top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Wired/Wireless internet communication : 10th International Conference, WWIC 2012, Santorini, Greece, June 6-8, 2012. Proceedings / Yevgeni Koucheryavy [and others] (eds.).
Wired/Wireless internet communication : 10th International Conference, WWIC 2012, Santorini, Greece, June 6-8, 2012. Proceedings / Yevgeni Koucheryavy [and others] (eds.).
Creatore [WWIC (Conference) (10th : 2012 : Thēra, Greece)]
Estensione 1 online resource (xiv, 382 pages).
Disciplina 004.67/8
Accesso persona Koucheryavy, Yevgeni
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Software engineering
Data protection
Information Systems Applications (incl. Internet)
Information Systems and Communication Service
Systems and Data Security
ISBN 9783642306303
3642306306
9783642306297
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto VNEMX: Virtual Network Embedding Test-Bed Using MPLS and Xen / Sarang Bharadwaj Masti, Siva P. Meenakshi and Serugudi V. Raghavan -- Towards Large-Scale Network Virtualization / Panagiotis Papadimitriou, Ines Houidi, Wajdi Louati, Djamal Zeghlache and Christoph Werle, et al. -- Prometheus: A Wirelessly Interconnected, Pico-Datacenter Framework for the Developing World / Vasileios Lakafosis, Sreenivas Addagatla, Christian Belady and Suyash Sinha -- Performance Analysis of Client Relay Cloud in Wireless Cellular Networks / Olga Galinina, Sergey Andreev and Yevgeni Koucheryavy -- Periodic Scheduling with Costs Revisited / A Novel Approach for Wireless Broadcasting / Christos Liaskos, Andreas Xeros, Georgios I. Papadimitriou, Marios Lestas and Andreas Pitsillides -- More for Less / Getting More Clients by Broadcasting Less Data / Christos Liaskos, Ageliki Tsioliaridou and Georgios I. Papadimitriou -- A Method to Improve the Channel Availability of IPTV Systems with Users Zapping Channels Sequentially / Junyu Lai and Bernd E. Wolfinger -- An Adaptive Bandwidth Allocation Scheme for Data Streaming over Body Area Networks / Nedal Ababneh, Nicholas Timmons and Jim Morrison -- EQR: A New Energy-Aware Query-Based Routing Protocol for Wireless Sensor Networks / Ehsan Ahvar, René Serral-Gracià, Eva Marín-Tordera, Xavier Masip-Bruin and Marcelo Yannuzzi -- Performance Evaluation of Reliable Overlay Multicast in Wireless Sensor Networks / Gerald Wagenknecht, Markus Anwander and Torsten Braun.
Experimental Comparison of Bluetooth and WiFi Signal Propagation for Indoor Localisation / Desislava C. Dimitrova, Islam Alyafawi and Torsten Braun -- Localization in Presence of Multipath Effect in Wireless Sensor Networks / Kaushik Mondal, Partha Sarathi Mandal and Bhabani P. Sinha -- RNBB: A Reliable Hybrid Broadcasting Algorithm for Ad-Hoc Networks / Ausama Yousef, Samer Rishe, Andreas Mitschele-Thiel and Abdalkarim Awad -- Exploiting Opportunistic Overhearing to Improve Performance of Mutual Exclusion in Wireless Ad Hoc Networks / Ghazale Hosseinabadi and Nitin H. Vaidya -- MANET Location Prediction Using Machine Learning Algorithms / Fraser Cadger, Kevin Curran, Jose Santos and Sandra Moffett -- Cooperative Sensing-Before-Transmit in Ad-Hoc Multi-hop Cognitive Radio Scenarios / José Marinho and Edmundo Monteiro -- An Evaluation of Vertical Handovers in LTE Networks / Adetola Oredope, Guilherme Frassetto and Barry Evans -- Connection Cost Based Handover Decision for Offloading Macrocells by Femtocells / Michal Vondra and Zdenek Becvar -- Direct Link Assignment Approach for IEEE 802.16 Networks / Chung-Hsien Hsu -- Dynamic Contention Resolution in Multiple-Access Channels / Dongxiao Yu, Qiang-Sheng Hua, Weiguo Dai, Yuexuan Wang and Francis C.M. Lau -- An Assessment of Community Finding Algorithms for Community-Based Message Routing in DTNs / Matthew Stabeler, Conrad Lee and Pádraig Cunningham -- Routing for Opportunistic Networks Based on Probabilistic Erasure Coding / Fani Tsapeli and Vassilis Tsaoussidis.
On the Performance of Erasure Coding over Space DTNs / Giorgos Papastergiou, Nikolaos Bezirgiannidis and Vassilis Tsaoussidis -- On Passive Characterization of Aggregated Traffic in Wireless Networks / Anna Chaltseva and Evgeny Osipov -- TCP Initial Window: A Study / Runa Barik and Dinil Mon Divakaran -- Performance Evaluation of Bandwidth and QoS Aware LTE Uplink Scheduler / Safdar Nawaz Khan Marwat, Thushara Weerawardane, Yasir Zaki, Carmelita Goerg and Andreas Timm-Giel -- Voice Quality Improvement with Error Concealment in Audio Sensor Networks / Okan Turkes and Sebnem Baydere -- Analysis of the Cost of Handover in a Mobile Wireless Sensor Network / Qian Dong and Waltenegus Dargie -- Optimized Service Aware LTE MAC Scheduler with Comparison against Other Well Known Schedulers / Nikola Zahariev, Yasir Zaki, Xi Li, Carmelita Goerg and Thushara Weerawardane, et al. -- Achieving Energy-Efficiency with DTN: A Proof-of-Concept and Roadmap Study / Dimitris Vardalis and Vassilis Tsaoussidis -- A Novel Security Architecture for a Space-Data DTN / Nathan L. Clarke, Vasilis Katos, Sofia-Anna Menesidou, Bogdan Ghita and Steven Furnell -- Cirrus: A Disruption-Tolerant Cloud / Eleftheria Katsiri -- Reliable Data Streaming over Delay Tolerant Networks / Sotirios-Angelos Lenas, Scott C. Burleigh and Vassilis Tsaoussidis -- Space Mission Characteristics and Requirements to be Addressed by Space-Data Router Enhancement of Space-Data Exploitation / Ioannis A. Daglis, Olga Sykioti, Anastasios Anastasiadis, Georgios Balasis and Iphigenia Keramitsoglou, et al. -- DTN-tg A DTN Traffic Generator / Theodoros Amanatidis and Anastasios Malkotsis.
