標(biāo)題: Titlebook: Information and Communication Technologies; 18th EUNICE/IFIP WG Róbert Szabó,Attila Vidács Conference proceedings 2012 IFIP International [打印本頁] 作者: 筆記 時間: 2025-3-21 17:12
書目名稱Information and Communication Technologies影響因子(影響力)
書目名稱Information and Communication Technologies影響因子(影響力)學(xué)科排名
書目名稱Information and Communication Technologies網(wǎng)絡(luò)公開度
書目名稱Information and Communication Technologies網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information and Communication Technologies被引頻次
書目名稱Information and Communication Technologies被引頻次學(xué)科排名
書目名稱Information and Communication Technologies年度引用
書目名稱Information and Communication Technologies年度引用學(xué)科排名
書目名稱Information and Communication Technologies讀者反饋
書目名稱Information and Communication Technologies讀者反饋學(xué)科排名
作者: follicular-unit 時間: 2025-3-21 23:55 作者: CHOIR 時間: 2025-3-22 03:40 作者: Interdict 時間: 2025-3-22 06:35 作者: instill 時間: 2025-3-22 12:03 作者: exostosis 時間: 2025-3-22 12:56
Muhammad Irfan Rafique,Thomas Bauschert data in a consistent way with the help of transactions. On the other hand, transactional applications can take advantage of group communication to build distributed cooperative servers as well as replicated ones. An additional advantage of an integrated approach is that it can be used as a base for作者: Paraplegia 時間: 2025-3-22 18:29 作者: 潛伏期 時間: 2025-3-23 00:06
Albert Domingo,Boris Bellalta,Miquel Oliverted computing systems. These protocols can be broadly classified as minimum process intrusive checkpointing protocols and non-intrusive checkpointing protocols. In this chapter, we present a non-intrusive coordinated checkpointing protocol for distributed systems with least failure-free overhead. Th作者: CLAIM 時間: 2025-3-23 03:13 作者: 抗體 時間: 2025-3-23 06:40 作者: 蛛絲 時間: 2025-3-23 10:36 作者: 縱火 時間: 2025-3-23 15:22
Patcharee Thongtra,Finn Arve Aagesen,Kornschnok Dittawitnctionality and application. The chapter consists of six sections, where the first three sections mainly introduce results of template-free synthesized conducting polymers whereas the later three sections focus on other methods created by author to unusual micro/nanostructured conducting polymers an作者: 適宜 時間: 2025-3-23 20:26
Konrad Walczyk,Annie Graveynctionality and application. The chapter consists of six sections, where the first three sections mainly introduce results of template-free synthesized conducting polymers whereas the later three sections focus on other methods created by author to unusual micro/nanostructured conducting polymers an作者: 抵制 時間: 2025-3-23 23:03
Christos Tsiaras,Martin Waldburger,Guilherme Sperb Machado,Andrei Vancea,Burkhard Stillerernal safety, the judge ruled that US family detention centers are relatively safe spaces compared to families’ countries of origin, from which most families sought asylum. This move not only used asylees’ testimonies as evidence of external insecurity but also enabled a particular fusing of US nati作者: malapropism 時間: 2025-3-24 04:17
Volker Richter,Rico Radeke,Ralf Lehnert at an autopsy performed on an II-day-old boy with bilateral dislocations; he concluded that the findings were not caused by injury at birth, but dated from a pre-natal stage. Soon after, Baron Dupuytren (1847) gave an accurate description of congenital dislocation in his contribution entitled "Memo作者: Evolve 時間: 2025-3-24 07:33 作者: 業(yè)余愛好者 時間: 2025-3-24 14:23 作者: DEFT 時間: 2025-3-24 15:11 作者: 新星 時間: 2025-3-24 21:46
Mihály Orosz,Gábor Hosszúided. Thus, it is very important to combine the above two strategies into a hybrid scheme and utilize the positive aspects of using both traffic control and resource control. In such case, the resource control strategy is firstly used for searching non-congested paths. If they are not available, the作者: Astigmatism 時間: 2025-3-25 02:06
978-3-642-32807-7IFIP International Federation for Information Processing 2012作者: 假裝是我 時間: 2025-3-25 05:24 作者: 懲罰 時間: 2025-3-25 11:09 作者: 去世 時間: 2025-3-25 15:13 作者: Arable 時間: 2025-3-25 16:37
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465794.jpg作者: 伙伴 時間: 2025-3-25 21:55
Conference proceedings 2012August 2012. The 23 oral papers demostrated together with 15 poster presentations were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on radio communications, security, management, protocols and performance, algorithms, models, and simulations.作者: 洞穴 時間: 2025-3-26 00:31
A Testbed Analysis of the Effects of IEEE 802.11s Power Save on Mesh Link Performancey be implemented in software, this allows to bring the benefits of mesh networking to a broad market of about one billion devices. The standard amendment describes new power save schemes which allow efficient energy saving for all mesh nodes. On the downside, the power save schemes will also degrade作者: BOON 時間: 2025-3-26 06:21 作者: erythema 時間: 2025-3-26 09:24
