標(biāo)題: Titlebook: Distributed Computing and Internet Technology; 6th International Co Tomasz Janowski,Hrushikesha Mohanty Conference proceedings 2010 Springe [打印本頁(yè)] 作者: 動(dòng)詞 時(shí)間: 2025-3-21 16:12
書目名稱Distributed Computing and Internet Technology影響因子(影響力)
書目名稱Distributed Computing and Internet Technology影響因子(影響力)學(xué)科排名
書目名稱Distributed Computing and Internet Technology網(wǎng)絡(luò)公開度
書目名稱Distributed Computing and Internet Technology網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Distributed Computing and Internet Technology被引頻次
書目名稱Distributed Computing and Internet Technology被引頻次學(xué)科排名
書目名稱Distributed Computing and Internet Technology年度引用
書目名稱Distributed Computing and Internet Technology年度引用學(xué)科排名
書目名稱Distributed Computing and Internet Technology讀者反饋
書目名稱Distributed Computing and Internet Technology讀者反饋學(xué)科排名
作者: Legend 時(shí)間: 2025-3-21 20:38
https://doi.org/10.1007/978-94-017-3315-1ve developed a tool to calculate the network parameters such as minimum numbers of forwarding nodes, minimum range for each node required to form a well connected mesh network and minimize the power consumption. Our initial experiments with google maps give very encouraging results.作者: 占卜者 時(shí)間: 2025-3-22 04:06
Malware: From Modelling to Practical DetectionOn the same lines, the remedies can also be thought of through analogies with epidemiological notions like disinfection, quarantine, environment control etc. We shall discuss these aspects and relate the above to notions of computability..Adleman in his seminal paper has extrapolated protection mech作者: 用手捏 時(shí)間: 2025-3-22 08:15
A Tool to Determine Strategic Location and Ranges of Nodes for Optimum Deployment of Wireless Sensorve developed a tool to calculate the network parameters such as minimum numbers of forwarding nodes, minimum range for each node required to form a well connected mesh network and minimize the power consumption. Our initial experiments with google maps give very encouraging results.作者: 證實(shí) 時(shí)間: 2025-3-22 12:25
Tomasz Janowski,Hrushikesha Mohantyconference proceedings作者: 耐寒 時(shí)間: 2025-3-22 14:45 作者: 耐寒 時(shí)間: 2025-3-22 17:07 作者: heckle 時(shí)間: 2025-3-22 21:52 作者: LUDE 時(shí)間: 2025-3-23 03:25 作者: 傲慢人 時(shí)間: 2025-3-23 06:49
A Framework for Web-Based NegotiationNegotiation in business is natural and so it is while business is performed on world wide web. There has been investigation on to perform negotiation on web. In this paper, we view negotiation is a process and propose a framework for it’s implementation.作者: 廣大 時(shí)間: 2025-3-23 12:57 作者: congenial 時(shí)間: 2025-3-23 17:50 作者: arousal 時(shí)間: 2025-3-23 21:36 作者: 枕墊 時(shí)間: 2025-3-23 22:20 作者: 分散 時(shí)間: 2025-3-24 05:38 作者: ethnology 時(shí)間: 2025-3-24 09:46 作者: EVEN 時(shí)間: 2025-3-24 13:54 作者: 無(wú)目標(biāo) 時(shí)間: 2025-3-24 17:41
William M. Bowen,Robert E. Gleesonsson distribution with mean rate . and service times are exponentially distributed with different mean values. It is assumed that if the servers were busy, incoming jobs would wait in the queue and maximum queue size will be finite. One example of this situation is, routers of different speeds serving the incoming packets in a network.作者: LAP 時(shí)間: 2025-3-24 19:22 作者: nonplus 時(shí)間: 2025-3-25 02:56
https://doi.org/10.1007/978-3-319-57024-2s dynamic, interactive, personalized experiences. To achieve this, the content of most web pages is created dynamically, by executing queries dynamically, using data that changes dynamically from distributed sources identified dynamically. A typical web page presents a “view” of the world constructe作者: echnic 時(shí)間: 2025-3-25 04:46
