LEADER 04297nam 22008175 450 001 996465391603316 005 20200705015934.0 010 $a3-642-30054-5 024 7 $a10.1007/978-3-642-30054-7 035 $a(CKB)3400000000085276 035 $a(SSID)ssj0000666550 035 $a(PQKBManifestationID)11955900 035 $a(PQKBTitleCode)TC0000666550 035 $a(PQKBWorkID)10673937 035 $a(PQKB)11498145 035 $a(DE-He213)978-3-642-30054-7 035 $a(MiAaPQ)EBC3070890 035 $a(PPN)168315823 035 $a(EXLCZ)993400000000085276 100 $a20120515d2012 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aNETWORKING 2012$b[electronic resource] $e11th International IFIP TC 6 Networking Conference, Prague, Czech Republic, May 21-25, 2012, Proceedings, Part II /$fedited by Robert Bestak, Lukas Kencl, Li Erran Li, Joerg Widmer, Hao Yin 205 $a1st ed. 2012. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2012. 215 $a1 online resource (XXI, 421 p. 182 illus.) 225 1 $aComputer Communication Networks and Telecommunications ;$v7290 300 $aInternational conference proceedings. 311 $a3-642-30053-7 320 $aIncludes bibliographical references and author index. 330 $aThe two-volume set LNCS 7289 and 7290 constitutes the refereed proceedings of the 11th International IFIP TC 6 Networking Conference held in Prague, Czech Republic, in May 2012. The 64 revised full papers presented were carefully reviewed and selected from a total of 225 submissions. The papers feature innovative research in the areas of network architecture, applications and services, next generation Internet, wireless and sensor networks, and network science. The second volume includes 32 papers and is organized in topical sections on video streaming, peer to peer, interdomain, security, cooperation and collaboration, DTN and wireless sensor networks, and wireless networks. 410 0$aComputer Communication Networks and Telecommunications ;$v7290 606 $aComputer communication systems 606 $aApplication software 606 $aAlgorithms 606 $aSoftware engineering 606 $aManagement information systems 606 $aComputer science 606 $aData encryption (Computer science) 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 615 0$aComputer communication systems. 615 0$aApplication software. 615 0$aAlgorithms. 615 0$aSoftware engineering. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aData encryption (Computer science). 615 14$aComputer Communication Networks. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aSoftware Engineering. 615 24$aManagement of Computing and Information Systems. 615 24$aCryptology. 676 $a004.6 702 $aBestak$b Robert$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKencl$b Lukas$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLi$b Li Erran$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWidmer$b Joerg$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYin$b Hao$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996465391603316 996 $aNETWORKING 2012$92830273 997 $aUNISA