0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (282)
  • R250 - R500 (874)
  • R500+ (13,631)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Architecting the Internet of Things (Hardcover, 2011 Ed.): Dieter Uckelmann, Mark Harrison, Florian Michahelles Architecting the Internet of Things (Hardcover, 2011 Ed.)
Dieter Uckelmann, Mark Harrison, Florian Michahelles
R4,005 Discovery Miles 40 050 Ships in 10 - 15 working days

Many of the initial developments towards the Internet of Things have focused on the combination of Auto-ID and networked infrastructures in business-to-business logistics and product lifecycle applications. However, the Internet of Things is more than a business tool for managing business processes more efficiently and more effectively it will also enable a more convenient way of life.

Since the term "Internet of Things" first came to attention when the Auto-ID Center launched their initial vision for the EPC network for automatically identifying and tracing the flow of goods within supply-chains, increasing numbers of researchers and practitioners have further developed this vision.

The authors in this book provide a research perspective on current and future developments in the Internet of Things. The different chapters cover a broad range of topics from system design aspects and core architectural approaches to end-user participation, business perspectives and applications.

DCOM Explained (Paperback): Rosemary Rock-Evans DCOM Explained (Paperback)
Rosemary Rock-Evans
R1,224 Discovery Miles 12 240 Ships in 10 - 15 working days

DCOM Explained describes what services DCOM provides, both development and runtime. Thus the aim of the book is not to teach how to program using DCOM, but to explain what DCOM does so readers will become better able to use it more effectively, understand the options available when using DCOM, and understand the types of applications that can be built by using DCOM.
This book describes:
. what each of the services mean, including load balancing, security, guaranteed delivery, deferred delivery, broadcasting and multi-casting, and session handling.
. what the service aims to do, such as saving time and effort or providing a secure, resilient, reliable, high performance network
. how the service could be provided, and what other solutions exist for achieving the same end
. how Microsoft has tackled the problem

Provides a complete, easy to understand, and compact picture of all the services of DCOM
Written from a designer or manager's point of view
Compares DCOM with other middleware"

Intelligence in Networks - IFIP TC6 WG6.7 Fifth International Conference on Intelligence in Networks (SMARTNET '99)... Intelligence in Networks - IFIP TC6 WG6.7 Fifth International Conference on Intelligence in Networks (SMARTNET '99) November 22-26, 1999, Pathumthani, Thailand (Hardcover, 2000 ed.)
Thongchai Yongchareon, Finn Arve Aagesen, Vilas Wuwongse
R5,400 Discovery Miles 54 000 Ships in 18 - 22 working days

Intelligence in Networks is a concept, the meaning of which is highly related to the time-period when it is used. In the 1960s, 1970s and 1980s, it was mainly related to the teleservice repertoire `an sich'. In the 1990s, it is more related to efficient flexibility in the introduction of new teleservices and teleservice repertoire. This state-of-the-art text sets out to identify and study issues related to solutions for increasing intelligence in networks. As examples, intelligence networks (IN), telecommunication information networking architecture (TINA) and mobile agents and active networks are different solutions for improving the grade of network intelligence. The areas under discussion include research and development within various closely related fields such as: Teleservices, service architecture and service creation; Middleware and specification languages; Mobile agents, active networks, plug-and-play issues; and Quality of service and performance.GBP/LISTGBP Intelligence in Networks contains the proceedings of SMARTNET'99, the fifth in a series of conferences on intelligence in networks sponsored by the International Federation for Information Processing (IFIP), at the Asian Institute of Technology, Pathumthani, Thailand in November 1999.

Context-Aware Communication and Computing: Applications for Smart Environment (Hardcover, 1st ed. 2018): Punnarumol Temdee,... Context-Aware Communication and Computing: Applications for Smart Environment (Hardcover, 1st ed. 2018)
Punnarumol Temdee, Ramjee Prasad
R3,246 Discovery Miles 32 460 Ships in 18 - 22 working days

This book introduces context-aware computing, providing definitions, categories, characteristics, and context awareness itself and discussing its applications with a particular focus on smart learning environments. It also examines the elements of a context-aware system, including acquisition, modelling, reasoning, and distribution of context. It also reviews applications of context-aware computing - both past and present - to offer readers the knowledge needed to critically analyse how context awareness can be put to use. It is particularly to those new to the subject area who are interested in learning how to develop context-aware computing-oriented applications, as well as postgraduates and researchers in computer engineering, communications engineering related areas of information technology (IT). Further it provides practical know-how for professionals working in IT support and technology, consultants and business decision-makers and those working in the medical, human, and social sciences.

