Listing 1 - 5 of 5 |
Sort by
|
Choose an application
This book constitutes the revised selected papers of the Second International Conference on Networked Systems, NETYS 2014, held in Marrakech, Morocco, in May 2014. The 20 full papers and the 6 short papers presented together with 2 keynotes were carefully reviewed and selected from 80 submissions. They address major topics such as multi-core architectures; concurrent and distributed algorithms; middleware environments; storage clusters; social networks; peer-to-peer networks; sensor networks; wireless and mobile networks; as well as privacy and security measures to protect such networked systems and data from attack and abuse.
Computer science. --- Computer communication systems. --- Algorithms. --- Computer Science. --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Computer software. --- Software, Computer --- Computer systems --- Computer networks --- Algorism --- Algebra --- Arithmetic --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Foundations --- Distributed processing
Choose an application
This book constitutes the revised selected papers of the Second International Conference on Networked Systems, NETYS 2014, held in Marrakech, Morocco, in May 2014. The 20 full papers and the 6 short papers presented together with 2 keynotes were carefully reviewed and selected from 80 submissions. They address major topics such as multi-core architectures; concurrent and distributed algorithms; middleware environments; storage clusters; social networks; peer-to-peer networks; sensor networks; wireless and mobile networks; as well as privacy and security measures to protect such networked systems and data from attack and abuse.
Complex analysis --- Computer science --- Computer architecture. Operating systems --- draadloze computernetwerken --- complexe analyse (wiskunde) --- bedrijfssoftware --- mobiele netwerken --- computers --- computernetwerken --- computerkunde
Choose an application
Annotation Wireless, Mobile and Multimedia Networks.
Choose an application
Choose an application
Wireless communication systems --- Computer networks --- Security measures
Listing 1 - 5 of 5 |
Sort by
|