Personnaliser

OK

Mobile Networks and Management -

Note : 0

0 avis
  • Soyez le premier à donner un avis

Vous en avez un à vendre ?

Vendez-le-vôtre

71,50 €

Produit Neuf

  • Ou 17,88 € /mois

    • Livraison à 0,01 €
    • Livré entre le 4 et le 11 mai
    Voir les modes de livraison

    RiaChristie

    PRO Vendeur favori

    4,9/5 sur + de 1 000 ventes

    Brand new, In English, Fast shipping from London, UK; Tout neuf, en anglais, expédition rapide depuis Londres, Royaume-Uni;ria9783319907741_dbm

    Publicité
     
    Vous avez choisi le retrait chez le vendeur à
    • Payez directement sur Rakuten (CB, PayPal, 4xCB...)
    • Récupérez le produit directement chez le vendeur
    • Rakuten vous rembourse en cas de problème

    Gratuit et sans engagement

    Félicitations !

    Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !

    En savoir plus

    Retour

    Horaires

        Note :


        Avis sur Mobile Networks And Management Format Broché  - Livre Informatique

        Note : 0 0 avis sur Mobile Networks And Management Format Broché  - Livre Informatique

        Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.


        Présentation Mobile Networks And Management Format Broché

         - Livre Informatique

        Livre Informatique - 01/05/2018 - Broché - Langue : Anglais

        . .

      • Editeur : Springer International Publishing Ag
      • Langue : Anglais
      • Parution : 01/05/2018
      • Format : Moyen, de 350g à 1kg
      • Nombre de pages : 408
      • Expédition : 616
      • Dimensions : 23.5 x 15.5 x 2.3
      • ISBN : 9783319907741



      • Résumé :
        Offloading of Fog Data Networks with Network Coded Cooperative D2D Communications.- Persistent vs Service IDs in Android: Session Fingerprinting from Apps.- Towards Developing Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques.- Performance Comparison of Distributed Pattern Matching Algorithms on Hadoop MapReduce Framework.- Robust Fingerprint Matching Based on Convolutional Neural Networks.- A Personalized Multi-Keyword Ranked Search Method over Encrypted Cloud Data.- Application of Fuzzy Comprehensive Evaluation Method for Reservoir Well Logging Interpretation While Drilling.- Factor Effects for Routing in a Delay-tolerant Wireless Sensor Network for Lake Environment Monitoring.- Estimating public opinion in social media content using aspect-based opinion mining.- A Robust Contactless Fingerprint Enhancement Algorithm.- Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and MachineLearning.- A Variant of BLS Signature Scheme With Tight Security Reduction.- Quantum authentication scheme based on fingerprintencoded graph states.- Cooperative Information Security/ Cybersecurity Curriculum Development.- An Energy Saving Mechanism based on Vacation Queuing Theory in Data Center Networks.- Homomorphic Evaluation of Database Queries.- A Cache-aware Congestion Control for Reliable Transport in Wireless Sensor Networks.- A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources.- Fog Computing as a Critical Link between a Central Cloud and IoT in Support of Fast Discovery of New Hydrocarbon Reservoirs.- Performance Assessment of Cloud Migrations from Network and Application Point of View.- A Cloud Service Enhanced Method Supporting Context-aware Applications.- Application of 3D Delaunay Triangulation in Fingerprint Authentication System.- A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources.- Fog Computing as a Critical Link between a Central Cloud and IoT in Support of Fast Discovery of New Hydrocarbon Reservoirs.- Performance Assessment of Cloud Migrations from Network and Application Point of View.- A Cloud Service Enhanced Method Supporting Context-aware Applications.- Application of 3D Delaunay Triangulation in Fingerprint Authentication System.- The Public Verifiability of Public Key Encryption with Keyword Search.- Malicious Bitcoin Transaction Tracing Using Incidence.- Relation Clustering.- Cryptanalysis of Salsa and ChaCha: Revisited.- CloudShare: Towards a Cost-Efficient and Privacy-Preserving Alliance Cloud Using Permissioned Blockchains.- Probability Risk Identification Based Intrusion Detection System for SCADA Systems.- Anonymizing k-NN Classification on MapReduce.- A Cancellable Ranking based Hashing Method for Fingerprint Template Protection....

        Sommaire:
        Offloading of Fog Data Networks with Network Coded Cooperative D2D Communications.- Persistent vs Service IDs in Android: Session Fingerprinting from Apps.- Towards Developing Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques.- Performance Comparison of Distributed Pattern Matching Algorithms on Hadoop MapReduce Framework.- Robust Fingerprint Matching Based on Convolutional Neural Networks.- A Personalized Multi-Keyword Ranked Search Method over Encrypted Cloud Data.- Application of Fuzzy Comprehensive Evaluation Method for Reservoir Well Logging Interpretation While Drilling.- Factor Effects for Routing in a Delay-tolerant Wireless Sensor Network for Lake Environment Monitoring.- Estimating public opinion in social media content using aspect-based opinion mining.- A Robust Contactless Fingerprint Enhancement Algorithm.- Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and MachineLearning.- A Variant of BLS Signature Scheme With Tight Security Reduction.- Quantum authentication scheme based on fingerprintencoded graph states.- Cooperative Information Security/ Cybersecurity Curriculum Development.- An Energy Saving Mechanism based on Vacation Queuing Theory in Data Center Networks.- Homomorphic Evaluation of Database Queries.- A Cache-aware Congestion Control for Reliable Transport in Wireless Sensor Networks.- A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources.- Fog Computing as a Critical Link between a Central Cloud and IoT in Support of Fast Discovery of New Hydrocarbon Reservoirs.- Performance Assessment of Cloud Migrations from Network and Application Point of View.- A Cloud Service Enhanced Method Supporting Context-aware Applications.- Application of 3D Delaunay Triangulation in Fingerprint Authentication System.- A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources.- Fog Computing as a Critical Link between a Central Cloud and IoT in Support of Fast Discovery of New Hydrocarbon Reservoirs.- Performance Assessment of Cloud Migrations from Network and Application Point of View.- A Cloud Service Enhanced Method Supporting Context-aware Applications.- Application of 3D Delaunay Triangulation in Fingerprint Authentication System.- The Public Verifiability of Public Key Encryption with Keyword Search.- Malicious Bitcoin Transaction Tracing Using Incidence.- Relation Clustering.- Cryptanalysis of Salsa and ChaCha: Revisited.- CloudShare: Towards a Cost-Efficient and Privacy-Preserving Alliance Cloud Using Permissioned Blockchains.- Probability Risk Identification Based Intrusion Detection System for SCADA Systems.- Anonymizing k-NN Classification on MapReduce.- A Cancellable Ranking based Hashing Method for Fingerprint Template Protection.

        Détails de conformité du produit

        Consulter les détails de conformité de ce produit (

        Personne responsable dans l'UE

        )
        Le choixNeuf et occasion
        Minimum5% remboursés
        La sécuritéSatisfait ou remboursé
        Le service clientsÀ votre écoute
        LinkedinFacebookTwitterInstagramYoutubePinterestTiktok
        visavisa
        mastercardmastercard
        klarnaklarna
        paypalpaypal
        floafloa
        americanexpressamericanexpress
        Rakuten Logo
        • Rakuten Kobo
        • Rakuten TV
        • Rakuten Viber
        • Rakuten Viki
        • Plus de services
        • À propos de Rakuten
        Rakuten.com