NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems (eBook, PDF)
4th International IFIP-TC6 Networking Conference, Waterloo, Canada, May 2-6, 2005, Proceedings
Redaktion: Boutaba, Raouf; Black, James P.; Shen, Sherman; Puigjaner, Ramon; Almeroth, Kevin
113,95 €
113,95 €
inkl. MwSt.
Sofort per Download lieferbar
57 °P sammeln
113,95 €
Als Download kaufen
113,95 €
inkl. MwSt.
Sofort per Download lieferbar
57 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
113,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
57 °P sammeln
NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems (eBook, PDF)
4th International IFIP-TC6 Networking Conference, Waterloo, Canada, May 2-6, 2005, Proceedings
Redaktion: Boutaba, Raouf; Black, James P.; Shen, Sherman; Puigjaner, Ramon; Almeroth, Kevin
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 21.55MB
Andere Kunden interessierten sich auch für
- NETWORKING 2006. Networking Technologies, Services, Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems (eBook, PDF)137,95 €
- NETWORKING 2002: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications (eBook, PDF)65,95 €
- NETWORKING 2008 Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet (eBook, PDF)113,95 €
- Managing Traffic Performance in Converged Networks (eBook, PDF)113,95 €
- Personal Wireless Communications (eBook, PDF)113,95 €
- Universal Multiservice Networks (eBook, PDF)40,95 €
- Personal Wireless Communications (eBook, PDF)73,95 €
-
-
Produktdetails
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 1487
- Erscheinungstermin: 2. Mai 2005
- Englisch
- ISBN-13: 9783540320173
- Artikelnr.: 44127308
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Raouf Boutaba, University of Waterloo, ON, Canada / Kevin Almeroth, University of California, Santa Barbara, USA / Ramon Puigjaner, Universitat de les Illes Balear, Spain / Sherman Shen, University of Waterloo, ON, Canada / James P. Black, University of Waterloo, ON, Canada
Peer-to-Peer Networks.- Topology-Aware Peer-to-Peer On-demand Streaming.- The Scalability of Swarming Peer-to-Peer Content Delivery.- Leopard: A Locality Aware Peer-to-Peer System with No Hot Spot.- PeerMint: Decentralized and Secure Accounting for Peer-to-Peer Applications.- Performance of Internet Protocols I.- Highly Responsive and Efficient QoS Routing Using Pre- and On-demand Computations Along with a New Normal Measure.- An Architecture for Software-Based iSCSI: Experiences and Analyses.- Reorder Density (RD): A Formal, Comprehensive Metric for Packet Reordering.- Batch Scheduling Algorithms for Optical Burst Switching Networks.- Wireless Security.- ECC Based Threshold Cryptography for Secure Data Forwarding and Secure Key Exchange in MANET (I).- Mutual Authentication and Key Exchange Protocols with Anonymity Property for Roaming Services.- An Energy-Efficient Image Representation for Secure Mobile Systems.- Efficient Clustering for Multicast Key Distribution in MANETs.- Network Security.- Using Secure Coprocessors to Protect Access to Enterprise Networks.- Trusted Security Devices for Bandwidth Conservation in IPSec Environments.- LIPS: Lightweight Internet Permit System for Stopping Unwanted Packets.- Victim-Assisted Mitigation Technique for TCP-Based Reflector DDoS Attacks.- Wireless Performance.- Performance Analysis of the Uplink of a CDMA Cell Supporting Elastic Services.- Queue Analysis for Wireless Packet Data Traffic.- Modeling a Beacon Enabled 802.15.4 Cluster with Bidirectional Traffic.- Analysis of Windowing and Peering Schemes for Cache Coherency in Mobile Devices.- Network Service Support.- Fast Scalable Robust Node Enumeration.- gTrace: Simple Mechanisms for Monitoring of Multicast Sessions.- Toward Feasibility and Scalability of Session Initiation and Dynamic QoS Provisioning in Policy-Enabled Networks.- Modeling Soft State Protocols with SDL.- Network Modeling and Simulations.- Inferring Traffic Burstiness by Sampling the Buffer Occupancy.- Modeling Available Bandwidth for an Efficient QoS Characterization of a Network Path.- Reducing Large Internet Topologies for Faster Simulations.- Dimensioning the Contention Channel of DOCSIS Cable Modem Networks.- Wireless LANs.- CONTI: Constant-Time Contention Resolution for WLAN Access.- Efficient 3G/WLAN Interworking Techniques for Seamless Roaming Services with Location-Aware Authentication.- A New per-Class Flow Fixed Proportional Differentiated Service for Multi-service Wireless LAN.- Reservation and Grouping Stations for the IEEE 802.11 DCF.- Optical Networking.- Path Switching in OBS Networks.- A Priority-Aware Protection Technique for Quality of Service Enabled WDM Networks.- Wavelength Rerouting in Survivable WDM Networks.- Performance of Internet & Web Applications.- Performance of Server Selection Algorithms for Content Replication Networks.- Local Utility Aware Content Replication.- Improving Network Convergence Time and Network Stability of an OSPF-Routed IP Network.- Ad Hoc Networks I.