Mining and control of network traffic by computational intelligence:
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2011
|
Schriftenreihe: | Studies in computational intelligence
342 |
Schlagworte: | |
Online-Zugang: | BTU01 FAB01 FHA01 FHI01 FHN01 FHR01 FKE01 FWS01 FWS02 Volltext |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9783642180842 |
DOI: | 10.1007/978-3-642-18084-2 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV040124965 | ||
003 | DE-604 | ||
005 | 20120828 | ||
007 | cr|uuu---uuuuu | ||
008 | 120509s2011 |||| o||u| ||||||eng d | ||
020 | |a 9783642180842 |c Online |9 978-3-642-18084-2 | ||
024 | 7 | |a 10.1007/978-3-642-18084-2 |2 doi | |
035 | |a (OCoLC)712216559 | ||
035 | |a (DE-599)BVBBV040124965 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-863 |a DE-862 |a DE-634 |a DE-898 |a DE-Aug4 |a DE-92 |a DE-1043 |a DE-859 |a DE-573 | ||
082 | 0 | |a 004.66 |2 22//ger | |
084 | |a ST 300 |0 (DE-625)143650: |2 rvk | ||
100 | 1 | |a Montesino Pouzols, Federico |e Verfasser |4 aut | |
245 | 1 | 0 | |a Mining and control of network traffic by computational intelligence |c Federico Montesino Pouzols ; Diego R. Lopez ; Angel Barriga Barros |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2011 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Studies in computational intelligence |v 342 | |
650 | 4 | |a Ingenieurwissenschaften | |
650 | 4 | |a Künstliche Intelligenz | |
650 | 4 | |a Engineering | |
650 | 4 | |a Information systems | |
650 | 4 | |a Artificial intelligence | |
650 | 4 | |a Telecommunication | |
650 | 4 | |a Computational Intelligence | |
650 | 4 | |a Artificial Intelligence (incl. Robotics) | |
650 | 4 | |a Communications Engineering, Networks | |
650 | 4 | |a Information Systems Applications (incl.Internet) | |
650 | 0 | 7 | |a Soft Computing |0 (DE-588)4455833-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zeitreihenanalyse |0 (DE-588)4067486-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Monitoring |g Informatik |0 (DE-588)4522632-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Data Mining |0 (DE-588)4428654-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Fuzzy-logisches Schließen |0 (DE-588)4659944-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Paketvermittlung |0 (DE-588)4173101-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Überlastkontrolle |0 (DE-588)4521193-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Traffic Engineering |0 (DE-588)4699419-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 1 | |a Traffic Engineering |0 (DE-588)4699419-1 |D s |
689 | 0 | 2 | |a Paketvermittlung |0 (DE-588)4173101-3 |D s |
689 | 0 | 3 | |a Data Mining |0 (DE-588)4428654-5 |D s |
689 | 0 | 4 | |a Überlastkontrolle |0 (DE-588)4521193-0 |D s |
689 | 0 | 5 | |a Monitoring |g Informatik |0 (DE-588)4522632-5 |D s |
689 | 0 | 6 | |a Soft Computing |0 (DE-588)4455833-8 |D s |
689 | 0 | 7 | |a Zeitreihenanalyse |0 (DE-588)4067486-1 |D s |
689 | 0 | 8 | |a Fuzzy-logisches Schließen |0 (DE-588)4659944-7 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Lopez, Diego R. |e Verfasser |4 aut | |
700 | 1 | |a Barriga Barros, Angel |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-642-18083-5 |
830 | 0 | |a Studies in computational intelligence |v 342 |w (DE-604)BV020822171 |9 342 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-18084-2 |x Verlag |3 Volltext |
912 | |a ZDB-2-ENG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-024982251 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1007/978-3-642-18084-2 |l BTU01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-18084-2 |l FAB01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-18084-2 |l FHA01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-18084-2 |l FHI01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-18084-2 |l FHN01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-18084-2 |l FHR01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-18084-2 |l FKE01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-18084-2 |l FWS01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-18084-2 |l FWS02 |p ZDB-2-ENG |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 435793 |
---|---|
_version_ | 1806178048996802560 |
any_adam_object | |
author | Montesino Pouzols, Federico Lopez, Diego R. Barriga Barros, Angel |
author_facet | Montesino Pouzols, Federico Lopez, Diego R. Barriga Barros, Angel |
author_role | aut aut aut |
author_sort | Montesino Pouzols, Federico |
author_variant | p f m pf pfm d r l dr drl b a b ba bab |
building | Verbundindex |
bvnumber | BV040124965 |
classification_rvk | ST 300 |
collection | ZDB-2-ENG |
ctrlnum | (OCoLC)712216559 (DE-599)BVBBV040124965 |
dewey-full | 004.66 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.66 |
dewey-search | 004.66 |
dewey-sort | 14.66 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-642-18084-2 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03934nmm a2200841zcb4500</leader><controlfield tag="001">BV040124965</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20120828 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">120509s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642180842</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-642-18084-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-18084-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)712216559</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV040124965</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-573</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.66</subfield><subfield code="2">22//ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 300</subfield><subfield code="0">(DE-625)143650:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Montesino Pouzols, Federico</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mining and control of network traffic by computational intelligence</subfield><subfield code="c">Federico Montesino Pouzols ; Diego R. Lopez ; Angel Barriga Barros</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Studies in computational intelligence</subfield><subfield code="v">342</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingenieurwissenschaften</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Künstliche Intelligenz</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence (incl. Robotics)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Communications Engineering, Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems Applications (incl.Internet)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Soft Computing</subfield><subfield code="0">(DE-588)4455833-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zeitreihenanalyse</subfield><subfield