Computer science research and technology.: Vol. 2 /
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York :
Nova Science Publishers,
©2011.
|
Schriftenreihe: | Computer science, technology and applications.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | 1 online resource (x, 199 pages) : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781611227246 1611227240 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn730933861 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 110615s2011 nyua ob 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d OCLCF |d YDXCP |d OCLCQ |d OCLCA |d OCLCQ |d AGLDB |d OCLCQ |d VTS |d OCLCQ |d AU@ |d STF |d OCLCQ |d K6U |d OCLCQ |d OCLCO |d OCL |d OCLCQ |d OCLCO | ||
019 | |a 904123262 |a 957741760 |a 958086621 |a 960281805 | ||
020 | |a 9781611227246 |q (electronic bk.) | ||
020 | |a 1611227240 |q (electronic bk.) | ||
020 | |z 9781611220735 | ||
020 | |z 1611220734 | ||
035 | |a (OCoLC)730933861 |z (OCoLC)904123262 |z (OCoLC)957741760 |z (OCoLC)958086621 |z (OCoLC)960281805 | ||
050 | 4 | |a QA75.5 |b .C66eb vol. 2 | |
072 | 7 | |a COM |x 052000 |2 bisacsh | |
072 | 7 | |a COM |x 037000 |2 bisacsh | |
072 | 7 | |a COM |x 013000 |2 bisacsh | |
072 | 7 | |a COM |x 032000 |2 bisacsh | |
072 | 7 | |a COM |x 018000 |2 bisacsh | |
072 | 7 | |a COM |x 014000 |2 bisacsh | |
072 | 7 | |a COM |x 067000 |2 bisacsh | |
082 | 7 | |a 004 |2 22 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Computer science research and technology. |n Vol. 2 / |c Janice P. Bauer, editor. |
260 | |a New York : |b Nova Science Publishers, |c ©2011. | ||
300 | |a 1 online resource (x, 199 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Computer science, technology and applications | |
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a LIBRARY OF CONGRESS CATALOGING-IN-PUBLICATION DATA ; COMPUTER SCIENCE RESEARCH AND TECHNOLOGY. VOLUME 2 ; CONTENTS ; PREFACE ; PROTECTION OF UNICAST AND MULTICAST TRAFFIC IN WDM MESH NETWORKS: A SURVEY ; ABSTRACT ; 1. INTRODUCTION ; 2. BASIC PROTECTION TECHNIQUES ; 2.1. Link-Protection ; 2.1.1. Link-Based Dedicated Protection [13] ; 2.1.2. Link-Based Shared Protection [13] ; 2.1.3. Virtual-Link Protection [13] ; 2.1.4. The p-Cycle Protection ; 2.1.5. Segment Protection ; 2.2. Path-Protection ; 2.2.1. Path-Based Dedicated Protection [13] ; 2.2.1.1. The 1+1 Protection. | |
505 | 8 | |a 2.2.2. Path-Based Shared Protection 2.2.2.1. The 1: N Protection ; 2.2.3. Partial Path Protection ; 2.2.4. Sub-Path Protection [21] ; 3. UNICAST TRAFFIC PROTECTION TECHNIQUE ; 3.1. Dynamic Hop Constrained Sub-Path Protection (HCSPP) [22] ; 3.2. Partial SRLG-Disjoint Shared Path Protection with Differentiated Reliability (Pd-SPP)[23] ; 3.3. Two-Segment (TS) Protection [15] ; 3.4. WDM-Shared Non-SRLG Protection [24] ; 3.5. On-Line Hybrid Survivability (OHS) [25] ; 3.6. Sub-Path Protection Based on Auxiliary Virtual Topology (SPAVT) [26] | |
505 | 8 | |a 3.7. Fault-Tolerate Ant-Based Survivable Routing with Shared Backup Path (FT-ABR) [27] 3.8. Recursive Shared Segment Protection (RSSP) [28] ; 3.9. Network Coding [29] ; A. The p_Cycle Construction and Node Assignment Procedure to Cycles ; B. Encoding Operations ; C. Recovery from Failure ; 3.10. Level of Service Algorithm (LSA) [30] ; 4. MULTICAST TRAFFIC PROTECTION SCHEMES ; 4.1. Dynamic Multicast Protection Schemes ; 4.1.1. Optimal Path-Pair Based Removing Residual Link (OPP-PRL) [32] ; 4.1.2. Source-Leaf Path Based Avoiding Residual Link (SLP-ARL) [32] | |
