top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
The 2005 Symposium on Applications and the Internet : Trento, Italy, January 31 - February 4, 2005
The 2005 Symposium on Applications and the Internet : Trento, Italy, January 31 - February 4, 2005
Pubbl/distr/stampa [Place of publication not identified], : IEEE Computer Society, 2005
Disciplina 004.6/78
Soggetto topico Internet
World Wide Web
Electrical & Computer Engineering
Telecommunications
Engineering & Applied Sciences
ISBN 1-5386-0082-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996202258003316
[Place of publication not identified], : IEEE Computer Society, 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
The 2005 Symposium on Applications and the Internet : Trento, Italy, January 31 - February 4, 2005
The 2005 Symposium on Applications and the Internet : Trento, Italy, January 31 - February 4, 2005
Pubbl/distr/stampa [Place of publication not identified], : IEEE Computer Society, 2005
Disciplina 004.6/78
Soggetto topico Internet
World Wide Web
Electrical & Computer Engineering
Telecommunications
Engineering & Applied Sciences
ISBN 1-5386-0082-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910146542603321
[Place of publication not identified], : IEEE Computer Society, 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Distributed Computing and Internet Technology [[electronic resource] ] : First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004, Proceedings / / edited by R.K. Ghosh, Hrushikesha Mohanty
Distributed Computing and Internet Technology [[electronic resource] ] : First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004, Proceedings / / edited by R.K. Ghosh, Hrushikesha Mohanty
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XX, 474 p.)
Disciplina 004.6/78
Collana Lecture Notes in Computer Science
Soggetto topico Computer programming
Computer communication systems
Software engineering
Algorithms
Application software
Information storage and retrieval
Programming Techniques
Computer Communication Networks
Software Engineering
Algorithm Analysis and Problem Complexity
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
ISBN 3-540-30555-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Plenary Talk – I -- Taming the Dynamics of Disributed Data -- DISTRIBUTED COMPUTING -- Data in Your Space -- Enabling Technologies for Harnessing Information Explosion -- Fair Leader Election by Randomized Voting -- An Efficient Leader Election Algorithm for Mobile Ad Hoc Networks -- Distributed Balanced Tables: A New Approach -- Performance Evaluation of Gigabit Ethernet and SCI in a Linux Cluster -- Performance Evaluation of a Modified-Cyclic-Banyan Based ATM / IP Switching Fabric -- A Scalable and Robust QoS Architecture for WiFi P2P Networks -- NEC: Node Energy Based Clustering Protocol for Wireless Sensor Networks with Guaranteed Connectivity -- Energy Efficient Cache Invalidation in a Disconnected Mobile Environment -- An Efficient Data Dissemination Schemes for Location Dependent Information Services -- A Publish / Subscribe Based Architecture of an Alert Server to Support Prioritized and Persistent Alerts -- A Nested Transaction Model for LDAP Transactions -- Team Transaction: A New Transaction Model for Mobile Ad Hoc Networks -- An Efficient Protocol for Checkpoint-Based Failure Recovery in Distributed Systems -- Cybersecurity: Opportunities and Challenges -- INTERNET TECHNOLOGY -- Vulnerabilities and Threats in Distributed Systems -- A TNATS Approach to Hidden Web Documents -- Querying XML Documents from a Relational Database in the Presence of DTDs -- SAQI: Semantics Aware Query Interface -- Hybrid-Chord: A Peer-to-Peer System Based on Chord -- A Generic and Flexible