top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Computer Networks and Inventive Communication Technologies : Proceedings of Fourth ICCNCT 2021
Computer Networks and Inventive Communication Technologies : Proceedings of Fourth ICCNCT 2021
Autore Smys S
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2021
Descrizione fisica 1 online resource (889 pages)
Altri autori (Persone) BestakRobert
PalanisamyRam
KotuliakIvan
Collana Lecture Notes on Data Engineering and Communications Technologies Ser.
Soggetto genere / forma Electronic books.
ISBN 981-16-3728-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Computer Networks and Inventive Communication Technologies
Record Nr. UNINA-9910502635103321
Smys S  
Singapore : , : Springer Singapore Pte. Limited, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data intelligence and cognitive informatics : proceedings of ICDICI 2021 / / edited by I. Jeena Jacob, Selvanayaki Kolandapalayam Shanmugam, and Robert Bestak
Data intelligence and cognitive informatics : proceedings of ICDICI 2021 / / edited by I. Jeena Jacob, Selvanayaki Kolandapalayam Shanmugam, and Robert Bestak
Pubbl/distr/stampa Singapore : , : Springer, , [2022]
Descrizione fisica 1 online resource (843 pages)
Disciplina 006.312
Collana Algorithms for Intelligent Systems
Soggetto topico Data mining
ISBN 981-16-6460-9
981-16-6459-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910743215603321
Singapore : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
International Conference on Computer Networks and Communication Technologies : ICCNCT 2018 / / edited by S. Smys, Robert Bestak, Joy Iong-Zong Chen, Ivan Kotuliak
International Conference on Computer Networks and Communication Technologies : ICCNCT 2018 / / edited by S. Smys, Robert Bestak, Joy Iong-Zong Chen, Ivan Kotuliak
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (1,035 pages)
Disciplina 303.4834
Collana Lecture Notes on Data Engineering and Communications Technologies
Soggetto topico Electrical engineering
Computer security
Application software
Communications Engineering, Networks
Systems and Data Security
Information Systems Applications (incl. Internet)
ISBN 981-10-8681-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Centralized Reliability and Security Management of Data in Internet of Things (IoT) with Rule Builder -- Chapter 2: Reliability Evaluation of Wireless Sensor Networks using EERN algorithm -- Chapter 3: Reliable AI based Smart Sensors for Managing Irrigation Resources in Agriculture -- Chapter 4: Dynamic Resource Management through Task Migration in Cloud -- Chapter 5: Modified Rounding Based Approximate Multiplier (MROBA) and MAC Unit Design for Digital Signal Processing -- Chapter 6: Development of Optical Communication Framework with Xilinx Gigabit Transceivers -- Chapter 7: OFDM Implementation on a Software Defined Radio Platform -- Chapter 8: Enhanced Equally Distributed Cluster Head Technique for Cluster Head Selection -- Chapter 9: Design of Cylindrical Mushroom like EBG-PRS Antenna for Enhanced Gain for Wi-Max Applications -- Chapter 10: Industrial Parameters Monitoring & Control with IoT.
Record Nr. UNINA-9910337654003321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Inventive Computation Technologies / / edited by S. Smys, Robert Bestak, Álvaro Rocha
Inventive Computation Technologies / / edited by S. Smys, Robert Bestak, Álvaro Rocha
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (949 pages)
Disciplina 004
Collana Lecture Notes in Networks and Systems
Soggetto topico Control engineering
Machine learning
System theory
Robotics
Automation
Control and Systems Theory
Machine Learning
Systems Theory, Control
Robotics and Automation
ISBN 3-030-33846-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910482973803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Mobile Computing and Sustainable Informatics : Proceedings of ICMCSI 2021
Mobile Computing and Sustainable Informatics : Proceedings of ICMCSI 2021
Autore Shakya Subarna
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2021
Descrizione fisica 1 online resource (864 pages)
Altri autori (Persone) BestakRobert
PalanisamyRam
KamelKhaled A
Collana Lecture Notes on Data Engineering and Communications Technologies Ser.