Record Nr. NYU-004622935
[WWIC (Conference) (10th : 2012 : Thēra, Greece)]  
Materiale a stampa
Lo trovi qui: New York University
Experimental algorithms : 11th International Symposium, SEA 2012, Bordeaux, France, June 7-9, 2012. Proceedings / Ralf Klasing (eds.).
Experimental algorithms : 11th International Symposium, SEA 2012, Bordeaux, France, June 7-9, 2012. Proceedings / Ralf Klasing (eds.).
Creatore [SEA (Symposium) (11th : 2012 : Bordeaux, France)]
Estensione 1 online resource.
Disciplina 005.1
Accesso persona Klasing, Ralf
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Computer software
Artificial intelligence
Algorithms
Algorithm Analysis and Problem Complexity
Information Systems Applications (incl. Internet)
ISBN 9783642308505
3642308503
9783642308499
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Automatic Decomposition and Branch-and-Price-A Status Report / Marco E. Lübbecke -- Continuous Local Strategies for Robotic Formation Problems / Barbara Kempkes and Friedhelm Meyer auf der Heide -- Engineering Graph Partitioning Algorithms / Vitaly Osipov, Peter Sanders and Christian Schulz -- Space Efficient Modifications to Structator- A Fast Index-Based Search Tool for RNA Sequence-Structure Patterns / Benjamin Albrecht and Volker Heun -- Implementation and Comparison of Heuristics for the Vertex Cover Problem on Huge Graphs / Eric Angel, Romain Campigotto and Christian Laforest -- How to Attack the NP-Complete Dag Realization Problem in Practice / Annabell Berger and Matthias Müller-Hannemann -- New Results about Multi-band Uncertainty in Robust Optimization / Christina Büsing and Fabio D'Andreagiovanni -- Compact Relaxations for Polynomial Programming Problems / Sonia Cafieri, Pierre Hansen, Lucas Létocart, Leo Liberti and Frédéric Messine -- Relaxations of Multilinear Convex Envelopes: Dual Is Better Than Primal / Alberto Costa and Leo Liberti -- On Computing the Diameter of Real-World Directed (Weighted) Graphs / Pierluigi Crescenzi, Roberto Grossi, Leonardo Lanzi and Andrea Marino -- Reoptimizing the Strengthened Metric TSP on Multiple Edge Weight Modifications / Annalisa D'Andrea and Guido Proietti.
Engineering a New Loop-Free Shortest Paths Routing Algorithm / Gianlorenzo D'Angelo, Mattia D'Emidio, Daniele Frigioni and Vinicio Maurizio -- Fully Dynamic Maintenance of Arc-Flags in Road Networks / Gianlorenzo D'Angelo, Mattia D'Emidio, Daniele Frigioni and Camillo Vitale -- A More Reliable Greedy Heuristic for Maximum Matchings in Sparse Random Graphs / Martin Dietzfelbinger, Hendrik Peilke and Michael Rink -- Branch Mispredictions Don't Affect Mergesort / Amr Elmasry, Jyrki Katajainen and Max Stenmark -- A Multiple Sliding Windows Approach to Speed Up String Matching Algorithms / Simone Faro and Thierry Lecroq -- Algorithms for Subnetwork Mining in Heterogeneous Networks / Guillaume Fertin, Hafedh Mohamed Babou and Irena Rusu -- Computing Strong Articulation Points and Strong Bridges in Large Scale Graphs / Donatella Firmani, Giuseppe F. Italiano, Luigi Laura, Alessio Orlandi and Federico Santaroni -- Adaptive Distributed b-Matching in Overlays with Preferences / Giorgos Georgiadis and Marina Papatriantafilou -- Dynamizing Succinct Tree Representations / Stelios Joannou and Rajeev Raman -- A Label Correcting Algorithm for the Shortest Path Problem on a Multi-modal Route Network / Dominik Kirchler, Leo Liberti and Roberto Wolfler Calvo -- Efficient Enumeration of the Directed Binary Perfect Phylogenies from Incomplete Data / Masashi Kiyomi, Yoshio Okamoto and Toshiki Saitoh.
Candidate Sets for Alternative Routes in Road Networks / Dennis Luxen and Dennis Schieferdecker -- Paired and Altruistic Kidney Donation in the UK: Algorithms and Experimentation / David F. Manlove and Gregg O'Malley -- An Evaluation of Community Detection Algorithms on Large-Scale Email Traffic / Farnaz Moradi, Tomas Olovsson and Philippas Tsigas -- Fast, Small, Simple Rank/Select on Bitmaps / Gonzalo Navarro and Eliana Providel -- Space-Efficient Top-k Document Retrieval / Gonzalo Navarro and Daniel Valenzuela -- Engineering Efficient Paging Algorithms / Gabriel Moruz, Andrei Negoescu, Christian Neumann and Volker Weichert -- Feasibility Pump Heuristics for Column Generation Approaches / Pierre Pesneau, Ruslan Sadykov and François Vanderbeck -- Exact Graph Search Algorithms for Generalized Traveling Salesman Path Problems / Michael N. Rice and Vassilis J. Tsotras -- Control Complexity in Bucklin, Fallback, and Plurality Voting: An Experimental Approach / Jörg Rothe and Lena Schend -- Advanced Coarsening Schemes for Graph Partitioning / Ilya Safro, Peter Sanders and Christian Schulz -- A Heuristic for Non-convex Variance-Based Clustering Criteria / Rodrigo F. Toso, Casimir A. Kulikowski and Ilya B. Muchnik -- A Decomposition Approach for Solving Critical Clique Detection Problems / Jose L. Walteros and Panos M. Pardalos.
Record Nr. NYU-004623038
[SEA (Symposium) (11th : 2012 : Bordeaux, France)]  
Materiale a stampa
Lo trovi qui: New York University
Software process improvement and capability determination : 12th International Conference, SPICE 2012, Palma, Spain, May 29-31, 2012. Proceedings / Antonia Mas [and others] (eds.).
Software process improvement and capability determination : 12th International Conference, SPICE 2012, Palma, Spain, May 29-31, 2012. Proceedings / Antonia Mas [and others] (eds.).
Creatore [SPICE 2012 (2012 : Palma de Mallorca, Spain)]
Estensione 1 online resource.
Disciplina 005.1
Accesso persona Mas, Antonia
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Software engineering
Computer software
Information systems
Management of Computing and Information Systems
Computers and Society
Algorithm Analysis and Problem Complexity
Computer Appl. in Administrative Data Processing
ISBN 9783642304392
3642304397
9783642304385
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part 1. Organizational Process Improvement 1 -- Critical Success Factors in Software Process Improvement: A Systematic Review / Sussy Bayona, Jose A. Calvo-Manzano and Tomás San Feliu -- Integrated Process Improvement Approach: Case Studies in Skype Technologies Ltd. / Anneli Tuisk, André Karpištšenko and Marion Lepmets -- A Case Study on Employee Perceptions of Organization Wide Continuous Process Improvement Activities / Algan Uskarcı and Onur Demirörs -- Part 2. SPI in Small and Very Small Enterprises -- Using Composition Trees to Validate an Entry Profile of Software Engineering Lifecycle Profiles for Very Small Entities (VSEs) / Lian Wen and Terry Rout -- Gained Experience by Making Intervention to Improve Software Process in Very Small Organizations / Mohammad Zarour, Jean-Marc Desharnais, Abdulrahman Alarifi, Naji Habra and Grégory Cassiers, et al. -- A Hierarchy of SPI Activities for Software SMEs: Results from ISO/IEC 12207-Based SPI Assessments / Paul Clarke, Rory V. O'Connor and Murat Yilmaz.
Part 3. Process Models 1 -- Innovation, Knowledge- and Technology Transfer Process Capability Model -- innoSPICETM / Jeremy Besson, Tanja Woronowicz, Antanas Mitasiunas and Michael Boronowsky -- A Case Study on Process Composition Using Enterprise SPICE Model / Amalia Alvarez, Santiago Matalonga and Tomás San Feliu -- Extending ISO/IEC 12207 with Software Product Management: A Process Reference Model Proposal / Fritz Stallinger and Robert Neumann -- Part 4. SPI in Automotive Software and Security -- An Experiment on Merging Quality Assessment in Automotive Domain / Morayo Adedjouma, Hubert Dubois, François Terrier and Tarek Kitouni -- A Process-Oriented Approach for Functional Safety Implementation in the Automotive Industry / Maria Antonieta Garcia, Ernesto Viale, Marco Bellotti and João Carlos Alchieri -- Designing a Process Reference Model for Information Security Management Systems / Olivier Mangin, Béatrix Barafort, Patrick Heymans and Eric Dubois.
Part 5. SPI in Medical and Safety Critical Systems -- Barriers to Adopting Agile Practices When Developing Medical Device Software / Martin McHugh, Fergal McCaffery and Valentine Casey -- Development of a Process Assessment Model for Assessing Medical IT Networks against IEC 80001-1 / Silvana Togneri MacMahon, Fergal McCaffery, Sherman Eagles, Frank Keenan and Marion Lepmets, et al. -- Traceability-Why Do It? / Gilbert Regan, Fergal McCaffery, Kevin McDaid and Derek Flood -- Part 6. Organizational Process Improvement 2 -- Improving the Tendering Process through the Deployment of PMBOK® / Antònia Mas and Antoni Lluís Mesquida -- FIRST: Common-Sense Process Scopes for Starting a Process Improvement Program / Luigi Buglione, Fergal McCaffery, Jean Carlo Rossa Hauck and Christiane Gresse von Wangenheim -- A Systematic Approach to the Comparison of Roles in the Software Development Processes / Murat Yilmaz, Rory V. O'Connor and Paul Clarke.
