[图书][B] Wireless sensor networks: an information processing approach

F Zhao, LJ Guibas - 2004 - books.google.com
… logical properties of nodes related to the network structure. … point of view, we define a sensor
network as an abstract tuple… For K > 3, we can solve for it using the least-squares method […

[图书][B] Network Algorithmics: an interdisciplinary approach to designing fast networked devices

G Varghese, J Xu - 2022 - books.google.com
using any information, methods, compounds, or experiments described herein. In using such
information or methodsmethod of crafting solutions to new network bottlenecks that we call …

[PDF][PDF] Middleware: a model for distributed system services

PA Bernstein - Communications of the ACM, 1996 - dl.acm.org
… -area network (WAN) typically support access to databases, … regarded as “communications
access method’’ products, … control these independent but related databases. Lotus Notes …

How to access factory floor information using internet technologies and gateways

T Sauter, M Lobashov - IEEE Transactions on Industrial …, 2011 - ieeexplore.ieee.org
… a remote node that is connected to a network. Because the … actual process data, device
configuration data, and network … and methods – gateway-side functions that a client may invoke. …

[图书][B] Network and system security

JR Vacca - 2013 - books.google.com
… and methods to make them more secure for hosting companies and their customers. …
through the cable to which the packet capture appliance is connected. There are also two general …

On the features and challenges of security and privacy in distributed internet of things

R Roman, J Zhou, J Lopez - Computer networks, 2013 - Elsevier
… edge of the network exchange information and collaborate … mostly related to external
customers (ie users that access the … , service providers, information processing systems) need to …

Making middleboxes someone else's problem: Network processing as a cloud service

J Sherry, S Hasan, C Scott, A Krishnamurthy… - ACM SIGCOMM …, 2012 - dl.acm.org
… Our study establishes the costs associated with middlebox deployments and the … of using
a single fixed PoP P* e for each enterprise site e, we choose the optimal PoP for each client

[图书][B] Distributed network systems: from concepts to implementations

W Jia, W Zhou - 2004 - books.google.com
methodology now know or hereafter developed is forbidden. … clients and servers/group
servers in distributed network … 7 computers connected by a local area network. The issue …

[图书][B] Wireless Network Security:.

T Karygiannis, L Owens - 2002 - all.net
… As described in this document, the risks related to the use of wireless … by the
informationprocessing and networking capabilities of … It should be noted that the authentication …

Securing building management systems using named data networking

W Shang, Q Ding, A Marianantoni, J Burke… - … Network, 2014 - ieeexplore.ieee.org
… by using hierarchical names, and long-term storage is provided through the use of NDN
repositories, network-connected … -based access control eliminates the need for clients to interact …