505 | 8 | |a 4.2. Multicast Protection through Spanning Paths (MPSP) [33] 4.3. Shared Source-Leaf Path-Based Protection (SLPP) [35] ; 4.4. Adaptive Shared Segment Protection (ASSP) [36] ; 4.5. Shared Segment Protection with Re-Provisioning (SSPR) [37] ; 4.6. Sparse Splitting Constrained Multicast Protection (SSMP) [38] ; 4.7. Cross-Sharing [10] ; 4.8. Protection Algorithms under Reliability Constraints [40] ; 4.9. A Tree Protection Scheme with Optimized Shortest Path Tree (TP- OSPT) [9] ; 5. PERFORMANCE COMPARISION ; 5.1. Comparison among Basic Traffic Protection Techniques. | |
505 | 8 | |a 5.2. Comparison among Protection Techniques Supporting Unicast Traffic 5.3. Comparison among Protection Techniques Supporting Multicast Traffic ; CONCLUSION ; REFERENCES ; CLOUD COMPUTING: MAKING HEADWAY WITH THE SCIENTIFIC COMMUNITY ; ABSTRACT ; I. INTRODUCTION ; II. CLOUD COMPUTING: DEFINITION ; III. PUBLIC, PRIVATE AND HYBRID CLOUDS ; IV. PUBLIC CLOUD SERVICES FOR HPC ; V. ECONOMICS, FLEXIBILITY AND GREEN CREDENTIALS ; VI. THE GROWING APPEAL OF CLOUD COMPUTING FOR HPC ; VII. CLOUD PROBLEMS: SHOULD USERS WORRY? ; CONCLUSION ; REFERENCES. | |
650 | 0 | |a Computer science. |0 http://id.loc.gov/authorities/subjects/sh89003285 | |
650 | 0 | |a Electronic data processing. |0 http://id.loc.gov/authorities/subjects/sh85042288 | |
650 | 6 | |a Informatique. | |
650 | 7 | |a data processing. |2 aat | |
650 | 7 | |a computer science. |2 aat | |
650 | 7 | |a COMPUTERS |x Reference. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Machine Theory. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Computer Literacy. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Information Technology. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Data Processing. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Computer Science. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Hardware |x General. |2 bisacsh | |
650 | 7 | |a Electronic data processing |2 fast | |
650 | 7 | |a Computer science |2 fast | |
700 | 1 | |a Bauer, Janice P. | |
776 | 0 | 8 | |i Print version: |t Computer Science Research and Technology. |d Nova Science Pub Inc 2011 |z 9781611220735 |w (OCoLC)679940960 |
830 | 0 | |a Computer science, technology and applications. | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=367728 |3 Volltext |
938 | |a EBSCOhost |b EBSC |n 367728 | ||
938 | |a YBP Library Services |b YANK |n 6940642 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn730933861 |
---|---|
_version_ | 1816881762079342592 |
adam_text | |
any_adam_object | |
author2 | Bauer, Janice P. |
author2_role | |
author2_variant | j p b jp jpb |
author_facet | Bauer, Janice P. |
author_sort | Bauer, Janice P. |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA75 |
callnumber-raw | QA75.5 .C66eb vol. 2 |
callnumber-search | QA75.5 .C66eb vol. 2 |
callnumber-sort | QA 275.5 C66 EB VOL 12 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | LIBRARY OF CONGRESS CATALOGING-IN-PUBLICATION DATA ; COMPUTER SCIENCE RESEARCH AND TECHNOLOGY. VOLUME 2 ; CONTENTS ; PREFACE ; PROTECTION OF UNICAST AND MULTICAST TRAFFIC IN WDM MESH NETWORKS: A SURVEY ; ABSTRACT ; 1. INTRODUCTION ; 2. BASIC PROTECTION TECHNIQUES ; 2.1. Link-Protection ; 2.1.1. Link-Based Dedicated Protection [13] ; 2.1.2. Link-Based Shared Protection [13] ; 2.1.3. Virtual-Link Protection [13] ; 2.1.4. The p-Cycle Protection ; 2.1.5. Segment Protection ; 2.2. Path-Protection ; 2.2.1. Path-Based Dedicated Protection [13] ; 2.2.1.1. The 1+1 Protection. 