Atjaunināt sīkdatņu piekrišanu

Networked Systems: Second International Conference, NETYS 2014, Marrakech, Morocco, May 15-17, 2014. Revised Selected Papers 2014 ed. [Mīkstie vāki]

Edited by , Edited by
  • Formāts: Paperback / softback, 348 pages, height x width: 235x155 mm, weight: 5504 g, 110 Illustrations, black and white; XV, 348 p. 110 illus., 1 Paperback / softback
  • Sērija : Computer Communication Networks and Telecommunications 8593
  • Izdošanas datums: 15-Aug-2014
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319095803
  • ISBN-13: 9783319095806
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 348 pages, height x width: 235x155 mm, weight: 5504 g, 110 Illustrations, black and white; XV, 348 p. 110 illus., 1 Paperback / softback
  • Sērija : Computer Communication Networks and Telecommunications 8593
  • Izdošanas datums: 15-Aug-2014
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319095803
  • ISBN-13: 9783319095806
Citas grāmatas par šo tēmu:
This book constitutes the revised selected papers of the Second International Conference on Networked Systems, NETYS 2014, held in Marrakech, Morocco, in May 2014. The 20 full papers and the 6 short papers presented together with 2 keynotes were carefully reviewed and selected from 80 submissions. They address major topics such as multi-core architectures; concurrent and distributed algorithms; middleware environments; storage clusters; social networks; peer-to-peer networks; sensor networks; wireless and mobile networks; as well as privacy and security measures to protect such networked systems and data from attack and abuse.

Multi-core architectures.- Concurrent and distributed algorithms.- Middleware environments.- Storage clusters.- Social networks.- Peer-to-peer networks.- Sensor networks.- Wireless and mobile networks.
Multi-core architectures.- Concurrent and distributed algorithms.- Middleware environments.- Storage clusters.- Social networks.- Peer-to-peer networks.- Sensor networks.- Wireless and mobile networks.