000 | 03194nam a22006135i 4500 | ||
---|---|---|---|
001 | 978-3-642-38998-6 | ||
003 | DE-He213 | ||
005 | 20200421112549.0 | ||
007 | cr nn 008mamaa | ||
008 | 130622s2013 gw | s |||| 0|eng d | ||
020 |
_a9783642389986 _9978-3-642-38998-6 |
||
024 | 7 |
_a10.1007/978-3-642-38998-6 _2doi |
|
050 | 4 | _aQA76.758 | |
072 | 7 |
_aUMZ _2bicssc |
|
072 | 7 |
_aCOM051230 _2bisacsh |
|
082 | 0 | 4 |
_a005.1 _223 |
245 | 1 | 0 |
_aEmerging Management Mechanisms for the Future Internet _h[electronic resource] : _b7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013, Barcelona, Spain, June 25-28, 2013. Proceedings / _cedited by Guillaume Doyen, Martin Waldburger, Pavel Čeleda, Anna Sperotto, Burkhard Stiller. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2013. |
|
300 |
_aXVI, 161 p. 55 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v7943 |
|
505 | 0 | _aTraffic engineering and quality-of-service -- Monitoring and modeling -- Security management -- Content distribution and multimedia -- Autonomous management -- Monitoring mechanisms. | |
520 | _aThis book constitutes the refereed proceedings of the 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013, held in Barcelona, Spain, in June 2013. The 11 full papers presented were carefully reviewed and selected from 32 submissions. The volume also includes 7 papers presented at the AIMS Ph.D. workshop. They were reviewed and selected from 14 submissions. The papers are organized in topical sections on traffic engineering and quality-of-service; monitoring and modeling; security management; content distribution and multimedia; autonomous management; and monitoring mechanisms. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer communication systems. | |
650 | 0 | _aSoftware engineering. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aAlgorithms. | |
650 | 0 | _aManagement information systems. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aSoftware Engineering. |
650 | 2 | 4 | _aManagement of Computing and Information Systems. |
650 | 2 | 4 | _aInformation Systems Applications (incl. Internet). |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aAlgorithm Analysis and Problem Complexity. |
650 | 2 | 4 | _aData Encryption. |
700 | 1 |
_aDoyen, Guillaume. _eeditor. |
|
700 | 1 |
_aWaldburger, Martin. _eeditor. |
|
700 | 1 |
_aČeleda, Pavel. _eeditor. |
|
700 | 1 |
_aSperotto, Anna. _eeditor. |
|
700 | 1 |
_aStiller, Burkhard. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783642389979 |
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v7943 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-38998-6 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c58795 _d58795 |