找回密碼
 To register

QQ登錄

只需一步,快速開(kāi)始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Computer Networks; 22nd International C Piotr Gaj,Andrzej Kwiecień,Piotr Stera Conference proceedings 2015 Springer International Publishin

[復(fù)制鏈接]
查看: 38124|回復(fù): 62
樓主
發(fā)表于 2025-3-21 17:20:50 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書(shū)目名稱Computer Networks
副標(biāo)題22nd International C
編輯Piotr Gaj,Andrzej Kwiecień,Piotr Stera
視頻videohttp://file.papertrans.cn/234/233643/233643.mp4
概述Includes supplementary material:
叢書(shū)名稱Communications in Computer and Information Science
圖書(shū)封面Titlebook: Computer Networks; 22nd International C Piotr Gaj,Andrzej Kwiecień,Piotr Stera Conference proceedings 2015 Springer International Publishin
描述.This book constitutes the thoroughly refereed proceedings of the 22st International Conference on Computer Networks, CN 2015, held in Brunów, Poland, in June 2015. The 42 revised full papers presented were carefully reviewed and selected from 79 submissions. The papers in these proceedings cover the following topics: computer networks, distributed computer systems, communications and teleinformatics..
出版日期Conference proceedings 2015
關(guān)鍵詞Ad hoc networks; Cloud computing; Computer networks; Distributed computing; Innovative applications; Netw
版次1
doihttps://doi.org/10.1007/978-3-319-19419-6
isbn_softcover978-3-319-19418-9
isbn_ebook978-3-319-19419-6Series ISSN 1865-0929 Series E-ISSN 1865-0937
issn_series 1865-0929
copyrightSpringer International Publishing Switzerland 2015
The information of publication is updating

書(shū)目名稱Computer Networks影響因子(影響力)




書(shū)目名稱Computer Networks影響因子(影響力)學(xué)科排名




書(shū)目名稱Computer Networks網(wǎng)絡(luò)公開(kāi)度




書(shū)目名稱Computer Networks網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書(shū)目名稱Computer Networks被引頻次




書(shū)目名稱Computer Networks被引頻次學(xué)科排名




書(shū)目名稱Computer Networks年度引用




書(shū)目名稱Computer Networks年度引用學(xué)科排名




書(shū)目名稱Computer Networks讀者反饋




書(shū)目名稱Computer Networks讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒(méi)有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 21:16:24 | 只看該作者
板凳
發(fā)表于 2025-3-22 01:08:14 | 只看該作者
Energy Aware Object Localization in Wireless Sensor Network Based on Wi-Fi Fingerprinting,them is a localization method based on Wi-Fi (802.11) access point (AP) signal strength (RSSI) measurement. In this method, a RSSI map is constructed via Localization Fingerprinting (LF), which allows localizing object on the basis of a pattern similarity. The drawback of LF method is the need to cr
地板
發(fā)表于 2025-3-22 06:34:13 | 只看該作者
5#
發(fā)表于 2025-3-22 12:38:47 | 只看該作者
IF-MANET: Interoperable Framework for Mobile Ad Hoc Networks,ources of mobile devices. The mobile ad?hoc network (MANET), an infrastructure-less wireless network, is an emerging technology and is best suited to provide communication between wireless mobile devices. Due to the nature of MANET, the network topology changes frequently, unpredictably and has crea
6#
發(fā)表于 2025-3-22 16:42:47 | 只看該作者
Attractiveness Study of Honeypots and Honeynets in Internet Threat Detection,nto honeynets are the most efficient tool how to lure, detect and analyze threats from the Internet. The paper presents recent results in honeynet made of Dionaea (emulating Windows services), Kippo (emulating Linux services) and Glastopf (emulating website services) honeypots. The most important re
7#
發(fā)表于 2025-3-22 18:31:38 | 只看該作者
User Trust Levels and Their Impact on System Security and Usability,CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.
8#
發(fā)表于 2025-3-22 23:38:26 | 只看該作者
9#
發(fā)表于 2025-3-23 03:01:08 | 只看該作者
On the Balancing Security Against Performance in Database Systems,hieved on different levels. One can choose factors which have a different impact on the overall system security. Traditionally, security engineers configure IT systems with the strongest possible security mechanisms. Unfortunately, the strongest protection can lead to unreasoned increase of the syst
10#
發(fā)表于 2025-3-23 07:49:05 | 只看該作者
Analysis of Objective Trees in Security Management of Distributed Computer Networks of Enterprises s, which can help to identify quickly and eliminate the causes of security breaches of these networks during their operation. The developed software allows to create a methodological basis for the creation of new information security management systems with cognitive functions, the use of which will
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-7 16:06
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
万全县| 萍乡市| 灵山县| 敦化市| 靖州| 新干县| 大竹县| 白玉县| 高碑店市| 临汾市| 昌平区| 大城县| 秦皇岛市| 陇川县| 普宁市| 县级市| 年辖:市辖区| 天峻县| 柳州市| 邮箱| 莱州市| 伊通| 德钦县| 吴旗县| 肇州县| 仲巴县| 赤城县| 周口市| 宁强县| 旬阳县| 图木舒克市| 平邑县| 平罗县| 丰原市| 武邑县| 龙江县| 瑞金市| 分宜县| 包头市| 克什克腾旗| 绥中县|