000 05757nam a22006375i 4500
001 978-3-642-13971-0
003 DE-He213
005 20240423125635.0
007 cr nn 008mamaa
008 100616s2010 gw | s |||| 0|eng d
020 _a9783642139710
_9978-3-642-13971-0
024 7 _a10.1007/978-3-642-13971-0
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM043000
_2bisacsh
072 7 _aUKN
_2thema
082 0 4 _a004.6
_223
245 1 0 _aNetworked Services and Applications - Engineering, Control and Management
_h[electronic resource] :
_b16th EUNICE/IFIP WG 6.6 Workshop, EUNICE 2010, Trondheim, Norway, June 28-30, 2010, Proceedings /
_cedited by Finn Arve Aagesen, Svein J. Knapskog.
250 _a1st ed. 2010.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2010.
300 _aXIII, 275 p. 125 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aInformation Systems and Applications, incl. Internet/Web, and HCI,
_x2946-1642 ;
_v6164
505 0 _aAdmission Control and Networking -- On the Performance of Grooming Strategies for Offloading IP Flows onto Lightpaths in Hybrid Networks -- MBAC: Impact of the Measurement Error on Key Performance Issues -- An Algorithm for Automatic Base Station Placement in Cellular Network Deployment -- An Energy-Efficient FPGA-Based Packet Processing Framework -- Service Mobility -- Service Migration Protocol for NFC Links -- Swarm Intelligence Heuristics for Component Deployment -- Peer-to-Peer and Virtualization -- On Force-Based Placement of Distributed Services within a Substrate Network -- Enabling P2P Gaming with Network Coding -- A Virtual File System Interface for Computational Grids -- Security -- Labeled VoIP Data-Set for Intrusion Detection Evaluation -- Document Provenance in the Cloud: Constraints and Challenges -- Wireless Handoff Optimization: A Comparison of IEEE 802.11r and HOKEY -- Introducing Perfect Forward Secrecy for AN.ON -- Congestion Control -- Mobility-Aware Drop Precedence Scheme in DiffServ-Enabled Mobile Network Systems -- Theoretical Analysis of an Ideal Startup Scheme in Multihomed SCTP -- Monitoring and Filtering -- The Network Data Handling War: MySQL vs. NfDump -- Processing of Flow Accounting Data in Java: Framework Design and Performance Evaluation -- Fighting Spam on the Sender Side: A Lightweight Approach -- Dependability -- Degradation Model for Erbium-Doped Fiber Amplifiers to Reduce Network Downtime -- A Token Based Approach Detecting Downtime in Distributed Application Servers or Network Elements -- Distributed Resource Reservation for Beacon Based MAC Protocols -- Adaptation and Reconfiguration -- On Runtime Adaptation of Application-Layer Multicast Protocol Parameters -- A Framework with Proactive Nodes for Scheduling and Optimizing Distributed Embedded Systems -- Resource Adaptive Distributed Information Sharing -- Poster Session -- Performance Impacts of Node Failures on a Chord-Based Hierarchical Peer-to-Peer Network -- A Low-Power Scheme for Localization in Wireless Sensor Networks -- Flow Aggregation Using Dynamic Packet State -- Evaluating MDC with Incentives in P2PTV Systems -- Translation from UML to SPN Model: A Performance Modeling Framework -- An Open and Extensible Service Discovery for Ubiquitous Communication Systems.
520 _aThe EUNICE (European Network of Universities and Companies in Information and Communication technology) (http://www.eunice-forum.org) mission is to jointly - velop and promote the best and most compatible standard of European higher edu- tion and professionals in ICT by increasing scientific and technical knowledge in the field of ICT and developing their applications in the economy. The EUNICE Wo- shop is an annual event. This year the workshop was sponsored by IFIP TC 6 WG 6.6: Management of Networks and Distributed Systems. Eight years ago, the seventh edition of the EUNICE workshop took place in Tro- heim with the topic “Adaptable Networks and Teleservices.” Since then “adaptability” has become a topic which is found in most ICT conferences. The concept teleservices, which is a telecommunication domain concept from the 1980s, has been lifted out of the telecom community and is now found with new and sometimes mysterious names such as service–oriented architecture and cloud computing.
650 0 _aComputer networks .
650 0 _aComputer science.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aElectronic data processing
_xManagement.
650 0 _aAlgorithms.
650 0 _aComputers and civilization.
650 1 4 _aComputer Communication Networks.
650 2 4 _aTheory of Computation.
650 2 4 _aCryptology.
650 2 4 _aIT Operations.
650 2 4 _aAlgorithms.
650 2 4 _aComputers and Society.
700 1 _aAagesen, Finn Arve.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aKnapskog, Svein J.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783642139703
776 0 8 _iPrinted edition:
_z9783642139727
830 0 _aInformation Systems and Applications, incl. Internet/Web, and HCI,
_x2946-1642 ;
_v6164
856 4 0 _uhttps://doi.org/10.1007/978-3-642-13971-0
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cSPRINGER
999 _c180161
_d180161