Soggetto genere / forma Electronic books.
ISBN 981-16-1866-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Acknowledgements -- Contents -- About the Editors -- Mitigating the Latency Induced Delay in IP Telephony Through an Enhanced De-Jitter Buffer -- 1 Introduction -- 1.1 Problem Formulation -- 2 Relevant Works -- 3 VOIP Technique and Network Structure -- 3.1 Media Gateways and Call Managers -- 3.2 Topologies -- 3.3 Session Initiation Protocol (SIP) -- 3.4 SIP Elements -- 4 Limitations -- 5 The Proposed Solution -- 5.1 Modification in De-Jitter Buffer -- 6 Results and Analysis -- 7 Conclusion -- References -- A Cyber-Safety IoT-Enabled Wearable Microstrip Antenna for X-Band Applications -- 1 Introduction -- 2 Existing Approach -- 3 Antenna Design -- 3.1 Antenna Configuration -- 3.2 Antenna Performance -- 3.3 Simulated Results -- 3.4 Measured Results -- 4 Conclusion and Future Work -- References -- Keyword Recognition from EEG Signals on Smart Devices a Novel Approach -- 1 Introduction -- 2 Materials and Methods -- 2.1 Overview -- 2.2 Data Acquisition -- 2.3 Data Preprocessing -- 3 Feature Extraction -- 3.1 DWT Feature Extraction -- 3.2 FFT Feature Extraction -- 3.3 Feature Fusion -- 3.4 Dimensionality Reduction -- 3.5 Command Map Table and Task Observer Thread -- 3.6 Tools and Software -- 4 Classifiers Used -- 4.1 SVM Classifier -- 4.2 KNN Classification -- 4.3 CNN Classifier -- 4.4 Random Forest -- 4.5 Performance Measure -- 5 Results and Discussion -- 6 Conclusion -- References -- Security Analysis for Sybil Attack in Sensor Network Using Compare and Match-Position Verification Method -- 1 Introduction -- 2 Sybil Attach and Security -- 2.1 WSN on Security Attacks -- 2.2 Sybil the Attack -- 3 Compare with Match-Position and Verification of Method -- 4 Message Authentication and Passing (MAP) -- 5 Result and Discussion -- 6 Conclusion -- References -- Certain Strategic Study on Machine Learning-Based Graph Anomaly Detection.
1 Introduction -- 2 Generalized Machine Learning Approaches Towards Outlier Detection -- 2.1 Key Challenges Identified in ML Techniques -- 3 Graph-Based Anomaly Detection Methods -- 3.1 Moving Towards Graph Representation -- 3.2 Existing Graph Basis Anomaly Detection Methods (GBAD) -- 3.3 Baseline Link Analysis Ranking Algorithms -- 3.4 Structure-Based Graph Anomaly Score Through Labelling/Ranking Strategy -- 3.5 Community-Based Graph Anomaly Score Through Labelling/Ranking Strategy -- 3.6 Graph Compression Strategies -- 4 Open Challenges in GBAD -- 5 Concluding Remarks -- References -- Machine Learning Perspective in VLSI Computer-Aided Design at Different Abstraction Levels -- 1 Introduction to Machine Learning and VLSI CAD -- 2 The Basic Paradigm of Machine Learning -- 3 Areas of Machine Learning -- 4 Machine Learning Algorithms -- 5 Drawbacks of Machine Learning -- 6 Application of Machine Learning in VLSI CAD Abtraction Levels -- 6.1 Machine Learning in Automatic Generation of Assertion in RTL Design -- 6.2 Machine Learning in Chip Testing -- 6.3 Machine Learning for Physical Design Routing -- 6.4 Machine Learning in Physical Design Floor Planning -- 6.5 Machine Learning in Static Timimg Analysis (STA) -- 6.6 Machine Learning in Gate-Level Netlist -- 6.7 Machine Learning in EDA and IC Design -- 7 Conclusion and Future Scope -- References -- A Practical Approach to Measure Data Centre Efficiency Usage Effectiveness -- 1 Introduction -- 2 Energy Versus Power -- 2.1 IT Load -- 2.2 Effect of Outdoor Condition -- 2.3 User Configuration -- 2.4 Product Review Analysis -- 3 Related Work -- 4 Proposed Work -- 5 Result Analysis -- 6 Conclusion -- References -- Advancing e-Government Using Internet of Things -- 1 Introduction -- 2 Social Networks and Machine Learning -- 3 Health Care -- 4 Agriculture -- 4.1 Six-Layer IoT-Based Model [4-6] (Shown in Fig. 3).
