0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (140)
  • R250 - R500 (968)
  • R500+ (10,352)
  • -
Status
Format
Author / Contributor
Publisher

Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications

Energy-Aware System Design - Algorithms and Architectures (Hardcover, Edition.): Chong-Min Kyung, Sung joo Yoo Energy-Aware System Design - Algorithms and Architectures (Hardcover, Edition.)
Chong-Min Kyung, Sung joo Yoo
R2,907 Discovery Miles 29 070 Ships in 10 - 15 working days

Power consumption becomes the most important design goal in a wide range of electronic systems. There are two driving forces towards this trend: continuing device scaling and ever increasing demand of higher computing power. First, device scaling continues to satisfy Moore's law via a conventional way of scaling (More Moore) and a new way of exploiting the vertical integration (More than Moore). Second, mobile and IT convergence requires more computing power on the silicon chip than ever. Cell phones are now evolving towards mobile PC. PCs and data centers are becoming commodities in house and a must in industry. Both supply enabled by device scaling and demand triggered by the convergence trend realize more computation on chip (via multi-core, integration of diverse functionalities on mobile SoCs, etc.) and finally more power consumption incurring power-related issues and constraints.

"Energy-Aware System Design: Algorithms and Architectures" provides state-of-the-art ideas for low power design methods from circuit, architecture to software level andoffers design case studies in three fast growing areas of mobile storage, biomedical and security.

Important topics and features:

- Describes very recent advanced issues and methods for energy-aware design at each design level from circuit andarchitecture toalgorithm level, and also covering important blocks including low power main memory subsystem and on-chip network at architecture level

- Explains efficient power conversion and delivery which is becoming important as heterogeneous power sources are adopted for digital and non-digital parts

- Investigates 3D die stacking emphasizing temperature awareness for better perspective on energy efficiency

- Presents three practical energy-aware design case studies; novel storage device (e.g., solid state disk), biomedical electronics (e.g., cochlear and retina implants), and wireless surveillance camera systems.

Researchers and engineers in the field of hardware and software design will find this book an excellent starting point to catch up with the state-of-the-art ideas of low power design.

Antenna Arrays and Automotive Applications (Hardcover, 2012): Victor Rabinovich, Nikolai Alexandrov Antenna Arrays and Automotive Applications (Hardcover, 2012)
Victor Rabinovich, Nikolai Alexandrov
R2,879 Discovery Miles 28 790 Ships in 10 - 15 working days

This book throws a lifeline to designers wading through mounds of antenna array patents looking for the most suitable systems for their projects. Drastically reducing the research time required to locate solutions to the latest challenges in automotive communications, it sorts and systematizes material on cutting-edge antenna arrays that feature multi-element communication systems with enormous potential for the automotive industry. These new systems promise to make driving safer and more efficient, opening up myriad applications, including vehicle-to-vehicle traffic that prevents collisions, automatic toll collection, vehicle location and fine-tuning for cruise control systems. This book's exhaustive coverage begins with currently deployed systems, frequency ranges and key parameters. It proceeds to examine system geometry, analog and digital beam steering technology (including "smart" beams formed in noisy environments), maximizing signal-to-noise ratios, miniaturization, and base station technology that facilitates in-car connectivity while on the move. An essential guide for technicians working in a fast-developing field, this new volume will be warmly welcomed as a powerful aid in their endeavors.

Mobile Broadband - Including WiMAX and LTE (Hardcover, 2009): Mustafa Ergen Mobile Broadband - Including WiMAX and LTE (Hardcover, 2009)
Mustafa Ergen
R4,656 Discovery Miles 46 560 Ships in 10 - 15 working days

This book addresses the emerging technology for Orthogonal Frequency Division Multiple Access (OFDMA), covering OFDMA physical layer as well as network technology. The book also includes information on IEEE 802.16e and WiMAX networks and also offers a comparison with other OFDMA technologies.

OFDMA is the fastest growing area in the wireless marketplace, and the backbone of systems used in WiMAX. WiMAX is the technology that enables wireless users to communicate at any time from any location without having to find a WiFi hotspot.