2.2.2. Path-Based Shared Protection 2.2.2.1. The 1: N Protection ; 2.2.3. Partial Path Protection ; 2.2.4. Sub-Path Protection [21] ; 3. UNICAST TRAFFIC PROTECTION TECHNIQUE ; 3.1. Dynamic Hop Constrained Sub-Path Protection (HCSPP) [22] ; 3.2. Partial SRLG-Disjoint Shared Path Protection with Differentiated Reliability (Pd-SPP)[23] ; 3.3. Two-Segment (TS) Protection [15] ; 3.4. WDM-Shared Non-SRLG Protection [24] ; 3.5. On-Line Hybrid Survivability (OHS) [25] ; 3.6. Sub-Path Protection Based on Auxiliary Virtual Topology (SPAVT) [26] 3.7. Fault-Tolerate Ant-Based Survivable Routing with Shared Backup Path (FT-ABR) [27] 3.8. Recursive Shared Segment Protection (RSSP) [28] ; 3.9. Network Coding [29] ; A. The p_Cycle Construction and Node Assignment Procedure to Cycles ; B. Encoding Operations ; C. Recovery from Failure ; 3.10. Level of Service Algorithm (LSA) [30] ; 4. MULTICAST TRAFFIC PROTECTION SCHEMES ; 4.1. Dynamic Multicast Protection Schemes ; 4.1.1. Optimal Path-Pair Based Removing Residual Link (OPP-PRL) [32] ; 4.1.2. Source-Leaf Path Based Avoiding Residual Link (SLP-ARL) [32] 4.2. Multicast Protection through Spanning Paths (MPSP) [33] 4.3. Shared Source-Leaf Path-Based Protection (SLPP) [35] ; 4.4. Adaptive Shared Segment Protection (ASSP) [36] ; 4.5. Shared Segment Protection with Re-Provisioning (SSPR) [37] ; 4.6. Sparse Splitting Constrained Multicast Protection (SSMP) [38] ; 4.7. Cross-Sharing [10] ; 4.8. Protection Algorithms under Reliability Constraints [40] ; 4.9. A Tree Protection Scheme with Optimized Shortest Path Tree (TP- OSPT) [9] ; 5. PERFORMANCE COMPARISION ; 5.1. Comparison among Basic Traffic Protection Techniques. 5.2. Comparison among Protection Techniques Supporting Unicast Traffic 5.3. Comparison among Protection Techniques Supporting Multicast Traffic ; CONCLUSION ; REFERENCES ; CLOUD COMPUTING: MAKING HEADWAY WITH THE SCIENTIFIC COMMUNITY ; ABSTRACT ; I. INTRODUCTION ; II. CLOUD COMPUTING: DEFINITION ; III. PUBLIC, PRIVATE AND HYBRID CLOUDS ; IV. PUBLIC CLOUD SERVICES FOR HPC ; V. ECONOMICS, FLEXIBILITY AND GREEN CREDENTIALS ; VI. THE GROWING APPEAL OF CLOUD COMPUTING FOR HPC ; VII. CLOUD PROBLEMS: SHOULD USERS WORRY? ; CONCLUSION ; REFERENCES. |
ctrlnum | (OCoLC)730933861 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05600cam a2200721 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn730933861</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">110615s2011 nyua ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AU@</subfield><subfield code="d">STF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">K6U</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">904123262</subfield><subfield code="a">957741760</subfield><subfield code="a">958086621</subfield><subfield code="a">960281805</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781611227246</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1611227240</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781611220735</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1611220734</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)730933861</subfield><subfield code="z">(OCoLC)904123262</subfield><subfield code="z">(OCoLC)957741760</subfield><subfield code="z">(OCoLC)958086621</subfield><subfield code="z">(OCoLC)960281805</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA75.5</subfield><subfield code="b">.C66eb vol. 2</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">052000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">037000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">013000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">032000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">018000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">014000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">067000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Computer science research and technology.