0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (282)
  • R250 - R500 (873)
  • R500+ (13,637)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Trust Management III - Third IFIP WG 11.11 International Conference, IFIPTM 2009, West Lafayette, IN, USA, June 15-19, 2009,... Trust Management III - Third IFIP WG 11.11 International Conference, IFIPTM 2009, West Lafayette, IN, USA, June 15-19, 2009, Proceedings (Hardcover, 2009 ed.)
Elena Ferrari, Ninghui Li, Elisa Bertino, Yucel Karabulut
R2,692 Discovery Miles 26 920 Ships in 18 - 22 working days

ThisvolumecontainstheproceedingsofIFIPTM2009, theThirdIFIPWG11.11 International Conference on Trust Management, held at Purdue University in West Lafayette, Indiana, USA during June 15-19, 2009. IFIPTM 2009 provided a truly global platform for the reporting of research, development, policyandpracticeintheinterdependentareasofprivacy, security, and trust. Building on the traditions inherited from the highly successful iTrust conference series, the IFIPTM 2007 conference in Moncton, New Brunswick, Canada, and the IFIPTM 2008conferencein Trondheim, Norway, IFIPTM 2009 focusedontrust, privacyand security from multidisciplinary perspectives. The conferenceisanarenafor discussionaboutrelevantproblemsfromboth research and practice in the areas of academia, business, and government. IFIPTM 2009 was an open IFIP conference. The program of the conference featured both theoretical research papers and reports of real-world case studies. IFIPTM 2009 received 44 submissions. The ProgramCommittee selected 17 - pers for presentation and inclusion in the proceedings. In addition, the program and the proceedings include one invited paper and ?ve demo descriptions. The highlights of IFIPTM 2009 included invited talks and tutorials by academic and governmental experts in the ?elds of trust management, privacy and security, including Eugene Spa?ord, Marianne Winslett, and Michael Novak. Running an international conference requires an immense e?ort from all p- ties involved. We would like to thank the Program Committee members and external referees for having provided timely and in-depth reviews of the subm- ted papers.We wouldalsolike to thank the Workshop, Tutorial, Demonstration, Local Arrangements, and Website Chairs, for having provided great help or- nizing the con

Communications, Signal Processing, and Systems - Proceedings of the 2016 International Conference on Communications, Signal... Communications, Signal Processing, and Systems - Proceedings of the 2016 International Conference on Communications, Signal Processing, and Systems (Hardcover, 1st ed. 2018)
Qilian Liang, Jiasong Mu, Wei Wang, Baoju Zhang
R7,866 Discovery Miles 78 660 Ships in 18 - 22 working days

This book brings together papers presented at the 2016 International Conference on Communications, Signal Processing, and Systems, which provides a venue to disseminate the latest developments and to discuss the interactions and links between these multidisciplinary fields. Spanning topics ranging from communications to signal processing and systems, this book is aimed at undergraduate and graduate students in electrical engineering, computer science and mathematics, researchers and engineers from academia and industry as well as government employees (such as NSF, DOD and DOE).

Advanced Fiber Access Networks (Paperback): Cedric F. Lam, Shuang Yin, Tao Zhang Advanced Fiber Access Networks (Paperback)
Cedric F. Lam, Shuang Yin, Tao Zhang
R2,547 Discovery Miles 25 470 Ships in 10 - 15 working days

Advanced Fiber Access Networks takes a holistic view of broadband access networks-from architecture to network technologies and network economies. The book reviews pain points and challenges that broadband service providers face (such as network construction, fiber cable efficiency, transmission challenges, network scalability, etc.) and how these challenges are tackled by new fiber access transmission technologies, protocols and architecture innovations. Chapters cover fiber-to-the-home (FTTH) applications as well as fiber backhauls in other access networks such as 5G wireless and hybrid-fiber-coax (HFC) networks. In addition, it covers the network economy, challenges in fiber network construction and deployment, and more. Finally, the book examines scaling issues and bottlenecks in an end-to-end broadband network, from Internet backbones to inside customer homes, something rarely covered in books.

