IP Operations and Management

IP Operations and Management

 

66,72 €
IVA incluido
Disponible
Editorial:
Springer Nature B.V.
Año de edición:
2009
ISBN:
9783642049675
66,72 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

On behalf of the IEEE Communications Society, Technical Committee on NetworkOperationsandManagement(CNOM),Manweek2009OrganizingC- mittee, and membersof the IPOMTechnicalProgramCommittee, it isour pl- sureto presenttheproceedingsofthe 9thIEEEWorkshoponIP Operationsand Management(IPOM2009),held aspartofManweek2009duringOctober26-30, 2009, Venice, Italy. Recently, there has been a heated discussion followed by highly ambitious, thus, high in risk, international research undertakings and programs, GENI and FIND in USA, FIRE in Europe, u-Japan in Japan to name a few, aiming at de?ning the Future Internet. Building on the success of the previous events, IPOM 2009 focused on network management challenges for the current Internet as well as Future Internet Design (FIND). We are particularly interested in network managementissues relatedto virtualization,mobility, service provision, security, multimedia, wireless networking, and P2P applications. Building on the success of the previous events, we wanted IPOM 2008 to focus on network managementchallengesfor thecurrentInternet aswellasfutureInternetdesign. Like the previous four IPOM workshops, IPOM 2009 was co-located with several related events as part of Manweek. The other events were the 20th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management (DSOM 2009), the 12th IFIP/IEEE International Conference on Management of Multimedia and Mobile Networks and Services (MMNS 2009), the 4th IEEE International Workshop on Modeling Autonomic Communi- tions Environments(MACE 2009),and the 6th InternationalWorkshoponNext Generation Networking Middleware (NGNM 2009). Co-locating those events providedthe opportunityfor anexchangeof ideasamong separateresearchc- munities working on related topics, and also allowed participants to forge links and exploit synergies.

Artículos relacionados

  • Strategic Data-Based Wisdom in the Big Data Era
    Deanna Klein / John Girard / Kristi Berg
    The ability to uncover, share, and utilize knowledge is one of the most vital components to the success of any organization. While new technologies and techniques of knowledge dissemination are promising, there is still a struggle to derive and circulate meaningful information from large data sets. Strategic Data-Based Wisdom in the Big Data Era combines the latest empirical re...
  • Enterprise Service Computing
    Robin G. Qiu / Robin GQiu
    ...
  • Harnessing Knowledge Dynamics
    Mark E. Nissen / Mark ENissen
    ...
  • Effective Cybersecurity Operations for Enterprise-Wide Systems
    Cybersecurity, or information technology security (I/T security), is the protection of computer systems and networks from information disclosure; theft of or damage to their hardware, software, or electronic data; as well as from the disruption or misdirection of the services they provide. The field is becoming increasingly critical due to the continuously expanding reliance on...
    Disponible

    248,86 €

  • IT for Business
    John Young
    IT for Business: A Student’s Guide to the Technology of Business provides readers with a comprehensive understanding of the role and application of information technology in the business world. Each chapter in the book focuses on a different aspect of IT as it relates to business. The opening chapter sets the stage by discussing the importance of developing a keen understanding...
    Disponible

    140,50 €

  • Evolution of Cross-Sector Cyber Intelligent Markets
    Eugene J. Lewis
    In today’s digital age, cyber threats have become an ever-increasing risk to businesses, governments, and individuals worldwide. The deep integration of technology into every facet of modern life has given rise to a complex and interconnected web of vulnerabilities. As a result, traditional, sector-specific approaches to cybersecurity have proven insufficient in the face of the...
    Disponible

    275,51 €