Optical Networks - Design and Modelling / IFIP TC6 Second International Working Conference on Optical Network Design and... Optical Networks - Design and Modelling / IFIP TC6 Second International Working Conference on Optical Network Design and Modelling (ONDM'98) February 9-11, 1998 Rome, Italy (Hardcover, 1999 ed.)
Giancarlo De Marchis, Roberto Sabella
R2,678 Discovery Miles 26 780 Ships in 18 - 22 working days

Optical Network Design and Modelling is an essential issue for planning and operating networks for the next century. The main issues in optical networking are being widely investigated, not only for WDM networks but also for optical TDM and optical packet switching. This book contributes to further progress in optical network architectures, design, operation and management and covers the following topics in detail:
-- Routing strategies and algorithms for optical networks; -- Network planning and design; -- Wavelength conversion and wavelength assignment in optical networks; -- Technologies for optical networks (transport, access and local area networks); -- Transmission aspects in wide area optical networks; -- New paradigms for traffic modelling.

This book contains the selected proceedings of the Second International Working Conference on Optical Network Design and Modelling, which was sponsored by the International Federation for Information Processing (IFIP), and held in February 1998, in Rome, Italy.

This valuable new book will be essential reading for personnel in computer/communication industries, and for academic and research staff in computer science and electrical engineering.

Internet Protocol-based Emergency Services (Hardcover): H Tschofenig Internet Protocol-based Emergency Services (Hardcover)
H Tschofenig
R2,350 Discovery Miles 23 500 Ships in 18 - 22 working days

Written by international experts in the field, this book covers the standards, architecture and deployment issues related to IP-based emergency services This book brings together contributions from experts on technical and operational aspects within the international standardisation and regulatory processes relating to routing and handling of IP-based emergency calls. Readers will learn how these standards work, how various standardization organizations contributed to them and about pilot projects, early deployment and current regulatory situation. Key Features: * Provides an overview of how the standards related to IP-based emergency services work, and how various organizations contributed to them * Focuses on SIP and IMS-based communication systems for the Internet * Covers standards, architecture and deployment issues * International focus, with coverage of the major national efforts in this area * Written by the experts who were/are involved in the development of the standards (NENA, EENA, 3GPP, IETF, ETSI, etc.) * Accompanying website provides updates on standards and deployment (http://ip-emergency.net) This book is an excellent resource for vendors building software and equipment for emergency services, engineers/researchers engaged in development of networks and network elements and standardization, emergency services providers, standardization experts, product persons, those within the regulatory environment. Students and lecturers, infrastructure and application service providers will also find this book of interest.

Multiaccess, Mobility and Teletraffic for Wireless Communications, volume 6 (Hardcover, 2002 ed.): Xavier Lagrange, Bijan... Multiaccess, Mobility and Teletraffic for Wireless Communications, volume 6 (Hardcover, 2002 ed.)
Xavier Lagrange, Bijan Jabbari
R4,206 Discovery Miles 42 060 Ships in 18 - 22 working days

Third generation networks have been specified and are now being deployed in a few countries. They are expected to reach maturity in the next several years and to provide various services including audio, video, and world wide web browsing. Furthermore, radio terminals are expected to be integrated in a number of devices such as personal computers, personal digital assistants, and even television sets. Such a wide-usage of radio mandates ongoing research to address design of networks with high capacity while providing acceptable quality of service. Included in Multiaccess, Mobility and Teletraffic for Wireless Communications: Volume 6 are new results on the optimization of protocols in third generation systems. The radio channel is dynamically shared among several users using packet access, it must adapt to a varying number of users and accomodate various services. Several chapters deal with radio resource management and packet access both in second and third generation systems. The book also considers the performance of low layer protocols (MAC/RLC) and transport protocols (e.g., TCP) when they are combined to offer data services. IPv6 will probably be an in-use network protocol in the near future. It must efficiently manage mobility and support multimedia flows. Wireless internet is an important area and related topics are included in this book. The improvement of the network performance relies on a sophisticated and optimized physical layer. The book includes studies on joint multiple access detection, MIMO systems, use of turbo-codes and methods to improve the analysis of the channel capacity. The book also covers location management, handoff optimization, multi-hop networks andnetwork management. Mobility and Teletraffic for Wireless Communications: Volume 6 is an important book for researchers, students and professionals working in the area of wireless communications and mobile computing.