4.2 Role of Unmanned Aerial Vehicles (UAVs) -- 5 Voting -- 5.1 IoT-Based Voting Framework -- 5.2 Fingerprint Matching Algorithm -- 5.3 Security -- 6 "Smart" Government? -- 7 Future Prospects -- References -- A New Network Forensic Investigation Process Model -- 1 Introduction -- 1.1 Forensic Science -- 1.2 Network Forensics -- 1.3 Need of Network Forensics -- 2 Literature Survey -- 3 Proposed Network Forensic Investigation Process Model -- 3.1 Network Forensic Readiness Module -- 3.2 Security Incident Alert Module -- 3.3 Data Acquisition Module -- 3.4 Forensic Investigation Module -- 3.5 Presentation Module -- 4 Conclusion -- References -- MDTA: A New Approach of Supervised Machine Learning for Android Malware Detection and Threat Attribution Using Behavioral Reports -- 1 Introduction -- 2 Literature Survey -- 3 System Methodology -- 4 System Design -- 5 System Algorithm -- 5.1 Build Model Algorithm -- 5.2 Feature Extraction Algorithm -- 5.3 Prediction Algorithm -- 6 System Implementation -- 6.1 Data Flow Diagram -- 6.2 Sequence Diagram -- 7 Result Analysis -- 7.1 Accuracy of Malware Detection -- 7.2 Accuracy of Threat Attribution -- 8 Experimentation -- 9 Discussion -- 10 Conclusion -- References -- Investigating the Role of User Experience and Design in Recommender Systems: A Pragmatic Review -- 1 Introduction -- 2 Related Work -- 3 Overview of Usability Engineering -- 4 Experimental Set-Up -- 5 Findings -- 6 Proposed Model -- 7 Conclusion -- 8 Future Scope -- References -- A Review on Intrusion Detection Approaches in Resource-Constrained IoT Environment -- 1 Introduction -- 2 Review of Intrusion Detection Frameworks for IoT -- 3 Open Issues -- 4 Discussion on Open Issues and Future Research Direction -- 5 Conclusion -- References -- Future 5G Mobile Network Performance in Webservices with NDN Technology -- 1 Introduction -- 2 Literature Review.
