0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (301)
  • R250 - R500 (844)
  • R500+ (14,098)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Technological Innovation for Life Improvement - 11th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical... Technological Innovation for Life Improvement - 11th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2020, Costa de Caparica, Portugal, July 1-3, 2020, Proceedings (Hardcover, 1st ed. 2020)
Luis M. Camarinha-Matos, Nastaran Farhadi, Fabio Lopes, Helena Pereira
R2,962 Discovery Miles 29 620 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2020, held in Costa de Caparica, Portugal, in July 2020. The 20 full papers and 24 short papers presented were carefully reviewed and selected from 91 submissions. The papers present selected results produced in engineering doctoral programs and focus on technological innovation for industry and service systems. Research results and ongoing work are presented, illustrated and discussed in the following areas: collaborative networks; decisions systems; analysis and synthesis algorithms; communication systems; optimization systems; digital twins and smart manufacturing; power systems; energy control; power transportation; biomedical analysis and diagnosis; and instrumentation in health.

Resource Management of Mobile Cloud Computing Networks and Environments (Hardcover): George Mastorakis, Constandinos X.... Resource Management of Mobile Cloud Computing Networks and Environments (Hardcover)
George Mastorakis, Constandinos X. Mavromoustakis, Evangelos Pallis
R5,924 Discovery Miles 59 240 Ships in 10 - 15 working days

As more and more of our data is stored remotely, accessing that data wherever and whenever it is needed is a critical concern. More concerning is managing the databanks and storage space necessary to enable cloud systems. Resource Management of Mobile Cloud Computing Networks and Environments reports on the latest advances in the development of computationally intensive and cloud-based applications. Covering a wide range of problems, solutions, and perspectives, this book is a scholarly resource for specialists and end-users alike making use of the latest cloud technologies.

Technological Advancements and the Impact of Actor-Network Theory (Hardcover): Arthur Tatnall Technological Advancements and the Impact of Actor-Network Theory (Hardcover)
Arthur Tatnall
R5,206 Discovery Miles 52 060 Ships in 10 - 15 working days

Actor-Network Theory (ANT) has existed as a topic of interest among social theorists for decades. Due to the prevalence of technology in modern society, discussions over the influence of actor-network theory on the changing scope of technology can assist in facilitating further research and scientific thought. Technological Advancements and the Impact of Actor-Network Theory focuses on cross-disciplinary research as well as examples of the use of actor-network theory in a variety of fields, including medicine, education, business, engineering, environmental science, computer science, and social science. This timely publication is well-suited for reference use by academicians, researchers, upper-level students, and theorists. Topics Covered The many academic areas covered in this publication include, but are not limited to: Digital Communication E-Health Human Interaction Information and Communication Technologies Online Education Online Investing Public Service Innovation Software Development

Intelligence in Networks - IFIP TC6 WG6.7 Fifth International Conference on Intelligence in Networks (SMARTNET '99)... Intelligence in Networks - IFIP TC6 WG6.7 Fifth International Conference on Intelligence in Networks (SMARTNET '99) November 22-26, 1999, Pathumthani, Thailand (Hardcover, 2000 ed.)
Thongchai Yongchareon, Finn Arve Aagesen, Vilas Wuwongse
R5,856 Discovery Miles 58 560 Ships in 10 - 15 working days

Intelligence in Networks is a concept, the meaning of which is highly related to the time-period when it is used. In the 1960s, 1970s and 1980s, it was mainly related to the teleservice repertoire `an sich'. In the 1990s, it is more related to efficient flexibility in the introduction of new teleservices and teleservice repertoire. This state-of-the-art text sets out to identify and study issues related to solutions for increasing intelligence in networks. As examples, intelligence networks (IN), telecommunication information networking architecture (TINA) and mobile agents and active networks are different solutions for improving the grade of network intelligence. The areas under discussion include research and development within various closely related fields such as: Teleservices, service architecture and service creation; Middleware and specification languages; Mobile agents, active networks, plug-and-play issues; and Quality of service and performance.GBP/LISTGBP Intelligence in Networks contains the proceedings of SMARTNET'99, the fifth in a series of conferences on intelligence in networks sponsored by the International Federation for Information Processing (IFIP), at the Asian Institute of Technology, Pathumthani, Thailand in November 1999.

Amazon Pinpoint User Guide (Hardcover): Documentation Team Amazon Pinpoint User Guide (Hardcover)
Documentation Team
R963 Discovery Miles 9 630 Ships in 10 - 15 working days
Recent Progress in Biometrics (Hardcover): Jose Mabry Recent Progress in Biometrics (Hardcover)
Jose Mabry
R3,291 R2,975 Discovery Miles 29 750 Save R316 (10%) Ships in 10 - 15 working days
Computing and Network Sustainability - Proceedings of IRSCNS 2016 (Hardcover, 1st ed. 2017): H. R. Vishwakarma, Shyam Akashe Computing and Network Sustainability - Proceedings of IRSCNS 2016 (Hardcover, 1st ed. 2017)
H. R. Vishwakarma, Shyam Akashe
R6,881 Discovery Miles 68 810 Ships in 12 - 19 working days

The book is compilation of technical papers presented at International Research Symposium on Computing and Network Sustainability (IRSCNS 2016) held in Goa, India on 1st and 2nd July 2016. The areas covered in the book are sustainable computing and security, sustainable systems and technologies, sustainable methodologies and applications, sustainable networks applications and solutions, user-centered services and systems and mobile data management. The novel and recent technologies presented in the book are going to be helpful for researchers and industries in their advanced works.

