|
|
|
|
LEADER |
04556nam a22006015i 4500 |
001 |
978-3-642-10485-5 |
003 |
DE-He213 |
005 |
20161207132507.0 |
007 |
cr nn 008mamaa |
008 |
100301s2009 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642104855
|9 978-3-642-10485-5
|
024 |
7 |
|
|a 10.1007/978-3-642-10485-5
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA75.5-76.95
|
072 |
|
7 |
|a UY
|2 bicssc
|
072 |
|
7 |
|a UYA
|2 bicssc
|
072 |
|
7 |
|a COM014000
|2 bisacsh
|
072 |
|
7 |
|a COM031000
|2 bisacsh
|
082 |
0 |
4 |
|a 004.0151
|2 23
|
245 |
1 |
0 |
|a Scalable Information Systems
|h [electronic resource] :
|b 4th International ICST Conference, INFOSCALE 2009, Hong Kong, June 10-11, 2009, Revised Selected Papers /
|c edited by Peter Mueller, Jian-Nong Cao, Cho-Li Wang.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2009.
|
300 |
|
|
|a XII, 323 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
|x 1867-8211 ;
|v 18
|
505 |
0 |
|
|a A Fully Data-Driven Reconfigurable Architecture with Very Coarse-Grained Execution Units -- Identify Intimate Social Relationship in Blogsphere -- Local vs. Global Scalability in Ad Hoc and Sensor Networks -- Measuring IP Address Fragmentation from BGP Routing Dynamics -- On Improving Network Locality in BitTorrent-Like Systems -- Parallel File Transfer for Grid Economic -- Performance Evaluation of Identity and Access Management Systems in Federated Environments -- Power Consumption Optimization of MPI Programs on Multi-core Clusters -- Scalable Workload Adaptation for Mixed Workload -- Tuning Performance of P2P Mesh Streaming System Using a Network Evolution Approach -- HVS-Based Imperceptibility Evaluation for Steganography -- Hasten Dynamic Frame Slotted ALOHA Algorithm for Fast Identification in RFID System -- A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks -- A Multidimensional Mapping Mechanism Based Secure Routing Method for DHT -- A Practical OpenMP Implementation of Bit-Reversal for Fast Fourier Transform -- A Scalable, Vulnerability Modeling and Correlating Method for Network Security -- A Self-adaptive Fault-Tolerant Mechanism in Wireless Sensor Networks -- CAWA: Continuous Approximate Where-About Queries -- Chemical Compounds with Path Frequency Using Multi-Core Technology -- Distance Dimension Reduction on QR Factorization for Efficient Clustering Semantic XML Document Using the QR Fuzzy C-Mean (QR-FCM) -- Efficient Top-k Query Algorithms Using K-Skyband Partition -- Using Multi-threading and Server Update Pushing to Improve the Performance of VNC for a Wall-Sized Tiled Display Wall.
|
520 |
|
|
|a This book constitutes the proceedings of the 4th International ICST Conference, INFOSCALE 2009, held in Hong Kong in June 2009. Scalability has become a mainstream research area in computer science and information systems in view of the incessant growth of data and knowledge. More than 60 manuscripts were submitted, and the program committee selected 22 papers for presentation on the conference and reproduction in this book. The papers focus on a wide range of scalability issues and new approaches to tackle problems arising from the ever growing size and complexity of information.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer software
|x Reusability.
|
650 |
|
0 |
|a Microprocessors.
|
650 |
|
0 |
|a Computer system failures.
|
650 |
|
0 |
|a Architecture, Computer.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Theory of Computation.
|
650 |
2 |
4 |
|a Computer System Implementation.
|
650 |
2 |
4 |
|a Artificial Intelligence (incl. Robotics).
|
650 |
2 |
4 |
|a System Performance and Evaluation.
|
650 |
2 |
4 |
|a Performance and Reliability.
|
650 |
2 |
4 |
|a Processor Architectures.
|
700 |
1 |
|
|a Mueller, Peter.
|e editor.
|
700 |
1 |
|
|a Cao, Jian-Nong.
|e editor.
|
700 |
1 |
|
|a Wang, Cho-Li.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642104848
|
830 |
|
0 |
|a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
|x 1867-8211 ;
|v 18
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-10485-5
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|