You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 8th IFIP WG 6.6 International Conference on Monitoring and Securing Virtualized Networks and Services, AIMS 2014, held in Brno, Czech Republic, in June/July 2014. The 9 full papers presented were carefully reviewed and selected from 29 submissions. The volume also includes 13 papers presented at the AIMS Ph.D. workshop. They were reviewed and selected from 27 submissions. The full papers are organized in topical sections on emerging infrastructures for networks and services; experimental studies for security management; and monitoring methods for quality-of-service and security. The workshop papers are organized in topical sections on management of virtualized network resources and functions; security management; SDN and content delivery; monitoring and information sharing.
This book constitutes the refereed proceedings of the Joint Workshop on Process Algebra and Performance Modeling and Probabilistic Methods in Verification, PAPM-PROBMIV 2001, held in Aachen, Germany in September 2001. The 12 revised full papers presented together with one invited paper were carefully reviewed and selected from 23 submissions. Among the topics addressed are model representation, model checking, probabilistic systems analysis, refinement, Markov chains, random variables, stochastic timed systems, Max-Plus algebra, process algebra, system modeling, and the Mobius modeling framework.
This book constitutes the refereed proceedings of the 10th IFIP/IEEE International Conference on Management of Multimedia and Mobile Networks and Services, MMNS 2007, held in the course of the 3rd International Week on Management of Networks and Services, Manweek 2007. The papers presented are organized in topical sections on services and user experience, wireless and cellular networks, monitoring and control, multicast and IPTV as well as resource management.
While compilers for high-level programming languages are large complex software systems, they have particular characteristics that differentiate them from other software systems. Their functionality is almost completely well-defined – ideally there exist complete precise descriptions of the source and target languages, while additional descriptions of the interfaces to the operating system, programming system and programming environment, and to other compilers and libraries are often available. The implementation of application systems directly in machine language is both difficult and error-prone, leading to programs that become obsolete as quickly as the computers for which they were dev...
This book constitutes the proceedings of the Third International Conference on Frontiers in Cyber Security, FCS 2020, held in Tianjin, China*, in November 2020. The 39 full papers along with the 10 short papers presented were carefully reviewed and selected from 143 submissions. The papers are organized in topical sections on: IoT security; artificial intelligence; blockchain; cyber-physical systems security; cryptography; database security; depth estimation; mobile security; network security; privacy; program analysis; quantum cryptography; steganography; web security. *The conference was held virtually due to the COVID-19 pandemic.
This book constitutes the refereed proceedings of the 19th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2008, held on Samos Island, Greece, on September 22-26, 2008, as part of the 4th International Week on Management of Networks and Services, Manweek 2008. The 14 revised full papers presented were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on decentralized and peer-to-peer management; operations and tools; security and trust; and measurements, monitoring and diagnosis.
This handbook aims to highlight fundamental, methodological and computational aspects of networks of queues to provide insights and to unify results that can be applied in a more general manner. The handbook is organized into five parts: Part 1 considers exact analytical results such as of product form type. Topics include characterization of product forms by physical balance concepts and simple traffic flow equations, classes of service and queue disciplines that allow a product form, a unified description of product forms for discrete time queueing networks, insights for insensitivity, and aggregation and decomposition results that allow sub networks to be aggregated into single nodes to r...
th Ten years ago, the 5 edition of the EUNICE Summer School took place in Barcelona with the motto “Broadband for all.” This year, with the broadband promise already ful?lled in the city, the international workshop returned to th Barcelona in its 15 edition and focused on a polyhedrical approach to the Internet of the future. The Internet is shaping the twenty-?rst century information society. It has deeply transformed the way we learn, work and interact. All kinds of insti- tions, from universities to businesses, have been shaken by the wave of digital innovation.Leisureandsocialnetworksalsohavetheirplaceinthevirtualworld, and the younger generations cannot imagine a time when they coul...
This book constitutes the refereed proceedings of the 13th International Conference on Passive and Active Measurement, PAM 2012, held in Vienna, Austria, in March 2012. The 25 revised full papers presented were carefully reviewed and selected from 83 submissions. The papers were arranged into eight sessions traffic evolution and analysis, large scale monitoring, evaluation methodology, malicious behavior, new measurement initiatives, reassessing tools and methods, perspectives on internet structure and services, and application protocols.
This book constitutes the refereed proceedings of the 9th IEEE Workshop on IP Operations and Management, IPOM 2009, held in Venice, Italy, on October 29-30, 2009, as part of the 5th International Week on Management of Networks and Services, Manweek 2009. The 12 revised full papers presented in this volume were carefully reviewed and selected from 35 submissions. The papers are organized in topical sections on management of quality of services and multimedia, network robustness, management of virtual networks, configuration of network resources and applications