resource management for big data pla...
|
|
resource management for big data platforms
|
resilient routing in communication n...
|
|
resilient routing in communication networks
|
fault-tolerance techniques for high-...
|
|
fault-tolerance techniques for high-performance computing
|
guide to computer network security
|
|
guide to computer network security
|
fundamentals of network forensics
|
|
fundamentals of network forensics
|
real-time communication protocols fo...
|
|
real-time communication protocols for multi-hop ad-hoc networks
|
wireless sensors in industrial time-...
|
|
wireless sensors in industrial time-critical environments
|
guide to computing fundamentals in c...
|
|
guide to computing fundamentals in cyber-physical systems
|
connected environments for the inter...
|
|
connected environments for the internet of things
|
software project management for dist...
|
|
software project management for distributed computing
|
guide to computer network security
|
|
guide to computer network security
|
automated workflow scheduling in sel...
|
|
automated workflow scheduling in self-adaptive clouds
|
network traffic anomaly detection an...
|
|
network traffic anomaly detection and prevention
|
continued rise of the cloud
|
|
continued rise of the cloud
|
guide to security in sdn and nfv
|
|
guide to security in sdn and nfv
|
6g mobile wireless networks
|
|
6g mobile wireless networks
|
big data platforms and applications
|
|
big data platforms and applications
|
dataflow supercomputing essentials
|
|
dataflow supercomputing essentials
|
greening video distribution networks
|
|
greening video distribution networks
|
guide to disaster-resilient communic...
|
|
guide to disaster-resilient communication networks
|