標(biāo)題: Titlebook: ; [打印本頁] 作者: CHARY 時間: 2025-3-21 16:40
書目名稱Guide to Disaster-Resilient Communication Networks影響因子(影響力)
書目名稱Guide to Disaster-Resilient Communication Networks影響因子(影響力)學(xué)科排名
書目名稱Guide to Disaster-Resilient Communication Networks網(wǎng)絡(luò)公開度
書目名稱Guide to Disaster-Resilient Communication Networks網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Guide to Disaster-Resilient Communication Networks被引頻次
書目名稱Guide to Disaster-Resilient Communication Networks被引頻次學(xué)科排名
書目名稱Guide to Disaster-Resilient Communication Networks年度引用
書目名稱Guide to Disaster-Resilient Communication Networks年度引用學(xué)科排名
書目名稱Guide to Disaster-Resilient Communication Networks讀者反饋
書目名稱Guide to Disaster-Resilient Communication Networks讀者反饋學(xué)科排名
作者: harrow 時間: 2025-3-21 22:24 作者: 道學(xué)氣 時間: 2025-3-22 03:43
Eleonora Pantano,Charles Dennisfailure (disaster). This chapter introduces volatile cloud resources, their life cycle, pros and cons. It also presents several resilient techniques against volatile cloud resources’ disruptions and multiple failures.作者: Aggressive 時間: 2025-3-22 07:38
Artificial Intelligence for Smart Robots,ions aiming to maximize the SDN control plane robustness to malicious node attacks. Finally, the chapter addresses the robustness of CDNs to malicious link cuts by describing methods for the network upgrade (based either on the addition of new links or new replica locations) and for the optimal selection of content replica locations.作者: integral 時間: 2025-3-22 12:35 作者: Neutral-Spine 時間: 2025-3-22 15:15 作者: Neutral-Spine 時間: 2025-3-22 20:02
Resilient Techniques Against Disruptions of Volatile Cloud Resourcesfailure (disaster). This chapter introduces volatile cloud resources, their life cycle, pros and cons. It also presents several resilient techniques against volatile cloud resources’ disruptions and multiple failures.作者: 百科全書 時間: 2025-3-23 00:53 作者: 有罪 時間: 2025-3-23 03:19
Stefanie Baumann,Michael Püschnerlated schemes further addressed in this monograph, concerning (a) measures and models for the analysis and evaluation of disaster-resilient networks, (b) techniques for design and update of disaster-resilient systems, (c) algorithms and schemes for resilient systems, and (d)?advanced topics focusing, e.g. on emerging communication technologies.作者: 擁護(hù)者 時間: 2025-3-23 09:11 作者: 有惡臭 時間: 2025-3-23 11:17
Fundamentals of Communication Networks Resilience to Disasters and Massive Disruptions,lated schemes further addressed in this monograph, concerning (a) measures and models for the analysis and evaluation of disaster-resilient networks, (b) techniques for design and update of disaster-resilient systems, (c) algorithms and schemes for resilient systems, and (d)?advanced topics focusing, e.g. on emerging communication technologies.作者: inventory 時間: 2025-3-23 17:27 作者: Acetabulum 時間: 2025-3-23 18:20
Smart Prison State of the Art Designscenarios, outlining a set of reference use cases and their communication requirements. Then, it presents an overview of the state of the art for emergency and post-disaster communications. Finally, it focuses on a set of specific solutions of special relevance for disaster scenarios, outlining the main research challenges which are open to date.作者: Classify 時間: 2025-3-23 23:40
Emergency Networks for Post-Disaster Scenariosscenarios, outlining a set of reference use cases and their communication requirements. Then, it presents an overview of the state of the art for emergency and post-disaster communications. Finally, it focuses on a set of specific solutions of special relevance for disaster scenarios, outlining the main research challenges which are open to date.作者: DEMUR 時間: 2025-3-24 05:57 作者: 掙扎 時間: 2025-3-24 06:54 作者: 開始沒有 時間: 2025-3-24 13:25 作者: 狂怒 時間: 2025-3-24 18:50
