2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom) : 10-14 August 2015, Beijing, China / / Institute of Electrical and Electronics Engineers
| 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom) : 10-14 August 2015, Beijing, China / / Institute of Electrical and Electronics Engineers |
| Pubbl/distr/stampa | Piscataway, New Jersey : , : IEEE, , [2015] |
| Descrizione fisica | 1 online resource (1868 pages) : illustrations |
| Disciplina | 006.3 |
| Soggetto topico |
Artificial intelligence
Autonomic computing Computer networks - Scalability |
| ISBN | 1-4673-7211-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops |
| Record Nr. | UNISA-996280967003316 |
| Piscataway, New Jersey : , : IEEE, , [2015] | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom) : 10-14 August 2015, Beijing, China / / Institute of Electrical and Electronics Engineers
| 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom) : 10-14 August 2015, Beijing, China / / Institute of Electrical and Electronics Engineers |
| Pubbl/distr/stampa | Piscataway, New Jersey : , : IEEE, , [2015] |
| Descrizione fisica | 1 online resource (1868 pages) : illustrations |
| Disciplina | 006.3 |
| Soggetto topico |
Artificial intelligence
Autonomic computing Computer networks - Scalability |
| ISBN | 1-4673-7211-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops |
| Record Nr. | UNINA-9910136972003321 |
| Piscataway, New Jersey : , : IEEE, , [2015] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
2020 IEEE Infrastructure Conference : 7 October-8 October 2020 / / Institute of Electrical and Electronics Engineers
| 2020 IEEE Infrastructure Conference : 7 October-8 October 2020 / / Institute of Electrical and Electronics Engineers |
| Pubbl/distr/stampa | Piscataway, New Jersey : , : IEEE, , 2020 |
| Descrizione fisica | 1 online resource (38 pages) : illustrations |
| Disciplina | 006.3 |
| Soggetto topico |
Artificial intelligence
Computer systems Computer networks - Scalability |
| ISBN | 1-7281-7728-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910469151603321 |
| Piscataway, New Jersey : , : IEEE, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
2020 IEEE Infrastructure Conference : 7 October-8 October 2020 / / Institute of Electrical and Electronics Engineers
| 2020 IEEE Infrastructure Conference : 7 October-8 October 2020 / / Institute of Electrical and Electronics Engineers |
| Pubbl/distr/stampa | Piscataway, New Jersey : , : IEEE, , 2020 |
| Descrizione fisica | 1 online resource (38 pages) : illustrations |
| Disciplina | 006.3 |
| Soggetto topico |
Artificial intelligence
Computer systems Computer networks - Scalability |
| ISBN | 1-7281-7728-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996574644003316 |
| Piscataway, New Jersey : , : IEEE, , 2020 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
A comparison of the performance of two popular symmetric multiprocessors when used to run high performance computing applications [[electronic resource] /] / Daniel M. Pressel ... [and others]
| A comparison of the performance of two popular symmetric multiprocessors when used to run high performance computing applications [[electronic resource] /] / Daniel M. Pressel ... [and others] |
| Pubbl/distr/stampa | Aberdeen Proving Ground, MD : , : Army Research Laboratory, , [2002] |
| Descrizione fisica | 1 online resource (x, 24 pages) : color illustrations |
| Altri autori (Persone) | PresselDaniel M |
| Collana | ARL-TR |
| Soggetto topico |
Multiprocessors - Evaluation
Computer networks - Scalability |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910699702803321 |
| Aberdeen Proving Ground, MD : , : Army Research Laboratory, , [2002] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Designing and developing scalable IP networks [[electronic resource] /] / Guy Davies
| Designing and developing scalable IP networks [[electronic resource] /] / Guy Davies |
| Autore | Davies Guy |
| Pubbl/distr/stampa | Chichester, West Sussex, England ; ; Hoboken, NJ, USA, : Wiley, 2004 |
| Descrizione fisica | 1 online resource (304 p.) |
| Disciplina | 004.6/2 |
| Soggetto topico |
Computer networks - Design and construction
Computer networks - Scalability |
| ISBN |
1-280-27208-2
9786610272082 0-470-30046-9 0-470-86741-8 0-470-86740-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Designing and Developing Scalable IP Networks; Contents; List of Figures; List of Tables; About the Author; Acknowledgements; Abbreviations; Introduction; 1 Hardware Design; 1.1 Separation of Routing and Forwarding Functionality; 1.2 Building Blocks; 1.2.1 Control Module; 1.2.2 Forwarding Module; 1.2.3 Non-Stop Forwarding; 1.2.4 Stateful Failover; 1.3 To Flow or Not to Flow?; 1.4 Hardware Redundancy, Single Chassis or Multi Chassis; 2 Transport Media; 2.1 Maximum Transmission Unit (MTU); 2.1.1 Path MTU Discovery; 2.1.2 Port Density; 2.1.3 Channelized Interfaces; 2.2 Ethernet
2.2.1 Address Resolution Protocol (ARP)2.2.2 MTU; 2.3 Asynchronous Transfer Mode (ATM); 2.4 Packet Over SONET (POS); 2.5 SRP/RPR and DPT; 2.5.1 Intelligent Protection Switching; 2.6 (Fractional) E1/T1/E3/T3; 2.7 Wireless Transport; 2.7.1 Regulatory Constraints; 2.7.2 Interference; 2.7.3 Obstructions; 2.7.4 Atmospheric Conditions; 2.7.5 If it is so bad . . .; 3 Router and Network Management; 3.1 The Importance of an Out-Of-Band (OOB) Network; 3.1.1 Management Ethernet; 3.1.2 Console Port; 3.1.3 Auxiliary (Aux) Port; 3.1.4 Remote Power Management; 3.1.5 Uninterruptible Power Supplies (UPS) 3.2 Network Time Protocol (NTP)3.3 Logging; 3.4 Simple Network Management Protocol (SNMP); 3.4.1 SNMPv1, v2c and v3; 3.5 Remote Monitoring (RMON); 3.6 Network Management Systems; 3.6.1 CiscoWorks; 3.6.2 JUNOScope; 3.6.3 Non-Proprietary Systems; 3.7 Configuration Management; 3.7.1 Concurrent Version System (CVS); 3.7.2 Scripting and Other Automated Configuration Distribution and Storage Mechanisms; 3.8 To Upgrade or Not to Upgrade; 3.8.1 Software Release Cycles; 3.9 Capacity Planning Techniques; 4 Network Security; 4.1 Securing Access to Your Network Devices; 4.1.1 Physical Security 4.1.2 Authentication, Authorization and Accounting (AAA)4.2 Securing Access to the Network Infrastructure; 4.2.1 Authentication of Users, Hosts and Servers; 4.2.2 Encryption of Information; 4.2.3 Access Tools and Protocols; 4.2.4 IP Security (IPsec); 4.2.5 Access Control Lists; 4.2.6 RFC 1918 Addresses; 4.2.7 Preventing and Tracing Denial of Service (DoS) Attacks; 4.3 Protecting Your Own and Others' Network Devices; 5 Routing Protocols; 5.1 Why Different Routing Protocols?; 5.2 Interior Gateway Protocols (IGP); 5.2.1 Open Shortest Path First (OSPF); 5.2.2 Authentication of OSPF 5.2.3 Stub Areas, Not So Stubby Areas (NSSA) and Totally Stubby Areas5.2.4 OSPF Graceful Restart; 5.2.5 OSPFv3; 5.2.6 Intermediate System to Intermediate System (IS-IS); 5.2.7 Authentication of IS-IS; 5.2.8 IS-IS Graceful Restart; 5.2.9 Routing Information Protocol (RIP); 5.2.10 Interior Gateway Routing Protocol (IGRP) and Enhanced Interior Gateway Routing Protocol (EIGRP); 5.2.11 Diffusing Update Algorithm (DUAL); 5.2.12 Stuck-in-Active; 5.2.13 Why use EIGRP?; 5.3 Exterior Protocols; 5.3.1 Border Gateway Protocol (BGP); 5.3.2 Authentication of BGP; 5.3.3 BGP Graceful Restart 5.3.4 Multiprotocol BGP |
| Record Nr. | UNINA-9910143750603321 |
Davies Guy
|
||
| Chichester, West Sussex, England ; ; Hoboken, NJ, USA, : Wiley, 2004 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Designing and developing scalable IP networks / / Guy Davies
| Designing and developing scalable IP networks / / Guy Davies |
| Autore | Davies Guy |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Chichester, West Sussex, England ; ; Hoboken, NJ, USA, : Wiley, 2004 |
| Descrizione fisica | 1 online resource (304 p.) |
| Disciplina | 004.6/2 |
| Soggetto topico |
Computer networks - Design and construction
Computer networks - Scalability |
| ISBN |
9786610272082
9781280272080 1280272082 9780470300466 0470300469 9780470867419 0470867418 9780470867402 047086740X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Designing and Developing Scalable IP Networks; Contents; List of Figures; List of Tables; About the Author; Acknowledgements; Abbreviations; Introduction; 1 Hardware Design; 1.1 Separation of Routing and Forwarding Functionality; 1.2 Building Blocks; 1.2.1 Control Module; 1.2.2 Forwarding Module; 1.2.3 Non-Stop Forwarding; 1.2.4 Stateful Failover; 1.3 To Flow or Not to Flow?; 1.4 Hardware Redundancy, Single Chassis or Multi Chassis; 2 Transport Media; 2.1 Maximum Transmission Unit (MTU); 2.1.1 Path MTU Discovery; 2.1.2 Port Density; 2.1.3 Channelized Interfaces; 2.2 Ethernet
2.2.1 Address Resolution Protocol (ARP)2.2.2 MTU; 2.3 Asynchronous Transfer Mode (ATM); 2.4 Packet Over SONET (POS); 2.5 SRP/RPR and DPT; 2.5.1 Intelligent Protection Switching; 2.6 (Fractional) E1/T1/E3/T3; 2.7 Wireless Transport; 2.7.1 Regulatory Constraints; 2.7.2 Interference; 2.7.3 Obstructions; 2.7.4 Atmospheric Conditions; 2.7.5 If it is so bad . . .; 3 Router and Network Management; 3.1 The Importance of an Out-Of-Band (OOB) Network; 3.1.1 Management Ethernet; 3.1.2 Console Port; 3.1.3 Auxiliary (Aux) Port; 3.1.4 Remote Power Management; 3.1.5 Uninterruptible Power Supplies (UPS) 3.2 Network Time Protocol (NTP)3.3 Logging; 3.4 Simple Network Management Protocol (SNMP); 3.4.1 SNMPv1, v2c and v3; 3.5 Remote Monitoring (RMON); 3.6 Network Management Systems; 3.6.1 CiscoWorks; 3.6.2 JUNOScope; 3.6.3 Non-Proprietary Systems; 3.7 Configuration Management; 3.7.1 Concurrent Version System (CVS); 3.7.2 Scripting and Other Automated Configuration Distribution and Storage Mechanisms; 3.8 To Upgrade or Not to Upgrade; 3.8.1 Software Release Cycles; 3.9 Capacity Planning Techniques; 4 Network Security; 4.1 Securing Access to Your Network Devices; 4.1.1 Physical Security 4.1.2 Authentication, Authorization and Accounting (AAA)4.2 Securing Access to the Network Infrastructure; 4.2.1 Authentication of Users, Hosts and Servers; 4.2.2 Encryption of Information; 4.2.3 Access Tools and Protocols; 4.2.4 IP Security (IPsec); 4.2.5 Access Control Lists; 4.2.6 RFC 1918 Addresses; 4.2.7 Preventing and Tracing Denial of Service (DoS) Attacks; 4.3 Protecting Your Own and Others' Network Devices; 5 Routing Protocols; 5.1 Why Different Routing Protocols?; 5.2 Interior Gateway Protocols (IGP); 5.2.1 Open Shortest Path First (OSPF); 5.2.2 Authentication of OSPF 5.2.3 Stub Areas, Not So Stubby Areas (NSSA) and Totally Stubby Areas5.2.4 OSPF Graceful Restart; 5.2.5 OSPFv3; 5.2.6 Intermediate System to Intermediate System (IS-IS); 5.2.7 Authentication of IS-IS; 5.2.8 IS-IS Graceful Restart; 5.2.9 Routing Information Protocol (RIP); 5.2.10 Interior Gateway Routing Protocol (IGRP) and Enhanced Interior Gateway Routing Protocol (EIGRP); 5.2.11 Diffusing Update Algorithm (DUAL); 5.2.12 Stuck-in-Active; 5.2.13 Why use EIGRP?; 5.3 Exterior Protocols; 5.3.1 Border Gateway Protocol (BGP); 5.3.2 Authentication of BGP; 5.3.3 BGP Graceful Restart 5.3.4 Multiprotocol BGP |
| Record Nr. | UNINA-9910823947903321 |
Davies Guy
|
||
| Chichester, West Sussex, England ; ; Hoboken, NJ, USA, : Wiley, 2004 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Evaluating performance of OpenMP and MPI on the SGI Origin 2000 with benchmarks of realistic problem sizes [[electronic resource] /] / by Csaba K. Zoltani, Punyam Satya-narayana, and Dixie Hisley
| Evaluating performance of OpenMP and MPI on the SGI Origin 2000 with benchmarks of realistic problem sizes [[electronic resource] /] / by Csaba K. Zoltani, Punyam Satya-narayana, and Dixie Hisley |
| Autore | Zoltani Csaba K |
| Pubbl/distr/stampa | Aberdeen Proving Ground, MD : , : Army Research Laboratory, , [2000] |
| Descrizione fisica | 1 online resource (viii, 18 pages) : illustrations |
| Altri autori (Persone) |
Satya-narayanaPunyam
HisleyDixie |
| Collana | ARL-TR |
| Soggetto topico | Computer networks - Scalability |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910699665603321 |
Zoltani Csaba K
|
||
| Aberdeen Proving Ground, MD : , : Army Research Laboratory, , [2000] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Implementing AWS : design , build, and manage your infrastructure : leverage AWS features to build highly secure, fault-tolerant and scalable cloud environments / / Yohan Wadia [and three others]
| Implementing AWS : design , build, and manage your infrastructure : leverage AWS features to build highly secure, fault-tolerant and scalable cloud environments / / Yohan Wadia [and three others] |
| Autore | Wadia Yohan |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Birmingham : , : Packt, , 2019 |
| Descrizione fisica | 1 online resource (690 pages) |
| Soggetto topico |
Cloud computing - Security measures
Computer networks - Scalability |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1: What is New in AWS? -- Chapter 2: Managing EC2 with Systems Manager -- Chapter 3: Introducing Elastic Beanstalk and Elastic File System -- Chapter 4: Securing Workloads Using AWS WAF -- Chapter 5: Governing Your Environments Using AWS CloudTrail and AWS Config -- Chapter 6: Access Control Using AWS IAM and AWS Organizations -- Chapter 7: Transforming Application Development Using the AWS Code Suite -- Chapter 8: Powering Analytics Using Amazon EMR and Amazon Redshift -- Chapter 9: Orchestrating Data using AWS Data Pipeline -- Chapter 10: Managing AWS Accounts -- Chapter 11: Using AWS Compute -- Chapter 12: Management Tools -- Chapter 13: Database Services -- Chapter 14: Introducing AWS Lambda -- Chapter 15: Writing Lambda Functions -- Chapter 16: Testing Lambda Functions -- Chapter 17: Event-Driven Model -- Chapter 18: Extending AWS Lambda with External Services -- Chapter 19: Build and Deploy Serverless Applications with AWS Lambda -- Chapter 20: Monitoring and Troubleshooting AWS Lambda -- Chapter 21: AWS Lambda - Use Cases -- Chapter 22: Next Steps with AWS Lambda. |
| Record Nr. | UNINA-9910795317503321 |
Wadia Yohan
|
||
| Birmingham : , : Packt, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Implementing AWS : design , build, and manage your infrastructure : leverage AWS features to build highly secure, fault-tolerant and scalable cloud environments / / Yohan Wadia [and three others]
| Implementing AWS : design , build, and manage your infrastructure : leverage AWS features to build highly secure, fault-tolerant and scalable cloud environments / / Yohan Wadia [and three others] |
| Autore | Wadia Yohan |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Birmingham : , : Packt, , 2019 |
| Descrizione fisica | 1 online resource (690 pages) |
| Soggetto topico |
Cloud computing - Security measures
Computer networks - Scalability |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1: What is New in AWS? -- Chapter 2: Managing EC2 with Systems Manager -- Chapter 3: Introducing Elastic Beanstalk and Elastic File System -- Chapter 4: Securing Workloads Using AWS WAF -- Chapter 5: Governing Your Environments Using AWS CloudTrail and AWS Config -- Chapter 6: Access Control Using AWS IAM and AWS Organizations -- Chapter 7: Transforming Application Development Using the AWS Code Suite -- Chapter 8: Powering Analytics Using Amazon EMR and Amazon Redshift -- Chapter 9: Orchestrating Data using AWS Data Pipeline -- Chapter 10: Managing AWS Accounts -- Chapter 11: Using AWS Compute -- Chapter 12: Management Tools -- Chapter 13: Database Services -- Chapter 14: Introducing AWS Lambda -- Chapter 15: Writing Lambda Functions -- Chapter 16: Testing Lambda Functions -- Chapter 17: Event-Driven Model -- Chapter 18: Extending AWS Lambda with External Services -- Chapter 19: Build and Deploy Serverless Applications with AWS Lambda -- Chapter 20: Monitoring and Troubleshooting AWS Lambda -- Chapter 21: AWS Lambda - Use Cases -- Chapter 22: Next Steps with AWS Lambda. |
| Record Nr. | UNINA-9910812806803321 |
Wadia Yohan
|
||
| Birmingham : , : Packt, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||