Maryvonne Gerin,Thomas G. Phillipsner of the computer). Typical categories of malicious code include Trojan Horses, viruses, worms etc. Malware has been a major cause of concern for information security. With the growth in complexity of computing systems and the ubiquity of information due to WWW, detection of malware has become hor作者: Breach 時(shí)間: 2025-3-25 09:45
Submillimeter CI and CO Lines in Galaxiesare can be obtained at commodity prices, and software infrastructure can be downloaded free of charge. The limiting factor is the cost of consistency and coordination: in software development, in systems integration, and in continuing interaction with users. This paper explains how the use of semant作者: infelicitous 時(shí)間: 2025-3-25 12:38 作者: 和平 時(shí)間: 2025-3-25 19:47 作者: commensurate 時(shí)間: 2025-3-25 23:30
https://doi.org/10.1007/978-94-017-3315-1 single Service Provider, who provides Cellular (GPRS), WLAN (WiFi) as well as data (Internet) services. The Service Provider’s network consists of an ‘Intermediate Switching Network’ (ISN), placed between the data services and the GPRS-WiFi networks. The ISN uses MPLS and MP-BGP to switch data traf作者: PIZZA 時(shí)間: 2025-3-26 01:01
https://doi.org/10.1007/978-94-017-3315-1e sensing location is fixed. In this paper, we are describing a deployment tool we have developed for strategic localization and network optimization. Even before going into field deployment, this tool can be used to calculate precisely the location of the nodes and transmission range while consider作者: evasive 時(shí)間: 2025-3-26 04:20
The Evolution of Global Internet Governancent routing scheme that can minimize delay and also offer good performance in energy efficiency and network lifetime. In this paper, we propose a new data gathering scheme which is a combination of clustering and shortest hop pairing of the sensor nodes. The cluster heads and the super leader are rot作者: 墻壁 時(shí)間: 2025-3-26 11:48 作者: 卵石 時(shí)間: 2025-3-26 16:13 作者: institute 時(shí)間: 2025-3-26 17:51 作者: Generosity 時(shí)間: 2025-3-27 00:57 作者: Bucket 時(shí)間: 2025-3-27 02:28
The Evolution of Human Populations in Arabia systems and computer operating systems, see Neuts [1], Chaudhry and Templeton [2], Medhi [3], etc. In accessible batch service queues, the arriving customers will be considered for service with current batch service in progress with some limitation. The concept of accessibility into batches during 作者: calorie 時(shí)間: 2025-3-27 05:35
The Evolution of Human SettlementsThese studies assume a set of autonomous, anonymous, oblivious robots. A task for such robots is to form an arbitrary pattern in the two dimensional plane. This task is fundamental in the sense that if the robots can form any pattern, they can agree on their respective roles in a subsequent, coordin作者: 討厭 時(shí)間: 2025-3-27 12:55 作者: FIG 時(shí)間: 2025-3-27 14:21 作者: Conclave 時(shí)間: 2025-3-27 18:40 作者: 大廳 時(shí)間: 2025-3-27 22:26
Transactional Memory Todaybate sometimes generates more heat than light: terms are not always well-defined and criteria for making judgments are not always clear..This article will try to impose some order on the conversation. TM itself can encompass hardware, software, speculative lock elision, and other mechanisms. The ben作者: 按時(shí)間順序 時(shí)間: 2025-3-28 03:06
Maintaining Coherent Views over Dynamic Distributed Datas dynamic, interactive, personalized experiences. To achieve this, the content of most web pages is created dynamically, by executing queries dynamically, using data that changes dynamically from distributed sources identified dynamically. A typical web page presents a “view” of the world constructe作者: Forehead-Lift 時(shí)間: 2025-3-28 09:05 作者: 苦澀 時(shí)間: 2025-3-28 12:04 作者: Conspiracy 時(shí)間: 2025-3-28 17:22