- Non-cooperative Forwarding in Ad-Hoc Networks.- Efficient Broadcasting in Ad Hoc Networks Using Directional Antennas.- Trellis-Based Virtual Regular Addressing Structures in Self-organized Networks.- Adaptive Networking.- Network of Shortcuts: An Adaptive Data Structure for Tree-Based Search Methods.- Multipath Routing Algorithms for Congestion Minimization.- Improving TCP in Wireless Networks with an Adaptive Machine-Learnt Classifier of Packet Loss Causes.- Performance of Internet Protocols II.- A Multiple Time-Scale Model for TCP Bandwidth Sharing Under User Heterogeneity.- A Multizone Pipelined Cache for IP Routing.- Aggregated Aggressiveness Control on Groups of TCP Flows.- Radio Resource Management.- Multi-level Dynamic Guard Channels for Priority Access in Cellular Systems.- Slotted Aloha with Priorities and Random Power.- Downlink Packet Scheduling with Minimum Throughput Guarantee in TDD-OFDMA Cellular Network.- Internet Routing.- Making IGP Routing Robust to
Peer-to-Peer Networks.- Topology-Aware Peer-to-Peer On-demand Streaming.- The Scalability of Swarming Peer-to-Peer Content Delivery.- Leopard: A Locality Aware Peer-to-Peer System with No Hot Spot.- PeerMint: Decentralized and Secure Accounting for Peer-to-Peer Applications.- Performance of Internet Protocols I.- Highly Responsive and Efficient QoS Routing Using Pre- and On-demand Computations Along with a New Normal Measure.- An Architecture for Software-Based iSCSI: Experiences and Analyses.- Reorder Density (RD): A Formal, Comprehensive Metric for Packet Reordering.- Batch Scheduling Algorithms for Optical Burst Switching Networks.- Wireless Security.- ECC Based Threshold Cryptography for Secure Data Forwarding and Secure Key Exchange in MANET (I).- Mutual Authentication and Key Exchange Protocols with Anonymity Property for Roaming Services.- An Energy-Efficient Image Representation for Secure Mobile Systems.- Efficient Clustering for Multicast Key Distribution in MANETs.- Network Security.- Using Secure Coprocessors to Protect Access to Enterprise Networks.- Trusted Security Devices for Bandwidth Conservation in IPSec Environments.- LIPS: Lightweight Internet Permit System for Stopping Unwanted Packets.- Victim-Assisted Mitigation Technique for TCP-Based Reflector DDoS Attacks.- Wireless Performance.- Performance Analysis of the Uplink of a CDMA Cell Supporting Elastic Services.- Queue Analysis for Wireless Packet Data Traffic.- Modeling a Beacon Enabled 802.15.4 Cluster with Bidirectional Traffic.- Analysis of Windowing and Peering Schemes for Cache Coherency in Mobile Devices.- Network Service Support.- Fast Scalable Robust Node Enumeration.- gTrace: Simple Mechanisms for Monitoring of Multicast Sessions.- Toward Feasibility and Scalability of Session Initiation and Dynamic QoS Provisioning in Policy-Enabled Networks.- Modeling Soft State Protocols with SDL.- Network Modeling and Simulations.- Inferring Traffic Burstiness by Sampling the Buffer Occupancy.- Modeling Available Bandwidth for an Efficient QoS Characterization of a Network Path.- Reducing Large Internet Topologies for Faster Simulations.- Dimensioning the Contention Channel of DOCSIS Cable Modem Networks.- Wireless LANs.- CONTI: Constant-Time Contention Resolution for WLAN Access.- Efficient 3G/WLAN Interworking Techniques for Seamless Roaming Services with Location-Aware Authentication.- A New per-Class Flow Fixed Proportional Differentiated Service for Multi-service Wireless LAN.- Reservation and Grouping Stations for the IEEE 802.11 DCF.- Optical Networking.- Path Switching in OBS Networks.- A Priority-Aware Protection Technique for Quality of Service Enabled WDM Networks.- Wavelength Rerouting in Survivable WDM Networks.- Performance of Internet & Web Applications.- Performance of Server Selection Algorithms for Content Replication Networks.- Local Utility Aware Content Replication.- Improving Network Convergence Time and Network Stability of an OSPF-Routed IP Network.- Ad Hoc Networks I.- Non-cooperative Forwarding in Ad-Hoc Networks.- Efficient Broadcasting in Ad Hoc Networks Using Directional Antennas.- Trellis-Based Virtual Regular Addressing Structures in Self-organized Networks.- Adaptive Networking.- Network of Shortcuts: An Adaptive Data Structure for Tree-Based Search Methods.- Multipath Routing Algorithms for Congestion Minimization.- Improving TCP in Wireless Networks with an Adaptive Machine-Learnt Classifier of Packet Loss Causes.- Performance of Internet Protocols II.- A Multiple Time-Scale Model for TCP Bandwidth Sharing Under User Heterogeneity.- A Multizone Pipelined Cache for IP Routing.- Aggregated Aggressiveness Control on Groups of TCP Flows.- Radio Resource Management.- Multi-level Dynamic Guard Channels for Priority Access in Cellular Systems.- Slotted Aloha with Priorities and Random Power.- Downlink Packet Scheduling with Minimum Throughput Guarantee in TDD-OFDMA Cellular Network.- Internet Routing.- Making IGP Routing Robust to