標(biāo)題: Titlebook: Computer Networks; 20th International C Andrzej Kwiecień,Piotr Gaj,Piotr Stera Conference proceedings 2013 The Editor(s) (if applicable) an [打印本頁] 作者: 難免 時間: 2025-3-21 19:00
書目名稱Computer Networks影響因子(影響力)
書目名稱Computer Networks影響因子(影響力)學(xué)科排名
書目名稱Computer Networks網(wǎng)絡(luò)公開度
書目名稱Computer Networks網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Computer Networks被引頻次
書目名稱Computer Networks被引頻次學(xué)科排名
書目名稱Computer Networks年度引用
書目名稱Computer Networks年度引用學(xué)科排名
書目名稱Computer Networks讀者反饋
書目名稱Computer Networks讀者反饋學(xué)科排名
作者: 不可知論 時間: 2025-3-21 23:27
Scientific Group Thermodata Europe (SGTE)n), security events probabilities. Some of the parameters are dynamic, they change in time, they are related to environmental conditions. Different sources, different means of data acquisition are presented together with discussion on trustworthiness and dependability of the acquired data in the sec作者: Negligible 時間: 2025-3-22 00:52
https://doi.org/10.1007/978-3-540-88154-4was measured repeatedly both with anonymization in various configurations and without it. The result showed that there are some ways how to improve the TOR efficiency but despite them the cost still remains too high for ordinary use.作者: 腫塊 時間: 2025-3-22 08:27
,Spatial Econometrics Models in Web Server’s Performance,k, Poland and targeting Web servers in Europe. Data analyzed in this paper contains the measurements, which were taken every day at the same time: at 6:00 a.m., 12:00 a.m. and 6:00 p.m. We presented our analysis of measurement data and created spatial econometric models. Next, influences on predicti作者: 傾聽 時間: 2025-3-22 11:01 作者: 導(dǎo)師 時間: 2025-3-22 16:37
Onion Routing Efficiency for Web Anonymization in Various Configurations,was measured repeatedly both with anonymization in various configurations and without it. The result showed that there are some ways how to improve the TOR efficiency but despite them the cost still remains too high for ordinary use.作者: 導(dǎo)師 時間: 2025-3-22 19:00
https://doi.org/10.1007/978-3-540-88142-1 LEACH protocol that address problems of the cluster head selection, load balancing and lifetime enhancement as well as presents the simulation results for the selected group of LEACH-based protocols.作者: archenemy 時間: 2025-3-22 21:24
Simulation Comparison of LEACH-Based Routing Protocols for Wireless Sensor Networks, LEACH protocol that address problems of the cluster head selection, load balancing and lifetime enhancement as well as presents the simulation results for the selected group of LEACH-based protocols.作者: 鋼筆記下懲罰 時間: 2025-3-23 02:26
Synchronization Algorithm for Timed Colored Petri Nets and Ns-2 Simulators,d application in order to obtain credible estimations of its efficiency on the basis of simulation. Data passing interface together with clock synchronization algorithm is described and discussed. Results of experiments are compared with simulations.作者: APO 時間: 2025-3-23 06:01 作者: BORE 時間: 2025-3-23 11:45
Conference proceedings 2013ogies, queueing theory and queueing networks, innovative applications, networking in e-business, security aspects of hardware and software, industrial systems, quantum and bio-informatics, cloud networking and services.作者: Commonplace 時間: 2025-3-23 15:48
Scientific Group Thermodata Europe (SGTE)d application in order to obtain credible estimations of its efficiency on the basis of simulation. Data passing interface together with clock synchronization algorithm is described and discussed. Results of experiments are compared with simulations.作者: Fecal-Impaction 時間: 2025-3-23 18:16 作者: galley 時間: 2025-3-24 01:18
1865-0929 plications, networking in e-business, security aspects of hardware and software, industrial systems, quantum and bio-informatics, cloud networking and services.978-3-642-38864-4978-3-642-38865-1Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: fidelity 時間: 2025-3-24 05:47 作者: 爵士樂 時間: 2025-3-24 08:35 作者: 顯微鏡 時間: 2025-3-24 13:02 作者: Glycogen 時間: 2025-3-24 15:09
Experimental Results of Dynamic Load Scheduling in the CMS Data Acquisition System,ns in computing power or network throughput. The discussed studies prove that the proposed method meets the requirements of CMS experiment and has a?positive impact on the resource utilization and overall fault tolerance.作者: curriculum 時間: 2025-3-24 19:07 作者: inconceivable 時間: 2025-3-25 00:17 作者: 發(fā)源 時間: 2025-3-25 07:03
1865-0929 International Conference on Computer Networks, CN 2013, held in Lwowek Slaski, Poland, in June 2013. The 58 revised full papers presented were carefully reviewed and selected for inclusion in the book. The papers in these proceedings cover the following topics: computer networks, network architectur作者: Flustered 時間: 2025-3-25 08:22
https://doi.org/10.1007/978-3-540-88142-1al of distributed processing solution based on web browsers. This method, unlike the commonly used, does not require installing any software on the compute nodes. This is achieved through the distribution and execution of the code in the container, which is a web browser.作者: reptile 時間: 2025-3-25 14:49
