feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    b3kat_BV047916953
    Format: 1 Online-Ressource (xvi, 631 Seiten) , 230 Illustrationen, 192 in Farbe
    ISBN: 9783030967727
    Series Statement: Lecture notes in computer science 13148
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-96771-0
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-96773-4
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Datenstruktur ; Informationstheorie ; Computermathematik ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    New York, NY : Springer US
    UID:
    b3kat_BV046874036
    Format: 1 Online-Ressource (XIV, 252 p. 16 illus)
    Edition: 1st ed. 2004
    ISBN: 9780306486388
    Content: Guarding Your Business outlines the organizational elements that must be in place to protect the information and physical assets of typical businesses and organizations. The book recognizes the need for an architecture integrated within the organizational environment for systematic protection. Such an architecture is offered along with the building blocks to make organizations resistant to human error and resilient under physical attack or natural disaster. The book addresses risk assessment, determination of quality-of-service levels that balance safety versus cost, security versus privacy, determination of access rights to data and software, and a security-conscious culture in the organization. Questions answered by experts from academia and industry include: How can one organize for security? What organizational structures, policies, and procedures must be in place? What legal and privacy issues must be addressed?
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781475782127
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781475782110
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9780306484940
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Boston, MA : Springer US
    UID:
    b3kat_BV045185798
    Format: 1 Online-Ressource (XII, 514 p)
    ISBN: 9781489912985
    Content: Three speakers at the Second Workshop on Network Management and Control nostalgically remembered the INTEROP Conference at which SNMP was able to interface even to CD players and toasters. We agreed this was indeed a major step forward in standards, but wondered if anyone noticed whether the toast was burned, let alone, would want to eat it. The assurance of the correct operation of practical systems under difficult environments emerged as the dominant theme of the workshop with growth, interoperability, performance, and scalability as the primary sub-themes. Perhaps this thrust is un surprising, since about half the 100 or so attendees were from industry, with a strong contingency of users. Indeed the technical program co-chairs, Shivendra Panwar of Polytechnic and Walter Johnston of NYNEX, took as their assignment the coverage of real problems and opportunities in industry. Nevertheless we take it as a real indication of progress in the field that the community is beginning to take for granted the availability of standards and even the ability to detect physical, link, and network-level faults and is now expecting diagnostics at higher levels as well as system-wide solutions
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781489913005
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Boston, MA : Springer US
    UID:
    b3kat_BV045186360
    Format: 1 Online-Ressource (XII, 448 p)
    ISBN: 9781461314714
    Content: Like the 120 volt standard for electricity, the appearance of standards in network management heralds new opportunities for creativity and achievement. As one example, within the framework of these evolving standards, consider a system of local area networks connecting computing equipment from different vendors. A bridge 1qc. k:8 up because of a transient caused by a repeater failure. The result is a massive disconnecHon of virtual circuits. What is the role of the manager and the network management system in solving the problem? How does the vendor implement the solution? How does the user use it? What measurements should be made? How should they be displayed? How much of the diagnosis and correction should be automated? How does the solution change with different hardware and software? In the IEEE Communications Magazine, I recently reported a timely illustration in the area of problems in fault management. At the workshop hotel, "I was waiting for a room assignment at the reception desk, when my attendant left the counter for a moment. Upon returning, he took one look at his screen and whined an accusatory question at everyone in sight, 'Who logged out my terminal?' Who indeed! It wasn't any of us. It was the system
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781461287797
    Language: English
    Keywords: Netzwerkmanagement ; Management ; Computerarchitektur ; Rechnernetz ; Kontrolle ; Konferenzschrift ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    gbv_1796267406
    Format: 1 Online-Ressource(XVI, 631 p. 230 illus., 192 illus. in color.)
    Edition: 1st ed. 2022.