code="0">(DE-588)4067486-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Monitoring</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4522632-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Fuzzy-logisches Schließen</subfield><subfield code="0">(DE-588)4659944-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Paketvermittlung</subfield><subfield code="0">(DE-588)4173101-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Überlastkontrolle</subfield><subfield code="0">(DE-588)4521193-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Traffic Engineering</subfield><subfield code="0">(DE-588)4699419-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Traffic Engineering</subfield><subfield code="0">(DE-588)4699419-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Paketvermittlung</subfield><subfield code="0">(DE-588)4173101-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Überlastkontrolle</subfield><subfield code="0">(DE-588)4521193-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Monitoring</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4522632-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="6"><subfield code="a">Soft Computing</subfield><subfield code="0">(DE-588)4455833-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="7"><subfield code="a">Zeitreihenanalyse</subfield><subfield code="0">(DE-588)4067486-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="8"><subfield code="a">Fuzzy-logisches Schließen</subfield><subfield code="0">(DE-588)4659944-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lopez, Diego R.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Barriga Barros, Angel</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-642-18083-5</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Studies in computational intelligence</subfield><subfield code="v">342</subfield><subfield code="w">(DE-604)BV020822171</subfield><subfield code="9">342</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-18084-2</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024982251</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-18084-2</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-18084-2</subfield><subfield code="l">FAB01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-18084-2</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-18084-2</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-18084-2</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-18084-2</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-18084-2</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-18084-2</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-18084-2</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV040124965 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T11:46:55Z |
institution | BVB |
isbn | 9783642180842 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-024982251 |
oclc_num | 712216559 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-634 DE-898 DE-BY-UBR DE-Aug4 DE-92 DE-1043 DE-859 DE-573 |
owner_facet | DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-634 DE-898 DE-BY-UBR DE-Aug4 DE-92 DE-1043 DE-859 DE-573 |
physical | 1 Online-Ressource |
psigel | ZDB-2-ENG |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Springer |
record_format | marc |
series | Studies in computational intelligence |
series2 | Studies in computational intelligence |
spellingShingle | Montesino Pouzols, Federico Lopez, Diego R. Barriga Barros, Angel Mining and control of network traffic by computational intelligence Studies in computational intelligence Ingenieurwissenschaften Künstliche Intelligenz Engineering Information systems Artificial intelligence Telecommunication Computational Intelligence Artificial Intelligence (incl. Robotics) Communications Engineering, Networks Information Systems Applications (incl.Internet) Soft Computing (DE-588)4455833-8 gnd Zeitreihenanalyse (DE-588)4067486-1 gnd Monitoring Informatik (DE-588)4522632-5 gnd Data Mining (DE-588)4428654-5 gnd Internet (DE-588)4308416-3 gnd Fuzzy-logisches Schließen (DE-588)4659944-7 gnd Paketvermittlung (DE-588)4173101-3 gnd Überlastkontrolle (DE-588)4521193-0 gnd Traffic Engineering (DE-588)4699419-1 gnd |
subject_GND | (DE-588)4455833-8 (DE-588)4067486-1 (DE-588)4522632-5 (DE-588)4428654-5 (DE-588)4308416-3 (DE-588)4659944-7 (DE-588)4173101-3 (DE-588)4521193-0 (DE-588)4699419-1 |
title | Mining and control of network traffic by computational intelligence |
title_auth | Mining and control of network traffic by computational intelligence |
title_exact_search | Mining and control of network traffic by computational intelligence |
title_full | Mining and control of network traffic by computational intelligence Federico Montesino Pouzols ; Diego R. Lopez ; Angel Barriga Barros |
title_fullStr | Mining and control of network traffic by computational intelligence Federico Montesino Pouzols ; Diego R. Lopez ; Angel Barriga Barros |
title_full_unstemmed | Mining and control of network traffic by computational intelligence Federico Montesino Pouzols ; Diego R. Lopez ; Angel Barriga Barros |
title_short | Mining and control of network traffic by computational intelligence |
title_sort | mining and control of network traffic by computational intelligence |
topic | Ingenieurwissenschaften Künstliche Intelligenz Engineering Information systems Artificial intelligence Telecommunication Computational Intelligence Artificial Intelligence (incl. Robotics) Communications Engineering, Networks Information Systems Applications (incl.Internet) Soft Computing (DE-588)4455833-8 gnd Zeitreihenanalyse (DE-588)4067486-1 gnd Monitoring Informatik (DE-588)4522632-5 gnd Data Mining (DE-588)4428654-5 gnd Internet (DE-588)4308416-3 gnd Fuzzy-logisches Schließen (DE-588)4659944-7 gnd Paketvermittlung (DE-588)4173101-3 gnd Überlastkontrolle (DE-588)4521193-0 gnd Traffic Engineering (DE-588)4699419-1 gnd |
topic_facet | Ingenieurwissenschaften Künstliche Intelligenz Engineering Information systems Artificial intelligence Telecommunication Computational Intelligence Artificial Intelligence (incl. Robotics) Communications Engineering, Networks Information Systems Applications (incl.Internet) Soft Computing Zeitreihenanalyse Monitoring Informatik Data Mining Internet Fuzzy-logisches Schließen Paketvermittlung Überlastkontrolle Traffic Engineering |
url | https://doi.org/10.1007/978-3-642-18084-2 |
volume_link | (DE-604)BV020822171 |
work_keys_str_mv | AT montesinopouzolsfederico miningandcontrolofnetworktrafficbycomputationalintelligence AT lopezdiegor miningandcontrolofnetworktrafficbycomputationalintelligence AT barrigabarrosangel miningandcontrolofnetworktrafficbycomputationalintelligence |