派博傳思國際中心

標(biāo)題: Titlebook: Information and Communication Technologies; 18th EUNICE/IFIP WG Róbert Szabó,Attila Vidács Conference proceedings 2012 IFIP International [打印本頁]

作者: 筆記    時間: 2025-3-21 17:12
書目名稱Information and Communication Technologies影響因子(影響力)




書目名稱Information and Communication Technologies影響因子(影響力)學(xué)科排名




書目名稱Information and Communication Technologies網(wǎng)絡(luò)公開度




書目名稱Information and Communication Technologies網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Information and Communication Technologies被引頻次




書目名稱Information and Communication Technologies被引頻次學(xué)科排名




書目名稱Information and Communication Technologies年度引用




書目名稱Information and Communication Technologies年度引用學(xué)科排名




書目名稱Information and Communication Technologies讀者反饋




書目名稱Information and Communication Technologies讀者反饋學(xué)科排名





作者: follicular-unit    時間: 2025-3-21 23:55

作者: CHOIR    時間: 2025-3-22 03:40

作者: Interdict    時間: 2025-3-22 06:35

作者: instill    時間: 2025-3-22 12:03

作者: exostosis    時間: 2025-3-22 12:56
Muhammad Irfan Rafique,Thomas Bauschert data in a consistent way with the help of transactions. On the other hand, transactional applications can take advantage of group communication to build distributed cooperative servers as well as replicated ones. An additional advantage of an integrated approach is that it can be used as a base for
作者: Paraplegia    時間: 2025-3-22 18:29

作者: 潛伏期    時間: 2025-3-23 00:06
Albert Domingo,Boris Bellalta,Miquel Oliverted computing systems. These protocols can be broadly classified as minimum process intrusive checkpointing protocols and non-intrusive checkpointing protocols. In this chapter, we present a non-intrusive coordinated checkpointing protocol for distributed systems with least failure-free overhead. Th
作者: CLAIM    時間: 2025-3-23 03:13

作者: 抗體    時間: 2025-3-23 06:40

作者: 蛛絲    時間: 2025-3-23 10:36

作者: 縱火    時間: 2025-3-23 15:22
Patcharee Thongtra,Finn Arve Aagesen,Kornschnok Dittawitnctionality and application. The chapter consists of six sections, where the first three sections mainly introduce results of template-free synthesized conducting polymers whereas the later three sections focus on other methods created by author to unusual micro/nanostructured conducting polymers an
作者: 適宜    時間: 2025-3-23 20:26
Konrad Walczyk,Annie Graveynctionality and application. The chapter consists of six sections, where the first three sections mainly introduce results of template-free synthesized conducting polymers whereas the later three sections focus on other methods created by author to unusual micro/nanostructured conducting polymers an
作者: 抵制    時間: 2025-3-23 23:03
Christos Tsiaras,Martin Waldburger,Guilherme Sperb Machado,Andrei Vancea,Burkhard Stillerernal safety, the judge ruled that US family detention centers are relatively safe spaces compared to families’ countries of origin, from which most families sought asylum. This move not only used asylees’ testimonies as evidence of external insecurity but also enabled a particular fusing of US nati
作者: malapropism    時間: 2025-3-24 04:17
Volker Richter,Rico Radeke,Ralf Lehnert at an autopsy performed on an II-day-old boy with bilateral dislocations; he concluded that the findings were not caused by injury at birth, but dated from a pre-natal stage. Soon after, Baron Dupuytren (1847) gave an accurate description of congenital dislocation in his contribution entitled "Memo
作者: Evolve    時間: 2025-3-24 07:33

作者: 業(yè)余愛好者    時間: 2025-3-24 14:23

作者: DEFT    時間: 2025-3-24 15:11

作者: 新星    時間: 2025-3-24 21:46
Mihály Orosz,Gábor Hosszúided. Thus, it is very important to combine the above two strategies into a hybrid scheme and utilize the positive aspects of using both traffic control and resource control. In such case, the resource control strategy is firstly used for searching non-congested paths. If they are not available, the
作者: Astigmatism    時間: 2025-3-25 02:06
978-3-642-32807-7IFIP International Federation for Information Processing 2012
作者: 假裝是我    時間: 2025-3-25 05:24

作者: 懲罰    時間: 2025-3-25 11:09

作者: 去世    時間: 2025-3-25 15:13

作者: Arable    時間: 2025-3-25 16:37
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465794.jpg
作者: 伙伴    時間: 2025-3-25 21:55
Conference proceedings 2012August 2012. The 23 oral papers demostrated together with 15 poster presentations were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on radio communications, security, management, protocols and performance, algorithms, models, and simulations.
作者: 洞穴    時間: 2025-3-26 00:31
A Testbed Analysis of the Effects of IEEE 802.11s Power Save on Mesh Link Performancey be implemented in software, this allows to bring the benefits of mesh networking to a broad market of about one billion devices. The standard amendment describes new power save schemes which allow efficient energy saving for all mesh nodes. On the downside, the power save schemes will also degrade
作者: BOON    時間: 2025-3-26 06:21