Cross-Media Service Delivery (Hardcover, 2003 ed.): Diomidis Spinellis Cross-Media Service Delivery (Hardcover, 2003 ed.)
Diomidis Spinellis
R4,141 Discovery Miles 41 410 Ships in 18 - 22 working days

Cross-Media Service Delivery is of interest to professionals and academicians working in content authoring and electronic publishing platforms; as well as in media and broadcasting.
The digitization of traditional media formats, such as text, images, video, and sound provides us with the ability to store, process, and transport content in a uniform way. This has led the formerly distinct industries of media, telecommunications, and information technology to converge. Cross-media publishing and service delivery are important new trends emerging in the content industry landscape. Mass-media organizations and content providers transitionally targeted content production towards a single delivery channel. However, recent economic and technological changes in the industry led content providers to extend their brands to cover multiple delivery channels. Following the content industry trend to "create once and publish everywhere" - COPE, a number of architectures, technologies, and tools are currently being developed and deployed to facilitate the automatic conversion of content to multiple formats, and the creation of innovative multi-platform services. This new approach enables the seamless access to information over different network infrastructures and client platforms.
This work uniquely brings together a cross-disciplinary core of contributors to address the technical and business issues of cross-media publishing and service delivery. The contributions are organized into four different areas: the business issues driving the requirements for cross media content delivery, the architectures used for delivering content to multiple platforms, technologies that address specificpractical problems, and, last but not least, concrete applications.

Converged Networking - Data and Real-time Communications over IP (Hardcover, 2003 ed.): Chris McDonald Converged Networking - Data and Real-time Communications over IP (Hardcover, 2003 ed.)
Chris McDonald
R2,851 Discovery Miles 28 510 Ships in 18 - 22 working days

This volume forms the edited proceedings of the Sixth International Symposium on Communications Interworking, held in Perth, Western Australia, from 13-16 October, 2002. In total, 39 research papers were submitted for consideration, and after full refereeing by international referees, 27 papers from authors in 11 countries were accepted for publication. Invited keynote addresses were presented by Dr Hugh Bradlow, Chief Technology Offleer for Telstra Corporation, Australia, and Dr Sathya Rao, Director ofTelscom A.G., Switzerland. The symposium brought together 60 active international researchers and telecommunications engineers to discuss the important questions as to whether there is a convergence of all communications, including real-time communications, over the Internet Protocol (IP), and whether existing IP technology is capable of supporting this convergence, or whether it requires further development of that technology. The papers selected to appear in this volume make an important and timely contribution to this debate. Specific symposium paper sessions were held to present and discuss ernerging research on the topics of converged networking, real-time communications over IP, quality of service, routing and metrics, ernerging issues in mobile networks, differentiated services, and wireless networking.

Discrete Password Logbook - Locked Door Edition (Hardcover): Suzeteo Enterprises Discrete Password Logbook - Locked Door Edition (Hardcover)
Suzeteo Enterprises
R503 Discovery Miles 5 030 Ships in 18 - 22 working days
Preserving Privacy in Data Outsourcing (Hardcover, 2011 Ed.): Sara Foresti Preserving Privacy in Data Outsourcing (Hardcover, 2011 Ed.)
Sara Foresti
R2,754 Discovery Miles 27 540 Ships in 18 - 22 working days

Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive data, thus reducing query execution efficiency and preventing selective information release.

Preserving Privacy in Data Outsourcing presents a comprehensive approach for protecting highly sensitive information when it is stored on systems that are not under the data owner's control. The approach illustrated combines access control and encryption, enforcing access control via structured encryption. This solution, coupled with efficient algorithms for key derivation and distribution, provides efficient and secure authorization management on outsourced data, allowing the data owner to outsource not only the data but the security policy itself. To reduce the amount of data to be encrypted the book also investigates data fragmentation as a possible way to protect privacy of data associations and provide fragmentation as a complementary means for protecting privacy: associations broken by fragmentation will be visible only to users authorized (by knowing the proper key) to join fragments. The book finally investigates the problem of executing queries over possible data distributed at different servers and which must be controlled to ensure sensitive information and sensitive associations be visible only to parties authorized for that. Case Studies are provided throughout the book.