Model for Replica Consistency Management -- An Efficient Distributed Scheme for Source Routing Protocol in Communication Networks -- The Roles of Ontology and Metadata Registry for Interoperable Databases -- DHL: Semantically Rich Dynamic and Active Hyperlinks -- User-Class Based Service Acceptance Policy Using Cluster Analysis -- SOFTWARE ENGINEERING -- Tools and Techniques for Multi-site Software Development -- Specifying a Mobile Computing Infrastructure and Services -- Generating a Prototype from a UML Model of System Requirements -- A Type System for an Aspect Oriented Programming Language -- Secure Requirements Elicitation Through Triggered Message Sequence Charts -- Framework for Safe Reuse of Software Binaries -- Supporting Partial Component Matching -- A Novel Approach for Dynamic Slicing of Distributed Object-Oriented Programs -- Pattern Semantic Link: A Reusable Pattern Representation in MDA Context -- Compatibility Test and Adapter Generation for Interfaces of Software Components -- A Modern Graphic Flowchart Layout Tool -- SYSTEMS SECURITY -- A Flexible Authorization Framework for E-Commerce -- Efficient Algorithms for Intrusion Detection -- Proxi-Annotated Control Flow Graphs: Deterministic Context-Sensitive Monitoring for Intrusion Detection -- Using Schemas to Simplify Access Control for XML Documents -- Automatic Enforcement of Access Control Policies Among Dynamic Coalitions -- Implementing Consistency Checking in Correlating Attacks -- LSAD: Lightweight SYN Flooding Attack Detector -- UGSP: Secure Key Establishment Protocol for Ad-Hoc Networks -- Tracing Attackers with Deterministic Edge Router Marking (DERM) -- Distributing Key Updates in Secure Dynamic Groups -- Succinct and Fast Accessible Data Structures for Database Damage Assessment -- A Secure Checkpointing Protocol for Survivable Server Design -- MobiCoin: Digital Cash for M-Commerce -- Cellular Automata: An Ideal Candidate for a Block Cipher -- NFD Technique for Efficient and Secured Information Hiding in Low Resolution Images -- WORKSHOP ON DATAMINING, SECURITY & APPLICATION -- Improving Feature Selection in Anomaly Intrusion Detection Using Specifications -- Towards Automatic Learning of Valid Services for Honeypots.
Record Nr. UNISA-996466074303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Distributed computing and internet technology : first International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004 : proceedings / / R.K. Ghosh, Hrushikesha Mohanty (eds.)
Distributed computing and internet technology : first International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004 : proceedings / / R.K. Ghosh, Hrushikesha Mohanty (eds.)
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, : Springer, 2004
Descrizione fisica 1 online resource (XX, 474 p.)
Disciplina 004.6/78
Altri autori (Persone) GhoshR. K
MohantyHrushikesha
Collana Lecture notes in computer science
Soggetto topico Electronic data processing - Distributed processing
Internet
ISBN 3-540-30555-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Plenary Talk – I -- Taming the Dynamics of Disributed Data -- DISTRIBUTED COMPUTING -- Data in Your Space -- Enabling Technologies for Harnessing Information Explosion -- Fair Leader Election by Randomized Voting -- An Efficient Leader Election Algorithm for Mobile Ad Hoc Networks -- Distributed Balanced Tables: A New Approach -- Performance Evaluation of Gigabit Ethernet and SCI in a Linux Cluster -- Performance Evaluation of a Modified-Cyclic-Banyan Based ATM / IP Switching Fabric -- A Scalable and Robust QoS Architecture for WiFi P2P Networks -- NEC: Node Energy Based Clustering Protocol for Wireless Sensor Networks with Guaranteed Connectivity -- Energy