‘Network’ is a heavily overloaded term, so that ‘network analysis’ means different things to different people. Specific ...
Lire la suite
Investigates network traffic classification solutions by proposing transport-layer methods to achieve better run and operated ...
Lire la suite
Network Models and Optimization: Multiobjective Genetic Algorithm Approach extensively covers algorithms and applications, ...
Lire la suite
This useful volume introduces concepts and principles of network performance analysis by example, using the J programming ...
Lire la suite
Network Science, Nonlinear Science and Infrastructure Systems has been written by leading scholars in these areas. Its express ...
Lire la suite
This volume introduces the technical issues surrounding security, as well as how security policies are formulated at the ...
Lire la suite
Provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization’s ...
Lire la suite
These proceedings contain the papers presented at the 2005 IFIP International Conference on Network and Parallel Computing ...
Lire la suite
The goal of NPC is to establish an international forum for researchers and practitioners to present their - cellent ideas ...
Lire la suite
It thoroughly prepares you for success on CompTIA's Network+ N10-007 certification exam with fully mapped coverage of all ...
Lire la suite
Network-Aware Security for Group Communications fills a growing need in the research community for a reference that describes ...
Lire la suite
This book constitutes the refereed proceedings of the Second International Conference on Network-Based Information Systems, ...
Lire la suite
Network-Centric Service-Oriented Enterprise (NSCOE) is seen as heralding the next generation of mainstream Enterprise-business ...
Lire la suite
Networked Control Systems presents the most recent results in stability and robustness analysis as well as new developments ...
Lire la suite
The setting for this book is the networked community. The treatment of the subject matter is broad and interdisciplinary, ...
Lire la suite
The book begins with a quick introduction to RFID basics and then discusses the various elements of the topic, using applications ...
Lire la suite
This book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, ...
Lire la suite
In recent years, there has been significant interest and advances in developing systematic techniques to synthesize interactive ...
Lire la suite
The International Conference on Networking (ICN 2005) was the fourth conf- ence in its series aimed at stimulating technical ...
Lire la suite
Neural Engineering, Bioelectric Engineering Volume 2, contains reviews and discussions of contemporary and relevant topics ...
Lire la suite