Part 7. Process Models 2 -- Framework for Usage of Multiple Software Process Models / Stasys Peldzius and Saulius Ragaisis -- Self-assessment Model and Review Technique for SPICE: SMART SPICE / Sharmistha Kar, Satyabrata Das, Amiya Kumar Rath and Subrata Kumar Kar -- Bayesian Network Based Bug-fix Effort Prediction Model / Bharathi V., Udaya Shastry and Joseph Raj -- Part 8. Short Papers -- A State of Art of Software Improvement Implementation Support Tools in SMEs / Mirna Muñoz, Antonio De Amescua, Jezreel Mejia, Jose A. Calvo-Manzano and Gonzalo Cuevas, et al. -- Adaptive Process Improvement Approaches / Ravindra Joshi -- Improving Risk Management Practices with Success Driver Analysis / Ernest Wallmüller -- Software Engineering Process and Quality Assurance Framework for Automotive Product Engineering Outsourcing / Manfred Schedl, Eugene Nebrat and Lyudmila Matveeva -- Applying Kaizen for Improving Productivity in Automotive Software Projects / Smitha Bhandary, Balaji Ramachandran and Basavaraj Betageri.
Best Practices for Achieving Automotive SPICE Capability Level 3 / Anna Orecka, Sebastian Dawid and Rafał Dzianach -- Development of the Medi SPICE PRM / Valentine Casey and Fergal McCaffery -- Concrete, Steel and ISO 15288 / Han van Loon -- DEFT -- A Test Framework to Aid Decision Making / Gerry Crines, Sarah Salahuddin and Donald Mackinnon -- Evaluating Management Sentiment towards ISO/IEC 29110 in Very Small Software Development Companies / Rory V. O'Connor -- Using Process Assessment Models Based on Multiple Process Reference Models in a Capability Determination Context / Terry Rout -- Using Target Process Profiles in the Real World / Han van Loon -- Agile Maturity Model: Oxymoron or the Next Level of Understanding / Tomas Schweigert, Risto Nevalainen, Detlef Vohwinkel, Morten Korsaa and Miklos Biro -- The Gamification of SPICE / Alec Dorling and Fergal McCaffery.
Record Nr. NYU-004623079
[SPICE 2012 (2012 : Palma de Mallorca, Spain)]  
Materiale a stampa
Lo trovi qui: New York University
Computer networks : 19th International Conference, CN 2012, Szczyrk, Poland, June 19-23, 2012. Proceedings / Andrzej Kwiecień, Piotr Gaj, Piotr Stera (eds.).
Computer networks : 19th International Conference, CN 2012, Szczyrk, Poland, June 19-23, 2012. Proceedings / Andrzej Kwiecień, Piotr Gaj, Piotr Stera (eds.).
Creatore [CN (Conference) (19th : 2012 : Szczyrk, Poland)]
Estensione 1 online resource.
Disciplina 004.6
Accesso persona Kwiecień, Andrzej
Gaj, Piotr
Stera, Piotr
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Computer system performance
Software engineering
Data protection
Systems and Data Security
Information Systems Applications (incl. Internet)
System Performance and Evaluation
Probability and Statistics in Computer Science
ISBN 9783642312175
3642312179
3642312160
9783642312168
Classificazione 54.32
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The Interactions of SOAP-Based Web Services for Recording and Replaying Video Files / Miroslav Voznak, Lukas Kapicak, Martin Mikulec, Pavel Nevlud and Jaroslav Zdralek -- A Friendliness Study of TCP Linux Variants / Christian Callegari, Stefano Giordano, Michele Pagano and Teresa Pepe -- Admission Policy in Web Services Based on Auction Approach / Jolanta Wrzuszczak-Noga and Leszek Borzemski -- Decentralized Algorithm for Joint Data Placement and Rate Allocation in Content-Aware Networks / Dariusz Gąsior and Maciej Drwal -- Development of Service Composition by Applying ICT Service Mapping / Jakub M. Tomczak, Katarzyna Cieślińska and Michał Pleszkun -- The Concept of Using Data Mining Methods for Creating Efficiency and Reliability Model of Middleware Applications / Kamil Folkert, Michał Bochenek and Łukasz Huczała -- Transfer of Quantum Continuous Variable and Qudit States in Quantum Networks / Marek Sawerwain and Roman Gielerak -- Quantum Computer Network Model for a Decision Making Algorithm / Joanna Wiśniewska -- Comparison of AQM Control Systems with the Use of Fluid Flow Approximation / Adam Domański, Joanna Domańska and Tadeusz Czachórski -- Testing and Scalability Analysis of Network Management Systems Using Device Emulation / Krzysztof Grochla and Leszek Naruszewicz -- Resource Management in Grid Systems / Dariusz Czerwinski, Slawomir Przylucki and Przemyslaw Matejczuk.
Spatio-temporal Web Performance Forecasting with Sequential Gaussian Simulation Method / Leszek Borzemski and Anna Kamińska-Chuchmała -- Efficiency of IP Packets Pre-marking for H264 Video Quality Guarantees in Streaming Applications / Slawomir Przylucki -- Universal Web Pages Content Parser / Piotr Pawlas, Adam Domański and Joanna Domańska -- Using Oracle 11.2g Database Server in Social Network Analysis Based on Recursive SQL / Lukasz Wycislik and Lukasz Warchal -- Estimation of Web Page Download Time / Krzysztof Zatwarnicki and Anna Zatwarnicka -- Improving Packet Reception and Forwarding within Virtualized Xen Environments / Tomasz Fortuna and Blazej Adamczyk -- Virtual Networks with the IPv6 Addressing in the Xen Virtualization Environment / Krzysztof Chudzik, Jan Kwiatkowski and Kamil Nowak -- Multi-agent Based Approach of Botnet Detection in Computer Systems / Oleg Savenko, Sergiy Lysenko and Andriy Kryschuk -- Preventing TMTO Attack in AES-CCMP in IEEE 802.11i / Iman Saberi, Bahareh Shojaie, Mazleena Salleh, Mahan Niknafskermani and Mohammad Javad Rostami -- Reverse Engineering of Microprocessor Program Code / Andrzej Kwiecień, Michał Maćkowski and Krzysztof Skoroniak -- Network Malware Activity -- A View from Honeypot Systems / Mirosław Skrzewski -- The Method of Information Security Based on Micrographics / Ivanna Dronjuk, Mariya Nazarkevych, Nikola Medykovski and Olena Gorodetska.