Efficient Cache Invalidation in a Disconnected Mobile Environment -- An Efficient Data Dissemination Schemes for Location Dependent Information Services -- A Publish / Subscribe Based Architecture of an Alert Server to Support Prioritized and Persistent Alerts -- A Nested Transaction Model for LDAP Transactions -- Team Transaction: A New Transaction Model for Mobile Ad Hoc Networks -- An Efficient Protocol for Checkpoint-Based Failure Recovery in Distributed Systems -- Cybersecurity: Opportunities and Challenges -- INTERNET TECHNOLOGY -- Vulnerabilities and Threats in Distributed Systems -- A TNATS Approach to Hidden Web Documents -- Querying XML Documents from a Relational Database in the Presence of DTDs -- SAQI: Semantics Aware Query Interface -- Hybrid-Chord: A Peer-to-Peer System Based on Chord -- A Generic and Flexible Model for Replica Consistency Management -- An Efficient Distributed Scheme for Source Routing Protocol in Communication Networks -- The Roles of Ontology and Metadata Registry for Interoperable Databases -- DHL: Semantically Rich Dynamic and Active Hyperlinks -- User-Class Based Service Acceptance Policy Using Cluster Analysis -- SOFTWARE ENGINEERING -- Tools and Techniques for Multi-site Software Development -- Specifying a Mobile Computing Infrastructure and Services -- Generating a Prototype from a UML Model of System Requirements -- A Type System for an Aspect Oriented Programming Language -- Secure Requirements Elicitation Through Triggered Message Sequence Charts -- Framework for Safe Reuse of Software Binaries -- Supporting Partial Component Matching -- A Novel Approach for Dynamic Slicing of Distributed Object-Oriented Programs -- Pattern Semantic Link: A Reusable Pattern Representation in MDA Context -- Compatibility Test and Adapter Generation for Interfaces of Software Components -- A Modern Graphic Flowchart Layout Tool -- SYSTEMS SECURITY -- A Flexible Authorization Framework for E-Commerce -- Efficient Algorithms for Intrusion Detection -- Proxi-Annotated Control Flow Graphs: Deterministic Context-Sensitive Monitoring for Intrusion Detection -- Using Schemas to Simplify Access Control for XML Documents -- Automatic Enforcement of Access Control Policies Among Dynamic Coalitions -- Implementing Consistency Checking in Correlating Attacks -- LSAD: Lightweight SYN Flooding Attack Detector -- UGSP: Secure Key Establishment Protocol for Ad-Hoc Networks -- Tracing Attackers with Deterministic Edge Router Marking (DERM) -- Distributing Key Updates in Secure Dynamic Groups -- Succinct and Fast Accessible Data Structures for Database Damage Assessment -- A Secure Checkpointing Protocol for Survivable Server Design -- MobiCoin: Digital Cash for M-Commerce -- Cellular Automata: An Ideal Candidate for a Block Cipher -- NFD Technique for Efficient and Secured Information Hiding in Low Resolution Images -- WORKSHOP ON DATAMINING, SECURITY & APPLICATION -- Improving Feature Selection in Anomaly Intrusion Detection Using Specifications -- Towards Automatic Learning of Valid Services for Honeypots.
Altri titoli varianti ICDCIT 2004
Record Nr. UNINA-9910483416703321
Berlin, : Springer, 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wired/Wireless Internet Communications [[electronic resource] ] : 6th International Conference, WWIC 2008 Tampere, Finland, May 28-30, 2008 Proceedings / / edited by Jarmo Harju, Geert Heijenk, Peter Langendörfer, Vasilios Siris
Wired/Wireless Internet Communications [[electronic resource] ] : 6th International Conference, WWIC 2008 Tampere, Finland, May 28-30, 2008 Proceedings / / edited by Jarmo Harju, Geert Heijenk, Peter Langendörfer, Vasilios Siris
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (XII, 225 p.)
