top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Distributed Computing and Networking [[electronic resource] ] : 11th International Conference, ICDCN 2010, Kolkata, India, January 3-6, 2010, Proceedings / / edited by Krishna Kant, Sriram V. Pemmaraju, Krishna M. Sivalingam, Jie Wu
Distributed Computing and Networking [[electronic resource] ] : 11th International Conference, ICDCN 2010, Kolkata, India, January 3-6, 2010, Proceedings / / edited by Krishna Kant, Sriram V. Pemmaraju, Krishna M. Sivalingam, Jie Wu
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XIX, 522 p.)
Disciplina 004.6
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer networks
Computer engineering
Cryptography
Data encryption (Computer science)
Data protection
Electronic digital computers—Evaluation
Algorithms
Computer Communication Networks
Computer Engineering and Networks
Cryptology
Data and Information Security
System Performance and Evaluation
ISBN 1-280-38542-1
9786613563347
3-642-11322-2
Classificazione DAT 250f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynotes -- An Intelligent IT Infrastructure for the Future -- Heavy Tails and Models for the Web and Social Networks -- Data Structures and Algorithms for Packet Forwarding and Classification: Prof. A.K. Choudhury Memorial Lecture -- Spoken Web: A Parallel Web for the Masses: Industry Keynote -- India’s Mobile Revolution and the Unfinished Tasks: Invited Lecture -- Network Protocols and Applications -- Scheduling in Multi-Channel Wireless Networks -- Email Shape Analysis -- Maintaining Safety in Interdomain Routing with Hierarchical Path-Categories -- Fault-tolerance and Security -- On Communication Complexity of Secure Message Transmission in Directed Networks -- On Composability of Reliable Unicast and Broadcast -- A Leader-Free Byzantine Consensus Algorithm -- Authenticated Byzantine Generals in Dual Failure Model -- Sensor Networks -- Mission-Oriented k-Coverage in Mobile Wireless Sensor Networks -- Lessons from the Sparse Sensor Network Deployment in Rural India -- A New Architecture for Hierarchical Sensor Networks with Mobile Data Collectors -- Stability Analysis of Multi-hop Routing in Sensor Networks with Mobile Sinks -- Distributed Algorithms and Optimization -- Optimizing Distributed Computing Workflows in Heterogeneous Network Environments -- Radio Network Distributed Algorithms in the Unknown Neighborhood Model -- Probabilistic Self-stabilizing Vertex Coloring in Unidirectional Anonymous Networks -- A Token-Based Solution to the Group Mutual l-Exclusion Problem in Message Passing Distributed Systems -- Peer-to-Peer Networks and Network Tracing -- The Weak Network Tracing Problem -- Poisoning the Kad Network -- Credit Reputation Propagation: A Strategy to Curb Free-Riding in a Large BitTorrent Swarm -- Formal Understanding of the Emergence of Superpeer Networks: A Complex Network Approach -- Parallel and Distributed Systems -- Parallelization of the Lanczos Algorithm on Multi-core Platforms -- Supporting Malleability in Parallel Architectures with Dynamic CPUSETsMapping and Dynamic MPI -- Impact of Object Operations and Relationships on Concurrency Control in DOOS -- Causal Cycle Based Communication Pattern Matching -- Wireless Networks -- Channel Assignment in Virtual Cut-through Switching Based Wireless Mesh Networks -- Efficient Multi-hop Broadcasting in Wireless Networks Using k-Shortest Path Pruning -- Bandwidth Provisioning in Infrastructure-Based Wireless Networks Employing Directional Antennas -- ROTIO+: A Modified ROTIO for Nested Network Mobility -- Applications of Distributed Systems -- VirtualConnection: Opportunistic Networking for Web on Demand -- Video Surveillance with PTZ Cameras: The Problem of Maximizing Effective Monitoring Time -- DisClus: A Distributed Clustering Technique over High Resolution Satellite Data -- Performance Evaluation of a Wormhole-Routed Algorithm for Irregular Mesh NoC Interconnect -- Optical, Cellular and Mobile Ad Hoc Networks -- Dynamic Multipath Bandwidth Provisioning with Jitter, Throughput, SLA Constraints in MPLS over WDM Network -- Path Protection in Translucent WDM Optical Networks -- Post Deployment Planning of 3G Cellular Networks through Dual Homing of NodeBs -- K-Directory Community: Reliable Service Discovery in MANET -- Theory of Distributed Systems -- An Online, Derivative-Free Optimization Approach to Auto-tuning of Computing Systems -- Consistency-Driven Probabilistic Quorum System Construction for Improving Operation Availability -- Hamiltonicity of a General OTIS Network -- Specifying Fault-Tolerance Using Split Precondition Logic -- Network Protocols -- Fast BGP Convergence Following Link/Router Failure -- On Using Network Tomography for Overlay Availability -- QoSBR: A Quality Based Routing Protocol for Wireless Mesh Networks -- An ACO Based Approach for Detection of an Optimal Attack Path in a Dynamic Environment.