Privacy, data mining, data protection, data outsourcing, electronic commerce, machine learning professionals and others working in these related fields will find this book a valuable asset, as well as primary associations such as ACM, IEEE and Management Science. This book is also suitable for advanced level students and researchers concentrating on computer science as a secondary text or reference book.

Broadband Infrastructure - The Ultimate Guide to Building and Delivering OSS/BSS (Hardcover, 2003 ed.): Shailendra Jain, Mark... Broadband Infrastructure - The Ultimate Guide to Building and Delivering OSS/BSS (Hardcover, 2003 ed.)
Shailendra Jain, Mark Hayward, Sharad Kumar
R4,170 Discovery Miles 41 700 Ships in 18 - 22 working days

The companies that provide the Internet to the rest of the world do not have the luxury of setting high expectations and assuming they will be met. These Internet infrastructure companies (IICs) are responsible for delivering the Internet's promise, including everything from eBusiness and mobile Internet applications to optical services and high-speed access. The Internet's audience takes this promise for granted, and IICs face the daunting challenge of making the Internet, and networks like it, do what the audience expects them to. To meet the expectations they face, IICs must harness the power of their operations support systems (OSSs) - the software systems in the background they use to create, manage, maintain, manipulate and adapt their networks to serve customers reliably and rapidly.
Broadband Infrastructure: The Ultimate Guide to Understanding and Delivering OSS/BSS is a "how to" book for Internet infrastructure companies to help them prepare for the decisions they will face when constructing their core OSS strategies and infrastructure. This book provides a source of reference and education to learn the language, methods, and technologies associated with the OSS market. It examines the Internet infrastructure supply chain and how it will be automated. Finally, it brings together a wealth of proven knowledge and advice, gathered from BusinessEdge Solutions' extensive OSS experience, that broadband providers can use to minimize their OSS risks while maximizing their ability to differentiate and compete.

The Student Supercomputer Challenge Guide - From Supercomputing Competition to the Next HPC Generation (Hardcover, 1st ed.... The Student Supercomputer Challenge Guide - From Supercomputing Competition to the Next HPC Generation (Hardcover, 1st ed. 2018)
Asc Community
R1,733 Discovery Miles 17 330 Ships in 10 - 15 working days

This guide provides a comprehensive overview of High Performance Computing (HPC) to equip students with a full skill set including cluster setup, network selection, and a background of supercomputing competitions. It covers the system, architecture, evaluating approaches, and other practical supercomputing techniques. As the world's largest supercomputing hackathon, the ASC Student Supercomputer Challenge has attracted a growing number of new talent to supercomputing and has greatly promoted communications in the global HPC community. Enclosed in this book, readers will also find how to analyze and optimize supercomputing systems and applications in real science and engineering cases.

Memory Machines - The Evolution of Hypertext (Paperback): Belinda Barnet Memory Machines - The Evolution of Hypertext (Paperback)
Belinda Barnet
R769 Discovery Miles 7 690 Ships in 10 - 15 working days
Achieving Full Realization and Mitigating the Challenges of the Internet of Things (Hardcover): Marcel Ohanga Odhiambo, Weston... Achieving Full Realization and Mitigating the Challenges of the Internet of Things (Hardcover)
Marcel Ohanga Odhiambo, Weston Mwashita
R5,948 Discovery Miles 59 480 Ships in 18 - 22 working days

As the IoT market is booming, several issues are delaying the full realization of the technology. IoT devices, in cybersecurity terms, greatly increase security risk. This means that any scientific work that offers cybersecurity strategies will excite security experts who will be glad to expand their knowledge base on IoT cybersecurity. As a result of the booming of the IoT market, business competitors are jockeying for a piece of the market. This means that solutions from researchers that address compatibility issues will be greatly welcomed by IoT technology developers. Connectivity providers are likely to embrace solutions to challenges of bandwidth since a growing IoT market must be followed up by bandwidth-intensive IoT applications which tend to jostle for space on the current client-server model. Overpromising followed by underdelivering, has been the current approach by many innovators and the mismatch results in losses in production, orphaned technologies accompanied by frequent system failures. Solutions that address IoT performance issues are likely to excite many start-ups. Solutions to challenges of fragmentation presented by thousands of devices from different manufacturers operating on proprietary ecosystems are likely to be warmly embraced by many IoT brands developers. As such, a publication that specifically addresses the challenges faced in the rolling out of IoT technologies is sorely needed.