Scientific Group Thermodata Europe (SGTE), as well as anticipation of worst-case scenarios, are the equally important factors for successful experiments. We describe our experiences with implementing a?WSN for long-time unattended operation in a greenhouse data-collecting application.作者: BAIT 時間: 2025-3-25 16:43 作者: Hiatal-Hernia 時間: 2025-3-25 21:15
https://doi.org/10.1007/978-3-540-88154-4tnet presence degree in computer systems is developed. It takes into account the demonstration degree of reconnected computer system, demonstration degree of probably infected computer systems and demonstration degree of other computer systems available in the corporate area network that probably weren’t infected.作者: conformity 時間: 2025-3-26 03:30
https://doi.org/10.1007/978-3-540-88154-4he node for supporting various communication protocols to simultaneous data exchange via different buses. This method will enable to increase not only network bandwidth, but also the security of data transmission.作者: 軟弱 時間: 2025-3-26 07:33 作者: ethnology 時間: 2025-3-26 09:34 作者: GEST 時間: 2025-3-26 14:15 作者: Carminative 時間: 2025-3-26 20:43 作者: 手銬 時間: 2025-3-26 21:48
The Concept of Using Multi-protocol Nodes in Real-Time Distributed Systems for Increasing Communicahe node for supporting various communication protocols to simultaneous data exchange via different buses. This method will enable to increase not only network bandwidth, but also the security of data transmission.作者: 罐里有戒指 時間: 2025-3-27 03:40
Conference proceedings 2013une 2013. The 58 revised full papers presented were carefully reviewed and selected for inclusion in the book. The papers in these proceedings cover the following topics: computer networks, network architectural issues, Internet and wireless solutions, teleinformatics and communications, new technol作者: Rotator-Cuff 時間: 2025-3-27 07:13
Computer Networks978-3-642-38865-1Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 慎重 時間: 2025-3-27 12:09 作者: Liability 時間: 2025-3-27 14:08
Scientific Group Thermodata Europe (SGTE)k performance is studied under nonsaturation and saturation network condition. Additionally, it is shown that the EDCA doesn’t provide a good prioritized access in contrast to the DCF, when only one traffic type is being transmitted through the wireless network.作者: 細(xì)查 時間: 2025-3-27 19:37
https://doi.org/10.1007/978-3-540-88154-4ystem. The implemented algorithm is the base that use the second bus for parallel data transmission. It also presents the research results, which refer to measuring the duration of basic transaction in the network system, duration of the bus failure detection A(B) and slave station failure.作者: drusen 時間: 2025-3-28 01:48 作者: 滋養(yǎng) 時間: 2025-3-28 04:49
Scientific Group Thermodata Europe (SGTE)ding to a single collision of particles, referred to as an event, from about 500 detector Front-Ends. Each of those Front-Ends delivers event-fragments of an average size of 2 KB at a rate of 100 kHz. The event-fragments are statically distributed (usually in round robin fashion) between 8 identical作者: 免費 時間: 2025-3-28 08:59 作者: Mundane 時間: 2025-3-28 13:07
Scientific Group Thermodata Europe (SGTE)sses are presented. Four samples of collected traffic are analysed for the presence of self-similarity; the research used two common methods: ./. method and variance analysis method. The article ends with conclusions based on correlations found in the study.作者: 駭人 時間: 2025-3-28 15:36
Scientific Group Thermodata Europe (SGTE)able and predictable in context of Web access. Thus, there is a need to analyzing Web server’s performance and trying to predict future demand on given server’s. This kind of research requires spatial methods of analysis of such data. Therefore we decided using spatial econometrics methods to explor作者: ADORE 時間: 2025-3-28 22:36
https://doi.org/10.1007/978-3-540-88142-1first part of this paper briefly introduces and characterizes the?Multiagent Internet Measuring System (MWING) whose main task involves collecting data necessary for making the aforementioned analyses and forecasts. MWING comprises of many agents located in different parts of the globe; however, for作者: jocular 時間: 2025-3-29 01:54
Scientific Group Thermodata Europe (SGTE)tion or details of self-organizing network algorithms. In our practical deployment of such a network we learned that software and hardware reliability, as well as anticipation of worst-case scenarios, are the equally important factors for successful experiments. We describe our experiences with impl作者: 飛行員 時間: 2025-3-29 04:17 作者: 縮減了 時間: 2025-3-29 07:41
Scientific Group Thermodata Europe (SGTE)k performance is studied under nonsaturation and saturation network condition. Additionally, it is shown that the EDCA doesn’t provide a good prioritized access in contrast to the DCF, when only one traffic type is being transmitted through the wireless network.作者: FOIL 時間: 2025-3-29 14:35