作者: erythema    時間: 2025-3-26 09:24
Receiver-Initiated vs. Short-Preamble Burst MAC Approaches for Multi-channel Wireless Sensor Networks transmissions. The increase of spectrum utilization in non-licensed bands along with the reduced power used by these nodes is expected to cause high interference problems in WSNs. Therefore, the design of new dynamic spectrum access techniques specifically tailored to these networks plays an impor
作者: 半導(dǎo)體    時間: 2025-3-26 13:32
White Spaces in UHF Band: Catalonia Case Study and Impact of the Digital Dividendhis paper analyses the TV spectrum occupation in the region of Catalonia, Spain, because it will be one of the first EU regions where changes in the UHF band are going to be implemented. Those changes are derived from the implementation of the Digital Dividend. The goal of this paper is to correlate
作者: PALMY    時間: 2025-3-26 18:21
A Framework for Security Context Migration in a Firewall Secured Virtual Machine Environment these VMs via Virtual Networks (VNs). These VNs underlie the same security requirements as physical networks. Network elements such as stateful firewalls contribute in enforcing this security. With the advent of stateful firewalls on the hypervisor level, a new challenge arises when it comes to VM
作者: Exposition    時間: 2025-3-27 00:50

作者: NOVA    時間: 2025-3-27 04:14

作者: Euthyroid    時間: 2025-3-27 07:12
Hash-Based Mutual Authentication Protocol for Low-Cost RFID Systemsore security problems were raised. Since tags have limited memory and very low computational capacity a so-called lightweight authentication is needed. Several protocols have been proposed to resolve security and privacy issues in RFID systems. However, the earlier suggested algorithms do not satisf
作者: LURE    時間: 2025-3-27 09:47
The Impact of IPv6 on Penetration Testingnetration testing process are proposed to accommodate IPv6. Among these modifications are ways of performing fragmentation attacks, host discovery and brute-force protection. We also propose new checks for IPv6-specific vulnerabilities, such as bypassing firewalls using extension headers and reachin
作者: 佛刊    時間: 2025-3-27 14:19

作者: Obituary    時間: 2025-3-27 21:31

作者: Vulvodynia    時間: 2025-3-27 22:52

作者: 牛馬之尿    時間: 2025-3-28 03:56
Techno-Economic Comparison of Next-Generation Access Networks for the French Markete Optical Network). It also considers Long-Reach Optical Access, which augments the span of the access network. All potential solutions are evaluated on the basis of Payback Period, Net Present Value and Internal Rate of Return. The market is segmented in different areas depending on their respectiv
作者: 委派    時間: 2025-3-28 08:06

作者: Intuitive    時間: 2025-3-28 13:19

作者: 不愛防注射    時間: 2025-3-28 15:27
Implementation and Evaluation of Coupled Congestion Control for Multipath TCPta transmission if at least one of the endpoints is multi-homed. For example, this can be a mobile device with a Wifi and a 3G interface. It is assumed that the paths are disjoint or partly disjoint. As such these paths have different transmission characteristics, like speed or delay. With MPTCP the
作者: 完全    時間: 2025-3-28 20:31
Improving Fairness for Adaptive HTTP Video Streaming indicators are differences in achieved average rate and stability among the competing streams. The method analyzed is based on changing a fixed and equal video segment request rate of each stream, to either a per session unique or random request rate. The analysis is done by means of measurements i
作者: Morbid    時間: 2025-3-29 00:19

作者: 慢跑    時間: 2025-3-29 03:40

作者: hazard    時間: 2025-3-29 07:32

作者: Expressly    時間: 2025-3-29 14:35

作者: expound    時間: 2025-3-29 17:26

作者: MEN    時間: 2025-3-29 22:30

作者: 藝術(shù)    時間: 2025-3-30 03:48

作者: 騷擾    時間: 2025-3-30 07:59
Zahra Tavakoli,Sebastian Meier,Alexander Vensmere. Only in recent years researchers have proposed an integration of both techniques. Transactions were developed in the context of database systems to provide data consistency in the presence of failures and concurrent accesses. On the other hand, group communication was proposed as a basic building
作者: 倫理學(xué)    時間: 2025-3-30 11:22

作者: 外面    時間: 2025-3-30 12:31

作者: Absenteeism    時間: 2025-3-30 18:13

作者: 閃光東本    時間: 2025-3-30 23:43

作者: 詼諧    時間: 2025-3-31 01:43
Christos Tsiaras,Martin Waldburger,Guilherme Sperb Machado,Andrei Vancea,Burkhard Stillerr first describes the legal precedent for family detention as an immigration enforcement practice and situates it in immigration geopolitics and children’s rights literatures. Second, the chapter shows how noncitizen children are understood as “child-objects” in immigration law rather than agential,
作者: 傷心    時間: 2025-3-31 07:51

作者: exigent    時間: 2025-3-31 10:57

作者: aneurysm    時間: 2025-3-31 17:23

作者: artifice    時間: 2025-3-31 20:05

作者: 敬禮    時間: 2025-3-31 23:05

作者: 無能性    時間: 2025-4-1 01:59
Path Selection and Adaptive Selection of Smart Antenna Transmission Schemes in Multi-hop Wireless Neution enables mesh nodes to dynamically select their transmission scheme on a per packet basis according to the current channel conditions. Simulation results show that the overall packet success rate (throughput) of multi-hop wireless networks are substantially improved.
作者: 衰弱的心    時間: 2025-4-1 08:37





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
宜丰县| 邯郸市| 霍林郭勒市| 萨迦县| 青阳县| 福安市| 邻水| 乌拉特后旗| 鲁甸县| 云林县| 庆阳市| 荆门市| 化州市| 原平市| 宜城市| 固阳县| 宜州市| 象山县| 巴中市| 连江县| 辽中县| 株洲县| 容城县| 延庆县| 金溪县| 来安县| 元谋县| 青州市| 兴宁市| 湘阴县| 漯河市| 兴义市| 竹北市| 都兰县| 博乐市| 罗城| 阿图什市| 张家港市| 上饶市| 鄱阳县| 武强县|