</subfield><subfield code="n">Vol. 2 /</subfield><subfield code="c">Janice P. Bauer, editor.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">New York :</subfield><subfield code="b">Nova Science Publishers,</subfield><subfield code="c">©2011.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (x, 199 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Computer science, technology and applications</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">LIBRARY OF CONGRESS CATALOGING-IN-PUBLICATION DATA ; COMPUTER SCIENCE RESEARCH AND TECHNOLOGY. VOLUME 2 ; CONTENTS ; PREFACE ; PROTECTION OF UNICAST AND MULTICAST TRAFFIC IN WDM MESH NETWORKS: A SURVEY ; ABSTRACT ; 1. INTRODUCTION ; 2. BASIC PROTECTION TECHNIQUES ; 2.1. Link-Protection ; 2.1.1. Link-Based Dedicated Protection [13] ; 2.1.2. Link-Based Shared Protection [13] ; 2.1.3. Virtual-Link Protection [13] ; 2.1.4. The p-Cycle Protection ; 2.1.5. Segment Protection ; 2.2. Path-Protection ; 2.2.1. Path-Based Dedicated Protection [13] ; 2.2.1.1. The 1+1 Protection.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2.2.2. Path-Based Shared Protection 2.2.2.1. The 1: N Protection ; 2.2.3. Partial Path Protection ; 2.2.4. Sub-Path Protection [21] ; 3. UNICAST TRAFFIC PROTECTION TECHNIQUE ; 3.1. Dynamic Hop Constrained Sub-Path Protection (HCSPP) [22] ; 3.2. Partial SRLG-Disjoint Shared Path Protection with Differentiated Reliability (Pd-SPP)[23] ; 3.3. Two-Segment (TS) Protection [15] ; 3.4. WDM-Shared Non-SRLG Protection [24] ; 3.5. On-Line Hybrid Survivability (OHS) [25] ; 3.6. Sub-Path Protection Based on Auxiliary Virtual Topology (SPAVT) [26]</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">3.7. Fault-Tolerate Ant-Based Survivable Routing with Shared Backup Path (FT-ABR) [27] 3.8. Recursive Shared Segment Protection (RSSP) [28] ; 3.9. Network Coding [29] ; A. The p_Cycle Construction and Node Assignment Procedure to Cycles ; B. Encoding Operations ; C. Recovery from Failure ; 3.10. Level of Service Algorithm (LSA) [30] ; 4. MULTICAST TRAFFIC PROTECTION SCHEMES ; 4.1. Dynamic Multicast Protection Schemes ; 4.1.1. Optimal Path-Pair Based Removing Residual Link (OPP-PRL) [32] ; 4.1.2. Source-Leaf Path Based Avoiding Residual Link (SLP-ARL) [32]</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">4.2. Multicast Protection through Spanning Paths (MPSP) [33] 4.3. Shared Source-Leaf Path-Based Protection (SLPP) [35] ; 4.4. Adaptive Shared Segment Protection (ASSP) [36] ; 4.5. Shared Segment Protection with Re-Provisioning (SSPR) [37] ; 4.6. Sparse Splitting Constrained Multicast Protection (SSMP) [38] ; 4.7. Cross-Sharing [10] ; 4.8. Protection Algorithms under Reliability Constraints [40] ; 4.9. A Tree Protection Scheme with Optimized Shortest Path Tree (TP- OSPT) [9] ; 5. PERFORMANCE COMPARISION ; 5.1. Comparison among Basic Traffic Protection Techniques.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">5.2. Comparison among Protection Techniques Supporting Unicast Traffic 5.3. Comparison among Protection Techniques Supporting Multicast Traffic ; CONCLUSION ; REFERENCES ; CLOUD COMPUTING: MAKING HEADWAY WITH THE SCIENTIFIC COMMUNITY ; ABSTRACT ; I. INTRODUCTION ; II. CLOUD COMPUTING: DEFINITION ; III. PUBLIC, PRIVATE AND HYBRID CLOUDS ; IV. PUBLIC CLOUD SERVICES FOR HPC ; V. ECONOMICS, FLEXIBILITY AND GREEN CREDENTIALS ; VI. THE GROWING APPEAL OF CLOUD COMPUTING FOR HPC ; VII. CLOUD PROBLEMS: SHOULD USERS WORRY? ; CONCLUSION ; REFERENCES.