000 | 02966nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-3-319-54328-4 | ||
003 | DE-He213 | ||
005 | 20240423125926.0 | ||
007 | cr nn 008mamaa | ||
008 | 170216s2017 sz | s |||| 0|eng d | ||
020 |
_a9783319543284 _9978-3-319-54328-4 |
||
024 | 7 |
_a10.1007/978-3-319-54328-4 _2doi |
|
050 | 4 | _aQA76.9.E94 | |
072 | 7 |
_aUYD _2bicssc |
|
072 | 7 |
_aCOM011000 _2bisacsh |
|
072 | 7 |
_aUYD _2thema |
|
082 | 0 | 4 |
_a004.24 _223 |
245 | 1 | 0 |
_aPassive and Active Measurement _h[electronic resource] : _b18th International Conference, PAM 2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings / _cedited by Mohamed Ali Kaafar, Steve Uhlig, Johanna Amann. |
250 | _a1st ed. 2017. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2017. |
|
300 |
_aXIII, 284 p. 134 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aComputer Communication Networks and Telecommunications, _x2945-9184 ; _v10176 |
|
520 | _aThis book constitutes the proceedings of the 18th International Conference on Passive and Active Measurement, PAM 2017, held in Sydney, Australia, in March 2017. The 20 full papers presented in this volume were carefully reviewed and selected from 87 submissions. They are organized in topical sections on IPv6, Web and applications, security, performance, latency, characterization and troubleshooting, and wireless. | ||
650 | 0 |
_aElectronic digital computers _xEvaluation. |
|
650 | 0 | _aComputer networks . | |
650 | 0 | _aComputers, Special purpose. | |
650 | 0 | _aApplication software. | |
650 | 0 | _aData protection. | |
650 | 0 | _aCoding theory. | |
650 | 0 | _aInformation theory. | |
650 | 1 | 4 | _aSystem Performance and Evaluation. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aSpecial Purpose and Application-Based Systems. |
650 | 2 | 4 | _aComputer and Information Systems Applications. |
650 | 2 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aCoding and Information Theory. |
700 | 1 |
_aKaafar, Mohamed Ali. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aUhlig, Steve. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aAmann, Johanna. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319543277 |
776 | 0 | 8 |
_iPrinted edition: _z9783319543291 |
830 | 0 |
_aComputer Communication Networks and Telecommunications, _x2945-9184 ; _v10176 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-54328-4 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cSPRINGER | ||
999 |
_c183158 _d183158 |