Securing Emerging Wireless Systems - Lower-layer Approaches (Hardcover, 1st Edition.
2nd Printing. 2008): Yingying Chen,... Securing Emerging Wireless Systems - Lower-layer Approaches (Hardcover, 1st Edition. 2nd Printing. 2008)
Yingying Chen, Wenyuan Xu, Wade Trappe, YanYong Zhang
R2,929 Discovery Miles 29 290 Ships in 10 - 15 working days

Securing Emerging Wireless Systems: Lower-layer Approaches aims to fill a growing need in the research community for a reference that describes the lower-layer approaches as a foundation towards secure and reliable wireless systems. Whereas most of the references typically address cryptographic attacks by using conventional "network security" approches for securing wireless systems, the proposed book will be differentiated from the rest of the market by its focus on non-cryptographic attacks that cannot easily be addressed by using traditional methods, and further by presenting a collection of defense mechanisms that operate at the lower-layers of the protocol stack and can defend wireless systems before the effects of attacks propagate up to higher-level applications and services.

The book will focus on fundamental security problems that involve properties unique to wireless systems, such as the characteristics of radio propagation, or the location of communicating entities, or the properties of the medium access control layer. Specifically, the book provides detection mechanisms and highlights defense strategies that cope with threats to wireless localization infrastructure, attacks on wireless networks that exploit entity identity (i.e. spoofing attacks), jamming and radio interference that can undermine the availability of wireless communications, and privacy threats where an adversary seeks to infer spatial and temporal contextual information surrounding wireless communications. Additionally, the authors explore new paradigms of physical layer security for wireless systems, which can support authentication and confidentiality services by exploiting fading properties unique to wireless communications.

Wireless Networking (Hardcover): Anurag Kumar, D Manjunath, Joy Kuri Wireless Networking (Hardcover)
Anurag Kumar, D Manjunath, Joy Kuri
R1,931 Discovery Miles 19 310 Ships in 12 - 19 working days

Over the past decade, the world has witnessed an explosion in the development and deployment of new wireless network technologies. From cellular mobile telephony to the ubiquitous "WiFi" networks in coffee-shops and airports, to the emerging WiMAX wireless broadband access networks, the menu of wireless access systems has become so comprehensive that wireline access to user devices may soon become a relic of the past. Wireless Networking serves as a one-stop view of cellular, WiFi, and WiMAX networks, as well as the emerging wireless ad hoc and sensor networks. Rather than provide descriptive accounts of these technologies and standards, the book emphasizes conceptual perspectives on the modeling, analysis, design and optimization of such networks. Furthermore, the authors present wireless networking within the unifying framework of resource allocation, using simple abstractions of the underlying physical wireless communication. In short, Wireless Networking is an in-depth, exhaustive, and invaluable asset to anyone working in this rapidly evolving field.
*Goes beyond descriptive and qualitative treatments, by presenting the foundations underlying the various wireless networking technologies
*Provides abstractions, models and analyses of established and emerging wireless networks, thereby supplying the reader with a conceptual and quantitative treatment, thus ensuring longevity of the learning from this material
*Aids comprehension by including over 120 figures, four appendices on the mathematics of the various models, several inline exercises, and extensive problem sets at the end of each chapter

Fog/Edge Computing For Security, Privacy, and Applications (Hardcover, 1st ed. 2021): Wei Chang, Jie Wu Fog/Edge Computing For Security, Privacy, and Applications (Hardcover, 1st ed. 2021)
Wei Chang, Jie Wu
R4,260 Discovery Miles 42 600 Ships in 12 - 19 working days

This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein.

Spread Spectrum CDMA Systems for Wireless Communications (Hardcover): Savo G. Glisic, Branka Vucetic Spread Spectrum CDMA Systems for Wireless Communications (Hardcover)
Savo G. Glisic, Branka Vucetic
R2,519 Discovery Miles 25 190 Ships in 10 - 15 working days

The spread-spectrum technique is becoming increasingly important in wireless communication systems. In this work, the main advantages of this techniques are outlined, describing its key elements, presenting important code acquisition strategies for direct sequences (DS) and frequency hopping (FH) systems, comparing various code tracking loop systems, and detailing receiver configurations based on CCD, SAW and DSP matched filters. The authors also examine system capacity issues related to the CDMA cellular network, and explain the CDMA overlay, packetized transmission in CDMA networks, and the problems of multiuser detection.

Resource Management in Satellite Networks - Optimization and Cross-Layer Design (Hardcover, 2007 ed.): Giovanni Giambene Resource Management in Satellite Networks - Optimization and Cross-Layer Design (Hardcover, 2007 ed.)
Giovanni Giambene
R4,560 Discovery Miles 45 600 Ships in 10 - 15 working days

This book provides significant knowledge on innovative radio resource management schemes for satellite communication systems that exploit lower layer adaptivity and the knowledge of layer 3 IP QoS support and transport layer behavior. The book integrates competencies considering all the parts of system design: propagation aspects, radio resource management, access protocols, network protocols, transport layer protocols, and more, to cover both broadband and mobile satellite systems.

Signal Conditioning - An Introduction to Continuous Wave Communication and Signal Processing (Hardcover, 2012): Apurba Das Signal Conditioning - An Introduction to Continuous Wave Communication and Signal Processing (Hardcover, 2012)
Apurba Das
R2,916 Discovery Miles 29 160 Ships in 10 - 15 working days

"Signal Conditioning" is a comprehensive introduction to electronic signal processing. The book presents the mathematical basics including the implications of various transformed domain representations in signal synthesis and analysis in an understandable and lucid fashion and illustrates the theory through many applications and examples from communication systems. The ease to learn is supported by well-chosen exercises which give readers the flavor of the subject. Supplementary electronic material is available on http://extras.springer.com including MATLAB codes illuminating applications in the domain of one dimensional electrical signal processing, image processing, and speech processing. The book is an introduction for students with a basic understanding in engineering or natural sciences.

Understanding Electromagnetic Scattering Using the Moment Method - A Practical Approach (Hardcover): Randy Bancroft Understanding Electromagnetic Scattering Using the Moment Method - A Practical Approach (Hardcover)
Randy Bancroft
R2,905 Discovery Miles 29 050 Ships in 10 - 15 working days

Learn how to quickly solve electromagnetic scattering problems using the Moment Method with this unique book.

Software Included! Accompanying software featuring FORTRAN source code allows you to modify the book's examples and understand how simple and complex shapes scatter waves. One 3.5" IBM PC-compatible diskette.

Wireless Technology - Applications, Management, and Security (Hardcover, 2009 ed.): Steven Powell, J.P. Shim Wireless Technology - Applications, Management, and Security (Hardcover, 2009 ed.)
Steven Powell, J.P. Shim
R4,505 Discovery Miles 45 050 Ships in 10 - 15 working days

Wireless technology and handheld devices are dramatically changing the degrees of interaction throughout the world, further creating a ubiquitous network society. The emergence of advanced wireless telecommunication technologies and devices in today's society has increased accuracy and access rate, all of which are increasingly essential as the volume of information handled by users expands at an accelerated pace. The requirement for mobility leads to increasing pressure for applications and wireless systems to revolve around the concept of continuous communication with anyone, anywhere, and anytime. With the wireless technology and devices come ?exibility in network design and quicker deployment time. Over the past decades, numerous wireless telecommu- cation topics have received increasing attention from industry professionals, a- demics, and government agencies. Among these topics are the wireless Internet; multimedia; 3G/4G wireless networks and systems; mobile and wireless network security; wireless network modeling, algorithms, and simulation; satellite based s- tems; 802.11x; RFID; and broadband wireless access.

Semantic Web - Implications for Technologies and Business Practices (Hardcover, 1st ed. 2016): Michael Workman Semantic Web - Implications for Technologies and Business Practices (Hardcover, 1st ed. 2016)
Michael Workman
R4,402 R3,545 Discovery Miles 35 450 Save R857 (19%) Ships in 12 - 19 working days

This book examines recent developments in semantic systems that can respond to situations and environments and events. The contributors to this book cover how to design, implement and utilize disruptive technologies. The editor discusses the two fundamental sets of disruptive technologies: the development of semantic technologies including description logics, ontologies and agent frameworks; and the development of semantic information rendering and graphical forms of displays of high-density time-sensitive data to improve situational awareness. Beyond practical illustrations of emerging technologies, the editor proposes to utilize an incremental development method called knowledge scaffolding -a proven educational psychology technique for learning a subject matter thoroughly. The goal of this book is to help readers learn about managing information resources, from the ground up and reinforcing the learning as they read on.

China Satellite Navigation Conference (CSNC) 2012 Proceedings (Hardcover, 2012 ed.): Jiadong Sun, Jingnan Liu, Yuanxi Yang,... China Satellite Navigation Conference (CSNC) 2012 Proceedings (Hardcover, 2012 ed.)
Jiadong Sun, Jingnan Liu, Yuanxi Yang, Shiwei Fan
R5,704 Discovery Miles 57 040 Ships in 10 - 15 working days

"Proceedings of the 3rd China Satellite Navigation Conference (CSNC2012)" presents selected research papers from CSNC2012, held on 15-19 May in Guanzhou, China. These papers discuss the technologies and applications of the Global Navigation Satellite System (GNSS), and the latest progress made in the China BeiDou system especially. They are divided into 9 topics to match the corresponding sessions in CSNC2012, which broadly covered key topics in GNSS. Readers can learn about the BeiDou system and keep abreast of the latest advances in GNSS techniques and applications.

SUN Jiadong is the Chief Designer of the Compass/BeiDou system, and the Academician of Chinese Academy of Sciences; LIU Jingnan is a professor at Wuhan University, and the Academician of Chinese Academy of Engineering; YANG Yuanxi is a professor at China National Administration of GNSS and Applications, and the Academician of Chinese Academy of Sciences; FAN Shiwei is a researcher on satellite navigation.

The Art of Wireless Sensor Networks - Volume 2: Advanced Topics and Applications (Hardcover, 2014 ed.): Habib M. Ammari The Art of Wireless Sensor Networks - Volume 2: Advanced Topics and Applications (Hardcover, 2014 ed.)
Habib M. Ammari
R5,729 Discovery Miles 57 290 Ships in 10 - 15 working days

During the last one and a half decades, wireless sensor networks have witnessed significant growth and tremendous development in both academia and industry. A large number of researchers, including computer scientists and engineers, have been interested in solving challenging problems that span all the layers of the protocol stack of sensor networking systems. Several venues, such as journals, conferences, and workshops, have been launched to cover innovative research and practice in this promising and rapidly advancing field. Because of these trends, I thought it would be beneficial to provide our sensor networks community with a comprehensive reference on as much of the findings as possible on a variety of topics in wireless sensor networks. As this area of research is in continuous progress, it does not seem to be a reasonable solution to keep delaying the publication of such reference any more. This book relates to the second volume and focuses on the advanced topics and applications of wireless sensor networks. Our rationale is that the second volume has all application-specific and non-conventional sensor networks, emerging techniques and advanced topics that are not as matured as what is covered in the first volume. Thus, the second volume deals with three-dimensional, underground, underwater, body-mounted, and societal networks. Following Donald E. Knuth's above-quoted elegant strategy to focus on several important fields (The Art of Computer Programming: Fundamental Algorithms, 1997), all the book chapters in this volume include up-to-date research work spanning various topics, such as stochastic modeling, barrier and spatiotemporal coverage, tracking, estimation, counting, coverage and localization in three-dimensional sensor networks, topology control and routing in three-dimensional sensor networks, underground and underwater sensor networks, multimedia and body sensor networks, and social sensing. Most of these major topics can be covered in an advanced course on wireless sensor networks. This book will be an excellent source of information for graduate students majoring in computer science, computer engineering, electrical engineering, or any related discipline. Furthermore, computer scientists, researchers, and practitioners in both academia and industry will find this book useful and interesting.

Analysis Methods for Electromagnetic Wave Problems, v. 1 (Hardcover): Eikichi Yamashita Analysis Methods for Electromagnetic Wave Problems, v. 1 (Hardcover)
Eikichi Yamashita
R4,092 Discovery Miles 40 920 Ships in 10 - 15 working days

Instructs advanced and important analysis methods which are frequently used for researchers, engineers and students who work on applications of electromagnetic waves to microwave devices and antennas. The book also includes various numerical techniques.

Antennas and Wave Propagation (Hardcover): Pedro Pinho Antennas and Wave Propagation (Hardcover)
Pedro Pinho
R3,347 Discovery Miles 33 470 Ships in 10 - 15 working days
Power Management in Mobile Devices (Paperback): Findlay Shearer Power Management in Mobile Devices (Paperback)
Findlay Shearer
R1,232 Discovery Miles 12 320 Ships in 12 - 19 working days

Sealed Lead Acid...Nickel Cadmium...Lithium Ion...
How do you balance battery life with performance and cost?
This book shows you how!
Now that "mobile" has become the standard, the consumer not only expects mobility but demands power longevity in wireless devices. As more and more features, computing power, and memory are packed into mobile devices such as iPods, cell phones, and cameras, there is a large and growing gap between what devices can do and the amount of energy engineers can deliver. In fact, the main limiting factor in many portable designs is not hardware or software, but instead how much power can be delivered to the device. This book describes various design approaches to reduce the amount of power a circuit consumes and techniques to effectively manage the available power.
Power Management Advice On:
-Low Power Packaging Techniques
-Power and Clock Gating
-Energy Efficient Compilers
-Various Display Technologies
-Linear vs. Switched Regulators
-Software Techniques and Intelligent Algorithms
* Addresses power versus performance that each newly developed mobile device faces
* Robust case studies drawn from the author's 30 plus years of extensive real world experience are included
* Both hardware and software are discussed concerning their roles in power

Principles of Data Fusion Automation (Hardcover): Richard T. Antony Principles of Data Fusion Automation (Hardcover)
Richard T. Antony
R4,388 Discovery Miles 43 880 Ships in 10 - 15 working days

Multisensor fusion systems are only practical if the algorithms used are practical and effective, and if there is efficient database support. The first part of this book discusses a wide range of issues related to the development of robust, context-sensitive, and efficient data fusion algorithms. The second part addresses database requirements, structures, and issues related to achieving overall computational efficiency. Featuring highly accessible notation, the processing model and database issues presented in the text are aimed at system developers working in sensor fusion, automatic target recognition, multiple-target tracking, robotic control, automated image understanding, and large-scale integration and fabrication.

Securing Wireless Communications at the Physical Layer (Hardcover, 2010 ed.): Ruoheng Liu, Wade Trappe Securing Wireless Communications at the Physical Layer (Hardcover, 2010 ed.)
Ruoheng Liu, Wade Trappe
R4,587 Discovery Miles 45 870 Ships in 10 - 15 working days

Securing communications is a challenging task. A ?rst attempt at security involves learning basic cryptography, and applying encryption algorithms to make messages unintelligible to adversaries. However, rarely is the task of securing a message - changesosimple.Whenonestepsbackandcontemplateshowtosecuretheexchange of communications, one realizes that the challenge is fundamentally one of bui- ing a complete solution. For example, one must ensure that all entities involved have proper and authenticated cryptographic material, or one must ensure that one veri?ably knows to whom one is communicating, or one must understand how the communication process takes place so as to make certain there are no vulnerabilities introduced by the communication process itself. Thislastissue, namelythatsecuritymethodsareoftenbuiltwithoutconsideration to how communication takes place, represents a fundamental gap where much of modern security research has fallen short.The security literature is ?lled with a mass of articles on cryptographic primitives and, although there are still many theoretical hurdlestobeovercomebythecryptographiccommunity,mostoftheseshortcomings areacademicandtherearenownumeroustextbooksoncryptographythatcanprovide thebasicintroductionneededtoemploycryptographicprimitives. Ontheothersideof thecoin,thesecurityliteratureisalso?lledwithamassofarticlesdevotedtobuilding secure protocols and, similarly, there are now numerous textbooks on computer securitythatprovidetheinstructionneededtodesignsecureprotocols.Unfortunately, the issue of how communication takes place or, more speci?cally, whether there are any speci?c issues that might arise or be circumvented because message exchanges aretakingplaceononemediumversusanother(e.g., wirelesscommunicationversus wired communication), is generally neglected.

Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012): Volume 3 (Hardcover, 2013... Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012): Volume 3 (Hardcover, 2013 ed.)
Yuhang Yang, Maode Ma
R8,464 Discovery Miles 84 640 Ships in 10 - 15 working days

The objective of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012) is to facilitate an exchange of information on best practices for the latest research advances in the area of communications, networks and intelligence applications. These mainly involve computer science and engineering, informatics, communications and control, electrical engineering, information computing, and business intelligence and management.

"Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012)" will focus on green information technology and applications, which will provide in-depth insights for engineers and scientists in academia, industry, and government. The book addresses the most innovative research developments including technical challenges, social and economic issues, and presents and discusses the authors' ideas, experiences, findings, and current projects on all aspects of advanced green information technology and applications.

Yuhang Yang is a professor at the Department of Electronic Engineering, Shanghai Jiao Tong University. Maode Ma is an associate professor at the School of Electrical & Electronic Engineering, Nanyang Technological University.

Wireless Sensor Networks and Applications (Hardcover, 2008 ed.): Yingshu Li, My T. Thai Wireless Sensor Networks and Applications (Hardcover, 2008 ed.)
Yingshu Li, My T. Thai
R4,428 Discovery Miles 44 280 Ships in 10 - 15 working days

Wireless sensor networks are currently being employed in a variety of applications ranging from medical to military, and from home to industry. Wireless Sensor Networks and Applications aims to provide a reference tool for the increasing number of scientists who depend upon sensor networks in some way. The topics covered include network design and modeling, network management, data management, security and applications. The topic covered in each chapter is given expository but also scholarly treatment, covering the history of the topic, reviewing state-of-the-art thinking relative to the topic, and discussing currently unsolved problems of special interest.