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer science.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh89003285</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic data processing.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85042288</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">data processing.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">computer science.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Reference.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Machine Theory.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Computer Literacy.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Information Technology.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Data Processing.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Computer Science.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Hardware</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic data processing</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer science</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bauer, Janice P.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Computer Science Research and Technology.</subfield><subfield code="d">Nova Science Pub Inc 2011</subfield><subfield code="z">9781611220735</subfield><subfield code="w">(OCoLC)679940960</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Computer science, technology and applications.</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=367728</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">367728</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">6940642</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn730933861 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:17:52Z |
institution | BVB |
isbn | 9781611227246 1611227240 |
language | English |
oclc_num | 730933861 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (x, 199 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Nova Science Publishers, |
record_format | marc |
series | Computer science, technology and applications. |
series2 | Computer science, technology and applications |
spelling | Computer science research and technology. Vol. 2 / Janice P. Bauer, editor. New York : Nova Science Publishers, ©2011. 1 online resource (x, 199 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Computer science, technology and applications Includes bibliographical references and index. Print version record. LIBRARY OF CONGRESS CATALOGING-IN-PUBLICATION DATA ; COMPUTER SCIENCE RESEARCH AND TECHNOLOGY. VOLUME 2 ; CONTENTS ; PREFACE ; PROTECTION OF UNICAST AND MULTICAST TRAFFIC IN WDM MESH NETWORKS: A SURVEY ; ABSTRACT ; 1. INTRODUCTION ; 2. BASIC PROTECTION TECHNIQUES ; 2.1. Link-Protection ; 2.1.1. Link-Based Dedicated Protection [13] ; 2.1.2. Link-Based Shared Protection [13] ; 2.1.3. Virtual-Link Protection [13] ; 2.1.4. The p-Cycle Protection ; 2.1.5. Segment Protection ; 2.2. Path-Protection ; 2.2.1. Path-Based Dedicated Protection [13] ; 2.2.1.1. The 1+1 Protection. 2.2.2. Path-Based Shared Protection 2.2.2.1. The 1: N Protection ; 2.2.3. Partial Path Protection ; 2.2.4. Sub-Path Protection [21] ; 3. UNICAST TRAFFIC PROTECTION TECHNIQUE ; 3.1. Dynamic Hop Constrained Sub-Path Protection (HCSPP) [22] ; 3.2. Partial SRLG-Disjoint Shared Path Protection with Differentiated Reliability (Pd-SPP)[23] ; 3.3. Two-Segment (TS) Protection [15] ; 3.4. WDM-Shared Non-SRLG Protection [24] ; 3.5. On-Line Hybrid Survivability (OHS) [25] ; 3.6. Sub-Path Protection Based on Auxiliary Virtual Topology (SPAVT) [26] 3.7. Fault-Tolerate Ant-Based Survivable Routing with Shared Backup