IP Storage Security Analysis / Tomasz Bilski -- Usage of Pseudo-estimator LAD and SARIMA Models for Network Traffic Prediction: Case Studies / Maciej Szmit and Anna Szmit -- Anonymization of Web Client Traffic Efficiency Study / Tomas Sochor -- Real-Time Communication Network Concept Based on Frequency Division Multiplexing / Jacek Stój -- Introduction to OPC UA Performance / Marcin Fojcik and Kamil Folkert -- Analysis of Challenge-Response Authentication in a Networked Control System / Wojciech Rząsa, Dariusz Rzońca, Andrzej Stec and Bartosz Trybus -- Management of Industrial Networks Based on the FCAPS Guidelines / Andrzej Kwiecień and Karol Opielka -- The Algorithms of Transmission Failure Detection in Master-Slave Networks / Marcin Sidzina and Błażej Kwiecień -- Model of the Threshold Mechanism with Double Hysteresis for Multi-service Networks / Maciej Sobieraj, Maciej Stasiak and Piotr Zwierzykowski -- Modeling of Energy Consumption for Mobile Wireless Ad Hoc and Sensor Networks / Jerzy Martyna -- Simulation Study of the Mobility Models for the Wireless Mobile Ad Hoc and Sensor Networks / Jerzy Martyna -- Realistic Model of Radio Communication in Wireless Sensor Networks / Mariusz Słabicki, Bartosz Wojciechowski and Tomasz Surmacz -- The Evaluation of Unconstrained Multicast Routing Algorithms in Ad-Hoc Networks / Maciej Piechowiak and Piotr Zwierzykowski.
Performance Evaluation of Cellular Communication Systems for M2M Communication in Smart Grid Applications / Ganesh Man Shrestha and Jürgen Jasperneite -- The Weather Impact on Speech Quality in GSM Networks / Jan Rozhon, Petr Blaha, Miroslav Voznak and Jan Skapa -- Tandem Retrial Queueing System with Correlated Arrival Flow and Operation of the Second Station Described by a Markov Chain / Chesoong Kim, Alexander Dudin and Valentina Klimenok -- On the Stationary Distribution of Tandem Queue Consisting of a Finite Number of Stations / Valentina Klimenok, Alexander Dudin and Vladimir Vishnevsky -- Busy Period Characteristics for Single Server Queue with Random Capacity Demands / Oleg Tikhonenko and Magdalena Kawecka -- A CPU-GPU Hybrid Approach to the Uniformization Method for Solving Markovian Models -- A Case Study of a Wireless Network / Beata Bylina, Marek Karwacki and Jarosław Bylina -- A Markovian Model of a Network of Two Wireless Devices / Jarosław Bylina, Beata Bylina and Marek Karwacki -- Cost-Oriented Recommendation Model for E-Commerce / Grzegorz Chodak and Grażyna Suchacka -- Uncertainty-Dependent Data Collection in Vehicular Sensor Networks / Bartłomiej Płaczek -- Numerical Calculations for Geophysics Inversion Problem Using Apache Hadoop Technology / Łukasz Krauzowicz, Kamil Szostek, Maciej Dwornik, Paweł Oleksik and Adam Piórkowski -- DCOM and CORBA Efficiency in the Wireless Network / Zdzislaw Onderka -- VANETs as a Part of Weather Warning Systems / Marcin Bernaś.
Record Nr. NYU-004623127
[CN (Conference) (19th : 2012 : Szczyrk, Poland)]  
Materiale a stampa
Lo trovi qui: New York University
Data integration in the life sciences : 9th International Conference, DILS 2013, Montreal, QC, Canada, July 11-12, 2013 : proceedings / Christopher J.O. Baker, Greg Butler, Igor Jurisica (eds.).
Data integration in the life sciences : 9th International Conference, DILS 2013, Montreal, QC, Canada, July 11-12, 2013 : proceedings / Christopher J.O. Baker, Greg Butler, Igor Jurisica (eds.).
Creatore [DILS (Conference) (9th : 2013 : Montréal, Québec)]
Estensione 1 online resource (x, 140 pages) : illustrations.
Disciplina 005.7
Accesso persona Baker, Christopher J. O.
