Atjaunināt sīkdatņu piekrišanu

Frontiers in Internet Technologies: Second CCF Internet Conference of China, ICoC 2013, Zhangjiajie, China. Revised Selected Papers 2013 ed. [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 277 pages, height x width: 235x155 mm, weight: 4453 g, 132 Illustrations, black and white; XII, 277 p. 132 illus., 1 Paperback / softback
  • Sērija : Communications in Computer and Information Science 401
  • Izdošanas datums: 07-Jan-2014
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642539580
  • ISBN-13: 9783642539589
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 277 pages, height x width: 235x155 mm, weight: 4453 g, 132 Illustrations, black and white; XII, 277 p. 132 illus., 1 Paperback / softback
  • Sērija : Communications in Computer and Information Science 401
  • Izdošanas datums: 07-Jan-2014
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642539580
  • ISBN-13: 9783642539589
This book constitutes the refereed proceedings of the Second CCF Internet Conference of China, ICoC 2013, held in Zhangjiajie, China, in July 2013. The 24 revised full papers presented were carefully reviewed and selected from 63 submissions. The papers address issues such as future Internet architecture, Internet routing, network security, network management, data center networks, green networks, wireless networks, P2P networks, mobile Internet and the Internet of Things.
A Prediction Algorithm for Real-Time Video Traffic Based on Wavelet Packet
1(8)
Yingyou Wen
Zhi Li
Jian Chen
Hong Zhao
The Evaluation of Online Social Network's Nodes Influence Based on User's Attribute and Behavior
9(12)
Xiushuang Yi
Yeting Han
Xingwei Wang
A Bayesian Investment Model for Online P2P Lending
21(10)
Xubo Wang
Defu Zhang
Xiangxiang Zeng
Xiaoying Wu
Sub-channel and Power Allocation for Multiuser OFDM Systems with Proportional Rate Constraints Based on Genetic Algorithms
31(9)
Weihai Li
Yunxiao Zu
Yue Jia
On the Spatial-temporal Reachability of DTNs
40(10)
Cheng Zhang
Chunhe Xia
Haiquan Wang
Xiaojian Li
Research on Efficient Non-slotted Tree Structures for Advance Reservation
50(12)
Libing Wu
Ping Dang
Tianshui Yu
Lei Nie
A PSO-Optimized Nash Equilibrium-Based Task Scheduling Algorithm for Wireless Sensor Network
62(12)
Jiaye Chen
Wenzhong Guo
An Efficient Lookup Service in DHT Based Communication System
74(11)
Kai Shuang
Peng Zhang
Sen Su
An Improved Cooperative Model of P2P and ISP
85(12)
Ying Liu
Shenglin Zhang
Hongying Liu
Assessing Survivability of Inter-domain Routing System under Cascading Failures
97(12)
Yujing Liu
Wei Peng
Jinshu Su
Zhilin Wang
The Adaptive Multicast Data Origin Authentication Protocol
109(13)
Liehuang Zhu
Hao Yang
Zhenghe Yang
A Computer Network Defense Policy Refinement Method
122(12)
Zhao Wei
Yanli Lv
Chunhe Xia
Yang Luo
Qing Wei
An Efficient Update Mechanism for GPU-Based IP Lookup Engine Using Threaded Segment Tree
134(11)
Yanbiao Li
Dafang Zhang
Gaogang Xie
Jintao Zheng
Wei Zhao
Research on Resource Management in PaaS Based on IaaS Environment
145(13)
Peng Xu
Rui Hu
Sen Su
A Conflict-Related Rules Detection Tool for Access Control Policy
158(12)
Xiaoyan Liang
Liangshuang Lv
Chunhe Xia
Yang Luo
Yazhuo Li
East-West Bridge for SDN Network Peering
170(12)
Pingping Lin
Jun Bi
Yangyang Wang
A Connectivity Invariant Dynamic Multichannel Assignment Method for Vanet
182(12)
Tong Zhao
Shanbo Lu
Wei Yan
Xiaoming Li
VRBAC: An Extended RBAC Model for Virtualized Environment and Its Conflict Checking Approach
194(12)
Yang Luo
Yazhuo Li
Qing Tang
Zhao Wei
Chunhe Xia
TraSt: A Traffic Statistic Framework for Evaluating 3G Charging System and Smart Phone Applications
206(12)
Wenshan Fu
Tong Zhao
Kaigui Bian
Wei Yan
A Novel Direct Anonymous Attestation Scheme Using Secure Two-Party Computation
218(18)
Xiaohan Yue
Fucai Zhou
Towards Internet Innovation: Software Defined Data Plane
236(12)
Gaofeng Lv
Zhigang Sun
Yijiao Chen
Tao Li
Mining Network Behavior Specifications of Malware Based on Binary Analysis
248(8)
Peidai Xie
Yongjun Wang
Huabiao Lu
Meijian Li
Jinshu Su
CoISM: Improving Security and Accuracy of BGP through Information Sharing
256(10)
Ning Hu
BaoSheng Wang
Detecting Community Structures in Social Networks with Particle Swarm Optimization
266(11)
Yuzhong Chen
Xiaohui Qiu
Author Index 277