Functional Metrics to Evaluate Network Vulnerability to Disastersn understanding the impact of disasters on the network infrastructure to enable the design of more robust networks. However, these multiple failures also affect the applications running over the network infrastructure. Even when the impact of a disaster on the structural performance indicators is in作者: GIST 時間: 2025-3-24 19:01
Vulnerability Evaluation of Networks to Multiple Failures Based on Critical Nodes and Links still provided by the network if its critical elements fail simultaneously. This evaluation requires to solve the optimization problem of identifying the set of network elements (either nodes or links) that are the most critical in the sense that if they are removed from the network, the resulting 作者: cogitate 時間: 2025-3-24 23:52
How to Model and Enumerate Geographically Correlated Failure Events in Communication Networkscal region as a result of a natural or human-made disaster. This chapter overviews how this information can be added to the existing network protocols through defining . (.)?and . (.). The output of this chapter can be the input of later chapters to design and operate the networks to enhance the pre作者: 失敗主義者 時間: 2025-3-25 05:34 作者: Dignant 時間: 2025-3-25 08:18
Modelling of Software FailuresWith the ongoing virtualization and shift of network functions to new software platforms, the role and criticality of software for ordinary operations as well as handling of disasters increase significantly. As discussed in the introductory section, malfunctioning software may cause disasters as wel作者: CHAFE 時間: 2025-3-25 12:12
Improving the Survivability of Carrier Networks to Large-Scale Disastersaster classification and associated risk analysis is described, and the disaster-aware submarine fibre-optic cable deployment? is addressed aiming to minimize the expected costs in case of natural disasters. Then, the chapter addresses the improvement of the network connectivity resilience to multip作者: 阻擋 時間: 2025-3-25 16:24
Security-Aware Carrier Network Planningwth of network traffic with tightening performance requirements combined with evolving physical-layer security threats poses multi-faceted challenges for network operators. To reduce network exposure to physical-layer attacks while satisfying the traffic growth and maintaining economic viability, aw作者: macular-edema 時間: 2025-3-25 22:32
Secure and Resilient Communications in the Industrial Internets and industrial devices with big data analysis in the cloud. In this chapter, we survey the main challenges that the Industrial Internet faces from a networking viewpoint. We especially focus on security, as critical industrial components could be exposed over the Internet, affecting resilience. We作者: 興奮過度 時間: 2025-3-26 01:31
Reliable Control and Data Planes for?Softwarized NetworksSDN) and network function virtualization (NFV). These solutions reduce the complexity and the specialization of hardware devices, by extracting the inherently distributed control plane of forwarding network elements such as switches and routers, to a logically centralized control plane (referred as 作者: hermitage 時間: 2025-3-26 06:18
Emergency Networks for Post-Disaster Scenariossaster until full restoration of pre-disaster communication infrastructure and services. As traffic demand might differ substantially from the one in the pre-disaster scenario, due to the specific needs of post-disaster scenarios, it appears evident that a simple restoration of existing infrastructu作者: 地殼 時間: 2025-3-26 08:58 作者: Amendment 時間: 2025-3-26 15:54
Free Space Optics System Reliability in?the Presence of Weather-Induced Disruptionsange of emerging applications. Nevertheless, FSO system reliability can be easily deteriorated in the presence of various weather-induced disruptions. The main two atmospheric effects influencing FSO links are fog and turbulence. Their investigation is based on real data and simulations—separately p作者: 愛花花兒憤怒 時間: 2025-3-26 17:07 作者: 葡萄糖 時間: 2025-3-27 00:44
