22 14:34
https://doi.org/10.1007/978-3-540-70890-2time restrictions in some real-time applications. Nevertheless, the existence of insecure protocol in hostile environment is unacceptable. To achieve a better efficiency, we suggest to use the hardware encryption provided in CC2420 radio chip.
作者: Alienated    時(shí)間: 2025-3-22 20:35
https://doi.org/10.1007/978-3-540-70890-2ludes multi-building and multi floor signal information while different from this RFKON includes a single-building single floor signal information. N-Nearest Neighbors (N3) and Binned Nearest Neighbors (BNN) algorithms are presented comparatively with respect to success of finding user position.
作者: 煤渣    時(shí)間: 2025-3-23 00:46

作者: 惹人反感    時(shí)間: 2025-3-23 01:57
Günter Effenberg,Svitlana Ilyenkostages for performing all required tests. Also, influence of diagnostic tests on the values of performance metrics for some real-time services is investigated. The usefulness of the method has been verified through simulation experiments prepared and performed in Riverbed Modeler environment.
作者: 幻影    時(shí)間: 2025-3-23 06:36

作者: Filibuster    時(shí)間: 2025-3-23 13:38

作者: 補(bǔ)助    時(shí)間: 2025-3-23 17:29
Method for Determining Effective Diagnostic Structures Within the Military IoT Networksstages for performing all required tests. Also, influence of diagnostic tests on the values of performance metrics for some real-time services is investigated. The usefulness of the method has been verified through simulation experiments prepared and performed in Riverbed Modeler environment.
作者: 折磨    時(shí)間: 2025-3-23 18:15
The Possibilities of System’s Self-defense Against Malicious Softwareitional line of defense, focused on detection of the malware, which penetrated defenses of the system. The paper presents the concept of such additional defense line, discusses the sources of necessary informations, method for detection of unknown malware and possible method of blocking malware operation.
作者: 兵團(tuán)    時(shí)間: 2025-3-24 00:07

作者: BRAND    時(shí)間: 2025-3-24 04:52
Traffic Flows Ateb-Prediction Method with Fluctuation Modeling Using Dirac Functionsnd forecasting of traffic on the network on the grounds of mathematical calculations and collected data was developed. Testing of models based on real network data from LPNU ACS Department was presented. Also, the simulation results have been compared with real traffic data. The results are illustrated in the form of both tables and plots.
作者: 擔(dān)心    時(shí)間: 2025-3-24 08:03

作者: Aviary    時(shí)間: 2025-3-24 14:19
Path Loss Model for a Wireless Sensor Network in Different Weather Conditionss become so important. The study focused on designation of the path loss model for different weather conditions. The influence of the temperature and the humidity on the RSSI distribution was analysed.
作者: Neutral-Spine    時(shí)間: 2025-3-24 18:39
Conference proceedings 2017in June 2017.?The 35 full papers presented were carefully reviewed and selected from 80 submissions. They are dealing with the topics computer networks;?teleinformatics and telecommunications;?new technologies;?queueing theory;?innovative applications.?.
作者: anticipate    時(shí)間: 2025-3-24 20:11

作者: 平躺    時(shí)間: 2025-3-24 23:58

作者: Monolithic    時(shí)間: 2025-3-25 05:54

作者: 橡子    時(shí)間: 2025-3-25 08:41
https://doi.org/10.1007/978-3-540-70890-2s become so important. The study focused on designation of the path loss model for different weather conditions. The influence of the temperature and the humidity on the RSSI distribution was analysed.
作者: 落葉劑    時(shí)間: 2025-3-25 13:42

作者: convert    時(shí)間: 2025-3-25 17:55
Günter Effenberg,Svitlana Ilyenkoe node which on the other hand maintain the high reliability of the communication subsystem, and on the other, makes it possible to manage the additional communication resources more efficiently, and therefore increases some parameters of the communication network.
作者: 冷淡一切    時(shí)間: 2025-3-25 21:56

作者: 結(jié)合    時(shí)間: 2025-3-26 03:30
Günter Effenberg,Svitlana Ilyenkoer is formulation of a relationship, which allows the upper bound of MTR to be estimated for VANETs in unidirectional and bidirectional signalized arterial roads. The conducted experiments confirm that the derived estimate fits well with results of simulation experiments.
作者: 食草    時(shí)間: 2025-3-26 07:05