Butler, G. (Gregory), 1953-
Jurisica, Igor
Genere/Forma Electronic books
Ebook
Congresses
Soggetto non controllato Computer science
Computer Communication Networks
Database management
Data mining
Information storage and retrieval systems
Artificial intelligence
Information Systems Applications (incl. Internet)
ISBN 9783642394379
364239437X
9783642394362
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Changing the Model in Pharma and Healthcare -- Can We Afford to Wait Any Longer? / Erich Alfred Gombocz -- Ibidas: Querying Flexible Data Structures to Explore Heterogeneous Bioinformatics Data / Marc Hulsman, Jan J. Bot, Arjen P. de Vries -- From Questions to Effective Answers: On the Utility of Knowledge-Driven Querying Systems for Life Sciences Data / Amir H. Asiaee, Prashant Doshi, Todd Minning -- OmixAnalyzer -- A Web-Based System for Management and Analysis of High-Throughput Omics Data Sets / Thomas Stoltmann, Karin Zimmermann -- The RDF Pipeline Framework: Automating Distributed, Dependency-Driven Data Pipelines / David Booth -- Towards Interoperable BioNLP Semantic Web Services Using the SADI Framework / Ahmad C. Bukhari, Artjom Klein -- Optimizing Similarity Computations for Ontology Matching -- Experiences from GOMMA / Michael Hartung, Lars Kolb, Anika Groß -- Semi-automatic Adaptation of Mappings between Life Science Ontologies / Anika Groß, Julio Cesar Dos Reis, Michael Hartung -- Next Generation Cancer Data Discovery, Access, and Integration Using Prizms and Nanopublications / James P. McCusker, Timothy Lebo -- Putting It All Together: The Design of a Pipeline for Genome-Wide Functional Annotation of Fungi in the Modern Era of "-Omics" Data and Systems Biology / Greg Butler -- Mining Anti-coagulant Drug-Drug Interactions from Electronic Health Records Using Linked Data / Jyotishman Pathak, Richard C. Kiefer.
Record Nr. NYU-004648849
[DILS (Conference) (9th : 2013 : Montréal, Québec)]  
Materiale a stampa
Lo trovi qui: New York University
Network robustness under large-scale attacks / Qing Zhou [and others]
Network robustness under large-scale attacks / Qing Zhou [and others]
Estensione 1 online resource.
Disciplina 005.8
Accesso persona Zhou, Qing
Genere/Forma Electronic books
Soggetto non controllato Engineering
Computer Communication Networks
Data structures (Computer science)
Telecommunication
Communications Engineering, Networks
Data Structures, Cryptology and Information Theory
ISBN 9781461448600
1461448603
9781461448594
146144859X
9781283908269
1283908263
9781461448597
Classificazione 54.32
54.33
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- System Models -- Link-Level Network Robustness to Area Attacks -- Network-Wide Robustness to Area Attacks -- Simulation Results -- Conclusion.
Record Nr. NYU-004624674
Materiale a stampa
Lo trovi qui: New York University
Economics of information security and privacy III / Bruce Schneier, editor
Economics of information security and privacy III / Bruce Schneier, editor
Estensione 1 online resource
Disciplina 005.8
Accesso persona Schneier, Bruce, 1963-
Genere/Forma Electronic books
Congresses
Soggetto non controllato Computer science
Computer network architectures
Computer Communication Networks
Data protection
Economics
Systems and Data Security
Data Structures, Cryptology and Information Theory
Computer Systems Organization and Communication Networks
ISBN 9781461419815
1461419816
1461419808
9781461419808
9781461419851 (eBook)
Classificazione 54.32
54.62
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The Impact of Immediate Disclosure on Attack Diffusion and Volume / Sam Ransbotham and Sabyasachi Mitra -- Where Do All the Attacks Go? / Dinei Florêncio and Cormac Herley -- Sex, Lies and Cyber-Crime Surveys / Dinei Florêncio and Cormac Herley -- The Underground Economy of Fake Antivirus Software / Brett Stone-Gross, Ryan Abman, Richard A. Kemmerer, Christopher Kruegel and Douglas G. Steigerwald, et al. -- The Inconvenient Truth About Web Certificates / Nevena Vratonjic, Julien Freudiger, Vincent Bindschaedler and Jean-Pierre Hubaux -- Resilience of the Internet Interconnection Ecosystem / Chris Hall, Ross Anderson, Richard Clayton, Evangelos Ouzounis and Panagiotis Trimintzios -- Modeling Internet-Scale Policies for Cleaning up Malware / Steven Hofmeyr, Tyler Moore, Stephanie Forrest, Benjamin Edwards and George Stelle -- Fixed Costs, Investment Rigidities, and Risk Aversion in Information Security: A Utility-theoretic Approach / Christos Ioannidis, David Pym and Julian Williams -- Are Home Internet Users Willing to Pay ISPs for Improvements in Cyber Security? / Brent Rowe and Dallas Wood -- Economic Methods and Decision Making by Security Professionals / Adrian Baldwin, Yolanta Beres, Geoffrey B. Duggan, Marco Casassa Mont and Hilary Johnson, et al. -- Real Name Verification Law on the Internet: A Poison or Cure for Privacy? / Daegon Cho -- The Privacy Landscape: Product Differentiation on Data Collection / Sören Preibusch and Joseph Bonneau.
Record Nr. NYU-004624895
Materiale a stampa
Lo trovi qui: New York University
Radio frequency identification : Security and privacy issues : 8th International Workshop, RFIDSec 2012, Nijmegen, the Netherlands, July 2-3, 2012, Revised selected papers / Jaap-Henk Hoepman, Ingrid Verbauwhede (eds.).
Radio frequency identification : Security and privacy issues : 8th International Workshop, RFIDSec 2012, Nijmegen, the Netherlands, July 2-3, 2012, Revised selected papers / Jaap-Henk Hoepman, Ingrid Verbauwhede (eds.).
Creatore [RFIDSec (Workshop) (8th : 2012 : Nijmegen, Netherlands)]
Estensione 1 online resource.