Receiver-Initiated vs. Short-Preamble Burst MAC Approaches for Multi-channel Wireless Sensor Networks transmissions. The increase of spectrum utilization in non-licensed bands along with the reduced power used by these nodes is expected to cause high interference problems in WSNs. Therefore, the design of new dynamic spectrum access techniques specifically tailored to these networks plays an impor作者: 半導(dǎo)體 時間: 2025-3-26 13:32
White Spaces in UHF Band: Catalonia Case Study and Impact of the Digital Dividendhis paper analyses the TV spectrum occupation in the region of Catalonia, Spain, because it will be one of the first EU regions where changes in the UHF band are going to be implemented. Those changes are derived from the implementation of the Digital Dividend. The goal of this paper is to correlate作者: PALMY 時間: 2025-3-26 18:21
A Framework for Security Context Migration in a Firewall Secured Virtual Machine Environment these VMs via Virtual Networks (VNs). These VNs underlie the same security requirements as physical networks. Network elements such as stateful firewalls contribute in enforcing this security. With the advent of stateful firewalls on the hypervisor level, a new challenge arises when it comes to VM 作者: Exposition 時間: 2025-3-27 00:50 作者: NOVA 時間: 2025-3-27 04:14 作者: Euthyroid 時間: 2025-3-27 07:12
Hash-Based Mutual Authentication Protocol for Low-Cost RFID Systemsore security problems were raised. Since tags have limited memory and very low computational capacity a so-called lightweight authentication is needed. Several protocols have been proposed to resolve security and privacy issues in RFID systems. However, the earlier suggested algorithms do not satisf作者: LURE 時間: 2025-3-27 09:47
The Impact of IPv6 on Penetration Testingnetration testing process are proposed to accommodate IPv6. Among these modifications are ways of performing fragmentation attacks, host discovery and brute-force protection. We also propose new checks for IPv6-specific vulnerabilities, such as bypassing firewalls using extension headers and reachin作者: 佛刊 時間: 2025-3-27 14:19 作者: Obituary 時間: 2025-3-27 21:31 作者: Vulvodynia 時間: 2025-3-27 22:52 作者: 牛馬之尿 時間: 2025-3-28 03:56
Techno-Economic Comparison of Next-Generation Access Networks for the French Markete Optical Network). It also considers Long-Reach Optical Access, which augments the span of the access network. All potential solutions are evaluated on the basis of Payback Period, Net Present Value and Internal Rate of Return. The market is segmented in different areas depending on their respectiv作者: 委派 時間: 2025-3-28 08:06 作者: Intuitive 時間: 2025-3-28 13:19 作者: 不愛防注射 時間: 2025-3-28 15:27
Implementation and Evaluation of Coupled Congestion Control for Multipath TCPta transmission if at least one of the endpoints is multi-homed. For example, this can be a mobile device with a Wifi and a 3G interface. It is assumed that the paths are disjoint or partly disjoint. As such these paths have different transmission characteristics, like speed or delay. With MPTCP the作者: 完全 時間: 2025-3-28 20:31
Improving Fairness for Adaptive HTTP Video Streaming indicators are differences in achieved average rate and stability among the competing streams. The method analyzed is based on changing a fixed and equal video segment request rate of each stream, to either a per session unique or random request rate. The analysis is done by means of measurements i作者: Morbid 時間: 2025-3-29 00:19 作者: 慢跑 時間: 2025-3-29 03:40 作者: hazard 時間: 2025-3-29 07:32 作者: Expressly 時間: 2025-3-29 14:35 作者: expound 時間: 2025-3-29 17:26 作者: MEN 時間: 2025-3-29 22:30 作者: 藝術(shù) 時間: 2025-3-30 03:48 作者: 騷擾 時間: 2025-3-30 07:59
Zahra Tavakoli,Sebastian Meier,Alexander Vensmere. Only in recent years researchers have proposed an integration of both techniques. Transactions were developed in the context of database systems to provide data consistency in the presence of failures and concurrent accesses. On the other hand, group communication was proposed as a basic building作者: 倫理學(xué) 時間: 2025-3-30 11:22 作者: 外面 時間: 2025-3-30 12:31 作者: Absenteeism 時間: 2025-3-30 18:13 作者: 閃光東本 時間: 2025-3-30 23:43 作者: 詼諧 時間: 2025-3-31 01:43
Christos Tsiaras,Martin Waldburger,Guilherme Sperb Machado,Andrei Vancea,Burkhard Stillerr first describes the legal precedent for family detention as an immigration enforcement practice and situates it in immigration geopolitics and children’s rights literatures. Second, the chapter shows how noncitizen children are understood as “child-objects” in immigration law rather than agential,作者: 傷心 時間: 2025-3-31 07:51 作者: exigent 時間: 2025-3-31 10:57 作者: aneurysm 時間: 2025-3-31 17:23 作者: artifice 時間: 2025-3-31 20:05 作者: 敬禮 時間: 2025-3-31 23:05 作者: 無能性 時間: 2025-4-1 01:59
Path Selection and Adaptive Selection of Smart Antenna Transmission Schemes in Multi-hop Wireless Neution enables mesh nodes to dynamically select their transmission scheme on a per packet basis according to the current channel conditions. Simulation results show that the overall packet success rate (throughput) of multi-hop wireless networks are substantially improved.作者: 衰弱的心 時間: 2025-4-1 08:37