    ISBN: 9783030967727
    Series Statement: Theoretical Computer Science and General Issues 13148
    Content: Networking and Architectures -- Accelerating GPU-Based Out-of-Core Stencil Computation with On-the-Fly Compression -- Routing with Ant Colony Optimization in Wireless Mesh Networks -- A light-weight scheme for detecting component structure of network traffic -- Evaluating the performance and conformance of a SYCL implementation for SX-Aurora TSUBASA -- Bayesian Optimization Based Task Scheduling in Heterogeneous Computing Systems -- Optimizing Uplink Bandwidth Utilization for Crowdsourced Livecast -- A Batched Jacobi SVD Algorithm on GPUs and Its Application to Quantum Lattice Systems -- A Molecular Dynamics Based Multi-Scale Platelet Aggregation Model and Its High-throughput Simulation -- Approximation and Polynomial Algorithms for Multi-Depot Capacitated Arc Routing Problems -- Zero-shot Face Swapping with De-identification Adversarial Learning -- An user-driven active way to push ACL in Software-Defined Networking -- Photonic Computing and Communication for Neural Network Accelerators -- Performance Comparison of Multi-layer Perceptron Training on Electrical and Optical Network-on-Chips -- The design and implementation of reconfigurable quaternary logic processor -- A 3D Dubins Curve Constructing Method Based on Particle Swarm Optimization -- Software Systems and Technologies -- Towards Conflict-Aware Workload Co-execution on SX-Aurora TSUBASA -- A Learning-Based Scheduler for High Volume Processing in Data Warehouse using Graph Neural Networks -- Adaptive Updates for Erasure-Coded Storage Systems Based on Data Delta and Logging -- Matching Program Implementations and Heterogeneous Computing Systems -- FastDCF: A Partial Index based Distributed and Scalable Near-Miss Code Clone Detection Approach for Very Large Code Repositories -- Towards Optimal Fast Matrix Multiplication on CPU-GPU Platforms -- Temperature Matrix-based Data Placement Using Improved Hungarian Algorithm in Edge Computing Environments -- Realtime Physics Simulation of Large Virtual Space with Docker Containers -- A deep reinforcement learning-based approach to the scheduling of multiple workflows on non-dedicated edge servers -- A MVCC Approach to Parallelizing Interoperability of Consortium Blockchain -- An Effective and Reliable Cross-Blockchain Data Migration Approach -- Algorithm for the Facility Location Problem with Origin and Destination -- Reinforcement Learning-based Auto-scaling Algorithm for Elastic Cloud Workflow Service -- Optimal Energy Efficiency Strategy of mm Wave Cooperative Communication Small Cell based on SWIPT -- Providing Low Latency Execution Guarantees under Uncertainty in Serverless Platforms -- High resolution patient-specific blood flow simulation in a full-size aneurysmal aorta based on a parallel two-level method -- Optimizing Data Locality by Executor Allocation in Reduce Stage for Spark Framework -- TEFRED: A temperature and energy cognizant fault-tolerant real-time scheduler based on deadline partitioning for heterogeneous platforms -- Algorithms and Applications -- Social Recommendation via Graph Attentive Aggregation -- MACSQ: Massively Accelerated DeepQ Learning on GPUs using on-the-fly State Construction -- Model-based Multi-agent Policy Optimization with Dynamic Dependence Modeling -- Multi-index federated aggregation algorithm based on trusted verification -- Few-shot Generative Learning by Modeling Stereoscopic Priors -- Distributed fair k-Center clustering problems with outliers -- Multi-zone residential HVAC control with satisfying occupants' thermal comfort requirements and saving energy via reinforcement learning -- Approximating BP Maximization with Distorted-Based Strategy -- Streaming Algorithms for Maximization of a Non-Submodular Function with a Cardinality Constraint on the Integer Lattice -- Adaptable Focal Loss for Imbalanced Text Classification -- Roman Amphitheater Classification Using Convolutional Neural Network and Data Augmentation -- Data-Hungry Issue in Personalized Product Search -- Jointly Super Resolution and Degradation Learning on Unpaired Real-World Images -- Enhanced Discriminant Local Direction Pattern Learning for Robust Palmprint Identification -- Latent Multi-view Subspace Clustering Based on Schatten-p Norm -- Security and Privacy -- MOFIT: An efficient access control scheme with attribute merging and outsourcing capability for Fog-enhanced IoT -- RepBFL: Reputation based Blockchain-Enabled Federated Learning Framework for Data Sharing in Internet of Vehicles -- Multimodal Fusion Representation Learning based on Differential Privacy -- Efficient List Decoding Applied to ECC^2 -- Federated Data Integration for Heterogeneous Partitions based on Differential Privacy -- Patient-Chain: Patient-centered healthcare system a Blockchain-based technology in dealing with emergencies -- A differential privacy image publishing method based on wavelet transform -- Traffic Matrix Prediction Based on Differential Privacy and LSTM -- A blockchain-based continuous query differential privacy algorithm -- Formalization and Verification of Group Communication CoAP using CSP.
    Content: This book constitutes the proceedings of the 22nd International Conference on Parallel and Distributed Computing, Applications, and Technologies, PDCAT 2021, which took place in Guangzhou, China, during December 17-19, 2021. The 24 full papers and 34 short papers included in this volume were carefully reviewed and selected from 97 submissions. The papers are categorized into the following topical sub-headings: networking and architectures, software systems and technologies, algorithms and applications, and security and privacy.
    Additional Edition: ISBN 9783030967710
    Additional Edition: ISBN 9783030967734
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783030967710
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783030967734
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages