OPEN EDUCATIONAL RESOURCES

UPA PERPUSTAKAAN UNEJ | NPP. 3509212D1000001

  • Home
  • Admin
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
  • General Material Designation
    See More
  • Location
  • Language
Found 170 from your keywords: subject="Communication Network...
First Page Previous 11 12 13 14 15 Next Last Page
cover
Energy Informatics 4th D-A-CH Conference, EI 2015, Karlsruhe, Germany, Novem…
Comment Share
GOTTWALT, SebastianKONING, LukasSCHMECK, Hartmut

This book constitutes the refereed proceedings of the 4th D-A-CH Conference on Energy Informatics, D-A-CH EI 2015, held in Karlsruhe, Germany, in November 2015. The 18 revised full papers presented were carefully reviewed and selected from 36 submissions. The papers are organized in topical sections on distributed energy sources and storage, smart meters and monitoring, research lab infrastruc…

Edition
-
ISBN/ISSN
978-3-319-25876-8
Collation
92 b/w illustrations
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Energy Efficient Servers Blueprints for Data Center Optimization
Comment Share
GOUGH, CoreySTEINER, IanSAUNDERS, Winston

Energy Efficient Servers: Blueprints for Data Center Optimization introduces engineers and IT professionals to the power management technologies and techniques used in energy efficient servers. The book includes a deep examination of different features used in processors, memory, interconnects, I/O devices, and other platform components. It outlines the power and performance impact of these fea…

Edition
-
ISBN/ISSN
978-1-4302-6638-9
Collation
103 b/w illustrations
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Networks of Dissipative Systems
Comment Share
ARCAK, MuratMEISSEN, ChrisPACKARD, Andrew

This book addresses a major problem for today’s large-scale networked systems: certification of the required stability and performance properties using analytical and computational models. On the basis of illustrative case studies, it demonstrates the applicability of theoretical methods to biological networks, vehicle fleets, and Internet congestion control. Rather than tackle the network as…

Edition
1
ISBN/ISSN
978-3-319-29927-3
Collation
X, 102
Series Title
SpringerBriefs in Electrical and Computer Engineering
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Networked Systems
Comment Share
BOUAJJANI, AhmedFAUCONNIOR, Hugues

This book constitutes the revised selected papers of the Third International Conference on Networked Systems, NETYS 2015, held in Agadir, Morocco, in May 2015. The 29 full papers and 12 short papers presented together with 22 poster abstracts were carefully reviewed and selected from 133 submissions. They address major topics such as multi-core architectures; concurrent and distributed algorith…

Edition
1
ISBN/ISSN
978-3-319-26849-1
Collation
XXVIII, 526
Series Title
Lecture Notes in Computer Science
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Network and System Security
Comment Share
QIU, MeikangXU, ShouhuaiYUNG, MotiZHANG, Haibo

This book constitutes the proceedings of the 9th International Conference on Network and System Security, NSS 2015, held in New York City, NY, USA, in November 2015. The 23 full papers and 18 short papers presented were carefully reviewed and selected from 110 submissions. The papers are organized in topical sections on wireless security and privacy; smartphone security; systems security; appl…

Edition
1
ISBN/ISSN
978-3-319-25644-3
Collation
XIV, 542
Series Title
Lecture Notes in Computer Science
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Network Coding at Different Layers in Wireless Networks
Comment Share
QIN, Yang

This book focuses on how to apply network coding at different layers in wireless networks – including MAC, routing, and TCP – with special focus on cognitive radio networks. It discusses how to select parameters in network coding (e.g., coding field, number of packets involved, redundant information ration) in order to be suitable for the varying wireless environments. The author explores h…

Edition
1
ISBN/ISSN
978-3-319-29768-2
Collation
VII, 183
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Nature of Computation and Communication:International Conference, ICTCC 2014,…
Comment Share
VINH, Phan CongVASSEV, EmilHINCHEY, Mike

This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Nature of Computation and Communication, ICTCC 2014, held in November 2014 in Ho Chi Minh City, Vietnam. The 34 revised full papers presented were carefully reviewed and selected from over 100 submissions. The papers cover formal methods for self-adaptive systems and discuss natural appr…

Edition
1
ISBN/ISSN
978-3-319-15391-9
Collation
XIII, 371
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Multiple Access Communications:8th International Workshop, MACOM 2015, Helsin…
Comment Share
JONSSON, MagnusVINEL, AlexeyBELLALTA, BorisTIRKKONEN, Olav

This book constitutes the refereed proceedings of the 8th International Workshop on Multiple Access Communications, MACOM 2015, held in Helsinki, Finland, in September 2015. The 12 full papers presented were carefully reviewed and selected from 18 submissions. They describe the latest advancements in the field of multiple access communications with an emphasis on wireless sensor networks; ph…

Edition
1
ISBN/ISSN
978-3-319-23439-7
Collation
X, 159
Series Title
Lecture Notes in Computer Science
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Encrypted Email The History and Technology of Message Privacy
Comment Share
ORMAN, Hilarie

This SpringerBrief examines the technology of email privacy encryption from its origins to its theoretical and practical details. It explains the challenges in standardization, usability, and trust that interfere with the user experience for software protection. Chapters address the origins of email encryption and why email encryption is rarely used despite the myriad of its benefits -- benefit…

Edition
-
ISBN/ISSN
978-3-319-21344-6
Collation
4 b/w illustrations
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Multi-hop Routing in Wireless Sensor Networks
Comment Share
RANI, ShalliAHMED, Syed Hassan

This brief provides an overview of recent developments in multi-hop routing protocols for Wireless Sensor Networks (WSNs). It introduces the various classifications of routing protocols and lists the pros and cons of each category, going beyond the conceptual overview of routing classifications offered in other books. Recently many researchers have proposed numerous multi-hop routing protocols …

Edition
1
ISBN/ISSN
2191-8112
Collation
X, 69
Series Title
SpringerBriefs in Electrical and Computer Engineering
Call Number
-
Availability0
Add to basket
MARC DownloadCite
First Page Previous 11 12 13 14 15 Next Last Page
OPEN EDUCATIONAL RESOURCES

Search

start it by typing one or more keywords for title, author or subject


Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?