Challenges in Ad Hoc Networking - Fourth Annual Mediterranean Ad Hoc Networking Workshop, June 21-24, 2005, Ile de... Challenges in Ad Hoc Networking - Fourth Annual Mediterranean Ad Hoc Networking Workshop, June 21-24, 2005, Ile de Porquerolles, France (Hardcover, 2006 ed.)
K. Al Agha, I. Guerin Lassous, G. Pujolle
R2,717 Discovery Miles 27 170 Ships in 18 - 22 working days

This book contains the refereed proceedings of the Fourth Annual Mediterranean Ad Hoc Networking Workshop, Med-Hoc-Net 2005. Med-Hoc-Net 2005 consolidated the success of the previous editions of the workshop series. It aimed to serve as a platform for researchers from academia, research, laboratories, and industry from all over the world to share their ideas, views, reults, and experiences in the field of ad-hoc networking.

Internet Naming and Discovery - Architecture and Economics (Hardcover, 2013 ed.): Joud S. Khoury, Chaouki T. Abdallah Internet Naming and Discovery - Architecture and Economics (Hardcover, 2013 ed.)
Joud S. Khoury, Chaouki T. Abdallah
R3,267 Discovery Miles 32 670 Ships in 10 - 15 working days

Naming is an integral building block within data networks and systems and is becoming ever more important as complex data-centric usage models emerge. Internet Naming and Discovery is timely in developing a unified model for studying the topic of naming and discovery. It details the architectural and economic tools needed for designing naming and discovery schemes within the broader context of internetwork architecture. Readers will find in this book a historic overview of the Internet and a comprehensive survey of the literature, followed by and an in-depth examination of naming and discovery. Specific topics covered include: * formal definitions of name, address, identifier, locator, binding, routing, discovery, mapping, and resolution; * a discussion of the properties of names and bindings, along with illustrative case studies; * taxonomy that helps in organizing the solution space, and more importantly in identifying new avenues for contributing to the field; * a general model for exploring the tradeoffs involved in designing discovery systems; * an illustrative design exercise for differentiated discovery services; * broad treatment of the main economic issues that arise in the context of discovery; and * a game-theoretic incentive model for route distribution (and discovery) in the context of path-vector routing protocols (mainly BGP). Internet Naming and Discovery will be of great value to readers, including graduate students, engineers and computer scientists, theoreticians and practitioners, seeking a training in advanced networking, or specializing in computer and communications networks.

Localized Quality of Service Routing for the Internet (Hardcover, 2003 ed.): Srihari Nelakuditi, Zhi-Li Zhang Localized Quality of Service Routing for the Internet (Hardcover, 2003 ed.)
Srihari Nelakuditi, Zhi-Li Zhang
R1,470 Discovery Miles 14 700 Ships in 18 - 22 working days

Under Quality of Service (QoS) routing, paths for flows are selected based upon the knowledge of resource availability at network nodes and the QoS requirements of flows. QoS routing schemes proposed differ in the way they gather information about the network state and select paths based on this information. We broadly categorize these schemes into best-path routing and proportional routing. The best-path routing schemes gather global network state information and always select the best path for an incoming flow based on this global view. On the other hand, proportional routing schemes proportion incoming flows among a set of candidate paths. We have shown that it is possible to compute near-optimal proportions using only locally collected information. Furthermore, a few good candidate paths can be selected using infrequently exchanged global information and thus with minimal communication overhead.

Localized Quality Of Service Routing For The Internet, describes these schemes in detail demonstrating that proportional routing schemes can achieve higher throughput with lower overhead than best-path routing schemes. It first addresses the issue of finding near-optimal proportions for a given set of candidate paths based on locally collected flow statistics. This book will also look into the selection of a few good candidate paths based on infrequently exchanged global information. The final phase of this book will describe extensions to proportional routing approach to provide hierarchical routing across multiple areas in a large network.

Localized Quality Of Service Routing For The Internet is designed for researchers and practitioners in industry, and is suitable for graduatelevel students in computer science as a secondary text.