3 Network Testing Considered in Signal Error Detection and Correction Format -- 4 System Analysis -- 5 Enhanced System Design -- 5.1 Steps for Performance Improvements and Existing Analysis -- 5.2 Steps for Overcoming the Issues -- 5.3 Algorithm Equations and Operational Methods -- 6 Conclusion -- References -- Survey for Electroencephalography EEG Signal Classification Approaches -- 1 Introduction -- 1.1 Motivation -- 1.2 Survey Strategy and Evaluation -- 1.3 Paper Organization -- 2 Support Vector Machine for EEG Classification -- 3 Artificial Neural Network (ANN) for EEG Classification -- 4 Convolution Neural Network (CNN) for EEG Classification -- 5 K-Nearest Neighbor (K-NN) for EEG Classification -- 6 Linear Discriminant Analysis (LDA) for EEG Classification -- 7 Multi-classifier Approaches for EEG Classification -- 8 Other Models for EEG Classification -- 9 Analysis and Evaluation -- 10 Conclusion -- References -- Analysis of Road Accidents Using Data Mining Paradigm -- 1 Introduction -- 2 Data and Methods -- 2.1 Data Description -- 2.2 Apriori Algorithm -- 3 Results and Discussion -- 3.1 Road Type -- 3.2 Intoxication -- 4 Conclusions -- References -- Hybrid Approach to Cross-Platform Mobile Interface Development for IAAS -- 1 Introduction -- 2 State of the Art on IAAS -- 2.1 General Mechanism of IAAS -- 2.2 Implementation of IAAS -- 3 State of the Art on Mobile Development Approaches -- 3.1 Native Approach -- 3.2 Web Approach -- 3.3 Hybrid Approach -- 4 Comparative Study and Mobile Solution Proposition for IAAS -- 4.1 Description of the Interface to Be Developed -- 4.2 Proposed Development Approach -- 5 Implementation and Evaluation -- 5.1 Functional Needs Model and Analysis -- 5.2 Realization of the Proposition -- 5.3 Display Tests and Evaluation of the Solution -- 6 Conclusion -- References.
Self-organizing Data Processing for Time Series Using SPARK -- 1 Introduction -- 2 Problem Definition -- 3 Related Work -- 4 Proposed Work -- 5 Results and Evaluation -- 5.1 Data and Preprocessing -- 5.2 Experimental Setup -- 5.3 Results -- 6 Conclusion -- References -- An Experimental Investigation of PCA-Based Intrusion Detection Approach Utilizing Machine Learning Algorithms -- 1 Introduction -- 1.1 Kinds of IDS -- 2 Related Work -- 3 Methodology -- 3.1 Machine Learning Techniques -- 3.2 Principal Component Analysis (PCA) -- 4 Experimental Evaluation -- 4.1 Result and Discussion -- 5 Conclusion -- References -- OpenFlow-Based Dynamic Traffic Distribution in Software-Defined Networks -- 1 Introduction -- 2 Background and Related Studies -- 2.1 Software-Defined Network (SDN) and Openflow -- 2.2 Related Works -- 3 System Design and Implementation -- 3.1 System Architecture -- 3.2 Load Balancing Algorithm -- 4 Performance Evaluation and Results -- 4.1 Performance Parameters -- 4.2 Experimental Environment -- 4.3 Experimental Design -- 4.4 Experimental Results -- 5 Conclusions and Future Works -- References -- A Comparative Study of Classification Algorithms Over Images Using Machine Learning and TensorFlow -- 1 Introduction -- 1.1 Convolutional Neural Networks -- 2 Methodology -- 3 Experimental Results -- 3.1 Model Development -- 3.2 Packages Required -- 4 Conclusion -- References -- Intelligent Routing to Enhance Energy Consumption in Wireless Sensor Network: A Survey -- 1 Introduction -- 2 Wireless Sensor Networks Structure -- 3 The Approaches to Energy Consumption Managment -- 3.1 Intelligent Routing Protocols -- 3.2 Duty Cycle -- 3.3 Data Manipulation -- 3.4 Based on Mobility -- 4 Disscusions -- 5 Conclusions -- References -- Deep Residual Learning for Facial Emotion Recognition -- 1 Introduction -- 1.1 Background -- 2 Related Works.
3 Proposed Methodology.
Altri titoli varianti Mobile Computing and Sustainable Informatics
Record Nr. UNINA-9910497103403321
Shakya Subarna  
Singapore : , : Springer Singapore Pte. Limited, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
NETWORKING 2012 [[electronic resource] ] : 11th International IFIP TC 6 Networking Conference, Prague, Czech Republic, May 21-25, 2012, Proceedings, Part II / / edited by Robert Bestak, Lukas Kencl, Li Erran Li, Joerg Widmer, Hao Yin
NETWORKING 2012 [[electronic resource] ] : 11th International IFIP TC 6 Networking Conference, Prague, Czech Republic, May 21-25, 2012, Proceedings, Part II / / edited by Robert Bestak, Lukas Kencl, Li Erran Li, Joerg Widmer, Hao Yin
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (XXI, 421 p. 182 illus.)