作者: 高爾夫    時(shí)間: 2025-3-26 11:48

作者: hegemony    時(shí)間: 2025-3-26 12:40
Software Defined Home Network for Distribution of the SVC Video Based on the DASH Principlesimplementation is possible without the use of additional, dedicated hardware. The article presents the analysis of influence of proposed SDN on the improvement of the SVC video quality received by DASH clients in a typical home network. Test results confirm the superiority of the proposed system over the conventional solutions.
作者: LUMEN    時(shí)間: 2025-3-26 18:43

作者: 議程    時(shí)間: 2025-3-26 21:22
1865-0929 Networks, CN 2017, held in Brunów, Poland, in June 2017.?The 35 full papers presented were carefully reviewed and selected from 80 submissions. They are dealing with the topics computer networks;?teleinformatics and telecommunications;?new technologies;?queueing theory;?innovative applications.?.978
作者: insipid    時(shí)間: 2025-3-27 02:38

作者: 闖入    時(shí)間: 2025-3-27 08:59
Selected Systems from Fe-N-V to Fe-Ti-Zrtype, session duration, AS, country and RIR of the attack origin. Clusters of similar objects were formed accordingly and certain typical attack patterns for potential detection automation as well as some aspects of threat dissemination were identified.
作者: Costume    時(shí)間: 2025-3-27 12:43
https://doi.org/10.1007/978-3-540-70890-2erabilities connected with the potential knowledge of the part of the original message and uneven distribution of bits in the message blocks. In the new solution, we use also Davies-Meyer scheme in order to enhance immunity to meet-in-the-middle attacks.
作者: 性上癮    時(shí)間: 2025-3-27 16:38
Application of Fault-Tolerant GQP Algorithm in Multihop AMI Networksively optimal number of selected forwarders and by introducing the redundancy factor, good fault tolerance. An improvement to GQP algorithm to add a redundancy factor is proposed, what allows to execute fault tolerant broadcast transmission.
作者: Affirm    時(shí)間: 2025-3-27 20:38

作者: 外貌    時(shí)間: 2025-3-27 22:06

作者: 圓錐    時(shí)間: 2025-3-28 03:48
Conference proceedings 2017in June 2017.?The 35 full papers presented were carefully reviewed and selected from 80 submissions. They are dealing with the topics computer networks;?teleinformatics and telecommunications;?new technologies;?queueing theory;?innovative applications.?.
作者: 新陳代謝    時(shí)間: 2025-3-28 06:43

作者: 涂掉    時(shí)間: 2025-3-28 11:45

作者: gout109    時(shí)間: 2025-3-28 16:15
Günter Effenberg,Svitlana Ilyenkois based on partitioning IoT network among disjoint clusters and applying comparison approach for diagnosis of misbehaving nodes within network clusters. Common communication and diagnostic structures are determined on the basis of the nodes attainability characteristics and subsequent generation of
作者: geriatrician    時(shí)間: 2025-3-28 18:54

作者: 儲(chǔ)備    時(shí)間: 2025-3-29 02:08
https://doi.org/10.1007/978-3-540-70890-2protocols and applications. Localization has become a popular topic in the literature and many localization algorithms in wireless sensor networks (WSN) have been proposed. However, the most of them are vulnerable to common wireless attacks. In this article, we introduce the secure localization prot
作者: intelligible    時(shí)間: 2025-3-29 04:20
Selected Systems from Fe-N-V to Fe-Ti-Zrngs). The algorithm was compared to the reference algorithms: CB, SBA and DP. It was shown that the GQP algorithm presents the good scalability, relatively optimal number of selected forwarders and by introducing the redundancy factor, good fault tolerance. An improvement to GQP algorithm to add a r
作者: Alveolar-Bone    時(shí)間: 2025-3-29 09:20