Quantum Communication, Quantum Networks, and Quantum Sensing (Paperback): Ivan B. Djordjevic Quantum Communication, Quantum Networks, and Quantum Sensing (Paperback)
Ivan B. Djordjevic
R2,958 Discovery Miles 29 580 Ships in 10 - 15 working days

Quantum Communication, Quantum Networks, and Quantum Sensing represents a self-contained introduction to quantum communication, quantum error-correction, quantum networks, and quantum sensing. It starts with basic concepts from classical detection theory, information theory, and channel coding fundamentals before continuing with basic principles of quantum mechanics including state vectors, operators, density operators, measurements, and dynamics of a quantum system. It continues with fundamental principles of quantum information processing, basic quantum gates, no-cloning and theorem on indistinguishability of arbitrary quantum states. The book then focuses on quantum information theory, quantum detection and Gaussian quantum information theories, and quantum key distribution (QKD). The book then covers quantum error correction codes (QECCs) before introducing quantum networks. The book concludes with quantum sensing and quantum radars, quantum machine learning and fault-tolerant quantum error correction concepts.

Piecewise Linear Modeling and Analysis (Hardcover, 1998 ed.): Domine Leenaerts, Wim M.G.Van Bokhoven Piecewise Linear Modeling and Analysis (Hardcover, 1998 ed.)
Domine Leenaerts, Wim M.G.Van Bokhoven
R4,119 Discovery Miles 41 190 Ships in 18 - 22 working days

Piecewise Linear (PL) approximation of non-linear behaviour is a well-known technique in synthesis and analysis of electrical networks. However, the PL description should be efficient in data storage and the description should allow simple retrieval of the stored information. Furthermore, it would be useful if the model description could handle a large class of piecewise linear mappings. Piecewise Linear Modeling and Analysis explains in detail all possible model descriptions for efficiently storing piecewise linear functions, starting with the Chua descriptions. Detailed explanation on how the model parameter can be obtained for a given mapping is provided and demonstrated by examples. The models are ranked to compare them and to show which model can handle the largest class of PL mappings. All model descriptions are implicitly related to the Linear Complementarity Problem and most solution techniques for this problem, like Katzenelson and Lemke, are discussed according to examples that are explained in detail. To analyse PL electrical networks a simulator is mandatory. Piecewise Linear Modeling and Analysis provides a detailed outline of a possible PL simulator, including pseudo-programming code. Several simulation domains like transient, AC and distortion are discussed. The book explains the attractive features of PL simulators with respect to mixed-level and mixed-signal simulation while paying due regard also to hierarchical simulation. Piecewise Linear Modeling and Analysis shows in detail how many existing components in electrical networks can be modeled. These range from digital logic and analog basic elements such as transistors to complex systems like Phase-Locked Loops and detection systems. Simulation results are also provided. The book concludes with a discussion on how to find multiple solutions for PL functions or networks. Again, the most common techniques are outlined using clear examples. Piecewise Linear Modeling and Analysis is an indispensable guide for researchers and designers interested in network theory, network synthesis and network analysis.

Spoken Multimodal Human-Computer Dialogue in Mobile Environments (Hardcover, 2005 ed.): Wolfgang Minker, Dirk Buhler, Laila... Spoken Multimodal Human-Computer Dialogue in Mobile Environments (Hardcover, 2005 ed.)
Wolfgang Minker, Dirk Buhler, Laila Dybkjaer
R4,243 Discovery Miles 42 430 Ships in 18 - 22 working days

The ongoing migration of computing and information access from stationary environments to mobile computing devices for eventual use in mobile environments, such as Personal Digital Assistants (PDAs), tablet PCs, next generation mobile phones, and in-car driver assistance systems, poses critical challenges for natural human-computer interaction. Spoken dialogue is a key factor in ensuring natural and user-friendly interaction with such devices which are meant not only for computer specialists, but also for everyday users.

Speech supports hands-free and eyes-free operation, and becomes a key alternative interaction mode in mobile environments, e.g. in cars where driver distraction by manually operated devices may be a significant problem. On the other hand, the use of mobile devices in public places, may make the possibility of using alternative modalities possibly in combination with speech, such as graphics output and gesture input, preferable due to e.g. privacy issues. Researchers' interest is progressively turning to the integration of speech with other modalities such as gesture input and graphics output, partly to accommodate more efficient interaction and partly to accommodate different user preferences.