Survivable Networks - Algorithms for Diverse Routing (Hardcover, 1999 ed.): Ramesh Bhandari Survivable Networks - Algorithms for Diverse Routing (Hardcover, 1999 ed.)
Ramesh Bhandari
R2,763 Discovery Miles 27 630 Ships in 18 - 22 working days

Survivable Networks: Algorithms for Diverse Routing provides algorithms for diverse routing to enhance the survivability of a network. It considers the common mesh-type network and describes in detail the construction of physically disjoint paths algorithms for diverse routing. The algorithms are developed in a systematic manner, starting with shortest path algorithms appropriate for disjoint paths construction. Key features of the algorithms are optimality and simplicity. Although the algorithms have been developed for survivability of communication networks, they are in a generic form, and thus applicable in other scientific and technical disciplines to problems that can be modeled as a network. A notable highlight of this book is the consideration of real-life telecommunication networks in detail. Such networks are described not only by nodes and links, but also by the actual physical elements, called span nodes and spans. The sharing of spans (the actual physical links) by the network (logical) links complicates the network, requiring new algorithms. This book is the first one to provide algorithms for such networks. Survivable Networks: Algorithms for Diverse Routing is a comprehensive work on physically disjoint paths algorithms. It is an invaluable resource and reference for practicing network designers and planners, researchers, professionals, instructors, students, and others working in computer networking, telecommunications, and related fields.

Blockchain Applications in IoT Security (Hardcover): Harshita Patel, Ghanshyam Singh Thakur Blockchain Applications in IoT Security (Hardcover)
Harshita Patel, Ghanshyam Singh Thakur
R5,952 Discovery Miles 59 520 Ships in 18 - 22 working days

Like many other scientific innovations, scientists are looking to protect the internet of things (IoT) from unfortunate losses, theft, or misuse. As one of the current hot trends in the digital world, blockchain technology could be the solution for securing the IoT. Blockchain Applications in IoT Security presents research for understanding IoT-generated data security issues, existing security facilities and their limitations and future possibilities, and the role of blockchain technology. Featuring coverage on a broad range of topics such as cryptocurrency, remote monitoring, and smart computing, this book is ideally designed for security analysts, IT specialists, entrepreneurs, business professionals, academicians, researchers, students, and industry professionals seeking current studies on the limitations and possibilities behind competitive blockchain technologies.

Multichannel Optical Networks (Hardcover, 1999 ed.): Peng-Jun Wan Multichannel Optical Networks (Hardcover, 1999 ed.)
Peng-Jun Wan
R4,246 Discovery Miles 42 460 Ships in 18 - 22 working days

The huge bandwidth of optical fiber was recognized back in the 1970s during the early development of fiber optic technology. For the last two decades, the capacity of experimental and deployed systems has been increasing at a rate of 100-fold each decade-a rate exceeding the increase of integrated circuit speeds. Today, optical communication in the public communication networks has developed from the status of a curiosity into being the dominant technology. Various great challenges arising from the deployment of the wavelength division multiplexing (WDM) have attracted a lot of efforts from many researchers. Indeed, the optical networking has been a fertile ground for both theoretical researches and experimental studies. This monograph presents the contribution from my past and ongoing research in the optical networking area. The works presented in this book focus more on graph-theoretical and algorithmic aspects of optical networks. Although this book is limited to the works by myself and my coauthors, there are many outstanding achievements made by other individuals, which will be cited in many places in this book. Without the inspiration from their efforts, this book would have never been possible. This monograph is divided into four parts: * Multichannel Optical Networking Architectures, * Broadcast-and-Select Passive Optical Networks, * Wavelength-Switched Optical Networks, * SONET/WDM Optical Networks. The first part consists of the first three chapters. Chapter 1 pro vides a brief survey on the networking architectures of optical trans- XVll xvm MULTICHANNEL OPTICAL NETWORKS port networks, optical access networks and optical premise networks.

Brain Art - Brain-Computer Interfaces for Artistic Expression (Hardcover, 1st ed. 2019): Anton Nijholt Brain Art - Brain-Computer Interfaces for Artistic Expression (Hardcover, 1st ed. 2019)
Anton Nijholt
R4,661 Discovery Miles 46 610 Ships in 10 - 15 working days