https://doi.org/10.1007/978-3-540-88142-1ergy consumption in order to prolong the network lifetime. Data reception and transmission are the main energy consuming operations and they are regulated by the network layer, hence the routing protocol plays very important role in network optimization..In this paper information concerning the LEAC作者: Generator 時間: 2025-3-29 19:08 作者: 等級的上升 時間: 2025-3-29 20:37
Scientific Group Thermodata Europe (SGTE) security policy. The main advantage of the method (in comparison to other techniques) is its accuracy – a better start point for security policy definition. Obviously the accuracy is directly related to input data dependability. The basic problem of the method is related to acquisition of input dat作者: 全等 時間: 2025-3-30 01:07 作者: HEED 時間: 2025-3-30 06:23
https://doi.org/10.1007/978-3-540-88154-4 situation of the intentionally computer system reconnection with the use of fuzzy logic is performed. Fuzzy expert system for making conclusion of botnet presence degree in computer systems is developed. It takes into account the demonstration degree of reconnected computer system, demonstration de作者: 侵略 時間: 2025-3-30 10:48 作者: somnambulism 時間: 2025-3-30 14:26
https://doi.org/10.1007/978-3-540-88154-4ystem. The implemented algorithm is the base that use the second bus for parallel data transmission. It also presents the research results, which refer to measuring the duration of basic transaction in the network system, duration of the bus failure detection A(B) and slave station failure.作者: 采納 時間: 2025-3-30 18:36
https://doi.org/10.1007/978-3-540-88154-4ol nodes. The method presented in this paper is related to hardware and software, and based on new original communication protocol, which is used by the node for supporting various communication protocols to simultaneous data exchange via different buses. This method will enable to increase not only作者: BOON 時間: 2025-3-30 22:53 作者: 受辱 時間: 2025-3-31 04:40
https://doi.org/10.1007/978-3-540-88142-1The Local Minimum Problem occurs in geographic routing scenarios. In this paper two solutions to this problem for certain network topologies are proposed. By using the notion of virtual coordinates a?theoretical and a practical constructions are presented. A distributed algorithm for the practical approach is proposed.作者: RODE 時間: 2025-3-31 07:42
Modelling the Pertubation of Traffic Based on Ateb-functions,Traffic’s periodic processes in computer networks based on Ateb-functions without perturbation were simulated. The types of small perturbations that influence the traffic’s vibration were considered. Appropriate software that outputs the results in graphical and tabular forms was developed.作者: 符合國情 時間: 2025-3-31 12:57
A Note on the Local Minimum Problem in Wireless Sensor Networks,The Local Minimum Problem occurs in geographic routing scenarios. In this paper two solutions to this problem for certain network topologies are proposed. By using the notion of virtual coordinates a?theoretical and a practical constructions are presented. A distributed algorithm for the practical approach is proposed.作者: SPECT 時間: 2025-3-31 15:34
Study of the Character of APRS Traffic in AX.25 Network,sses are presented. Four samples of collected traffic are analysed for the presence of self-similarity; the research used two common methods: ./. method and variance analysis method. The article ends with conclusions based on correlations found in the study.作者: Evacuate 時間: 2025-3-31 18:38
Performance Analysis of IEEE 802.11 EDCA for a Different Number of Access Categories and Comparisonk performance is studied under nonsaturation and saturation network condition. Additionally, it is shown that the EDCA doesn’t provide a good prioritized access in contrast to the DCF, when only one traffic type is being transmitted through the wireless network.作者: 玉米 時間: 2025-3-31 23:41 作者: gait-cycle 時間: 2025-4-1 01:58 作者: Canary 時間: 2025-4-1 07:37 作者: 細(xì)絲 時間: 2025-4-1 12:06 作者: 免除責(zé)任 時間: 2025-4-1 18:15 作者: 誘使 時間: 2025-4-1 19:08
Synchronization Algorithm for Timed Colored Petri Nets and Ns-2 Simulators, The simulators are connected to provide reliable model of distributed systems based on TCPN formalism supported with precise TCP model from the Ns-2, based on real implementation. Consequently, precise results of network transmission time estimation can be combined with reliable model of distribute作者: Interstellar 時間: 2025-4-1 22:43
Experimental Results of Dynamic Load Scheduling in the CMS Data Acquisition System,ding to a single collision of particles, referred to as an event, from about 500 detector Front-Ends. Each of those Front-Ends delivers event-fragments of an average size of 2 KB at a rate of 100 kHz. The event-fragments are statically distributed (usually in round robin fashion) between 8 identical