This book:
-combines overview chapters of key areas in spoken multimodal dialogue (systems and components, architectures, and evaluation) with chapters focussed on particular applications or problems in the field;
-focuses on the influence of the environment when building and evaluating an application.

Audience: Computer scientists, engineers, and others who work in the area of spoken multimodal dialogue systems in academia and in the industry;
graduatestudents and Ph.D. students specialising in spoken multimodal dialogue systems in general, or focusing on issues in these systems in mobile environments in particular.

Computer Network Security (Hardcover, 2005 ed.): Joseph Migga Kizza Computer Network Security (Hardcover, 2005 ed.)
Joseph Migga Kizza
R1,686 Discovery Miles 16 860 Ships in 10 - 15 working days

A comprehensive survey of computer network security concepts, methods, and practices. This authoritative volume provides an optimal description of the principles and applications of computer network security in particular, and cyberspace security in general. The book is thematically divided into three segments: Part I describes the operation and security conditions surrounding computer networks; Part II builds from there and exposes readers to the prevailing security situation based on a constant security threat; and Part III - the core - presents readers with most of the best practices and solutions currently in use. It is intended as both a teaching tool and reference. This broad-ranging text/reference comprehensively surveys computer network security concepts, methods, and practices and covers network security tools, policies, and administrative goals in an integrated manner. It is an essential security resource for undergraduate or graduate study, practitioners in networks, and professionals who develop and maintain secure computer network systems.

Cyber Crime and the Victimization of Women - Laws, Rights and Regulations (Hardcover, New): Debarati Halder, K Jaishankar Cyber Crime and the Victimization of Women - Laws, Rights and Regulations (Hardcover, New)
Debarati Halder, K Jaishankar
R4,911 Discovery Miles 49 110 Ships in 18 - 22 working days

While women benefit from using new digital and Internet technologies for self-expression, networking, and professional activities, cyber victimization remains an underexplored barrier to their participation. Women often outnumber men in surveys on cyber victimization. Cyber Crime and the Victimization of Women: Laws, Rights and Regulations is a unique and important contribution to the literature on cyber crime. It explores gendered dimensions of cyber crimes like adult bullying, cyber stalking, hacking, defamation, morphed pornographic images, and electronic blackmailing. These and other tactics designed to inflict intimidation, control, and other harms are frequently committed by perpetrators who, for many reasons, are unlikely to be identified or punished. Scholars, researchers, law makers, and ordinary women and their supporters will gain a better understanding of cyber victimization and discover how to improve responses to cyber crimes against women.

Research Anthology on Artificial Intelligence Applications in Security, VOL 2 (Hardcover): Information Reso Management... Research Anthology on Artificial Intelligence Applications in Security, VOL 2 (Hardcover)
Information Reso Management Association
R9,815 Discovery Miles 98 150 Ships in 18 - 22 working days
Trusted Computing Platforms - TPM2.0 in Context (Hardcover, 1st ed. 2014): Graeme Proudler, Liqun Chen, Chris Dalton Trusted Computing Platforms - TPM2.0 in Context (Hardcover, 1st ed. 2014)
Graeme Proudler, Liqun Chen, Chris Dalton
R4,853 Discovery Miles 48 530 Ships in 10 - 15 working days

In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Wonder Reborn - Creating Sermons on…
Thomas Troeger Hardcover R1,087 Discovery Miles 10 870
Miraculous Images and Votive Offerings…
Frank Graziano Hardcover R3,574 Discovery Miles 35 740
The Merry Christmas Tree Farm
Sharon M Hawkins Hardcover R678 Discovery Miles 6 780
The Origins of Feasts, Fasts and Seasons…
Paul F. Bradshaw Paperback R496 Discovery Miles 4 960
Last Gift of the Magi - A Christmas…
Louis Tartaglia Hardcover R623 Discovery Miles 6 230
Gifts of the Spiritual Wilderness - A…
J. Dana Trent Pamphlet R131 Discovery Miles 1 310
Christmas in the Olden Time, Or, the…
John Mills Paperback R419 Discovery Miles 4 190
Prayers for Living - 500 Prayers for…
Rosalind Brown Hardcover R694 Discovery Miles 6 940
Mr. Snow's Magical Christmas
Laura Stephens Cole Hardcover R760 Discovery Miles 7 600
Releasing Resurrection And Revival From…
Robert Henderson Paperback R425 R389 Discovery Miles 3 890

 

Partners