Cargando…

Computer science research and technology. Vol. 2 /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Bauer, Janice P.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : Nova Science Publishers, Ã2011.
Colección:Computer science, technology and applications.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocn730933861
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 110615s2011 nyua ob 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d OCLCQ  |d OCLCF  |d YDXCP  |d OCLCQ  |d OCLCA  |d OCLCQ  |d AGLDB  |d OCLCQ  |d VTS  |d OCLCQ  |d AU@  |d STF  |d OCLCQ  |d K6U  |d OCLCQ  |d OCLCO  |d OCL  |d OCLCQ 
019 |a 904123262  |a 957741760  |a 958086621  |a 960281805 
020 |a 9781611227246  |q (electronic bk.) 
020 |a 1611227240  |q (electronic bk.) 
020 |z 9781611220735 
020 |z 1611220734 
029 1 |a DEBSZ  |b 472546538 
035 |a (OCoLC)730933861  |z (OCoLC)904123262  |z (OCoLC)957741760  |z (OCoLC)958086621  |z (OCoLC)960281805 
050 4 |a QA75.5  |b .C66eb vol. 2 
072 7 |a COM  |x 052000  |2 bisacsh 
072 7 |a COM  |x 037000  |2 bisacsh 
072 7 |a COM  |x 013000  |2 bisacsh 
072 7 |a COM  |x 032000  |2 bisacsh 
072 7 |a COM  |x 018000  |2 bisacsh 
072 7 |a COM  |x 014000  |2 bisacsh 
072 7 |a COM  |x 067000  |2 bisacsh 
082 0 4 |a 004  |2 22 
049 |a UAMI 
245 0 0 |a Computer science research and technology.  |n Vol. 2 /  |c Janice P. Bauer, editor. 
260 |a New York :  |b Nova Science Publishers,  |c Ã2011. 
300 |a 1 online resource (x, 199 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Computer science, technology and applications 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
505 0 |a LIBRARY OF CONGRESS CATALOGING-IN-PUBLICATION DATA ; COMPUTER SCIENCE RESEARCH AND TECHNOLOGY. VOLUME 2 ; CONTENTS ; PREFACE ; PROTECTION OF UNICAST AND MULTICAST TRAFFIC IN WDM MESH NETWORKS: A SURVEY ; ABSTRACT ; 1. INTRODUCTION ; 2. BASIC PROTECTION TECHNIQUES ; 2.1. Link-Protection ; 2.1.1. Link-Based Dedicated Protection [13] ; 2.1.2. Link-Based Shared Protection [13] ; 2.1.3. Virtual-Link Protection [13] ; 2.1.4. The p-Cycle Protection ; 2.1.5. Segment Protection ; 2.2. Path-Protection ; 2.2.1. Path-Based Dedicated Protection [13] ; 2.2.1.1. The 1+1 Protection. 
505 8 |a 2.2.2. Path-Based Shared Protection 2.2.2.1. The 1: N Protection ; 2.2.3. Partial Path Protection ; 2.2.4. Sub-Path Protection [21] ; 3. UNICAST TRAFFIC PROTECTION TECHNIQUE ; 3.1. Dynamic Hop Constrained Sub-Path Protection (HCSPP) [22] ; 3.2. Partial SRLG-Disjoint Shared Path Protection with Differentiated Reliability (Pd-SPP)[23] ; 3.3. Two-Segment (TS) Protection [15] ; 3.4. WDM-Shared Non-SRLG Protection [24] ; 3.5. On-Line Hybrid Survivability (OHS) [25] ; 3.6. Sub-Path Protection Based on Auxiliary Virtual Topology (SPAVT) [26] 
505 8 |a 3.7. Fault-Tolerate Ant-Based Survivable Routing with Shared Backup Path (FT-ABR) [27] 3.8. Recursive Shared Segment Protection (RSSP) [28] ; 3.9. Network Coding [29] ; A. The p_Cycle Construction and Node Assignment Procedure to Cycles ; B. Encoding Operations ; C. Recovery from Failure ; 3.10. Level of Service Algorithm (LSA) [30] ; 4. MULTICAST TRAFFIC PROTECTION SCHEMES ; 4.1. Dynamic Multicast Protection Schemes ; 4.1.1. Optimal Path-Pair Based Removing Residual Link (OPP-PRL) [32] ; 4.1.2. Source-Leaf Path Based Avoiding Residual Link (SLP-ARL) [32] 
505 8 |a 4.2. Multicast Protection through Spanning Paths (MPSP) [33] 4.3. Shared Source-Leaf Path-Based Protection (SLPP) [35] ; 4.4. Adaptive Shared Segment Protection (ASSP) [36] ; 4.5. Shared Segment Protection with Re-Provisioning (SSPR) [37] ; 4.6. Sparse Splitting Constrained Multicast Protection (SSMP) [38] ; 4.7. Cross-Sharing [10] ; 4.8. Protection Algorithms under Reliability Constraints [40] ; 4.9. A Tree Protection Scheme with Optimized Shortest Path Tree (TP- OSPT) [9] ; 5. PERFORMANCE COMPARISION ; 5.1. Comparison among Basic Traffic Protection Techniques. 
505 8 |a 5.2. Comparison among Protection Techniques Supporting Unicast Traffic 5.3. Comparison among Protection Techniques Supporting Multicast Traffic ; CONCLUSION ; REFERENCES ; CLOUD COMPUTING: MAKING HEADWAY WITH THE SCIENTIFIC COMMUNITY ; ABSTRACT ; I. INTRODUCTION ; II. CLOUD COMPUTING: DEFINITION ; III. PUBLIC, PRIVATE AND HYBRID CLOUDS ; IV. PUBLIC CLOUD SERVICES FOR HPC ; V. ECONOMICS, FLEXIBILITY AND GREEN CREDENTIALS ; VI. THE GROWING APPEAL OF CLOUD COMPUTING FOR HPC ; VII. CLOUD PROBLEMS: SHOULD USERS WORRY? ; CONCLUSION ; REFERENCES. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer science. 
650 0 |a Electronic data processing. 
650 6 |a Informatique. 
650 7 |a data processing.  |2 aat 
650 7 |a computer science.  |2 aat 
650 7 |a COMPUTERS  |x Reference.  |2 bisacsh 
650 7 |a COMPUTERS  |x Machine Theory.  |2 bisacsh 
650 7 |a COMPUTERS  |x Computer Literacy.  |2 bisacsh 
650 7 |a COMPUTERS  |x Information Technology.  |2 bisacsh 
650 7 |a COMPUTERS  |x Data Processing.  |2 bisacsh 
650 7 |a COMPUTERS  |x Computer Science.  |2 bisacsh 
650 7 |a COMPUTERS  |x Hardware  |x General.  |2 bisacsh 
650 7 |a Electronic data processing.  |2 fast  |0 (OCoLC)fst00906956 
650 7 |a Computer science.  |2 fast  |0 (OCoLC)fst00872451 
700 1 |a Bauer, Janice P. 
776 0 8 |i Print version:  |t Computer Science Research and Technology.  |d Nova Science Pub Inc 2011  |z 9781611220735  |w (OCoLC)679940960 
830 0 |a Computer science, technology and applications. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=367728  |z Texto completo 
938 |a EBSCOhost  |b EBSC  |n 367728 
938 |a YBP Library Services  |b YANK  |n 6940642 
994 |a 92  |b IZTAP