Disciplina 004.6
Collana Computer Communication Networks and Telecommunications
Soggetto topico Computer communication systems
Application software
Algorithms
Software engineering
Management information systems
Computer science
Data encryption (Computer science)
Computer Communication Networks
Information Systems Applications (incl. Internet)
Algorithm Analysis and Problem Complexity
Software Engineering
Management of Computing and Information Systems
Cryptology
ISBN 3-642-30054-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465391603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
NETWORKING 2012 [[electronic resource] ] : 11th International IFIP TC 6 Networking Conference, Prague, Czech Republic, May 21-25, 2012, Proceedings, Part I / / edited by Robert Bestak, Lukas Kencl, Li Erran Li, Joerg Widmer, Hao Yin
NETWORKING 2012 [[electronic resource] ] : 11th International IFIP TC 6 Networking Conference, Prague, Czech Republic, May 21-25, 2012, Proceedings, Part I / / edited by Robert Bestak, Lukas Kencl, Li Erran Li, Joerg Widmer, Hao Yin
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (XXII, 437 p. 191 illus.)
Disciplina 004.6
Collana Computer Communication Networks and Telecommunications
Soggetto topico Computer communication systems
Application software
Algorithms
Software engineering
Management information systems
Computer science
Data encryption (Computer science)
Computer Communication Networks
Information Systems Applications (incl. Internet)
Algorithm Analysis and Problem Complexity
Software Engineering
Management of Computing and Information Systems
Cryptology
ISBN 3-642-30045-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Pt. 1.
Record Nr. UNISA-996465392603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
NETWORKING 2012 Workshops [[electronic resource] ] : International IFIP TC 6 Workshops, ETICS, HetsNets, and CompNets, Held at NETWORKING 2012, Prague, Czech Republic, May 25, 2012, Proceedings / / edited by Zdenek Becvar, Robert Bestak, Lukas Kencl
NETWORKING 2012 Workshops [[electronic resource] ] : International IFIP TC 6 Workshops, ETICS, HetsNets, and CompNets, Held at NETWORKING 2012, Prague, Czech Republic, May 25, 2012, Proceedings / / edited by Zdenek Becvar, Robert Bestak, Lukas Kencl
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (XVI, 158 p. 57 illus.)
Disciplina 004.6
Collana Computer Communication Networks and Telecommunications
Soggetto topico Computer communication systems
Application software
Algorithms
Software engineering
Management information systems
Computer science
Computer simulation
Computer Communication Networks
Information Systems Applications (incl. Internet)
Algorithm Analysis and Problem Complexity
Software Engineering
Management of Computing and Information Systems
Simulation and Modeling
Soggetto genere / forma Conference papers and proceedings.
