OPEN EDUCATIONAL RESOURCES

UPA PERPUSTAKAAN UNEJ | NPP. 3509212D1000001

  • Home
  • Admin
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
  • General Material Designation
    See More
  • Location
  • Language
Found 414 from your keywords: subject="Network"
First Page Previous 21 22 23 24 25 Next Last Page
cover
Novel 3D Media Technologies
Comment Share
KONDOZ, AhmetDAGIUKLAS, Tasos

This book describes recent innovations in 3D media and technologies, with coverage of 3D media capturing, processing, encoding, and adaptation, networking aspects for 3D Media, and quality of user experience (QoE). The contributions are based on the results of the FP7 European Project ROMEO, which focuses on new methods for the compression and delivery of 3D multi-view video and spatial audio, …

Edition
1
ISBN/ISSN
978-1-4939-2025-9
Collation
Number of Pages IX, 249
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Nonlinear Stochastic Systems with Network-Induced Phenomena: Recursive Filter…
Comment Share
HU, JunWANG, ZidongGAO, Huijun

This monograph introduces methods for handling filtering and control problems in nonlinear stochastic systems arising from network-induced phenomena consequent on limited communication capacity. Such phenomena include communication delay, packet dropout, signal quantization or saturation, randomly occurring nonlinearities and randomly occurring uncertainties. The text is self-contained, begi…

Edition
1
ISBN/ISSN
978-3-319-08710-8
Collation
XV, 223
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Financial Cryptography and Data Security
Comment Share
BÖHME, RainerOKAMOTO, Tatsuaki

This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Financial Cryptography and Data Security, FC 2014, held in San Juan, Puerto Rico, in January 2015. The 23 revised full papers and 10 short papers were carefully selected and reviewed from 102 full papers submissions. The papers are grouped in the following topical sections: sidechan…

Edition
-
ISBN/ISSN
978-3-662-47854-7
Collation
XIV, 574
Series Title
Lecture Notes in Computer Science
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Dependability problems of complex information systems
Comment Share
Wojciech Zamojski

This monograph presents original research results on selected problems of dependability in contemporary Complex Information Systems (CIS). The ten chapters are concentrated around the following three aspects: methods for modelling of the system and its components, tasks? or in more generic and more adequate interpretation, functionalities? accomplished by the system and conditions for their cor…

Edition
-
ISBN/ISSN
9783319089645
Collation
x, 189 pages
Series Title
-
Call Number
004.6
Availability0
Add to basket
MARC DownloadCite
cover
IT Security Risk Management in the Context of Cloud Computing: Towards an Und…
Comment Share
LOSKE, André

This work adds a new perspective to the stream of organizational IT security risk management literature, one that sheds light on the importance of IT security risk perceptions. Based on a large-scale empirical study of Cloud providers located in North America, the study reveals that in many cases, the providers’ decision makers significantly underestimate their services’ IT security risk ex…

Edition
-
ISBN/ISSN
978-3-658-11339-1
Collation
XXII, 167
Series Title
-
Call Number
004 LOS
Availability0
Add to basket
MARC DownloadCite
cover
Anti-Jamming Transmissions in Cognitive Radio Networks
Comment Share
XIAO, Liang

This SpringerBrief examines anti-jamming transmissions in cognitive radio networks (CRNs), including several recent related research topics within this field. The author introduces the transmissions based on uncoordinated spread spectrum to address smart jammers in CRNs. The author applies game theory to investigate the interactions between secondary users and jammers while providing game th…

Edition
Ed. 1
ISBN/ISSN
978-3-319-24292-7
Collation
VIII, 76
Series Title
-
Call Number
004.6 XIA a
Availability0
Add to basket
MARC DownloadCite
cover
Analysis of Computer Networks
Comment Share
GEBALI, Fayez

This textbook presents the mathematical theory and techniques necessary for analyzing and modeling high-performance global networks, such as the Internet. The three main building blocks of high-performance networks are links, switching equipment connecting the links together and software employed at the end nodes and intermediate switches. This book provides the basic techniques for modeling an…

Edition
Ed. 1
ISBN/ISSN
978-3-319-15657-6
Collation
XXV, 589
Series Title
-
Call Number
004.6 GEB a
Availability0
Add to basket
MARC DownloadCite
cover
Analysis and Design of Networked Control Systems
Comment Share
YOU, KeyouXIAO, NanXIE, Lihua

This monograph focuses on characterizing the stability and performance consequences of inserting limited-capacity communication networks within a control loop. The text shows how integration of the ideas of control and estimation with those of communication and information theory can be used to provide important insights concerning several fundamental problems such as: · minimum data rate f…

Edition
Ed. 1
ISBN/ISSN
978-1-4471-6615-3
Collation
XII, 321
Series Title
Communications and Control Engineering
Call Number
005.7 YOU a
Availability0
Add to basket
MARC DownloadCite
cover
Analog-Digital Converters for Industrial Applications Including an Introducti…
Comment Share
Ohnhäuser, Frank

This book offers students and those new to the topic of analog-to-digital converters (ADCs) a broad introduction, before going into details of the state-of-the-art design techniques for SAR and DS converters, including the latest research topics, which are valuable for IC design engineers as well as users of ADCs in applications. The book then addresses important topics, such as correct connect…

Edition
Ed. 1
ISBN/ISSN
978-3-662-47020-6
Collation
IX, 333
Series Title
-
Call Number
004.6 OHN a
Availability0
Add to basket
MARC DownloadCite
cover
Detecting Peripheral-based Attacks on the Host Memory
Comment Share
Patrick Stewin

This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host?s main memory, storing cryptographic keys, passwo…

Edition
-
ISBN/ISSN
9783319135151
Collation
xv, 108 pages
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
First Page Previous 21 22 23 24 25 Next Last Page
OPEN EDUCATIONAL RESOURCES

Search

start it by typing one or more keywords for title, author or subject


Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?