Resilient Techniques Against Disruptions of Volatile Cloud Resourcesgions (data centres) and multiple availability zones in each region. This redundant and highly distributed resource pool guarantees users high availability and reliability, even in case of disasters. In order to increase revenues, cloud service providers offer their unused computing resources for mu作者: 土產(chǎn) 時間: 2025-3-27 03:40 作者: commute 時間: 2025-3-27 07:24 作者: 可能性 時間: 2025-3-27 12:09 作者: osteocytes 時間: 2025-3-27 17:39 作者: 打折 時間: 2025-3-27 21:11
Michel Barreteau,Claudia Cantinical region as a result of a natural or human-made disaster. This chapter overviews how this information can be added to the existing network protocols through defining . (.)?and . (.). The output of this chapter can be the input of later chapters to design and operate the networks to enhance the pre作者: Germinate 時間: 2025-3-28 01:09 作者: COST 時間: 2025-3-28 05:45 作者: Indict 時間: 2025-3-28 06:40 作者: 有機(jī)體 時間: 2025-3-28 12:56
Sana Khalid,Riffat Siddique,Allah Bakhshwth of network traffic with tightening performance requirements combined with evolving physical-layer security threats poses multi-faceted challenges for network operators. To reduce network exposure to physical-layer attacks while satisfying the traffic growth and maintaining economic viability, aw作者: Goblet-Cells 時間: 2025-3-28 18:08 作者: 啜泣 時間: 2025-3-28 20:05 作者: 使入迷 時間: 2025-3-28 23:08 作者: DEAF 時間: 2025-3-29 03:42 作者: catagen 時間: 2025-3-29 09:29
Smart Living in der Smart Regionange of emerging applications. Nevertheless, FSO system reliability can be easily deteriorated in the presence of various weather-induced disruptions. The main two atmospheric effects influencing FSO links are fog and turbulence. Their investigation is based on real data and simulations—separately p作者: ZEST 時間: 2025-3-29 14:00
Handlungsfelder und Modellregionenilures. While most of the failures are unpredictable, weather-based disasters such as tornadoes, hurricanes, wildfires or floods can be often predicted well in advance, which leaves enough time for operators to prepare their networks against the incoming threat. This chapter is devoted to explore re作者: 喊叫 時間: 2025-3-29 17:31 作者: 地殼 時間: 2025-3-29 23:18 作者: 闖入 時間: 2025-3-30 00:16
Guide to Disaster-Resilient Communication Networks978-3-030-44685-7Series ISSN 1617-7975 Series E-ISSN 2197-8433 作者: 攀登 時間: 2025-3-30 04:04
Guide to Disaster-Resilient Communication Networks作者: hallow 時間: 2025-3-30 11:33
Functional Metrics to Evaluate Network Vulnerability to Disastershe users. In this chapter, we review the functional metrics for evaluating the impact of disasters on applications and users. We specify relevant packet- and network-based functional metrics as well as perceived subjective metrics, and demonstrate the impact of disasters on QoS and QoE metrics in a 作者: cumber 時間: 2025-3-30 14:23
Vulnerability Evaluation of Networks to Multiple Failures Based on Critical Nodes and Linkss separately the cases aiming to identify the set of critical nodes and the set of critical links. Computational results are provided enabling the comparison between exact methods and centrality-based heuristics in terms of solution optimality.作者: 胰臟 時間: 2025-3-30 19:22
Comparing Destructive Strategies for Attacking Networks-vector”, that is the diagonal elements of the pseudo-inverse of the Laplacian matrix. Finally, we compare and rank these node-removal strategies and apply to the selected set of real-world infrastructures.作者: 撕裂皮肉 時間: 2025-3-30 23:00 作者: Aromatic 時間: 2025-3-31 02:33 作者: NICHE 時間: 2025-3-31 05:01
Reliable Control and Data Planes for?Softwarized Networkslanes. The reliability of the data plane can be increased by considering survivable virtual network embedding solutions. This chapter proposes a survivable embedding against single and double failures at either links or nodes. Furthermore, in order to provide a programmable and resilient data plane,作者: Tractable 時間: 2025-3-31 10:40