|
|
|
|
LEADER |
02559nam a22005655i 4500 |
001 |
978-3-319-54328-4 |
003 |
DE-He213 |
005 |
20170216123752.0 |
007 |
cr nn 008mamaa |
008 |
170216s2017 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319543284
|9 978-3-319-54328-4
|
024 |
7 |
|
|a 10.1007/978-3-319-54328-4
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.E94
|
072 |
|
7 |
|a UYD
|2 bicssc
|
072 |
|
7 |
|a COM074000
|2 bisacsh
|
082 |
0 |
4 |
|a 004.24
|2 23
|
245 |
1 |
0 |
|a Passive and Active Measurement
|h [electronic resource] :
|b 18th International Conference, PAM 2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings /
|c edited by Mohamed Ali Kaafar, Steve Uhlig, Johanna Amann.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2017.
|
300 |
|
|
|a XIII, 284 p. 134 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 10176
|
520 |
|
|
|a This book constitutes the proceedings of the 18th International Conference on Passive and Active Measurement, PAM 2017, held in Sydney, Australia, in March 2017. The 20 full papers presented in this volume were carefully reviewed and selected from 87 submissions. They are organized in topical sections on IPv6, Web and applications, security, performance, latency, characterization and troubleshooting, and wireless.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Special purpose computers.
|
650 |
|
0 |
|a Computer system failures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Coding theory.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a System Performance and Evaluation.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Special Purpose and Application-Based Systems.
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Coding and Information Theory.
|
700 |
1 |
|
|a Kaafar, Mohamed Ali.
|e editor.
|
700 |
1 |
|
|a Uhlig, Steve.
|e editor.
|
700 |
1 |
|
|a Amann, Johanna.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319543277
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 10176
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-319-54328-4
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|