This is the first book on brain-computer interfaces (BCI) that aims to explain how these BCI interfaces can be used for artistic goals. Devices that measure changes in brain activity in various regions of our brain are available and they make it possible to investigate how brain activity is related to experiencing and creating art. Brain activity can also be monitored in order to find out about the affective state of a performer or bystander and use this knowledge to create or adapt an interactive multi-sensorial (audio, visual, tactile) piece of art. Making use of the measured affective state is just one of the possible ways to use BCI for artistic expression. We can also stimulate brain activity. It can be evoked externally by exposing our brain to external events, whether they are visual, auditory, or tactile. Knowing about the stimuli and the effect on the brain makes it possible to translate such external stimuli to decisions and commands that help to design, implement, or adapt an artistic performance, or interactive installation. Stimulating brain activity can also be done internally. Brain activity can be voluntarily manipulated and changes can be translated into computer commands to realize an artistic vision. The chapters in this book have been written by researchers in human-computer interaction, brain-computer interaction, neuroscience, psychology and social sciences, often in cooperation with artists using BCI in their work. It is the perfect book for those seeking to learn about brain-computer interfaces used for artistic applications.

Next Generation Optical Network Design and Modelling - IFIP TC6 / WG6.10 Sixth Working Conference on Optical Network Design and... Next Generation Optical Network Design and Modelling - IFIP TC6 / WG6.10 Sixth Working Conference on Optical Network Design and Modelling (ONDM 2002) February 4-6, 2002, Torino, Italy (Hardcover, 2003 ed.)
Andrea Bianco, Fabio Neri
R2,926 Discovery Miles 29 260 Ships in 18 - 22 working days

Optical networks are leaving the labs and becoming a reality. Despite the current crisis of the telecom industry, our everyday life increasingly depends on communication networks for information exchange, medicine, education, data transfer, commerce, and many other endeavours. High capacity links are required by the large futemet traffic demand, and optical networks remain one of the most promising technologies for meeting these needs. WDM systems are today widely deployed, thanks to low-cost at extreme data rates and high reliability of optical components, such as optical amplifiers and fixed/tunable filters and transceivers. Access and metropolitan area networks are increasingly based on optical technologies to overcome the electronic bottleneck at the network edge. Traditional multi-layer architectures, such as the widely deployed IP/ATM/SDH protocol stack, are increasingly based on WDM transport; further efforts are sought to move at the optical layer more of the functionalities available today in higher protocol layers. New components and subsystems for very high speed optical networks offer new design opportunities to network operators and designers. The trends towards dynamically configurable all-optical network infrastructures open up a wide range of new network engineering and design choices, which must face issues such as interoperability and unified control and management.

Building Secure Business Models Through Blockchain Technology - Tactics, Methods, Limitations, and Performance (Hardcover):... Building Secure Business Models Through Blockchain Technology - Tactics, Methods, Limitations, and Performance (Hardcover)
Shweta Dewangan, Sapna Singh Kshatri, Astha Bhanot, Mushtaq Ahmed Shah
R6,221 Discovery Miles 62 210 Ships in 18 - 22 working days

Blockchain technology provided a buzz-seeking opportunity for all industries to implement improved corporate procedures and trust-building. Still, some industries, such as the banking sector, may view it as a disruptive technology that must be adopted. A transaction ledger's contents can be verified, maintained, and synchronized by community members using blockchain technology. A transaction can never be changed or removed from the blockchain; updates may only be made by participants in the system. Its distributed database cannot be manipulated, disrupted, or hacked in the same manner as conventional, user-controlled access systems and centralized databases. Building Secure Business Models Through Blockchain Technology: Tactics, Methods, Limitations, and Performance studies and explores the status of blockchain technology and, through the latest technology, builds business models to secure the future direction in the field of business. This book discusses the tactics and methods, as well as their limitations and performance. Covering topics such as AI-based efficient models, digital technology and services, and financial trading, this premier reference source is a valuable resource for business leaders and managers, IT managers, students and educators of higher education, entrepreneurs, government officials, librarians, researchers, and academicians.

Virtualization Techniques for Mobile Systems (Hardcover, 2014 ed.): David Jaramillo, Borko Furht, Ankur Agarwal Virtualization Techniques for Mobile Systems (Hardcover, 2014 ed.)
David Jaramillo, Borko Furht, Ankur Agarwal
R1,381 Discovery Miles 13 810 Ships in 18 - 22 working days

This book presents effective ways to partition mobile devices such that the enterprise system access and its information are completely separated from the personal information. For those using mobile devices for personal and business purposes, the ability to keep the data secure and separate is critical. The applications for security in smart platforms range from personal email accounts to global enterprise systems. Several approaches for mobile virtualization are described, all creating secure and secluded environments for enterprise information. The authors present a reference architecture that allows for integration with existing enterprise mobile device management systems and provides a lightweight solution for containerizing mobile applications. This solution is then benchmarked with several of the existing mobile virtualization solutions across a range of mobile devices. Virtualization Techniques for Mobile Systems is an excellent resource for researchers and professionals working in mobile systems. Advanced-level students studying computer science and electrical engineering will also find the content helpful.

Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance (Hardcover): Maria Manuela Cruz Cunha,... Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance (Hardcover)
Maria Manuela Cruz Cunha, Irene Maria Portela
R9,614 Discovery Miles 96 140 Ships in 18 - 22 working days

In our hyper-connected digital world, cybercrime prevails as a major threat to online security and safety. New developments in digital forensics tools and an understanding of current criminal activities can greatly assist in minimizing attacks on individuals, organizations, and society as a whole. The Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance combines the most recent developments in data protection and information communication technology (ICT) law with research surrounding current criminal behaviors in the digital sphere. Bridging research and practical application, this comprehensive reference source is ideally designed for use by investigators, computer forensics practitioners, and experts in ICT law, as well as academicians in the fields of information security and criminal science.

Broadband Communications - Convergence of Network Technologies (Hardcover, 2000 ed.): Danny H.K. Tsang, Paul J. Kuhn Broadband Communications - Convergence of Network Technologies (Hardcover, 2000 ed.)
Danny H.K. Tsang, Paul J. Kuhn
R5,528 Discovery Miles 55 280 Ships in 18 - 22 working days

Broadband communications is widely recognized as one of the key technologies for building the next generation global network infrastructure to support ever-increasing multimedia applications. This book contains a collection of timely leading-edge research papers that address some of the important issues of providing such a broadband network infrastructure. Broadband Communications represents the selected proceedings of the Fifth International Conference on Broadband Communications, sponsored by the International Federation for Information Processing (IFIP) and held in Hong Kong in November 1999. The book is organized according to the eighteen technical sessions of the conference. The topics covered include internet services, traffic modeling, internet traffic control, performance evaluation, billing, pricing, admission policy, mobile network protocols, TCP/IP performance, mobile network performance, bandwidth allocation, switching systems, traffic flow control, routing, congestion and admission control, multicast protocols, network management, and quality of service. It will serve as an essential reference for computer scientists and practitioners.

From Model-Driven Design to Resource Management for Distributed Embedded Systems - IFIP TC 10 Working Conference on Distributed... From Model-Driven Design to Resource Management for Distributed Embedded Systems - IFIP TC 10 Working Conference on Distributed and Parallel Embedded Systems (DIPES 2006) October 11-13, 2006, Braga, Portugal (Hardcover, 2006 ed.)
Bernd Kleinjohann, Lisa Kleinjohann, Ricardo J. Machado, Carlos Pereira, P.S. Thiagarajan
R2,804 Discovery Miles 28 040 Ships in 18 - 22 working days

From Model-Driven Design to Resource Management for Distributed Embedded Systems presents 16 original contributions and 12 invited papers presented at the Working Conference on Distributed and Parallel Embedded Systems - DIPES 2006, sponsored by the International Federation for Information Processing - IFIP. Coverage includes model-driven design, testing and evolution of embedded systems, timing analysis and predictability, scheduling, allocation, communication and resource management in distributed real-time systems.

Collective Intelligence and E-learning 2.0 - Implications of Web-based Communities and Networking (Hardcover): Harrison Hao... Collective Intelligence and E-learning 2.0 - Implications of Web-based Communities and Networking (Hardcover)
Harrison Hao Yang, Steve Chi-Yin Yuen
R4,591 Discovery Miles 45 910 Ships in 18 - 22 working days

With the advent of Web 2.0, e-learning has the potential to become far more personal, social, and flexible. ""Collective Intelligence and E-Learning 2.0: Implications of Web-Based Communities and Networking"" provides a valuable reference to the latest advancements in the area of educational technology and e-learning. This innovative collection includes a selection of world-class chapters addressing current research, case studies, best practices, pedagogical approaches, and strategies related to e-learning resources and projects.