Disciplina 004.6/78
Collana Computer Communication Networks and Telecommunications
Soggetto topico Computer communication systems
Application software
Software engineering
Computer security
Personal computers
Electrical engineering
Computer Communication Networks
Information Systems Applications (incl. Internet)
Software Engineering
Systems and Data Security
Personal Computing
Communications Engineering, Networks
ISBN 3-540-68807-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Performance Analysis of Wireless Systems -- A New CAC Policy Based on Traffic Characterization in Cellular Networks -- Cross-Layer Modeling of TCP SACK Performance over Wireless Channels with Completely Reliable ARQ/FEC -- Flow Level Performance Comparison of Packet Scheduling Schemes for UMTS EUL -- Resource and QoS Management -- A Hybrid Fault-Tolerant Algorithm for MPLS Networks -- Reliable Signalling Transport in Next Generation Networks -- An Experimental Investigation of the End-to-End QoS of the Apple Darwin Streaming Server -- Implementation Techniques -- An Encryption-Enabled Network Protocol Accelerator -- Freemote Emulator: A Lightweight and Visual Java Emulator for WSN -- An Efficient IP Lookup Architecture with Fast Update Using Single-Match TCAMs -- Mobility -- OMEN – A New Paradigm for Optimal Network Mobility -- Security and Accounting Enhancements for Roaming in IMS -- An Experimental Evaluation of a HIP Based Network Mobility Scheme -- Cross-Layer Design -- Service Discovery Framework for MANETs Using Cross-Layered Design -- Cross-Layer Designs Architecture for LEO Satellite Ad Hoc Network -- Wireless Sensor Networks -- MARWIS: A Management Architecture for Heterogeneous Wireless Sensor Networks -- Experiences from Two Sensor Network Deployments — Self-monitoring and Self-configuration Keys to Success -- Energy-Efficient Multiple Routing Trees for Aggregate Query Evaluation in Sensor Networks -- A Collaborative Localization Scheme from Connectivity in Wireless Sensor Networks.
Record Nr. UNISA-996465579903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Wired/wireless internet communications : 6th international conference, WWIC 2008, Tampere, Finland, May 28-30, 2008 : proceedings / / Jarmo Harju ... [et al.] (eds.)
Wired/wireless internet communications : 6th international conference, WWIC 2008, Tampere, Finland, May 28-30, 2008 : proceedings / / Jarmo Harju ... [et al.] (eds.)
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer, c2008
Descrizione fisica 1 online resource (XII, 225 p.)
Disciplina 004.6/78
Altri autori (Persone) HarjuJarmo
Collana Lecture notes in computer science
LNCS sublibrary. SL 5, Computer communication networks and telecommunications
Soggetto topico Wireless Internet
Mobile communication systems
ISBN 3-540-68807-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Performance Analysis of Wireless Systems -- A New CAC Policy Based on Traffic Characterization in Cellular Networks -- Cross-Layer Modeling of TCP SACK Performance over Wireless Channels with Completely Reliable ARQ/FEC -- Flow Level Performance Comparison of Packet Scheduling Schemes for UMTS EUL -- Resource and QoS Management -- A Hybrid Fault-Tolerant Algorithm for MPLS Networks -- Reliable Signalling Transport in Next Generation Networks -- An Experimental Investigation of the End-to-End QoS of the Apple Darwin Streaming Server -- Implementation Techniques -- An Encryption-Enabled Network Protocol Accelerator -- Freemote Emulator: A Lightweight and Visual Java Emulator for WSN -- An Efficient IP Lookup Architecture with Fast Update Using Single-Match TCAMs -- Mobility -- OMEN – A New Paradigm for Optimal Network Mobility -- Security and Accounting Enhancements for Roaming in IMS -- An Experimental Evaluation of a HIP Based Network Mobility Scheme -- Cross-Layer Design -- Service Discovery Framework for MANETs Using Cross-Layered Design -- Cross-Layer Designs Architecture for LEO Satellite Ad Hoc Network -- Wireless Sensor Networks -- MARWIS: A Management Architecture for Heterogeneous Wireless Sensor Networks -- Experiences from Two Sensor Network Deployments — Self-monitoring and Self-configuration Keys to Success -- Energy-Efficient Multiple Routing Trees for Aggregate Query Evaluation in Sensor Networks -- A Collaborative Localization Scheme from Connectivity in Wireless Sensor Networks.
Altri titoli varianti WWIC 2008
Record Nr. UNINA-9910146295003321
Berlin ; ; New York, : Springer, c2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui