[图书][B] Wireless sensor networks: an information processing approach
… logical properties of nodes related to the network structure. … point of view, we define a sensor
network as an abstract tuple… For K > 3, we can solve for it using the least-squares method […
network as an abstract tuple… For K > 3, we can solve for it using the least-squares method […
[图书][B] Network Algorithmics: an interdisciplinary approach to designing fast networked devices
G Varghese, J Xu - 2022 - books.google.com
… using any information, methods, compounds, or experiments described herein. In using such
information or methods … method of crafting solutions to new network bottlenecks that we call …
information or methods … method of crafting solutions to new network bottlenecks that we call …
[PDF][PDF] Middleware: a model for distributed system services
PA Bernstein - Communications of the ACM, 1996 - dl.acm.org
… -area network (WAN) typically support access to databases, … regarded as “communications
access method’’ products, … control these independent but related databases. Lotus Notes …
access method’’ products, … control these independent but related databases. Lotus Notes …
How to access factory floor information using internet technologies and gateways
T Sauter, M Lobashov - IEEE Transactions on Industrial …, 2011 - ieeexplore.ieee.org
… a remote node that is connected to a network. Because the … actual process data, device
configuration data, and network … and methods – gateway-side functions that a client may invoke. …
configuration data, and network … and methods – gateway-side functions that a client may invoke. …
[图书][B] Network and system security
JR Vacca - 2013 - books.google.com
… and methods to make them more secure for hosting companies and their customers. …
through the cable to which the packet capture appliance is connected. There are also two general …
through the cable to which the packet capture appliance is connected. There are also two general …
On the features and challenges of security and privacy in distributed internet of things
… edge of the network exchange information and collaborate … mostly related to external
customers (ie users that access the … , service providers, information processing systems) need to …
customers (ie users that access the … , service providers, information processing systems) need to …
Making middleboxes someone else's problem: Network processing as a cloud service
… Our study establishes the costs associated with middlebox deployments and the … of using
a single fixed PoP P* e for each enterprise site e, we choose the optimal PoP for each client …
a single fixed PoP P* e for each enterprise site e, we choose the optimal PoP for each client …
[图书][B] Distributed network systems: from concepts to implementations
… methodology now know or hereafter developed is forbidden. … clients and servers/group
servers in distributed network … 7 computers connected by a local area network. The issue …
servers in distributed network … 7 computers connected by a local area network. The issue …
[图书][B] Wireless Network Security:.
T Karygiannis, L Owens - 2002 - all.net
… As described in this document, the risks related to the use of wireless … by the
informationprocessing and networking capabilities of … It should be noted that the authentication …
informationprocessing and networking capabilities of … It should be noted that the authentication …
Securing building management systems using named data networking
… by using hierarchical names, and long-term storage is provided through the use of NDN
repositories, network-connected … -based access control eliminates the need for clients to interact …
repositories, network-connected … -based access control eliminates the need for clients to interact …