Cooperative Management of Enterprise Networks (Hardcover, 2002 ed.): Pradeep Kumar Ray Cooperative Management of Enterprise Networks (Hardcover, 2002 ed.)
Pradeep Kumar Ray
R2,821 Discovery Miles 28 210 Ships in 18 - 22 working days

Enterprises all over the world are experiencing a rapid development of networked computing for applications that are required for the daily survival of an organization. Client-server computing offers great potential for cost-effective networked computing. However, many organizations have now learned that the cost of maintenance and support of these networked distributed systems far exceeds the cost of buying them. Computer Supported Creative Work (CSCW) is the new evolving area that promotes the understanding of business processes and relevant communication technologies. Cooperative Management of Enterprise Networks uses CSCW as the medium for conveying ideas on the integration of business processes with network and systems management. This book will be useful for systems management professionals wishing to know about business process integration; business managers wishing to integrate their tasks with network/systems management; software system developers wishing to adopt participatory design practices; and students and researchers.

Networks and Grids - Technology and Theory (Hardcover, 2007 ed.): Thomas G. Robertazzi Networks and Grids - Technology and Theory (Hardcover, 2007 ed.)
Thomas G. Robertazzi
R2,454 Discovery Miles 24 540 Ships in 18 - 22 working days

This useful volume adopts a balanced approach between technology and mathematical modeling in computer networks, covering such topics as switching elements and fabrics, Ethernet, and ALOHA design. The discussion includes a variety of queueing models, routing, protocol verification and error codes and divisible load theory, a new modeling technique with applications to grids and parallel and distributed processing. Examples at the end of each chapter provide ample material for practice. This book can serve as an text for an undergraduate or graduate course on computer networks or performance evaluation in electrical and computer engineering or computer science.

Multiaccess, Mobility and Teletraffic in Wireless Communications: Volume 5 (Hardcover, 2001 ed.): Gordon L. Stuber, Bijan... Multiaccess, Mobility and Teletraffic in Wireless Communications: Volume 5 (Hardcover, 2001 ed.)
Gordon L. Stuber, Bijan Jabbari
R5,371 Discovery Miles 53 710 Ships in 18 - 22 working days

The METRA (Multi-Element Transmit and Receive Antennas) Project Ana Perez-Neira, Javier R Fonollosa.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 . . . . . . . . . . . . . . . . . . . . TURBO-BLAST: A Novel Technique for Multi-transmit Multi-receive Wireless Communications Mathini Sellathurni, Sirnon Haykin. . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . ... . . . 13 . . . . . . Optimal Channel Training for Multiple Antenna Systems J. Balakrishnan, M. Rupp, H. Viswanathan. .. . . . . . . . . . .. . . . . . . . . . . . . . . . . . . .... . . . . 25 . . . . . . Code-Aided Blind Multi-user Detection in Dispersive CDMA channels Stefano Buzzi, Marco Lops.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ... . . . 3 . . 7 . . . . . . . . . . . . . . . . . . . . . lndoor BLAST Measurements: Capacity ofMulti-elemmt Antenna Systems P.Kyritsi, P.Wolniansky, R Valenzuela..... .. . .. . .. . .. . .. . .. . .. . .. . . . .. . . .. . .. . . . .. . . ... 49 The High Data Rate Evolution of the cdma2000 Cellular System Eduardo Esteves. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . User-Perceived Performance ofWeb-Browsing and Interactive Data Applications in TDMA Packet Wireless Networks N.K. Shankaranarayanan, Z.Jiang, P.Mishra......................................... ... 73 Resource Allocation Schemes for Voice and Data Integration over Wireless Cessular Networks Wessam Ajib, Philippe Godlewski............................ .. . . . . . .. . . . . . . . . . . . .. . . 85 . . . SIP-sessions between a 3G-Network and a SIP-proxy Traversing NAT -PT G. Bajko, B. Bertenyi............................. .. . . . . . . . . . . . . . .. . . .. . . . . . . . . . .. . . . . . .. . . 97 Resource Allocation for Soft Handoff in Wireless Packet CDMA System E. Dinan, B. Jabbari, M. Kasmi, P. Godlewski............... .. . . . . . . . . . . . . . ... . . . 109 . . . . . . ."