IT Security Management - IT Securiteers - Setting up an IT Security Function (Hardcover, 2010 ed.): Alberto Partida, Diego... IT Security Management - IT Securiteers - Setting up an IT Security Function (Hardcover, 2010 ed.)
Alberto Partida, Diego Andina
R3,034 Discovery Miles 30 340 Ships in 10 - 15 working days

IT securiteers - The human and technical dimension working for the organisation.

Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry.

More often than desired, these teams are only useful for companies' executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems.

IT Security Management provides an insight into how to create and grow a team of passionate IT security professionals. We will call them "securiteers." They will add value to the business, improving the information security stance of organisations.

Solid State Radar Transmitters (Hardcover): Edward Ostroff Solid State Radar Transmitters (Hardcover)
Edward Ostroff
R3,237 Discovery Miles 32 370 Ships in 10 - 15 working days
Fault-Tolerant Message-Passing Distributed Systems - An Algorithmic Approach (Hardcover, 1st ed. 2018): Michel Raynal Fault-Tolerant Message-Passing Distributed Systems - An Algorithmic Approach (Hardcover, 1st ed. 2018)
Michel Raynal
R2,346 Discovery Miles 23 460 Ships in 10 - 15 working days

This book presents the most important fault-tolerant distributed programming abstractions and their associated distributed algorithms, in particular in terms of reliable communication and agreement, which lie at the heart of nearly all distributed applications. These programming abstractions, distributed objects or services, allow software designers and programmers to cope with asynchrony and the most important types of failures such as process crashes, message losses, and malicious behaviors of computing entities, widely known under the term "Byzantine fault-tolerance". The author introduces these notions in an incremental manner, starting from a clear specification, followed by algorithms which are first described intuitively and then proved correct. The book also presents impossibility results in classic distributed computing models, along with strategies, mainly failure detectors and randomization, that allow us to enrich these models. In this sense, the book constitutes an introduction to the science of distributed computing, with applications in all domains of distributed systems, such as cloud computing and blockchains. Each chapter comes with exercises and bibliographic notes to help the reader approach, understand, and master the fascinating field of fault-tolerant distributed computing.

Multimodal Location Estimation of Videos and Images (Hardcover, 2015 ed.): Jae-Young Choi, Gerald Friedland Multimodal Location Estimation of Videos and Images (Hardcover, 2015 ed.)
Jae-Young Choi, Gerald Friedland
R4,389 R3,533 Discovery Miles 35 330 Save R856 (20%) Ships in 12 - 19 working days

This book presents an overview of the field of multimodal location estimation. The authors' aim is to describe the research results in this field in a unified way. The book describes fundamental methods of acoustic, visual, textual, social graph, and metadata processing as well as multimodal integration methods used for location estimation. In addition, the book covers benchmark metrics and explores the limits of the technology based on a human baseline. The book also outlines privacy implications and discusses directions for future research in the area.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Asian Energy Security - The Maritime…
H. Lai Hardcover R1,521 Discovery Miles 15 210
Practical Ship Design, Volume 1
D.G.M. Watson Hardcover R3,079 Discovery Miles 30 790
Maritime Risk and Organizational…
Michael Ekow Manuel Paperback R1,813 Discovery Miles 18 130
Lights, Shapes, and Signals for the…
Captain D. Green Spiral bound R1,036 R825 Discovery Miles 8 250
Seaman's Guide to Human Factors…
Jose Rodriguez Cordon Hardcover R2,087 Discovery Miles 20 870
Creative Ropecraft - A treasure trove of…
Stuart Grainger Paperback R510 Discovery Miles 5 100
Contemporary Container Security
Girish Gujar, Adolf K Y Ng, … Hardcover R2,889 Discovery Miles 28 890
Tankers in Trouble - Norwegian Shipping…
Stig Tenold Paperback R939 Discovery Miles 9 390
Barons of the Sea - And Their Race to…
Steven Ujifusa Paperback R465 R433 Discovery Miles 4 330
Techniques for Ship Handling and Bridge…
Hiroaki Kobayashi Paperback R1,560 Discovery Miles 15 600

 

Partners