Youssef Ait El Mahjoub, J. Fourneau, Hind Castel-Taleb
{"title":"Analysis of Energy Consumption in Cloud Center with Tasks Migrations","authors":"Youssef Ait El Mahjoub, J. Fourneau, Hind Castel-Taleb","doi":"10.1007/978-3-030-21952-9_23","DOIUrl":"https://doi.org/10.1007/978-3-030-21952-9_23","url":null,"abstract":"","PeriodicalId":6553,"journal":{"name":"2016 25th International Conference on Computer Communication and Networks (ICCCN)","volume":"31 1","pages":"301-315"},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90293048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rafał Marjasz, K. Grochla, Anna Strzoda, Zbigniew Laskarzewski
{"title":"Simulation Analysis of Packet Delivery Probability in LoRa Networks","authors":"Rafał Marjasz, K. Grochla, Anna Strzoda, Zbigniew Laskarzewski","doi":"10.1007/978-3-030-21952-9_7","DOIUrl":"https://doi.org/10.1007/978-3-030-21952-9_7","url":null,"abstract":"","PeriodicalId":6553,"journal":{"name":"2016 25th International Conference on Computer Communication and Networks (ICCCN)","volume":"43 1","pages":"86-98"},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88053440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recreation of Containers for High Availability Architecture and Container-Based Applications","authors":"Rafal Pawlik, J. Werewka","doi":"10.1007/978-3-030-21952-9_22","DOIUrl":"https://doi.org/10.1007/978-3-030-21952-9_22","url":null,"abstract":"","PeriodicalId":6553,"journal":{"name":"2016 25th International Conference on Computer Communication and Networks (ICCCN)","volume":"340 1","pages":"287-298"},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86793466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Impact of Time Parameters on the Security Protocols Correctness","authors":"Sabina Szymoniak","doi":"10.1007/978-3-319-92459-5_27","DOIUrl":"https://doi.org/10.1007/978-3-319-92459-5_27","url":null,"abstract":"","PeriodicalId":6553,"journal":{"name":"2016 25th International Conference on Computer Communication and Networks (ICCCN)","volume":"1 1","pages":"333-343"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73092458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sabina Szymoniak, Olga Siedlecka-Lamch, M. Kurkowski
{"title":"On Some Time Aspects in Security Protocols Analysis","authors":"Sabina Szymoniak, Olga Siedlecka-Lamch, M. Kurkowski","doi":"10.1007/978-3-319-92459-5_28","DOIUrl":"https://doi.org/10.1007/978-3-319-92459-5_28","url":null,"abstract":"","PeriodicalId":6553,"journal":{"name":"2016 25th International Conference on Computer Communication and Networks (ICCCN)","volume":"45 1","pages":"344-356"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76607880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New SDN-Oriented Authentication and Access Control Mechanism","authors":"Fahad Nife, Z. Kotulski","doi":"10.1007/978-3-319-92459-5_7","DOIUrl":"https://doi.org/10.1007/978-3-319-92459-5_7","url":null,"abstract":"","PeriodicalId":6553,"journal":{"name":"2016 25th International Conference on Computer Communication and Networks (ICCCN)","volume":"22 1","pages":"74-88"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77969338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Full Network Coverage Monitoring Solutions - The netBaltic System Case","authors":"Damian Karpowicz, T. Gierszewski, K. Nowicki","doi":"10.1007/978-3-319-92459-5_8","DOIUrl":"https://doi.org/10.1007/978-3-319-92459-5_8","url":null,"abstract":"","PeriodicalId":6553,"journal":{"name":"2016 25th International Conference on Computer Communication and Networks (ICCCN)","volume":"99 1","pages":"89-102"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80566990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QoS- and Energy-Aware Services Management of Resources in a Cloud Computing Environment","authors":"J. Martyna","doi":"10.1007/978-3-319-92459-5_32","DOIUrl":"https://doi.org/10.1007/978-3-319-92459-5_32","url":null,"abstract":"","PeriodicalId":6553,"journal":{"name":"2016 25th International Conference on Computer Communication and Networks (ICCCN)","volume":"41 1","pages":"402-413"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83320384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy Efficient MPTCP Transmission Over Channels with a Common Bottleneck","authors":"M. Morawski, P. Ignaciuk","doi":"10.1007/978-3-319-92459-5_4","DOIUrl":"https://doi.org/10.1007/978-3-319-92459-5_4","url":null,"abstract":"","PeriodicalId":6553,"journal":{"name":"2016 25th International Conference on Computer Communication and Networks (ICCCN)","volume":"93 6 1","pages":"40-51"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83337959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Auction Based Scheduling Algorithm in Industrial Internet of Things Networks","authors":"M. Ojo, S. Giordano, D. Adami, M. Pagano","doi":"10.1007/978-3-319-92459-5_9","DOIUrl":"https://doi.org/10.1007/978-3-319-92459-5_9","url":null,"abstract":"","PeriodicalId":6553,"journal":{"name":"2016 25th International Conference on Computer Communication and Networks (ICCCN)","volume":"23 1","pages":"103-114"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86064566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}