Path (FT-ABR) [27] 3.8. Recursive Shared Segment Protection (RSSP) [28] ; 3.9. Network Coding [29] ; A. The p_Cycle Construction and Node Assignment Procedure to Cycles ; B. Encoding Operations ; C. Recovery from Failure ; 3.10. Level of Service Algorithm (LSA) [30] ; 4. MULTICAST TRAFFIC PROTECTION SCHEMES ; 4.1. Dynamic Multicast Protection Schemes ; 4.1.1. Optimal Path-Pair Based Removing Residual Link (OPP-PRL) [32] ; 4.1.2. Source-Leaf Path Based Avoiding Residual Link (SLP-ARL) [32] 4.2. Multicast Protection through Spanning Paths (MPSP) [33] 4.3. Shared Source-Leaf Path-Based Protection (SLPP) [35] ; 4.4. Adaptive Shared Segment Protection (ASSP) [36] ; 4.5. Shared Segment Protection with Re-Provisioning (SSPR) [37] ; 4.6. Sparse Splitting Constrained Multicast Protection (SSMP) [38] ; 4.7. Cross-Sharing [10] ; 4.8. Protection Algorithms under Reliability Constraints [40] ; 4.9. A Tree Protection Scheme with Optimized Shortest Path Tree (TP- OSPT) [9] ; 5. PERFORMANCE COMPARISION ; 5.1. Comparison among Basic Traffic Protection Techniques. 5.2. Comparison among Protection Techniques Supporting Unicast Traffic 5.3. Comparison among Protection Techniques Supporting Multicast Traffic ; CONCLUSION ; REFERENCES ; CLOUD COMPUTING: MAKING HEADWAY WITH THE SCIENTIFIC COMMUNITY ; ABSTRACT ; I. INTRODUCTION ; II. CLOUD COMPUTING: DEFINITION ; III. PUBLIC, PRIVATE AND HYBRID CLOUDS ; IV. PUBLIC CLOUD SERVICES FOR HPC ; V. ECONOMICS, FLEXIBILITY AND GREEN CREDENTIALS ; VI. THE GROWING APPEAL OF CLOUD COMPUTING FOR HPC ; VII. CLOUD PROBLEMS: SHOULD USERS WORRY? ; CONCLUSION ; REFERENCES. Computer science. http://id.loc.gov/authorities/subjects/sh89003285 Electronic data processing. http://id.loc.gov/authorities/subjects/sh85042288 Informatique. data processing. aat computer science. aat COMPUTERS Reference. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Computer Literacy. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Hardware General. bisacsh Electronic data processing fast Computer science fast Bauer, Janice P. Print version: Computer Science Research and Technology. Nova Science Pub Inc 2011 9781611220735 (OCoLC)679940960 Computer science, technology and applications. FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=367728 Volltext |
spellingShingle | Computer science research and technology. Computer science, technology and applications. LIBRARY OF CONGRESS CATALOGING-IN-PUBLICATION DATA ; COMPUTER SCIENCE RESEARCH AND TECHNOLOGY. VOLUME 2 ; CONTENTS ; PREFACE ; PROTECTION OF UNICAST AND MULTICAST TRAFFIC IN WDM MESH NETWORKS: A SURVEY ; ABSTRACT ; 1. INTRODUCTION ; 2. BASIC PROTECTION TECHNIQUES ; 2.1. Link-Protection ; 2.1.1. Link-Based Dedicated Protection [13] ; 2.1.2. Link-Based Shared Protection [13] ; 2.1.3. Virtual-Link Protection [13] ; 2.1.4. The p-Cycle Protection ; 2.1.5. Segment Protection ; 2.2. Path-Protection ; 2.2.1. Path-Based Dedicated Protection [13] ; 2.2.1.1. The 1+1 Protection. 2.2.2. Path-Based Shared Protection 2.2.2.1. The 1: N Protection ; 2.2.3. Partial Path Protection ; 2.2.4. Sub-Path Protection [21] ; 3. UNICAST TRAFFIC PROTECTION TECHNIQUE ; 3.1. Dynamic Hop Constrained Sub-Path Protection (HCSPP) [22] ; 3.2. Partial SRLG-Disjoint Shared Path Protection with Differentiated Reliability (Pd-SPP)[23] ; 3.3. Two-Segment (TS) Protection [15] ; 3.4. WDM-Shared Non-SRLG Protection [24] ; 3.5. On-Line Hybrid Survivability (OHS) [25] ; 3.6. Sub-Path Protection Based on Auxiliary Virtual Topology (SPAVT) [26] 3.7. Fault-Tolerate Ant-Based Survivable Routing with Shared Backup Path (FT-ABR) [27] 3.8. Recursive Shared Segment Protection (RSSP) [28] ; 3.9. Network Coding [29] ; A. The p_Cycle Construction and Node Assignment Procedure to Cycles ; B. Encoding Operations ; C. Recovery from Failure ; 3.10. Level of Service Algorithm (LSA) [30] ; 4. MULTICAST TRAFFIC PROTECTION SCHEMES ; 4.1. Dynamic Multicast Protection Schemes ; 4.1.1. Optimal Path-Pair Based Removing Residual Link (OPP-PRL) [32] ; 4.1.2. Source-Leaf Path Based Avoiding Residual Link (SLP-ARL) [32] 4.2. Multicast Protection through Spanning Paths (MPSP) [33] 4.3. Shared Source-Leaf Path-Based Protection (SLPP) [35] ; 4.4. Adaptive Shared Segment Protection (ASSP) [36] ; 4.5. Shared Segment Protection with Re-Provisioning (SSPR) [37] ; 4.6. Sparse Splitting Constrained Multicast Protection (SSMP) [38] ; 4.7. Cross-Sharing [10] ; 4.8. Protection Algorithms under Reliability Constraints [40] ; 4.9. A Tree Protection Scheme with Optimized Shortest Path Tree (TP- OSPT) [9] ; 5. PERFORMANCE COMPARISION ; 5.1. Comparison among Basic Traffic Protection Techniques. 5.2. Comparison among Protection Techniques Supporting Unicast Traffic 5.3. Comparison among Protection Techniques Supporting Multicast Traffic ; CONCLUSION ; REFERENCES ; CLOUD COMPUTING: MAKING HEADWAY WITH THE SCIENTIFIC COMMUNITY ; ABSTRACT ; I. INTRODUCTION ; II. CLOUD COMPUTING: DEFINITION ; III. PUBLIC, PRIVATE AND HYBRID CLOUDS ; IV. PUBLIC CLOUD SERVICES FOR HPC ; V. ECONOMICS, FLEXIBILITY AND GREEN CREDENTIALS ; VI. THE GROWING APPEAL OF CLOUD COMPUTING FOR HPC ; VII. CLOUD PROBLEMS: SHOULD USERS WORRY? ; CONCLUSION ; REFERENCES. Computer science. http://id.loc.gov/authorities/subjects/sh89003285 Electronic data processing. http://id.loc.gov/authorities/subjects/sh85042288 Informatique. data processing. aat computer science. aat COMPUTERS Reference. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Computer Literacy. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Hardware General. bisacsh Electronic data processing fast Computer science fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh89003285 http://id.loc.gov/authorities/subjects/sh85042288 |
title | Computer science research and technology. |
title_auth | Computer science research and technology. |
title_exact_search | Computer science research and technology. |
title_full | Computer science research and technology. Vol. 2 / Janice P. Bauer, editor. |
title_fullStr | Computer science research and technology. Vol. 2 / Janice P. Bauer, editor. |
title_full_unstemmed | Computer science research and technology. Vol. 2 / Janice P. Bauer, editor. |
title_short | Computer science research and technology. |
title_sort | computer science research and technology |
topic | Computer science. http://id.loc.gov/authorities/subjects/sh89003285 Electronic data processing. http://id.loc.gov/authorities/subjects/sh85042288 Informatique. data processing. aat computer science. aat COMPUTERS Reference. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Computer Literacy. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Hardware General. bisacsh Electronic data processing fast Computer science fast |
topic_facet | Computer science. Electronic data processing. Informatique. data processing. computer science. COMPUTERS Reference. COMPUTERS Machine Theory. COMPUTERS Computer Literacy. COMPUTERS Information Technology. COMPUTERS Data Processing. COMPUTERS Computer Science. COMPUTERS Hardware General. Electronic data processing Computer science |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=367728 |
work_keys_str_mv | AT bauerjanicep computerscienceresearchandtechnologyvol2 |