Disciplina 621.3841/92
Accesso persona Hoepman, Jaap-Henk
Verbauwhede, Ingrid
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Software engineering
Data protection
Data encryption (Computer science)
Information systems
Systems and Data Security
e-Commerce/e-business
ISBN 9783642361401
3642361404
3642361390
9783642361395
Classificazione 54.62
53.77
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto On the Security of Tan et al. Serverless RFID Authentication and Search Protocols / Masoumeh Safkhani, Pedro Peris-Lopez -- Yet Another Ultralightweight Authentication Protocol That Is Broken / Gildas Avoine -- Improved Anonymity for Key-Trees / Thijs Veugen, Michael Beye -- Hidden Bits Approach for Authentication in RFID Systems / Marek Klonowski, Krzysztof Majcher -- Designated Attribute-Based Proofs for RFID Applications / Gergely Alpár, Lejla Batina, Wouter Lueks -- T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags / Kaoutar Elkhiyaoui, Erik-Oliver Blass -- Private Yoking Proofs: Attacks, Models and New Provable Constructions / Jens Hermans, Roel Peeters -- Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems / Gesine Hinterwälder, Christof Paar -- Weakening ePassports through Bad Implementations / Luigi Sportiello -- Never Trust a Bunny / Daniel J. Bernstein, Tanja Lange -- On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller / Hannes Groß, Thomas Plos -- DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification / Daniel E. Holcomb, Amir Rahmati.
Record Nr. NYU-004626759
[RFIDSec (Workshop) (8th : 2012 : Nijmegen, Netherlands)]  
Materiale a stampa
Lo trovi qui: New York University
Network and system security : 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings / Javier Lopez, Xinyi Huang, Ravi Sandhu (eds.).
Network and system security : 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings / Javier Lopez, Xinyi Huang, Ravi Sandhu (eds.).
Creatore [International Conference on Network and System Security (7th : 2013 : Madrid, Spain)]
Estensione 1 online resource.
Disciplina 005.8
Accesso persona López, Javier
Huang, Xinyi
Sandhu, Ravi
Genere/Forma Electronic books
Conference papers and proceedings
Ebook
Congresses
Soggetto non controllato Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Information Systems
Systems and Data Security
Management of Computing and Information Systems
e-Commerce/e-business
ISBN 9783642386312
3642386318
9783642386305
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto NSS 2013 Regular Papers. Network Security: Modeling and Evaluation. Stochastic Traffic Identification for Security Management: eDonkey Protocol as a Case Study / Rafael A. Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro García-Teodoro -- A Technology Independent Security Gateway for Real-Time Multimedia Communication / Fudong Li, Nathan Clarke, Steven Furnell -- Efficient Attribute Based Access Control Mechanism for Vehicular Ad Hoc Network / Y. Sreenivasa Rao, Ratna Dutta -- Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection / Yuxin Meng, Wenjuan Li, Lam-for Kwok -- Model the Influence of Sybil Nodes in P2P Botnets / Tianzuo Wang [and others] -- Network Security: Security Protocols and Practice. A Novel Security Protocol for Resolving Addresses in the Location/ID Split Architecture / Mahdi Aiash -- The OffPAD: Requirements and Usage / Kent Are Varmedal [and others] -- Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks / Sashi Gurung [and others] -- Using Trusted Platform Modules for Location Assurance in Cloud Networking / Christoph Krauß, Volker Fusenig.
Network Security: Network Attacks and Defense. Tracing Sources of Anonymous Slow Suspicious Activities / Harsha K. Kalutarage [and others] -- Static Analysis for Regular Expression Denial-of-Service Attacks / James Kirrage, Asiri Rathnayake, Hayo Thielecke -- Next-Generation DoS at the Higher Layers: A Study of SMTP Flooding / Gabriel Cartier, Jean-François Cartier, José M. Fernandez -- Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning / Tamas K. Lengyel [and others] -- System Security: Malware and Intrusions. MADS: Malicious Android Applications Detection through String Analysis / Borja Sanz [and others] -- X-TIER: Kernel Module Injection / Sebastian Vogl [and others] -- Leveraging String Kernels for Malware Detection / Jonas Pfoh, Christian Schneider, Claudia Eckert -- Insiders Trapped in the Mirror Reveal Themselves in Social Media / Miltiadis Kandias [and others].
System Security: Applications Security. On Business Logic Vulnerabilities Hunting: The APP_LogGIC Framework / George Stergiopoulos, Bill Tsoumas, Dimitris Gritzalis -- Using the Smart Card Web Server in Secure Branchless Banking / Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis -- Liability for Data Breaches: A Proposal for a Revenue-Based Sanctioning Approach / Maurizio Naldi, Marta Flamini, Giuseppe D'Acquisto -- Efficient and Private Three-Party Publish/Subscribe / Giovanni Di Crescenzo [and others] -- System Security: Security Algorithms and Systems. Marlin: A Fine Grained Randomization Approach to Defend against ROP Attacks / Aditi Gupta [and others] -- Mobile Trusted Agent (MTA): Build User-Based Trust for General-Purpose Computer Platform / Wei Feng [and others] -- Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines / Suaad Alarifi, Stephen Wolthusen -- JShadObf: A JavaScript Obfuscator Based on Multi-Objective Optimization Algorithms / Benoît Bertholon, Sébastien Varrette, Pascal Bouvry.
Cryptographic Algorithms I. Forward Secure Certificateless Proxy Signature Scheme / Jiguo Li, Yanqiong Li, Yichen Zhang -- Leakage-Resilient Zero-Knowledge Proofs of Knowledge for NP / Hongda Li, Qihua Niu, Bei Liang -- On the Security of an Efficient Attribute-Based Signature / Yan Zhang [and others] -- Factoring RSA Modulus with Known Bits from Both p and q: A Lattice Method / Yao Lu, Rui Zhang, Dongdai Lin -- Cryptographic Algorithms II. Performance Prediction Model for Block Ciphers on GPU Architectures / Naoki Nishikawa [and others] -- Threshold-Oriented Optimistic Fair Exchange / Yang Wang [and others] -- Secure Storage and Fuzzy Query over Encrypted Databases / Zheli Liu [and others] -- A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation / Yunhui Zhuang [and others].
Privacy. Privacy Preserving Context Aware Publish Subscribe Systems / Mohamed Nabeel [and others] -- A New Unpredictability-Based RFID Privacy Model / Anjia Yang [and others] -- Privacy-Preserving Multi-party Reconciliation Using Fully Homomorphic Encryption / Florian Weingarten [and others] -- Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party Setting / Weijia Wang, Lei Hu, Yong Li -- Key Agreement and Distribution. Light Weight Network Coding Based Key Distribution Scheme for MANETs / Jianwei Liu [and others] Identity-Based Dynamic Authenticated Group Key Agreement Protocol for Space Information Network / Chao Wang [and others] Authentication and Key Agreement Based on Hyper-sphere Using Smart Cards / Shaohua Tang, Lingling Xu -- An Efficient Constant Round ID-Based Group Key Agreement Protocol for Ad Hoc Networks / Elisavet Konstantinou.
NSS 2013 Short Papers. Human Identification with Electroencephalogram (EEG) for the Future Network Security / Xu Huang [and others] Building Better Unsupervised Anomaly Detector with S-Transform / Sirikarn Pukkawanna [and others] Fault-Tolerant Topology Control Based on Artificial Immune Theory in WMNs / Jing Chen [and others] Virtually Reconfigurable Secure Wireless Networks Using Broadcast Tokens / Kannan Karthik On the Use of Key Assignment Schemes in Authentication Protocols / James Alderman, Jason Crampton On the Interactions between Privacy-Preserving, Incentive, and Inference Mechanisms in Participatory Sensing Systems / Idalides J. Vergara-Laurens, Diego Mendez-Chaves, Miguel A. Labrador Security Authentication of AODV Protocols in MANETs / Ahmad Alomari -- Architecture for Trapping Toll Fraud Attacks Using a VoIP Honeynet Approach / Markus Gruber [and others].
Towards a Privacy-Preserving Solution for OSNs / Qiang Tang -- Measuring and Comparing the Protection Quality in Different Operating Systems / Zhihui Han [and others] -- Collusion-Resistant Domain-Specific Pseudonymous Signatures / Julien Bringer, Hervé Chabanne, Alain Patey -- On the Applicability of Time-Driven Cache Attacks on Mobile Devices / Raphael Spreitzer, Thomas Plos -- Ancestor Excludable Hierarchical ID-Based Encryption Revisited / Fan Zhang, Hua Guo, Zhoujun Li -- Think Twice before You Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks / Yan Li [and others] -- A Dynamic and Multi-layer Reputation Computation Model for Multi-hop Wireless Networks / Jia Hu, Hui Lin, Li Xu -- Distributed and Anonymous Publish-Subscribe / Jörg Daubert [and others] -- Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs / Giovanni Agosta [and others].
NSS 2013 Industrial Track Papers. Combining Dynamic Passive Analysis and Active Fingerprinting for Effective Bot Malware Detection in Virtualized Environments / Shun-Wen Hsiao [and others] -- Filtering Trolling Comments through Collective Classification / Jorge de-la-Peña-Sordo [and others] Security Analysis of Touch Inputted Passwords / Bruno Alves Pereira Botelho, Emilio Tissato Nakamura, Nelson Uto -- A Pairing-Free Identity Based Authentication Framework for Cloud Computing / Dheerendra Mishra, Vinod Kumar, Sourav Mukhopadhyay -- Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols / Alessandro Armando, Roberto Carbone, Luca Zanetti -- Towards a More Secure Apache Hadoop HDFS Infrastructure / Jason Cohen, Subatra Acharya -- A Formally Verified Initial Authentication and Key Agreement Protocol in Heterogeneous Environments Using Casper/FDR / Mahdi Aiash -- A Comprehensive Access Control System for Scientific Applications / Muhammad I. Sarfraz [and others] -- Partial Fingerprint Reconstruction with Improved Smooth Extension / Wei Zhou [and others] -- Modeling and Analysis for Thwarting Worm Propagation in Email Networks / Sheng Wen, Yang Xiang, Wanlei Zhou -- On Secure and Power-Efficient RFID-Based Wireless Body Area Network / Sana Ullah, Waleed Alsalih -- Towards Authenticated Objects / Daniele Midi, Ashish Kundu, Elisa Bertino -- A Finger-Vein Based Cancellable Bio-cryptosystem / Wencheng Yang, Jiankun Hu, Song Wang.
Record Nr. NYU-004638142
[International Conference on Network and System Security (7th : 2013 : Madrid, Spain)]  
Materiale a stampa
Lo trovi qui: New York University
Agents and data mining interaction : 7th international workshop, ADMI 2011, Taipei, Taiwan, May 2-6, 2011 : revised selected papers / Longbing Cao [and others] (eds.).
Agents and data mining interaction : 7th international workshop, ADMI 2011, Taipei, Taiwan, May 2-6, 2011 : revised selected papers / Longbing Cao [and others] (eds.).
Creatore [ADMI (Workshop) (7th : 2011 : Taipei, Taiwan)]
Estensione 1 online resource (xiii, 359 pages) : illustrations.
Disciplina 006.3
Accesso persona Cao, Longbing, 1969-
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Database management
Data mining
Information storage and retrieval systems
Artificial intelligence
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
Data Mining and Knowledge Discovery
ISBN 9783642276095
3642276091
9783642276088
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-004621005
[ADMI (Workshop) (7th : 2011 : Taipei, Taiwan)]  
Materiale a stampa
Lo trovi qui: New York University