000 | 02901nam a22003735i 4500 | ||
---|---|---|---|
001 | 321056 | ||
003 | MX-SnUAN | ||
005 | 20160429161446.0 | ||
007 | cr nn 008mamaa | ||
008 | 160111s2015 gw | s |||| 0|eng d | ||
020 |
_a9783319160504 _9978-3-319-16050-4 |
||
035 | _avtls000420249 | ||
039 | 9 |
_y201601110926 _zstaff |
|
050 | 4 | _aTK5105.5-5105.9 | |
245 | 1 | 0 |
_aCloud computing : _b5th international conference, cloudcomp 2014, guilin, china, october 19-21, 2014, revised selected papers / _cedited by Victor C.M. Leung, Roy Xiaorong Lai, Min Chen, Jiafu Wan. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bSpringer, _c2015. |
|
300 |
_aix, 245 páginas : _b94 ilustraciones |
||
336 |
_atexto _btxt _2rdacontent |
||
337 |
_acomputadora _bc _2rdamedia |
||
338 |
_arecurso en línea _bcr _2rdacarrier |
||
347 |
_aarchivo de texto _bPDF _2rda |
||
490 | 0 |
_aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, _x1867-8211 ; _v142 |
|
500 | _aSpringer eBooks | ||
505 | 0 | _a A Hybrid Remote Rendering Approach for Graphic Applications on Cloud Computing -- A Policy-based Application Service Management in Mobile Cloud Broker -- Personalized Video Recommendations with Both Historical and New Items -- A VM Reservation-based Cloud Service Broker and Its Performance Evaluation -- Virtualizing IMS Core and its Performance Analysis -- VM3: Virtual Machine Multicast Migration Based on Comprehensive Load Forecasting -- A Phased Workflow Scheduling Scheme with Task Division Policy in Cloud Broker -- An Efficient Data Extracting Method Based on Hadoop -- Based Big Data Analysis of Fraud Detection for Online Transaction Orders -- Question Classification based on Hadoop Platform -- A Dynamic and Static Combined Replication Management Mechanism Based on Frequency Adaptive -- A distributed business process collaboration architecture based on entropy in cloud computing -- DSBAF: Running My Web Services in your WS Environment -- Cloud-based Iterative RFID Tag Search Protocol Using Bloom Filters -- Design and Optimizations of The MD5 Crypt Cracking Algorithm Based on CUDA -- A Model of Cloud Computing Federation Based on Complex Network Theory -- The Implementation of IKEV2 For IPSec. | |
590 | _aPara consulta fuera de la UANL se requiere clave de acceso remoto. | ||
700 | 1 |
_aLeung, Victor C.M, _eeditor. _9355508 |
|
700 | 1 |
_aLai, Roy Xiaorong, _eeditor. _9365954 |
|
700 | 1 |
_aChen, Min, _eeditor. _9345797 |
|
700 | 1 |
_aWan, Jiafu, _eeditor. _9363626 |
|
710 | 2 |
_aSpringerLink (Servicio en línea) _9299170 |
|
776 | 0 | 8 |
_iEdición impresa: _z9783319160498 |
856 | 4 | 0 |
_uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-3-319-16050-4 _zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL) |
942 | _c14 | ||
999 |
_c321056 _d321056 |