LEADER 06156nam 22008415 450 001 9910483365103321 005 20251226202333.0 010 $a1-280-38753-X 010 $a9786613565457 010 $a3-642-13971-X 024 7 $a10.1007/978-3-642-13971-0 035 $a(CKB)2670000000028966 035 $a(SSID)ssj0000446661 035 $a(PQKBManifestationID)11249948 035 $a(PQKBTitleCode)TC0000446661 035 $a(PQKBWorkID)10496712 035 $a(PQKB)11294908 035 $a(DE-He213)978-3-642-13971-0 035 $a(MiAaPQ)EBC3065404 035 $a(PPN)149064209 035 $a(EXLCZ)992670000000028966 100 $a20100616d2010 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aNetworked Services and Applications - Engineering, Control and Management $e16th EUNICE/IFIP WG 6.6 Workshop, EUNICE 2010, Trondheim, Norway, June 28-30, 2010, Proceedings /$fedited by Finn Arve Aagesen, Svein J. Knapskog 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (XIII, 275 p. 125 illus.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI,$x2946-1642 ;$v6164 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-13970-1 327 $aAdmission Control and Networking -- On the Performance of Grooming Strategies for Offloading IP Flows onto Lightpaths in Hybrid Networks -- MBAC: Impact of the Measurement Error on Key Performance Issues -- An Algorithm for Automatic Base Station Placement in Cellular Network Deployment -- An Energy-Efficient FPGA-Based Packet Processing Framework -- Service Mobility -- Service Migration Protocol for NFC Links -- Swarm Intelligence Heuristics for Component Deployment -- Peer-to-Peer and Virtualization -- On Force-Based Placement of Distributed Services within a Substrate Network -- Enabling P2P Gaming with Network Coding -- A Virtual File System Interface for Computational Grids -- Security -- Labeled VoIP Data-Set for Intrusion Detection Evaluation -- Document Provenance in the Cloud: Constraints and Challenges -- Wireless Handoff Optimization: A Comparison of IEEE 802.11r and HOKEY -- Introducing Perfect Forward Secrecy for AN.ON -- Congestion Control -- Mobility-Aware Drop Precedence Scheme in DiffServ-Enabled Mobile Network Systems -- Theoretical Analysis of an Ideal Startup Scheme in Multihomed SCTP -- Monitoring and Filtering -- The Network Data Handling War: MySQL vs. NfDump -- Processing of Flow Accounting Data in Java: Framework Design and Performance Evaluation -- Fighting Spam on the Sender Side: A Lightweight Approach -- Dependability -- Degradation Model for Erbium-Doped Fiber Amplifiers to Reduce Network Downtime -- A Token Based Approach Detecting Downtime in Distributed Application Servers or Network Elements -- Distributed Resource Reservation for Beacon Based MAC Protocols -- Adaptation and Reconfiguration -- On Runtime Adaptation of Application-Layer Multicast Protocol Parameters -- A Framework with Proactive Nodes for Scheduling and Optimizing Distributed Embedded Systems -- Resource Adaptive Distributed Information Sharing -- Poster Session -- Performance Impacts of Node Failures on a Chord-Based Hierarchical Peer-to-Peer Network -- A Low-Power Scheme for Localization in Wireless Sensor Networks -- Flow Aggregation Using Dynamic Packet State -- Evaluating MDC with Incentives in P2PTV Systems -- Translation from UML to SPN Model: A Performance Modeling Framework -- An Open and Extensible Service Discovery for Ubiquitous Communication Systems. 330 $aThe EUNICE (European Network of Universities and Companies in Information and Communication technology) (http://www.eunice-forum.org) mission is to jointly - velop and promote the best and most compatible standard of European higher edu- tion and professionals in ICT by increasing scientific and technical knowledge in the field of ICT and developing their applications in the economy. The EUNICE Wo- shop is an annual event. This year the workshop was sponsored by IFIP TC 6 WG 6.6: Management of Networks and Distributed Systems. Eight years ago, the seventh edition of the EUNICE workshop took place in Tro- heim with the topic ?Adaptable Networks and Teleservices.? Since then ?adaptability? has become a topic which is found in most ICT conferences. The concept teleservices, which is a telecommunication domain concept from the 1980s, has been lifted out of the telecom community and is now found with new and sometimes mysterious names such as service?oriented architecture and cloud computing. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI,$x2946-1642 ;$v6164 606 $aComputer networks 606 $aComputer science 606 $aCryptography 606 $aData encryption (Computer science) 606 $aElectronic data processing$xManagement 606 $aAlgorithms 606 $aComputers and civilization 606 $aComputer Communication Networks 606 $aTheory of Computation 606 $aCryptology 606 $aIT Operations 606 $aAlgorithms 606 $aComputers and Society 615 0$aComputer networks. 615 0$aComputer science. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aElectronic data processing$xManagement. 615 0$aAlgorithms. 615 0$aComputers and civilization. 615 14$aComputer Communication Networks. 615 24$aTheory of Computation. 615 24$aCryptology. 615 24$aIT Operations. 615 24$aAlgorithms. 615 24$aComputers and Society. 676 $a004.6 701 $aAagesen$b Finn Arve$01762200 701 $aKnapskog$b Svein Johan$01752466 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483365103321 996 $aNetworked services and applications-- engineering, control and management$94201980 997 $aUNINA