Record Nr. UNISA-996465635703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Distributed Computing and Networking : 11th International Conference, ICDCN 2010, Kolkata, India, January 3-6, 2010, Proceedings / / edited by Krishna Kant, Sriram V. Pemmaraju, Krishna M. Sivalingam, Jie Wu
Distributed Computing and Networking : 11th International Conference, ICDCN 2010, Kolkata, India, January 3-6, 2010, Proceedings / / edited by Krishna Kant, Sriram V. Pemmaraju, Krishna M. Sivalingam, Jie Wu
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XIX, 522 p.)
Disciplina 004.6
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer networks
Computer engineering
Cryptography
Data encryption (Computer science)
Data protection
Electronic digital computers—Evaluation
Algorithms
Computer Communication Networks
Computer Engineering and Networks
Cryptology
Data and Information Security
System Performance and Evaluation
ISBN 1-280-38542-1
9786613563347
3-642-11322-2
Classificazione DAT 250f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynotes -- An Intelligent IT Infrastructure for the Future -- Heavy Tails and Models for the Web and Social Networks -- Data Structures and Algorithms for Packet Forwarding and Classification: Prof. A.K. Choudhury Memorial Lecture -- Spoken Web: A Parallel Web for the Masses: Industry Keynote -- India’s Mobile Revolution and the Unfinished Tasks: Invited Lecture -- Network Protocols and Applications -- Scheduling in Multi-Channel Wireless Networks -- Email Shape Analysis -- Maintaining Safety in Interdomain Routing with Hierarchical Path-Categories -- Fault-tolerance and Security -- On Communication Complexity of Secure Message Transmission in Directed Networks -- On Composability of Reliable Unicast and Broadcast -- A Leader-Free Byzantine Consensus Algorithm -- Authenticated Byzantine Generals in Dual Failure Model -- Sensor Networks -- Mission-Oriented k-Coverage in Mobile Wireless Sensor Networks -- Lessons from the Sparse Sensor Network Deployment in Rural India -- A New Architecture for Hierarchical Sensor Networks with Mobile Data Collectors -- Stability Analysis of Multi-hop Routing in Sensor Networks with Mobile Sinks -- Distributed Algorithms and Optimization -- Optimizing Distributed Computing Workflows in Heterogeneous Network Environments -- Radio Network Distributed Algorithms in the Unknown Neighborhood Model -- Probabilistic Self-stabilizing Vertex Coloring in Unidirectional Anonymous Networks -- A Token-Based Solution to the Group Mutual l-Exclusion Problem in Message Passing Distributed Systems -- Peer-to-Peer Networks and Network Tracing -- The Weak Network Tracing Problem -- Poisoning the Kad Network -- Credit Reputation Propagation: A Strategy to Curb Free-Riding in a Large BitTorrent Swarm -- Formal Understanding of the Emergence of Superpeer Networks: A Complex Network Approach -- Parallel and Distributed Systems -- Parallelization of the Lanczos Algorithm on Multi-core Platforms -- Supporting Malleability in Parallel Architectures with Dynamic CPUSETsMapping and Dynamic MPI -- Impact of Object Operations and Relationships on Concurrency Control in DOOS -- Causal Cycle Based Communication Pattern Matching -- Wireless Networks -- Channel Assignment in Virtual Cut-through Switching