Поиск по каталогу |
(строгое соответствие)
|
- Профессиональная
- Научно-популярная
- Художественная
- Публицистика
- Детская
- Искусство
- Хобби, семья, дом
- Спорт
- Путеводители
- Блокноты, тетради, открытки
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети Vinothkumar Jambulingam Cross-Layer Approach For Seamless Vertical Handover In Networks. A Cross-Layer Approach For Seamless Vertical Handover In Heteronenous Overlay Networks 2014 г., 68 стр., мягкий переплет Future Wireless systems will be characterized by their heterogeneity. Multiple access technologies provide access to internet content.Vertical handoff is an important mechanism for achieving continuous seamless transmissions in these networks. When connections need to migrate between heterogeneous networks seamless vertical handoff is necessary.... | 23493 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети Jabarweer Singh,Krishan Kumar and Gulshan Kumar Intrusion detection using artificial intelligence based ensembles. An effective combination technique 2014 г., 116 стр., мягкий переплет Network security is a serious global concern. The increasing prevalence of malware and incidents of attacks hinders the utilization of the Internet to its greatest benefit and incur significant economic losses. The traditional approaches in securing systems against threats are designing mechanisms that create a protective shield, almost always... | 32457 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети Sammee Mushtaq Bazaz,Junaid Jami Gul and Rabia Riaz Optimal Guard Node Placement Using SGLD and Energy Factor. An optimal plan for placement of guard nodes against DDoS attacks with energy consumption at each node 2013 г., 68 стр., мягкий переплет Execution of distributed denial-of-service (DDoS) attacks requires little effort on the attacker’s side, since a vast number of insecure machines provide fertile ground for attack zombies. These attacks can easily be downloaded and deployed. On the other hand, prevention of the attack or the response and trace back of agents is extremely... | 23493 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети Temitope Takpor Implementation and Evaluation of a Zigbee Network. 2014 г., 52 стр., мягкий переплет There is a growing need for compact devices that can interoperate with each other wirelessly and offer a wide range of applications. Wireless data transfer is normally being preferred to transmission of data via cables. In addition, consumers like using devices that save power because it leads to low cost. With the intention of meeting the... | 20988 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети Fabio Demicheli,Gianluigi Ferrari and Pietro Gonizzi Design, Implementation and Evaluation of an energy RPL routing metric. Study of an energy efficient routing metric 2014 г., 88 стр., мягкий переплет The Internet of Things is the new paradigm arise in the last years, based on the idea that everyday object can connect to the Internet and exchanging information with other objects and people. This is possible thanks to the Smart Objects. which are the base of IoT: they are small wireless devices equipped with a tiny sensor, and generally are... | 24203 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети Ghada Alakhdar Orality Online and the Promotion of Cultural Diversity. 2013 г., 304 стр., мягкий переплет The internet is becoming increasingly global, with more languages, cultures, and variety each year. It is up to us to sustain its diversity so as to keep its gems within reach and its varied pleasures within access. This book attempts a ground-breaking non-western reading of Deleuze and Guattari's Rhizome as the structure of social media... | 50799 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети Amel Chowdhury Deployment of a Secure VoIP System. 2014 г., 68 стр., мягкий переплет Here, I describe the basic principles and operation of a VoIP system, the current scenario of the implementation site and what necessary changes are to be made to execute the implementation. I have described, in one chapter all the protocols working in a telephone and a VoIP network and I provide an extensive study of security risks,... | 23493 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети Kire Jakimoski and Toni Janevski Quality of Service in Heterogeneous Mobile and Wireless Networks. 2013 г., 252 стр., мягкий переплет Multi-access mobile devices and overlapping mobile and wireless network deployments have emerged as a reality in the converged telecommunications world. In heterogeneous wireless and mobile environment it is highly important to provide QoS support and seamless handovers between different radio access networks, something that is particularly needed... | 34385 тг |