Third International Conference on Autonomous Infrastructure, Management and Security, AIMS 2009 Enschede, The Netherlands, June 30 - July 2, 2009, Proceedings Herausgegeben:Sadre, Ramin; Pras, Aiko
Third International Conference on Autonomous Infrastructure, Management and Security, AIMS 2009 Enschede, The Netherlands, June 30 - July 2, 2009, Proceedings Herausgegeben:Sadre, Ramin; Pras, Aiko
This book constitutes the refereed proceedings of the Third International Conference on Autonomous Infrastructure, Management and Security, AIMS 2009, held in Enschede, The Netherlands, during June 30 - July 2, 2009 under the auspices of IFIP. The 12 revised full papers and three short papers presented together with 8 papers of the AIMS PhD workshop were carefully reviewed and selected from 28 submissions to the main conference and 15 papers for the PhD workshop respectively. The papers are organized in topical sections on network resource management, overlays and P2P networks, network…mehr
This book constitutes the refereed proceedings of the Third International Conference on Autonomous Infrastructure, Management and Security, AIMS 2009, held in Enschede, The Netherlands, during June 30 - July 2, 2009 under the auspices of IFIP. The 12 revised full papers and three short papers presented together with 8 papers of the AIMS PhD workshop were carefully reviewed and selected from 28 submissions to the main conference and 15 papers for the PhD workshop respectively. The papers are organized in topical sections on network resource management, overlays and P2P networks, network configuration and optimization, as well as monitoring and visualization.
Artikelnr. des Verlages: 12707539, 978-3-642-02626-3
2009
Seitenzahl: 228
Erscheinungstermin: 15. Juni 2009
Englisch
Abmessung: 235mm x 155mm x 13mm
Gewicht: 353g
ISBN-13: 9783642026263
ISBN-10: 3642026265
Artikelnr.: 26538544
Herstellerkennzeichnung
Books on Demand GmbH
In de Tarpen 42
22848 Norderstedt
info@bod.de
040 53433511
Inhaltsangabe
Network Resource Management. Secure User Controlled Lightpath Provisioning with User Controlled Identity Management. A Statistical Analysis of Network Parameters for the Self management of Lambda Connections. Dynamics of Resource Closure Operators. Overlays and P2P Networks. Churn Tolerance Improvement Techniques in an Algorithm Neutral DHT. PeerVote: A Decentralized Voting Mechanism for P2P Collaboration Systems. Evaluation of Sybil Attacks Protection Schemes in KAD. Network Configuration and Optimization. NETCONF Interoperability Testing. Knowledge Management and Promises. A Policy Driven Network Management System for the Dynamic Configuration of Military Networks. A Strategy for Multi Agent Based Wireless Sensor Network Optimization. Monitoring and Visualization. Flow Monitoring in Wireless MESH Networks. Visualization of Node Interaction Dynamics in Network Traces. Short Papers. Towards Energy Efficient Change Management in a Cloud Computing Environment. A Market Based Pricing Scheme for Grid Networks. Consistency of Network Traffic Repositories: An Overview. PhD Workshop. A P2P Based Approach to Cross Domain Network and Service Management. PeerCollaboration. Fast Learning Neural Network Intrusion Detection System. Design of an Autonomous Framework for Efficient Large Scale Management of Next Generation Web Service Mashups. Scalable Detection and Isolation of Phishing. Multi agent Reinforcement Learning in Network Management. Answering Queries Using Cooperative Semantic Caching. Towards Cost Aware Multipath Routing.
Network Resource Management. Secure User Controlled Lightpath Provisioning with User Controlled Identity Management. A Statistical Analysis of Network Parameters for the Self management of Lambda Connections. Dynamics of Resource Closure Operators. Overlays and P2P Networks. Churn Tolerance Improvement Techniques in an Algorithm Neutral DHT. PeerVote: A Decentralized Voting Mechanism for P2P Collaboration Systems. Evaluation of Sybil Attacks Protection Schemes in KAD. Network Configuration and Optimization. NETCONF Interoperability Testing. Knowledge Management and Promises. A Policy Driven Network Management System for the Dynamic Configuration of Military Networks. A Strategy for Multi Agent Based Wireless Sensor Network Optimization. Monitoring and Visualization. Flow Monitoring in Wireless MESH Networks. Visualization of Node Interaction Dynamics in Network Traces. Short Papers. Towards Energy Efficient Change Management in a Cloud Computing Environment. A Market Based Pricing Scheme for Grid Networks. Consistency of Network Traffic Repositories: An Overview. PhD Workshop. A P2P Based Approach to Cross Domain Network and Service Management. PeerCollaboration. Fast Learning Neural Network Intrusion Detection System. Design of an Autonomous Framework for Efficient Large Scale Management of Next Generation Web Service Mashups. Scalable Detection and Isolation of Phishing. Multi agent Reinforcement Learning in Network Management. Answering Queries Using Cooperative Semantic Caching. Towards Cost Aware Multipath Routing.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826