Based Wireless Mesh Networks -- Efficient Multi-hop Broadcasting in Wireless Networks Using k-Shortest Path Pruning -- Bandwidth Provisioning in Infrastructure-Based Wireless Networks Employing Directional Antennas -- ROTIO+: A Modified ROTIO for Nested Network Mobility -- Applications of Distributed Systems -- VirtualConnection: Opportunistic Networking for Web on Demand -- Video Surveillance with PTZ Cameras: The Problem of Maximizing Effective Monitoring Time -- DisClus: A Distributed Clustering Technique over High Resolution Satellite Data -- Performance Evaluation of a Wormhole-Routed Algorithm for Irregular Mesh NoC Interconnect -- Optical, Cellular and Mobile Ad Hoc Networks -- Dynamic Multipath Bandwidth Provisioning with Jitter, Throughput, SLA Constraints in MPLS over WDM Network -- Path Protection in Translucent WDM Optical Networks -- Post Deployment Planning of 3G Cellular Networks through Dual Homing of NodeBs -- K-Directory Community: Reliable Service Discovery in MANET -- Theory of Distributed Systems -- An Online, Derivative-Free Optimization Approach to Auto-tuning of Computing Systems -- Consistency-Driven Probabilistic Quorum System Construction for Improving Operation Availability -- Hamiltonicity of a General OTIS Network -- Specifying Fault-Tolerance Using Split Precondition Logic -- Network Protocols -- Fast BGP Convergence Following Link/Router Failure -- On Using Network Tomography for Overlay Availability -- QoSBR: A Quality Based Routing Protocol for Wireless Mesh Networks -- An ACO Based Approach for Detection of an Optimal Attack Path in a Dynamic Environment.
Record Nr. UNINA-9910484672003321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Handbook on securing cyber-physical critical infrastructure [[electronic resource] /] / Sajal Das, Krishna Kant, Nan Zhang (editors)
Handbook on securing cyber-physical critical infrastructure [[electronic resource] /] / Sajal Das, Krishna Kant, Nan Zhang (editors)
Edizione [1st edition]
Pubbl/distr/stampa Waltham, Mass., : Elsevier/Morgan Kaufmann, 2012
Descrizione fisica 1 online resource (849 p.)
Disciplina 005.8
Altri autori (Persone) DasSajal K
KantKrishna
ZhangNan <1982->
Soggetto topico Computer networks - Security measures
Computer security
Soggetto genere / forma Electronic books.
ISBN 1-78402-345-0
1-283-43424-5
9786613434241
0-12-415910-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto pt. 1. Theoretical foundations -- pt. 2. Security for wireless mobile networks -- pt. 3. Security for sensor networks -- pt. 4. Platform secruity -- pt. 5. Cloud computing and data security -- pt. 6. Event monitoring and situation awareness -- pt. 7. Policy issues in security management -- pt. 8. Security in real-world systems.
Record Nr. UNINA-9910457887703321
Waltham, Mass., : Elsevier/Morgan Kaufmann, 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Handbook on securing cyber-physical critical infrastructure [[electronic resource] /] / Sajal Das, Krishna Kant, Nan Zhang (editors)
Handbook on securing cyber-physical critical infrastructure [[electronic resource] /] / Sajal Das, Krishna Kant, Nan Zhang (editors)
Edizione [1st edition]
Pubbl/distr/stampa Waltham, Mass., : Elsevier/Morgan Kaufmann, 2012
Descrizione fisica 1 online resource (849 p.)
