Müller, Peter 1961 July 8-
Overview
Works: | 12 works in 51 publications in 3 languages and 1,911 library holdings |
---|---|
Genres: | Conference papers and proceedings |
Roles: | Editor, Author, htt |
Classifications: | TK5105.85, 621.3821 |
Publication Timeline
.
Most widely held works by
Peter Müller
WiMAX security and quality of service : an end-to-end perspective by
Seok-Yee Tang(
)
12 editions published between 2010 and 2011 in English and held by 860 WorldCat member libraries worldwide
WiMAX is the first standard technology to deliver true broadband mobility at speeds that enable powerful multimedia applications such as Voice over Internet Protocol (VoIP), online gaming, mobile TV, and personalized infotainment. WiMAX Security and Quality of Service, focuses on the interdisciplinary subject of advanced Security and Quality of Service (QoS) in WiMAX wireless telecommunication systems including its models, standards, implementations, and applications. Split into 4 parts, Part A of the book is an end-to-end overview of the WiMAX architecture, protocol, and system requirements
12 editions published between 2010 and 2011 in English and held by 860 WorldCat member libraries worldwide
WiMAX is the first standard technology to deliver true broadband mobility at speeds that enable powerful multimedia applications such as Voice over Internet Protocol (VoIP), online gaming, mobile TV, and personalized infotainment. WiMAX Security and Quality of Service, focuses on the interdisciplinary subject of advanced Security and Quality of Service (QoS) in WiMAX wireless telecommunication systems including its models, standards, implementations, and applications. Split into 4 parts, Part A of the book is an end-to-end overview of the WiMAX architecture, protocol, and system requirements
Algorithms and Architectures for Parallel Processing 16th International Conference, ICA3PP 2016, Granada, Spain, December
14-16, 2016, Proceedings by
Jesus Carretero(
)
10 editions published in 2016 in English and held by 298 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the 16th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2016, held in Granada, Spain, in December 2016. The 30 full papers and 22 short papers presented were carefully reviewed and selected from 117 submissions. They cover many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems trying to push beyond the limits of existing technologies, including experimental efforts, innovative systems, and investigations that identify weaknesses in existing parallel processing technology
10 editions published in 2016 in English and held by 298 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the 16th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2016, held in Granada, Spain, in December 2016. The 30 full papers and 22 short papers presented were carefully reviewed and selected from 117 submissions. They cover many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems trying to push beyond the limits of existing technologies, including experimental efforts, innovative systems, and investigations that identify weaknesses in existing parallel processing technology
Security in computing and communications : 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, proceedings by
Peter Müller(
)
10 editions published in 2016 in English and held by 284 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the 4th International Symposium on Security in Computing and Communications, SSCC 2016, held in Jaipur, India, in September 2016. The 23 revised full papers presented together with 16 short papers and an invited paper were carefully reviewed and selected from 136 submissions. The papers are organized in topical sections on cryptosystems, algorithms, primitives; security and privacy in networked systems; system and network security; steganography, visual cryptography, image forensics; applications security.
10 editions published in 2016 in English and held by 284 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the 4th International Symposium on Security in Computing and Communications, SSCC 2016, held in Jaipur, India, in September 2016. The 23 revised full papers presented together with 16 short papers and an invited paper were carefully reviewed and selected from 136 submissions. The papers are organized in topical sections on cryptosystems, algorithms, primitives; security and privacy in networked systems; system and network security; steganography, visual cryptography, image forensics; applications security.
2013 IEEE International Conference on Communications (ICC) : [9-13 June 2013, Budapest, Hungary] by IEEE International Conference on Communications(
)
1 edition published in 2013 in English and held by 216 WorldCat member libraries worldwide
1 edition published in 2013 in English and held by 216 WorldCat member libraries worldwide
Security and privacy in digital economy : first international conference, SPDE 2020, Quzhou, China, October 30-November 1,
2020, Proceedings by International Conference on Security and Privacy in Digital Economy(
)
4 editions published in 2020 in English and held by 160 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the First International Conference on Security and Privacy in Digital Economy, SPDE 2020, held in Quzhou, China, in October 2020*. The 49 revised full papers and 2 short papers were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections: cyberspace security, privacy protection, anomaly and intrusion detection, trust computation and forensics, attacks and countermeasures, covert communication, security protocol, anonymous communication, security and privacy from social science. *The conference was held virtually due to the COVID-19 pandemic
4 editions published in 2020 in English and held by 160 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the First International Conference on Security and Privacy in Digital Economy, SPDE 2020, held in Quzhou, China, in October 2020*. The 49 revised full papers and 2 short papers were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections: cyberspace security, privacy protection, anomaly and intrusion detection, trust computation and forensics, attacks and countermeasures, covert communication, security protocol, anonymous communication, security and privacy from social science. *The conference was held virtually due to the COVID-19 pandemic
2013 IEEE International Conference on Communications Workshops (ICC) by IEEE International Conference on Communications(
)
2 editions published in 2013 in English and held by 42 WorldCat member libraries worldwide
2 editions published in 2013 in English and held by 42 WorldCat member libraries worldwide
Einstieg in WordPress by
Peter Müller(
Book
)
2 editions published between 2016 and 2018 in German and held by 17 WorldCat member libraries worldwide
Sie planen eine eigene Website mit WordPress und suchen einen einfachen Einstieg? Dann sind Sie bei dem neuen Buch von Peter Müller genau richtig. Er zeigt Ihnen, wie Sie mit WordPress eine eigene Webseite erstellen und veröffentlichen können - auch ohne Vorkenntnisse. In einfachen Kapiteln lernen Sie WordPress als Redaktionssystem kennen und bauen Schritt für Schritt eine Onlinepräsenz auf. Sie erfahren, Sie eine Domain und Webspace einrichten und WordPress intallieren, mit Texten Bildern und Videos arbeiten und das grafische Design mit Themes ändern oder die Funktionalität mit Plugins erweitern. Aktuell zu WordPress 4!Galileo Press heisst jetzt Rheinwerk Verlag. Die Fachpresse zur Vorauflage: Mac Life:>>Richtet sich gezielt an Novizen und vermittelt denen alles, was sie über WordPress wissen müssen.<<LINUX MAGAZIN:>>Mit diesem Buch kann man sich ohne jede Vorkenntnis an sein erstes Blog wagen.<<(Quelle: buch.ch)
2 editions published between 2016 and 2018 in German and held by 17 WorldCat member libraries worldwide
Sie planen eine eigene Website mit WordPress und suchen einen einfachen Einstieg? Dann sind Sie bei dem neuen Buch von Peter Müller genau richtig. Er zeigt Ihnen, wie Sie mit WordPress eine eigene Webseite erstellen und veröffentlichen können - auch ohne Vorkenntnisse. In einfachen Kapiteln lernen Sie WordPress als Redaktionssystem kennen und bauen Schritt für Schritt eine Onlinepräsenz auf. Sie erfahren, Sie eine Domain und Webspace einrichten und WordPress intallieren, mit Texten Bildern und Videos arbeiten und das grafische Design mit Themes ändern oder die Funktionalität mit Plugins erweitern. Aktuell zu WordPress 4!Galileo Press heisst jetzt Rheinwerk Verlag. Die Fachpresse zur Vorauflage: Mac Life:>>Richtet sich gezielt an Novizen und vermittelt denen alles, was sie über WordPress wissen müssen.<<LINUX MAGAZIN:>>Mit diesem Buch kann man sich ohne jede Vorkenntnis an sein erstes Blog wagen.<<(Quelle: buch.ch)
Die politische Macht der Mafia : Bedingungen, Formen und Grenzen by
Peter Müller(
Book
)
6 editions published in 1991 in German and held by 15 WorldCat member libraries worldwide
6 editions published in 1991 in German and held by 15 WorldCat member libraries worldwide
Verified software: theories, tools, experiments : 4th International Conference, VSTTE 2012, Philadelphia, PA, USA, January
28-29, 2012 ; proceedings by
Rajeev Joshi(
Book
)
1 edition published in 2012 in English and held by 15 WorldCat member libraries worldwide
This volume contains the proceedings of the 4th International Conference on Verified Software: Theories, Tools, and Experiments, VSTTE 2012, held in Philadelphia, PA, USA, in January 2012. The 20 revised full papers presented together with 2 invited talks and 2 tutorials were carefully revised and selected from 54 initialsubmissions for inclusion in the book. The goal of the VSTTE conference is to advance the state of the art through the interaction of theory development, tool evolution, and experimental validation. The papers address topics such as: specification and verification techniques, tool support for specification languages, tool for various designmethodologies, tool integration and plug-ins, automation in formalverification, tool comparisons and benchmark repositories, combination of tools and techniques, customizing tools for particular applications, challenge problems, refinement methodologies, requirements modeling, specification languages, specification/verification case-studies, software design methods, and program logic
1 edition published in 2012 in English and held by 15 WorldCat member libraries worldwide
This volume contains the proceedings of the 4th International Conference on Verified Software: Theories, Tools, and Experiments, VSTTE 2012, held in Philadelphia, PA, USA, in January 2012. The 20 revised full papers presented together with 2 invited talks and 2 tutorials were carefully revised and selected from 54 initialsubmissions for inclusion in the book. The goal of the VSTTE conference is to advance the state of the art through the interaction of theory development, tool evolution, and experimental validation. The papers address topics such as: specification and verification techniques, tool support for specification languages, tool for various designmethodologies, tool integration and plug-ins, automation in formalverification, tool comparisons and benchmark repositories, combination of tools and techniques, customizing tools for particular applications, challenge problems, refinement methodologies, requirements modeling, specification languages, specification/verification case-studies, software design methods, and program logic
WiMAX security and quality of service by
Seok-Yee Tang(
)
1 edition published in 2010 in English and held by 2 WorldCat member libraries worldwide
WiMAX is the first standard technology to deliver true broadband mobility at speeds that enable powerful multimedia applications such as Voice over Internet Protocol (VoIP), online gaming, mobile TV, and personalized infotainment. WiMAX Security and Quality of Service, focuses on the interdisciplinary subject of advanced Security and Quality of Service (QoS) in WiMAX wireless telecommunication systems including its models, standards, implementations, and applications. Split into 4 parts, Part A of the book is an end-to-end overview of the WiMAX architecture, protocol, and system requirements. Security is an essential element in the wireless world and Part B is fully dedicated to this topic. Part C provides an in depth analysis of QoS, including mobility management in WiMAX. Finally, Part D introduces the reader to advanced and future topics. * One of the first texts to cover security, QoS and deployments of WiMAX in the same book. * Introduces the primary concepts of the interdisciplinary nature of WiMAX security and QoS, and also includes discussion of hot topics in the field. * Written for engineers and researchers, answering practical questions from industry and the experimental field in academia. * Explains how WiMAX applications' security and QoS are interconnected and interworked among the cross layers
1 edition published in 2010 in English and held by 2 WorldCat member libraries worldwide
WiMAX is the first standard technology to deliver true broadband mobility at speeds that enable powerful multimedia applications such as Voice over Internet Protocol (VoIP), online gaming, mobile TV, and personalized infotainment. WiMAX Security and Quality of Service, focuses on the interdisciplinary subject of advanced Security and Quality of Service (QoS) in WiMAX wireless telecommunication systems including its models, standards, implementations, and applications. Split into 4 parts, Part A of the book is an end-to-end overview of the WiMAX architecture, protocol, and system requirements. Security is an essential element in the wireless world and Part B is fully dedicated to this topic. Part C provides an in depth analysis of QoS, including mobility management in WiMAX. Finally, Part D introduces the reader to advanced and future topics. * One of the first texts to cover security, QoS and deployments of WiMAX in the same book. * Introduces the primary concepts of the interdisciplinary nature of WiMAX security and QoS, and also includes discussion of hot topics in the field. * Written for engineers and researchers, answering practical questions from industry and the experimental field in academia. * Explains how WiMAX applications' security and QoS are interconnected and interworked among the cross layers
Gdyby zostało sto sekund by
Jens Stoltenberg(
)
1 edition published in 2020 in Polish and held by 1 WorldCat member library worldwide
1 edition published in 2020 in Polish and held by 1 WorldCat member library worldwide
Gorzka lekcja dla populistów by
Ursula von der Leyen(
)
1 edition published in 2020 in Polish and held by 1 WorldCat member library worldwide
1 edition published in 2020 in Polish and held by 1 WorldCat member library worldwide
more

fewer

Audience Level
0 |
![]() |
1 | ||
Kids | General | Special |

- Tang, Seok-Yee 1968- Author Editor
- Sharif, Hamid R. (Hamid Reza) 1958- Editor
- Ko, Ryan Editor
- Nakano, Koji Editor
- Carretero, Jesus Author Editor
- Garcia-Blas, Javier Editor
- Doss, Robin Editor
- Thampi, Sabu M. Editor
- Alam Bhuiyan, Md Zakirul Editor
- Alcaraz Calero, Jose M. Editor
Useful Links
Associated Subjects
Algorithms Artificial intelligence Computer algorithms Computer architecture Computer networks Computer networks--Security measures Computer organization Computer programming Computer programs--Validation Computers Computer science Computer security Computer software Computer software--Verification Data encryption (Computer science) Data protection Data structures (Computer science) Engineering IEEE 802.16 (Standard) Italy Logic design Mafia Organized crime--Political aspects Parallel processing (Electronic computers) Political corruption Politics and government Software engineering Telecommunication Transnational crime--Political aspects
Covers
Alternative Names
Mueller, Peter 1961-
Peter Müller Duits journalist
Peter Müller German journalist
Peter Müller giornalista tedesco
Peter Müller jornalista alemão
Peter Müller journaliste allemand
Peter Müller periodista alemán
Peter Müller periodista alemany
Петер Мюллер
بيتر مولر صحفي ألماني
Languages