Amazon Virtual Private Cloud User Guide (Hardcover): Documentation Team Amazon Virtual Private Cloud User Guide (Hardcover)
Documentation Team
R1,465 Discovery Miles 14 650 Ships in 18 - 22 working days
High-Performance Networks, Personal Communications and Mobile Computing (Hardcover): Dimitris N Chorafas High-Performance Networks, Personal Communications and Mobile Computing (Hardcover)
Dimitris N Chorafas
R2,681 Discovery Miles 26 810 Ships in 18 - 22 working days

Many professionals in the technology industry are seeking new solutions beyond the confines of the more traditional type software tools, network design solutions and distributed systems applications. The aim of this book is to provide for them a much needed upgrade of knowledge and skills by addressing the developing technical and business perspectives which have emerged from the deregulation of telecommunications, including issues connected to costs and tariffs. It also addresses a comprehensible introduction to the research, development and implementation of agents. Based on thorough research undertaken from 1993-96 in the United States, Europe and Japan, much practical material is included, with both comprehensive examples and case studies.

Interface and Transport Dynamics - Computational Modelling (Hardcover, 2003 ed.): Heike Emmerich, Britta Nestler, Michael... Interface and Transport Dynamics - Computational Modelling (Hardcover, 2003 ed.)
Heike Emmerich, Britta Nestler, Michael Schreckenberg
R4,097 Discovery Miles 40 970 Ships in 18 - 22 working days

An overview of the recent progress of research in computational physics and materials science. Particular topics are modelling of traffic flow and complex multi-scale solidification phenomena. The sections introduce novel research results of experts from a considerable diversity of disciplines such as physics, mathematical and computational modelling, nonlinear dynamics, materials sciences, statistical mechanics and foundry technique. The book intends to create a comprehensive and coherent image of the current research status and illustrates new simulation results of transport and interface dynamics by high resolution graphics. Various possible perspectives are formulated for future activities. Special emphasis is laid on exchanging experiences concerning numerical tools and on the bridging of the scales as is necessary in a variety of scientific and engineering applications. An interesting possibility along this line was the coupling of different computational approaches leading to hybrid simulations.

Development and Deployment of Multiplayer Online Games, Vol. II - DIY, (Re)Actors, Client Arch., Unity/UE4/ Lumberyard/Urho3D... Development and Deployment of Multiplayer Online Games, Vol. II - DIY, (Re)Actors, Client Arch., Unity/UE4/ Lumberyard/Urho3D (Hardcover)
'No Bugs' Hare; Contributions by Sergey Ignatchenko
R977 R856 Discovery Miles 8 560 Save R121 (12%) Ships in 18 - 22 working days
ECSCW 2009: Proceedings of the 11th European Conference on Computer Supported Cooperative Work, 7-11 September 2009, Vienna,... ECSCW 2009: Proceedings of the 11th European Conference on Computer Supported Cooperative Work, 7-11 September 2009, Vienna, Austria (Hardcover, 2nd Printing.)
Ina Wagner, Hilda Tellioglu, Ellen Balka, Carla Simone, Luigina Ciolfi
R5,369 Discovery Miles 53 690 Ships in 18 - 22 working days

This volume presents the proceedings of ECSCW'09, the 11th European Conference on Computer Supported Cooperative Work. Each conference offers an occasion to critically review our research field, which has been multidisciplinary and committed to high scientific standards, both theoretical and methodological, from its beginning. These proceedings represent discussions and contributions to ongoing challenges. One challenge comes from emerging new technologies connected to 'social computing', gaming, as well as applications supporting citizen participation in their communities. As boundaries between home and work erode with the increased movement of work into home environments, and new applications further blur the once separate conceptions of work and leisure, our intellectual community faces challenges in the ways we think about and study work. Other challenges result from transformations of the world of work itself and the role of IT in these. They have been taken up in in-depth studies of design practice, software development, and manufacturing, as well as in the growing body of research on health care contexts and applications. Finally, there is the question of what is the European perspective in our community and whether it is worthwhile to anchor our research more firmly in such a perspective. Of high relevance to our field is the strong grounding of technology development in an understanding of human activity.

The nineteen full papers, four short papers and one discussion paper selected for this conference deal with and reflect on some of these challenges, thus representing the lively debate currently ongoing in our field of research.