Fuzzy-Controlled Source-Initiated Multicasting (FSIM) in Ad Hoc Networks short in a harsh ad hoc mobile environment, since node mobility causes conventional multicast tree to rapidly become outdated. The amount of bandwidth required for building up a multicast tree is less than that required for other delivery structures, since a tree avoids unnecessary duplication of d作者: aplomb 時(shí)間: 2025-3-28 21:30 作者: 雄偉 時(shí)間: 2025-3-29 01:38 作者: absorbed 時(shí)間: 2025-3-29 05:42
A Tool to Determine Strategic Location and Ranges of Nodes for Optimum Deployment of Wireless Sensore sensing location is fixed. In this paper, we are describing a deployment tool we have developed for strategic localization and network optimization. Even before going into field deployment, this tool can be used to calculate precisely the location of the nodes and transmission range while consider作者: 使害羞 時(shí)間: 2025-3-29 10:42
An Efficient Hybrid Data-Gathering Scheme in Wireless Sensor Networksnt routing scheme that can minimize delay and also offer good performance in energy efficiency and network lifetime. In this paper, we propose a new data gathering scheme which is a combination of clustering and shortest hop pairing of the sensor nodes. The cluster heads and the super leader are rot作者: faculty 時(shí)間: 2025-3-29 14:35 作者: receptors 時(shí)間: 2025-3-29 19:06 作者: Insubordinate 時(shí)間: 2025-3-29 23:23 作者: 性上癮 時(shí)間: 2025-3-30 01:29 作者: progestogen 時(shí)間: 2025-3-30 06:32
Performance Analysis of a Renewal Input Bulk Service Queue with Accessible and Non-accessible Batche systems and computer operating systems, see Neuts [1], Chaudhry and Templeton [2], Medhi [3], etc. In accessible batch service queues, the arriving customers will be considered for service with current batch service in progress with some limitation. The concept of accessibility into batches during 作者: Tartar 時(shí)間: 2025-3-30 10:27 作者: Ornament 時(shí)間: 2025-3-30 12:25
Gathering Asynchronous Transparent Fat Robotsrithm for .. (unit disc robots) has been reported for 3 and 4 robots. This paper proposes a distributed algorithm for .. (.?≥?5) autonomous, oblivious, homogeneous, asynchronous, .. The robots are assumed to be transparent and they have full visibility.作者: Density 時(shí)間: 2025-3-30 20:30
Development of Generalized HPC Simulatorsimulation, data storage, or intensive computation solutions there will obviously be ever growing needs from researchers within governments, businesses, and academia to determine the right HPC framework for meeting their computational needs for the least cost. While HPC simulators are available from作者: 正常 時(shí)間: 2025-3-30 23:47 作者: NEEDY 時(shí)間: 2025-3-31 03:59 作者: RALES 時(shí)間: 2025-3-31 08:29 作者: left-ventricle 時(shí)間: 2025-3-31 12:25
Maintaining Coherent Views over Dynamic Distributed Datawith the required fidelity in spite of data dynamics. How these challenges can be met by the judicious design of algorithms for data dissemination, caching, and cooperation forms the crux of our work.作者: 分離 時(shí)間: 2025-3-31 15:19 作者: Metastasis 時(shí)間: 2025-3-31 20:45 作者: NICE 時(shí)間: 2025-4-1 00:13
Submillimeter CI and CO Lines in Galaxiesand coordination: in software development, in systems integration, and in continuing interaction with users. This paper explains how the use of semantic technologies and model-driven engineering can greatly reduce this cost, and thus increase the quality, interoperability, and suitability of information technology applications.作者: Mortar 時(shí)間: 2025-4-1 03:40 作者: 讓你明白 時(shí)間: 2025-4-1 08:30 作者: microscopic 時(shí)間: 2025-4-1 11:53 作者: 斑駁 時(shí)間: 2025-4-1 14:38 作者: beta-carotene 時(shí)間: 2025-4-1 19:32
Seamless Handoff between IEEE 802.11 and GPRS Networks ‘Intermediate Switching Network’ (ISN), placed between the data services and the GPRS-WiFi networks. The ISN uses MPLS and MP-BGP to switch data traffic between GPRS and WiFi networks, as per the movements of the user.