Disciplina 005.8
Altri autori (Persone) DasSajal K
KantKrishna
ZhangNan <1982->
Soggetto topico Computer networks - Security measures
Computer security
ISBN 1-78402-345-0
1-283-43424-5
9786613434241
0-12-415910-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto pt. 1. Theoretical foundations -- pt. 2. Security for wireless mobile networks -- pt. 3. Security for sensor networks -- pt. 4. Platform secruity -- pt. 5. Cloud computing and data security -- pt. 6. Event monitoring and situation awareness -- pt. 7. Policy issues in security management -- pt. 8. Security in real-world systems.
Record Nr. UNINA-9910778936803321
Waltham, Mass., : Elsevier/Morgan Kaufmann, 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Handbook on securing cyber-physical critical infrastructure / / Sajal Das, Krishna Kant, Nan Zhang (editors)
Handbook on securing cyber-physical critical infrastructure / / Sajal Das, Krishna Kant, Nan Zhang (editors)
Edizione [1st edition]
Pubbl/distr/stampa Waltham, Mass., : Elsevier/Morgan Kaufmann, 2012
Descrizione fisica 1 online resource (849 p.)
Disciplina 005.8
Altri autori (Persone) DasSajal K
KantKrishna
ZhangNan <1982->
Soggetto topico Computer networks - Security measures
Computer security
ISBN 1-78402-345-0
1-283-43424-5
9786613434241
0-12-415910-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto pt. 1. Theoretical foundations -- pt. 2. Security for wireless mobile networks -- pt. 3. Security for sensor networks -- pt. 4. Platform secruity -- pt. 5. Cloud computing and data security -- pt. 6. Event monitoring and situation awareness -- pt. 7. Policy issues in security management -- pt. 8. Security in real-world systems.
Record Nr. UNINA-9910807118903321
Waltham, Mass., : Elsevier/Morgan Kaufmann, 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration
Pubbl/distr/stampa [Place of publication not identified], : ACM, 2010
Descrizione fisica 1 online resource (90 pages)
Collana ACM Conferences
Soggetto topico Electrical & Computer Engineering
Engineering & Applied Sciences
Telecommunications
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti SafeConfig '10
Record Nr. UNINA-9910376004703321
[Place of publication not identified], : ACM, 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Secure Cloud Computing / / edited by Sushil Jajodia, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup, Cliff Wang
Secure Cloud Computing / / edited by Sushil Jajodia, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup, Cliff Wang
Edizione [1st ed. 2014.]
Pubbl/distr/stampa New York, NY : , : Springer New York : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (351 p.)
Disciplina 004
004.6
004.6782
005.7
Soggetto topico Computer security
Application software
Computer communication systems
Computers
Systems and Data Security
Information Systems Applications (incl. Internet)
Computer Communication Networks
Information Systems and Communication Service
ISBN 1-4614-9278-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptographic Key Management Issues and Challenges in Cloud Services -- Costs and Security in Clouds -- Hardware-enhanced Security for Cloud Computing -- Cloud Computing Security: What Changes with Software-Defined Networking? -- Proof of Isolation for Cloud Storage -- Selective and Fine-Grained Access to Data in the Cloud -- Enabling Collaborative Data Authorization Between Enterprise Clouds -- Making Query Execution Over Encrypted Data Practical -- Privacy-preserving Keyword Search over Encrypted Data in Cloud Computing -- Towards Data Confidentiality and a Vulnerability Analysis Framework for Cloud Computing -- Secure Mission-Centric Operations in Cloud Computing -- Computational Decoys for Cloud Security -- Towards Data Confidentiality and a Vulnerability Analysis Framework for Cloud Computing -- Software Cruising: A New Technology for Building Concurrent Software Monitor -- Controllability and Observability of Risk and Resilience in Cyber-Physical Cloud Systems.
Record Nr. UNINA-9910298573503321
New York, NY : , : Springer New York : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui