Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Quality-Based Content Delivery over the Internet

Buy

It is an obvious fact now that the Internet is becoming part of our life. More and more contents are delivered over the Internet. As the heterogeneity in the Internet increases, content providers are considering adaptive content delivery to achieve better user satisfaction. However, so far there are still no thorough study of how contents are delivered over the Internet and how we can achieve better adaptive content delivery.

In this book, we try to illustrate the Internet content delivery mechanism. And based on this mechanism we propose an adaptive content delivery framework which can greatly help Internet Service Providers and Internet Content Providers to achieve quality-based content delivery service. This book can be used as an introduction for Internet content based technology researchers, and can also be used as a reference book for graduate students.

This book is the refined wisdom from the Institute of Information Security Engineering, Shanghai Jiao Tong University. We appreciate all of our colleagues for their great help in this book. And we would also express our sincere appreciation towards Shanghai Jiao Tong University Press. Without their help, we would never have this book published so smoothly.

(HTML tags aren't allowed.)

Introducing SQLite for Mobile Developers
Introducing SQLite for Mobile Developers
This brief book is an introduction to SQLite for both iOS and Android developers.  The book includes an optional introduction to SQL, a discussion of when to use SQLite,  and chapters devoted to using SQLite with the most likely programming languages and then goes through adding a simple database to an Android or iOS app and finally a...
Inside Network Perimeter Security (2nd Edition)
Inside Network Perimeter Security (2nd Edition)
Security professionals and administrators now have access to one of the most valuable resources for learning best practices for network perimeter security. Inside Network Perimeter Security, Second Edition is your guide to preventing network intrusions and defending against any intrusions that do manage to slip...
Cisco CallManager Fundamentals, Second Edition
Cisco CallManager Fundamentals, Second Edition

Exposes the inner workings of Cisco CallManager to help you maximize your Cisco IP Communications solution

  • Read new content on QSIG, SIP trunks, video support, hunt lists and line groups, time-of-day routing, and new features added in CallManager releases 3.2, 3.3, 3.4, 4.0, and...


Complete Idiot's Guide to Biblical Mysteries
Complete Idiot's Guide to Biblical Mysteries
The Bible is without a doubt one of the most significant and influential written works the world has ever seen. Despite thousands of years of study, the Bible's holy texts continue to instruct, inspire, challenge, and mystify. Tens of thousands of books have been written about the Bible in an attempt to make sense of its...
Cisco multicast routing and switching
Cisco multicast routing and switching

Another offering in the Cisco Technical Expert series, this book provides a good introduction to IP multicasting and Cisco routers. The important protocols for multicast service are covered in detail, including a discussion on the Internet Group Management Protocol (IGMP) and the Cisco Group Management Protocol (CGMP). Following...

Organizational Data Mining: Leveraging Enterprise Data Resources for Optimal Performance
Organizational Data Mining: Leveraging Enterprise Data Resources for Optimal Performance

The adage “knowledge is power” is widely accepted in corporate circles and tremendous amounts of data have and are being accumulated towards the goal of acquiring more knowledge. But corporations are increasingly realizing that there is a wide gap between “data” and “knowledge.” Data warehousing and data...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy