|
LDR
| 02346nam a22005295i 4500 |
|---|
| 001 | 39558 |
|---|
| 003 | CONS |
|---|
| 005 | 20131220141505.0 |
|---|
| 007 | cr nn 008mamaa |
|---|
| 008 | 100301s2010 gw | s |||| 0|eng d |
|---|
| 020 | | . |
‡a9783642117237
‡9978-3-642-11723-7 |
|---|
| 024 | 7 | . |
‡a10.1007/978-3-642-11723-7
‡2doi |
|---|
| 035 | | . |
‡a(DE-He213)978-3-642-11723-7 |
|---|
| 050 | | 4. |
‡aTK5105.5-5105.9 |
|---|
| 072 | | 7. |
‡aUKN
‡2bicssc |
|---|
| 072 | | 7. |
‡aCOM075000
‡2bisacsh |
|---|
| 100 | 1 | . |
‡aZheng, Jun.
‡eeditor. |
|---|
| 245 | 1 | 0. |
‡aAd Hoc Networks
‡h[electronic resource] :
‡bFirst International Conference, ADHOCNETS 2009, Niagara Falls, Ontario, Canada, September 22-25, 2009. Revised Selected Papers /
‡cedited by Jun Zheng, Shiwen Mao, Scott F. Midkiff, Hua Zhu. |
|---|
| 264 | | 1. |
‡aBerlin, Heidelberg :
‡bSpringer Berlin Heidelberg,
‡c2010. |
|---|
| 300 | | . |
‡aXVI, 915p. 450 illus.
‡bonline resource. |
|---|
| 336 | | . |
‡atext
‡btxt
‡2rdacontent |
|---|
| 337 | | . |
‡acomputer
‡bc
‡2rdamedia |
|---|
| 338 | | . |
‡aonline resource
‡bcr
‡2rdacarrier |
|---|
| 347 | | . |
‡atext file
‡bPDF
‡2rda |
|---|
| 490 | 1 | . |
‡aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
‡x1867-8211 ;
‡v28 |
|---|
| 650 | | 0. |
‡aComputer science. |
|---|
| 650 | | 0. |
‡aComputer network architectures. |
|---|
| 650 | | 0. |
‡aComputer Communication Networks. |
|---|
| 650 | | 0. |
‡aComputer system performance. |
|---|
| 650 | | 0. |
‡aSoftware engineering. |
|---|
| 650 | | 0. |
‡aData protection. |
|---|
| 650 | | 0. |
‡aData structures (Computer science). |
|---|
| 650 | 1 | 4. |
‡aComputer Science. |
|---|
| 650 | 2 | 4. |
‡aComputer Communication Networks. |
|---|
| 650 | 2 | 4. |
‡aComputer Systems Organization and Communication Networks. |
|---|
| 650 | 2 | 4. |
‡aSoftware Engineering/Programming and Operating Systems. |
|---|
| 650 | 2 | 4. |
‡aSystem Performance and Evaluation. |
|---|
| 650 | 2 | 4. |
‡aData Structures, Cryptology and Information Theory. |
|---|
| 650 | 2 | 4. |
‡aSystems and Data Security. |
|---|
| 700 | 1 | . |
‡aMao, Shiwen.
‡eeditor. |
|---|
| 700 | 1 | . |
‡aMidkiff, Scott F.
‡eeditor. |
|---|
| 700 | 1 | . |
‡aZhu, Hua.
‡eeditor. |
|---|
| 710 | 2 | . |
‡aSpringerLink (Online service) |
|---|
| 773 | 0 | . |
‡tSpringer eBooks |
|---|
| 776 | 0 | 8. |
‡iPrinted edition:
‡z9783642117220 |
|---|
| 830 | | 0. |
‡aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
‡x1867-8211 ;
‡v28 |
|---|
| 856 | 4 | 0. |
‡uhttp://biblioteca.ipicyt.edu.mx:2048/login?url=http://dx.doi.org/10.1007/978-3-642-11723-7
‡yTexto completo
‡9CONS |
|---|
| 950 | | . |
‡aComputer Science (Springer-11645) |
|---|
| 901 | | . |
‡a39558
‡b
‡c39558
‡tbiblio
‡sSystem Local |
|---|