Theoretical Aspects of Distributed Computing in Sensor Networks (Hardcover, Edition.): Sotiris Nikoletseas, Jose D.P. Rolim Theoretical Aspects of Distributed Computing in Sensor Networks (Hardcover, Edition.)
Sotiris Nikoletseas, Jose D.P. Rolim
R2,844 Discovery Miles 28 440 Ships in 18 - 22 working days

Wireless ad hoc sensor networks has recently become a very active research subject. Achieving efficient, fault-tolerant realizations of very large, highly dynamic, complex, unconventional networks is a real challenge for abstract modelling, algorithmic design and analysis, but a solid foundational and theoretical background seems to be lacking. This book presents high-quality contributions by leading experts worldwide on the key algorithmic and complexity-theoretic aspects of wireless sensor networks. The intended audience includes researchers and graduate students working on sensor networks, and the broader areas of wireless networking and distributed computing, as well as practitioners in the relevant application areas. The book can also serve as a text for advanced courses and seminars.

Network Control and Engineering for QoS, Security and Mobility - IFIP TC6 / WG6.2 & WG6.7 Conference on Network Control and... Network Control and Engineering for QoS, Security and Mobility - IFIP TC6 / WG6.2 & WG6.7 Conference on Network Control and Engineering for QoS, Security and Mobility (Net-Con 2002) October 23-25, 2002, Paris, France (Hardcover, 2003 ed.)
Dominique Gaiti, Nadia Boukhatem
R2,734 Discovery Miles 27 340 Ships in 18 - 22 working days

Service and network providers must be able to satisfy the demands for new services; improve the quality of service; reduce the cost of network service operations and maintenance; control performance; and adapt to user demands. It is essential to investigate different approaches for performing such tasks.
One of these approaches is based on policies and the capability of the network to adapt itself to current conditions. With a focus on policy-based networking, this volume addresses the problem of network control and the introduction of policies such as the control of the Quality of Service, security, mobility, performance, mobile and intelligent agents, and traffic engineering.
The area of control in networks through policies promises to provide stimulating challenges for years to come. This book is an attempt to answer questions and provide some direction about the best approaches to be followed.
This volume contains the proceedings of the first International Conference on NETwork CONtrol and Engineering (NETCON) for Quality of Service, Security and Mobility, which was sponsored by the International Federation for Information Processing (IFIP), and organized by IFIP TC6 Working Group 6.7 (Smart Networks). The conference convened in Paris, France in October 2002.

Real-time Security Extensions for EPCglobal Networks - Case Study for the Pharmaceutical Industry (Hardcover, 2014 ed.):... Real-time Security Extensions for EPCglobal Networks - Case Study for the Pharmaceutical Industry (Hardcover, 2014 ed.)
Matthieu-P. Schapranow
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

The transformation towards EPCglobal networks requires technical equipment for capturing event data and IT systems to store and exchange them with supply chain participants. For the very first time, supply chain participants thus need to face the automatic exchange of event data with business partners. Data protection of sensitive business secrets is therefore the major aspect that needs to be clarified before companies will start to adopt EPCglobal networks. This book contributes to this proposition as follows: it defines the design of transparent real-time security extensions for EPCglobal networks based on in-memory technology. For that, it defines authentication protocols for devices with low computational resources, such as passive RFID tags, and evaluates their applicability. Furthermore, it outlines all steps for implementing history-based access control for EPCglobal software components, which enables a continuous control of access based on the real-time analysis of the complete query history and a fine-grained filtering of event data. The applicability of these innovative data protection mechanisms is underlined by their exemplary integration in the FOSSTRAK architecture.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
How to Learn a Language in 5 Days
Frederick Dodson Hardcover R647 Discovery Miles 6 470
How We Think
John Dewey Hardcover R746 Discovery Miles 7 460
What is Three Three Three-What is Three…
Crystal Horton Hardcover R564 R519 Discovery Miles 5 190
Understanding Schematic Learning at Two
Julie Brierley, Cathy Nutbrown Hardcover R4,630 Discovery Miles 46 300
How to Differentiate Instruction in…
Carol Ann Tomlinson Paperback R785 R689 Discovery Miles 6 890
Do It! or Get Off! the Pot!
Johnny Estrada Hardcover R953 Discovery Miles 9 530
The Science of Rapid Skill Acquisition…
Peter Hollins Hardcover R640 Discovery Miles 6 400
Using Innovative Literacies to Develop…
Limor Pinhasi-Vittorio, Elite Ben-Yosef Hardcover R5,370 Discovery Miles 53 700
Kurt, Gert, Jazmine, and Bagel - In…
Irene Dolnick Hardcover R986 Discovery Miles 9 860
Becoming Einstein's Teacher - Awakening…
Erika Twani Hardcover R592 R546 Discovery Miles 5 460

 

Partners