| LDR | 02239nam a22005175i 4500 | 
|---|
| 001 | 39744 | 
|---|
| 003 | CONS | 
|---|
| 005 | 20131220221838.0 | 
|---|
| 007 | cr nn 008mamaa | 
|---|
| 008 | 101129s2010    gw |    s    |||| 0|eng d | 
|---|
| 020 |  | . | ‡a9783642179945 
			‡9978-3-642-17994-5 | 
|---|
| 024 | 7 | . | ‡a10.1007/978-3-642-17994-5 
			‡2doi | 
|---|
| 035 |  | . | ‡a(DE-He213)978-3-642-17994-5 | 
|---|
| 050 |  | 4. | ‡aTK5105.5-5105.9 | 
|---|
| 072 |  | 7. | ‡aUKN 
			‡2bicssc | 
|---|
| 072 |  | 7. | ‡aCOM075000 
			‡2bisacsh | 
|---|
| 100 | 1 | . | ‡aZheng, Jun. 
			‡eeditor. | 
|---|
| 245 | 1 | 0. | ‡aAd Hoc Networks 
			‡h[electronic resource] : 
			‡bSecond International Conference, ADHOCNETS 2010, Victoria, BC, Canada, August 18-20, 2010, Revised Selected Papers / 
			‡cedited by Jun Zheng, David Simplot-Ryl, Victor C. M. Leung. | 
|---|
| 264 |  | 1. | ‡aBerlin, Heidelberg : 
			‡bSpringer Berlin Heidelberg, 
			‡c2010. | 
|---|
| 300 |  | . | ‡aXIV, 542p. 272 illus. 
			‡bonline resource. | 
|---|
| 336 |  | . | ‡atext 
			‡btxt 
			‡2rdacontent | 
|---|
| 337 |  | . | ‡acomputer 
			‡bc 
			‡2rdamedia | 
|---|
| 338 |  | . | ‡aonline resource 
			‡bcr 
			‡2rdacarrier | 
|---|
| 347 |  | . | ‡atext file 
			‡bPDF 
			‡2rda | 
|---|
| 490 | 1 | . | ‡aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 
			‡x1867-8211 ; 
			‡v49 | 
|---|
| 650 |  | 0. | ‡aComputer science. | 
|---|
| 650 |  | 0. | ‡aComputer Communication Networks. | 
|---|
| 650 |  | 0. | ‡aComputer system performance. | 
|---|
| 650 |  | 0. | ‡aData encryption (Computer science). | 
|---|
| 650 |  | 0. | ‡aComputer software. | 
|---|
| 650 |  | 0. | ‡aComputer simulation. | 
|---|
| 650 |  | 0. | ‡aInformation Systems. | 
|---|
| 650 | 1 | 4. | ‡aComputer Science. | 
|---|
| 650 | 2 | 4. | ‡aComputer Communication Networks. | 
|---|
| 650 | 2 | 4. | ‡aAlgorithm Analysis and Problem Complexity. | 
|---|
| 650 | 2 | 4. | ‡aManagement of Computing and Information Systems. | 
|---|
| 650 | 2 | 4. | ‡aData Encryption. | 
|---|
| 650 | 2 | 4. | ‡aSystem Performance and Evaluation. | 
|---|
| 650 | 2 | 4. | ‡aSimulation and Modeling. | 
|---|
| 700 | 1 | . | ‡aSimplot-Ryl, David. 
			‡eeditor. | 
|---|
| 700 | 1 | . | ‡aLeung, Victor C. M. 
			‡eeditor. | 
|---|
| 710 | 2 | . | ‡aSpringerLink (Online service) | 
|---|
| 773 | 0 | . | ‡tSpringer eBooks | 
|---|
| 776 | 0 | 8. | ‡iPrinted edition: 
			‡z9783642179938 | 
|---|
| 830 |  | 0. | ‡aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 
			‡x1867-8211 ; 
			‡v49 | 
|---|
| 856 | 4 | 0. | ‡uhttp://biblioteca.ipicyt.edu.mx:2048/login?url=http://dx.doi.org/10.1007/978-3-642-17994-5 
			‡yTexto completo 
			‡9CONS | 
|---|
| 950 |  | . | ‡aComputer Science (Springer-11645) | 
|---|
| 901 |  | . | ‡a39744 
			‡b 
			‡c39744 
			‡tbiblio 
			‡sSystem Local | 
|---|