ISBN 3-642-30039-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Fairness Model for Resource Allocation in Wireless Networks / Huaizhou Shi, R. Venkatesha Prasad, Vijay S. Rao and I. G. M. M. Niemegeers -- An Extension and Cooperation Mechanism for Heterogeneous Overlay Networks / Vincenzo Ciancaglini, Luigi Liquori, Giang Ngo Hoang and Petar Maksimović -- Dynamic Pricing Coalitional Game for Cognitive Radio Networks / Yong Xiao and Luiz A. DaSilva -- Evaluation of ON-OFF Schemes and Linear Prediction Methods for Increasing Energy Efficiency in Mobile Broadband Networks / Dario Sabella, Marco Caretti, William Tomaselli, Valerio Palestini and Bruno Cendón, et al. -- Challenge-Aware Traffic Protection in Wireless Mobile Backhaul Networks / Javier Martín-Hernández, Christian Doerr, Johannes Lessmann and Marcus Schöller -- A Distributed Signaling Fast Mobile IPv6 Scheme for Next Generation Heterogeneous IP Networks / Mohtasim Abbassi, Shahbaz Khan and M. Rahman -- Energy Efficiency Gains Using VHOs in Heterogeneous Networks / António Serrador and Luís M. Correia -- Inter-Domain Route Diversity for the Internet / Xavier Misseri, Ivan Gojmerac and Jean-Louis Rougier -- A Proposal of Business Model Design Parameters for Future Internet Carriers / Antonio Ghezzi
Reputation-Aware Learning for SLA Negotiation / Mohamed Lamine Lamali, Dominique Barth and Johanne Cohen -- From Quality of Experience to Willingness to Pay for Interconnection Service Quality / Andreas Sackl, Patrick Zwickl and Peter Reichl -- An Instance-Based Approach for the Quantitative Assessment of Key Value Network Dependencies / Patrick Zwickl and Peter Reichl -- Evaluating Impacts of Oversubscription on Future Internet Business Models / Anand Raju, Vânia Gonçalves, Sven Lindmark and Pieter Ballon -- Inter-domain Coordination Models / Eleni Agiatzidou, Costas Courcoubetis, Olivier Dugeon, Finn-Tore Johansen and George D. Stamoulis -- In Which Content to Specialize? A Game Theoretic Analysis / Eitan Altman -- Estimation of Expectable Network Quality in Wireless Mesh Networks / Till Wollenberg -- Development of Localization Module for Various Smart Devices Platforms / Ondrej Krejcar -- Improved GSM-Based Localization by Incorporating Secondary Network Characteristics / Marek Dvorsky, Libor Michalek, Pavel Moravec and Roman Sebesta -- Visualization of Complex Networks Dynamics: Case Study / Ivan Zelinka, Donald Davendra and Lenka Skanderova -- PCI Planning Strategies for Long Term Evolution Networks / Hakan Kavlak and Hakki Ilk -- Effective Packet Loss Estimation on VoIP Jitter Buffer / Miroslav Voznak, Adrian Kovac and Michal Halas.
Record Nr. UNISA-996465397303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Ubiquitous Computing and Internet of People - Models and Appplications / / A. Pasumpon Pandian, Robert Bestak, and Klimis Ntalianis
Ubiquitous Computing and Internet of People - Models and Appplications / / A. Pasumpon Pandian, Robert Bestak, and Klimis Ntalianis
Autore Pandian A. Pasumpon
Pubbl/distr/stampa [Place of publication not identified] : , : Emerald Publishing Limited, , [2022]
Descrizione fisica 1 online resource (145 pages)
Disciplina 621.384
Collana International Journal of Pervasive Computing and Communications
Soggetto topico Wireless communication systems
Mobile computing - Computer programs
ISBN 1-80382-582-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910795889303321
Pandian A. Pasumpon  
[Place of publication not identified] : , : Emerald Publishing Limited, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Ubiquitous Computing and Internet of People - Models and Appplications / / A. Pasumpon Pandian, Robert Bestak, and Klimis Ntalianis
Ubiquitous Computing and Internet of People - Models and Appplications / / A. Pasumpon Pandian, Robert Bestak, and Klimis Ntalianis
Autore Pandian A. Pasumpon
Pubbl/distr/stampa [Place of publication not identified] : , : Emerald Publishing Limited, , [2022]
Descrizione fisica 1 online resource (145 pages)
Disciplina 621.384
Collana International Journal of Pervasive Computing and Communications
Soggetto topico Wireless communication systems
Mobile computing - Computer programs
ISBN 1-80382-582-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910815175203321
Pandian A. Pasumpon  
[Place of publication not identified] : , : Emerald Publishing Limited, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui