找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Computer Networks; 22nd International C Piotr Gaj,Andrzej Kwiecień,Piotr Stera Conference proceedings 2015 Springer International Publishin

[复制链接]
查看: 38030|回复: 62
发表于 2025-3-21 17:20:50 | 显示全部楼层 |阅读模式
书目名称Computer Networks
副标题22nd International C
编辑Piotr Gaj,Andrzej Kwiecień,Piotr Stera
视频video
概述Includes supplementary material:
丛书名称Communications in Computer and Information Science
图书封面Titlebook: Computer Networks; 22nd International C Piotr Gaj,Andrzej Kwiecień,Piotr Stera Conference proceedings 2015 Springer International Publishin
描述.This book constitutes the thoroughly refereed proceedings of the 22st International Conference on Computer Networks, CN 2015, held in Brunów, Poland, in June 2015. The 42 revised full papers presented were carefully reviewed and selected from 79 submissions. The papers in these proceedings cover the following topics: computer networks, distributed computer systems, communications and teleinformatics..
出版日期Conference proceedings 2015
关键词Ad hoc networks; Cloud computing; Computer networks; Distributed computing; Innovative applications; Netw
版次1
doihttps://doi.org/10.1007/978-3-319-19419-6
isbn_softcover978-3-319-19418-9
isbn_ebook978-3-319-19419-6Series ISSN 1865-0929 Series E-ISSN 1865-0937
issn_series 1865-0929
copyrightSpringer International Publishing Switzerland 2015
The information of publication is updating

书目名称Computer Networks影响因子(影响力)




书目名称Computer Networks影响因子(影响力)学科排名




书目名称Computer Networks网络公开度




书目名称Computer Networks网络公开度学科排名




书目名称Computer Networks被引频次




书目名称Computer Networks被引频次学科排名




书目名称Computer Networks年度引用




书目名称Computer Networks年度引用学科排名




书目名称Computer Networks读者反馈




书目名称Computer Networks读者反馈学科排名




单选投票, 共有 0 人参与投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 21:16:24 | 显示全部楼层
发表于 2025-3-22 01:08:14 | 显示全部楼层
Energy Aware Object Localization in Wireless Sensor Network Based on Wi-Fi Fingerprinting,them is a localization method based on Wi-Fi (802.11) access point (AP) signal strength (RSSI) measurement. In this method, a RSSI map is constructed via Localization Fingerprinting (LF), which allows localizing object on the basis of a pattern similarity. The drawback of LF method is the need to cr
发表于 2025-3-22 06:34:13 | 显示全部楼层
发表于 2025-3-22 12:38:47 | 显示全部楼层
IF-MANET: Interoperable Framework for Mobile Ad Hoc Networks,ources of mobile devices. The mobile ad hoc network (MANET), an infrastructure-less wireless network, is an emerging technology and is best suited to provide communication between wireless mobile devices. Due to the nature of MANET, the network topology changes frequently, unpredictably and has crea
发表于 2025-3-22 16:42:47 | 显示全部楼层
Attractiveness Study of Honeypots and Honeynets in Internet Threat Detection,nto honeynets are the most efficient tool how to lure, detect and analyze threats from the Internet. The paper presents recent results in honeynet made of Dionaea (emulating Windows services), Kippo (emulating Linux services) and Glastopf (emulating website services) honeypots. The most important re
发表于 2025-3-22 18:31:38 | 显示全部楼层
User Trust Levels and Their Impact on System Security and Usability,CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.
发表于 2025-3-22 23:38:26 | 显示全部楼层
发表于 2025-3-23 03:01:08 | 显示全部楼层
On the Balancing Security Against Performance in Database Systems,hieved on different levels. One can choose factors which have a different impact on the overall system security. Traditionally, security engineers configure IT systems with the strongest possible security mechanisms. Unfortunately, the strongest protection can lead to unreasoned increase of the syst
发表于 2025-3-23 07:49:05 | 显示全部楼层
Analysis of Objective Trees in Security Management of Distributed Computer Networks of Enterprises s, which can help to identify quickly and eliminate the causes of security breaches of these networks during their operation. The developed software allows to create a methodological basis for the creation of new information security management systems with cognitive functions, the use of which will
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-4 19:57
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表