作者: arsenal    時(shí)間: 2025-3-29 12:56

作者: Functional    時(shí)間: 2025-3-29 17:49

作者: SSRIS    時(shí)間: 2025-3-29 23:38

作者: 新手    時(shí)間: 2025-3-30 01:52
https://doi.org/10.1007/978-3-540-70890-2ial weaknesses and possible attacks have been previously described in [.]. The new version of the encryption method is immune to indicated in [.] vulnerabilities connected with the potential knowledge of the part of the original message and uneven distribution of bits in the message blocks. In the n
作者: 吞吞吐吐    時(shí)間: 2025-3-30 06:51
Günter Effenberg,Svitlana Ilyenkoould provide information on how to detect the presence of malware and attempts to infect the system. The protecting systems using this information should identify and stop malware operation. This paradigm led to current solutions, where protecting systems focus on detection of incoming threats and d
作者: Motilin    時(shí)間: 2025-3-30 10:23
Selected Systems from Fe-N-V to Fe-Ti-Zrare addressed from an Information theory perspective: in a nutshell, it is assumed that attacks determine a significant change in the distribution of relevant traffic descriptors and this change is measured in terms of Shannon entropy. In more detail, the traffic is first aggregated by means of rand
作者: 高興一回    時(shí)間: 2025-3-30 15:31
Selected Systems from Fe-N-V to Fe-Ti-Zrdetection is performing combining two ways: using network-level and host-level analysis. One approach makes it possible to analyze the behaviour of the software in the host, which may indicate the possible presence of bot directly in the host and identify malicious software, and another one involves
作者: 鳥(niǎo)籠    時(shí)間: 2025-3-30 19:26
Günter Effenberg,Svitlana Ilyenkoer to maintain operability of communication subsystems even when faults occur. In most cases, redundant communication buses realize exactly the same functionality as the initial non-redundant bus. That makes the system more reliable but the additional throughput of the redundant buses is not exploit
作者: sinoatrial-node    時(shí)間: 2025-3-30 22:13

作者: cardiopulmonary    時(shí)間: 2025-3-31 04:15
Günter Effenberg,Svitlana Ilyenko to derive an estimate of minimum transmission range (MTR), i.e., a minimum value of the vehicles transmission range that allows all vehicles in a given road section to be connected via multihop communication. The introduced method takes into account the impact of traffic signals coordination on for
作者: 杠桿支點(diǎn)    時(shí)間: 2025-3-31 07:40
Piotr Gaj,Andrzej Kwiecień,Micha? SawickiIncludes supplementary material:
作者: 按等級(jí)    時(shí)間: 2025-3-31 12:55
Communications in Computer and Information Sciencehttp://image.papertrans.cn/c/image/233652.jpg
作者: Antimicrobial    時(shí)間: 2025-3-31 15:50
Computer Networks978-3-319-59767-6Series ISSN 1865-0929 Series E-ISSN 1865-0937
作者: Basal-Ganglia    時(shí)間: 2025-3-31 19:48

作者: EVADE    時(shí)間: 2025-4-1 01:21
978-3-319-59766-9Springer International Publishing AG 2017
作者: CORE    時(shí)間: 2025-4-1 02:04
Traffic Flows Ateb-Prediction Method with Fluctuation Modeling Using Dirac Functionsy motion was proposed. It is suggested that the solution to the equation should be modified on the basis of the sum of Dirac functions which have different arguments at different points of time to simulate bursts of network traffic. Based on this model, the software implementing network monitoring a
作者: syncope    時(shí)間: 2025-4-1 06:32
Improving Accuracy of a Network Model Basing on the Case Study of a Distributed System with a Mobileas APIs that connect various parts of the system. It is a crucial task to apply a suitable architecture to provide users of mobile applications with satisfactory operation, especially when the Internet connection is necessary to get or send some data. The simulation of network architecture and confi
作者: 就職    時(shí)間: 2025-4-1 13:20
Method for Determining Effective Diagnostic Structures Within the Military IoT Networksis based on partitioning IoT network among disjoint clusters and applying comparison approach for diagnosis of misbehaving nodes within network clusters. Common communication and diagnostic structures are determined on the basis of the nodes attainability characteristics and subsequent generation of
作者: 收到    時(shí)間: 2025-4-1 15:27

作者: 長(zhǎng)處    時(shí)間: 2025-4-1 19:27





歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
仙桃市| 扶绥县| 双江| 塔河县| 泰州市| 沂水县| 铜梁县| 岱山县| 祁连县| 乌苏市| 鲜城| 德清县| 芒康县| 大荔县| 景宁| 将乐县| 鄯善县| 金秀| 阿克苏市| 施甸县| 阿拉善左旗| 三河市| 大邑县| 浙江省| 松潘县| 浮山县| 平利县| 洮南市| 乐至县| 正蓝旗| 苏州市| 揭西县| 萨嘎县| 北宁市| 闵行区| 洛阳市| 弋阳县| 东阳市| 嘉义县| 张家川| 丹凤县|