LEADER 02027nam--2200613---450 001 990000440440203316 005 20180308150855.0 010 $a88-15-04293-8 035 $a0044044 035 $aUSA010044044 035 $a(ALEPH)000044044USA01 035 $a0044044 100 $a20010511d1994----km-y0itay50------ba 101 0 $aita 102 $aIT 105 $a||||||||001yy 200 1 $aDimensioni della giustizia nelle società contemporanee$estudi di diritto giudiziario comparato$fMauro Cappelletti 210 $aBologna$cIl Mulino$dcopyr. 1994 215 $a206 p.$d22 cm 225 2 $aSaggi$v415 410 0$12001$aSaggi$v415 606 0 $aGiustizia$zSec. 20.$xStudio comparato 606 0 $aDiritto processuale comparato 676 $a347.05 700 1$aCAPPELLETTI,$bMauro$0160917 801 0$aIT$bsalbc$gISBD 912 $a990000440440203316 951 $aII.5. 290(VARIE COLL. 23/415)$b118543 LM$cVARIE COLL. 951 $aTesti 1542$b15705 G.$cTesti 951 $aXXIX.5.C 12 (Testi 1542)$b15706 G.$cTesti$d00234416 951 $aXXIX.5.C 12a (Testi 1542)$b15707 G.$cTesti$d00234413 951 $aSANT.9 4 24$b1648 DDPG$cSANT.9 951 $aST D$b1241 DDPG 951 $aCC 347 CAP$b2784 FIL 959 $aBK 969 $aGIU 969 $aDDPG 969 $aFIL 979 $aPATTY$b90$c20010511$lUSA01$h1156 979 $aPATTY$b90$c20010511$lUSA01$h1203 979 $c20020403$lUSA01$h1652 979 $aANGELA$b90$c20031125$lUSA01$h1647 979 $aPATRY$b90$c20040406$lUSA01$h1630 979 $aCOPAT3$b90$c20041228$lUSA01$h0933 979 $aDDPG1$b90$c20070105$lUSA01$h1524 979 $aDDPG1$b90$c20070109$lUSA01$h1514 979 $aDDPG1$b90$c20070215$lUSA01$h1717 979 $aRSIAV4$b90$c20090629$lUSA01$h1614 979 $c20121027$lUSA01$h1542 979 $c20121027$lUSA01$h1605 979 $c20121027$lUSA01$h1610 996 $aDimensioni della giustizia nelle società contemporanee$9628861 997 $aUNISA DEB $aSA0003507 LEADER 05818nam 22007455 450 001 9910556886003321 005 20251225203658.0 010 $a3-030-98005-7 024 7 $a10.1007/978-3-030-98005-4 035 $a(MiAaPQ)EBC6940141 035 $a(Au-PeEL)EBL6940141 035 $a(CKB)21427940500041 035 $a(PPN)261519735 035 $a(BIP)83667765 035 $a(BIP)83139252 035 $a(DE-He213)978-3-030-98005-4 035 $a(EXLCZ)9921427940500041 100 $a20220326d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAd Hoc Networks and Tools for IT $e13th EAI International Conference, ADHOCNETS 2021, Virtual Event, December 6?7, 2021, and 16th EAI International Conference, TRIDENTCOM 2021, Virtual Event, November 24, 2021, Proceedings /$fedited by Wei Bao, Xingliang Yuan, Longxiang Gao, Tom H. Luan, David Bong Jun Choi 205 $a1st ed. 2022. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2022. 215 $a1 online resource (333 pages) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v428 311 08$aPrint version: Bao, Wei Ad Hoc Networks and Tools for IT Cham : Springer International Publishing AG,c2022 9783030980047 320 $aIncludes bibliographical references and index. 327 $aNetwork Routing -- Analysis of Routing Attacks in FANET -- Context-Aware Routing and Forwarding Model for NDN-based VANET -- A Novel Adaptive Hello Mechanism based Geographic Routing Protocol for FANETs -- Network Security 4 Evaluation of Denial of Service Attacks in Software Defined-Cognitive Radio Networks -- The Evaluation of the Two Detection Algorithms for Distributed Denial of Service Attack -- Investigating the effectiveness of Spectrum Sensing Data Falsification Attacks Defense Mechanisms in Cognitive Radio Ad hoc Networks -- Active attack that exploits biometric similarity difference and basic countermeasures -- Network Protocols -- LEACH-S enhancement to ensure WSN stability -- M-ODD: A Standard Protocol for Reporting MANET Related Models, Simulations, and Findings -- Frame Design for Adaptability in Long-range Underwater Communication -- Adaptive Data Rate Based Congestion Control in Vehicular Ad Hoc Networks (VANET) -- Network Applications -- Analyzing Aggregate User Behavior on a LargeMulti-platform Content Distribution Service -- An AI-based Transmission Power-control Certificate Omission in Vehicular Ad-Hoc Networks -- Dynamic Ephemeral and Session Key Generation Protocol for Next Generation Smart Grids -- A Blockchain-Based Data-Sharing Scheme for Inter[1]Vehicular Safety Applications -- A Trust-based and Secure Real-Time Traffic Information Sharing Scheme -- TuneIn: Framework Design and Implementation for Education Using Dynamic Difficulty Adjustment Based on Deep Reinforcement Learning and Mathematical Approach -- P-sharding: Streamline emergency medical transactions via priority sharding -- BiDKT: Deep Knowledge Tracing with BERT -- Vision - An innovative management system based on private DLT -- Value-aware Collaborative Data Pricing for Federated Learning in Vehicular Networks -- Dual Scheme Privacy-Preserving Approach for Location[1]Aware Application in Edge Computing -- Survey on Bridge Discovery in Tor. 330 $aThis book constitutes the refereed post-conference proceedings of the 13th International Conference on Ad Hoc Networks, ADHOCNETS 2021, held in December 2021, and the 16th International Conference on Tools for Design, Implementation and Verification of Emerging Information Technologies, TRIDENTCOM 2021, held in November 2021. Both conferences were held virtually due to COVID 19 pandemic. The 15 full papers of ADHOCNETS 2021 were selected from 29 submissions and cover a variety of network paradigms including ad hoc networks (MANETs), wireless sensor networks (WSNs), vehicular ad hoc networks (Vanets), airborne networks, underwater networks, underground networks, personal area networks, and home networks, etc. It promises a wide range of applications in civilian, commercial, and military areas. The 18 full papers were selected from 47 submissions and deal the emerging technologies such as Industry 4.0, blockchain,deep learning, cloud/edge/fog computing, cyber physical systems, cybersecurity and computer communications. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v428 606 $aComputer networks 606 $aCoding theory 606 $aInformation theory 606 $aComputer systems 606 $aApplication software 606 $aData protection 606 $aComputer Communication Networks 606 $aCoding and Information Theory 606 $aComputer System Implementation 606 $aComputer and Information Systems Applications 606 $aData and Information Security 615 0$aComputer networks. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aComputer systems. 615 0$aApplication software. 615 0$aData protection. 615 14$aComputer Communication Networks. 615 24$aCoding and Information Theory. 615 24$aComputer System Implementation. 615 24$aComputer and Information Systems Applications. 615 24$aData and Information Security. 676 $a004.685 676 $a004.685 702 $aBao$b Wei 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910556886003321 996 $aAd hoc networks and tools for IT$92968982 997 $aUNINA