Cyberpatterns - Unifying Design Patterns with Security and Attack Patterns (Hardcover, 2014 ed.): Clive Blackwell, Hong Zhu Cyberpatterns - Unifying Design Patterns with Security and Attack Patterns (Hardcover, 2014 ed.)
Clive Blackwell, Hong Zhu
R3,642 R2,042 Discovery Miles 20 420 Save R1,600 (44%) Ships in 12 - 19 working days

Cyberspace in increasingly important to people in their everyday lives for purchasing goods on the Internet, to energy supply increasingly managed remotely using Internet protocols. Unfortunately, this dependence makes us susceptible to attacks from nation states, terrorists, criminals and hactivists. Therefore, we need a better understanding of cyberspace, for which patterns, which are predictable regularities, may help to detect, understand and respond to incidents better. The inspiration for the workshop came from the existing work on formalising design patterns applied to cybersecurity, but we also need to understand the many other types of patterns that arise in cyberspace.

Multiaccess, Mobility and Teletraffic for Wireless Communications, volume 6 (Hardcover, 2002 ed.): Xavier Lagrange, Bijan... Multiaccess, Mobility and Teletraffic for Wireless Communications, volume 6 (Hardcover, 2002 ed.)
Xavier Lagrange, Bijan Jabbari
R4,560 Discovery Miles 45 600 Ships in 10 - 15 working days

Third generation networks have been specified and are now being deployed in a few countries. They are expected to reach maturity in the next several years and to provide various services including audio, video, and world wide web browsing. Furthermore, radio terminals are expected to be integrated in a number of devices such as personal computers, personal digital assistants, and even television sets. Such a wide-usage of radio mandates ongoing research to address design of networks with high capacity while providing acceptable quality of service. Included in Multiaccess, Mobility and Teletraffic for Wireless Communications: Volume 6 are new results on the optimization of protocols in third generation systems. The radio channel is dynamically shared among several users using packet access, it must adapt to a varying number of users and accomodate various services. Several chapters deal with radio resource management and packet access both in second and third generation systems. The book also considers the performance of low layer protocols (MAC/RLC) and transport protocols (e.g., TCP) when they are combined to offer data services. IPv6 will probably be an in-use network protocol in the near future. It must efficiently manage mobility and support multimedia flows. Wireless internet is an important area and related topics are included in this book. The improvement of the network performance relies on a sophisticated and optimized physical layer. The book includes studies on joint multiple access detection, MIMO systems, use of turbo-codes and methods to improve the analysis of the channel capacity. The book also covers location management, handoff optimization, multi-hop networks andnetwork management. Mobility and Teletraffic for Wireless Communications: Volume 6 is an important book for researchers, students and professionals working in the area of wireless communications and mobile computing.

Protocols for High-Speed Networks VI - IFIP TC6 WG6.1 & WG6.4 / IEEE ComSoc TC on Gigabit Networking Sixth International... Protocols for High-Speed Networks VI - IFIP TC6 WG6.1 & WG6.4 / IEEE ComSoc TC on Gigabit Networking Sixth International Workshop on Protocols for High-Speed Networks (PfHSN '99) August 25-27, 1999, Salem, Massachusetts, USA (Hardcover, 2000 ed.)
Joseph D. Touch, James P.G. Sterbenz
R5,748 Discovery Miles 57 480 Ships in 10 - 15 working days

1 This year marks the l0 h anniversary of the IFIP International Workshop on Protocols for High-Speed Networks (PfHSN). It began in May 1989, on a hillside overlooking Lake Zurich in Switzerland, and arrives now in Salem Massachusetts 6,000 kilometers away and 10 years later, in its sixth incarnation, but still with a waterfront view (the Atlantic Ocean). In between, it has visited some picturesque views of other lakes and bays of the world: Palo Alto (1990 - San Francisco Bay), Stockholm (1993 - Baltic Sea), Vancouver (1994- the Strait of Georgia and the Pacific Ocean), and Sophia Antipolis I Nice (1996- the Mediterranean Sea). PfHSN is a workshop providing an international forum for the exchange of information on high-speed networks. It is a relatively small workshop, limited to 80 participants or less, to encourage lively discussion and the active participation of all attendees. A significant component of the workshop is interactive in nature, with a long history of significant time reserved for discussions. This was enhanced in 1996 by Christophe Diot and W allid Dabbous with the institution of Working Sessions chaired by an "animator," who is a distinguished researcher focusing on topical issues of the day. These sessions are an audience participation event, and are one of the things that makes PfHSN a true "working conference."

Cross-Media Service Delivery (Hardcover, 2003 ed.): Diomidis Spinellis Cross-Media Service Delivery (Hardcover, 2003 ed.)
Diomidis Spinellis
R4,489 Discovery Miles 44 890 Ships in 10 - 15 working days

Cross-Media Service Delivery is of interest to professionals and academicians working in content authoring and electronic publishing platforms; as well as in media and broadcasting.
The digitization of traditional media formats, such as text, images, video, and sound provides us with the ability to store, process, and transport content in a uniform way. This has led the formerly distinct industries of media, telecommunications, and information technology to converge. Cross-media publishing and service delivery are important new trends emerging in the content industry landscape. Mass-media organizations and content providers transitionally targeted content production towards a single delivery channel. However, recent economic and technological changes in the industry led content providers to extend their brands to cover multiple delivery channels. Following the content industry trend to "create once and publish everywhere" - COPE, a number of architectures, technologies, and tools are currently being developed and deployed to facilitate the automatic conversion of content to multiple formats, and the creation of innovative multi-platform services. This new approach enables the seamless access to information over different network infrastructures and client platforms.
This work uniquely brings together a cross-disciplinary core of contributors to address the technical and business issues of cross-media publishing and service delivery. The contributions are organized into four different areas: the business issues driving the requirements for cross media content delivery, the architectures used for delivering content to multiple platforms, technologies that address specificpractical problems, and, last but not least, concrete applications.

Internet Naming and Discovery - Architecture and Economics (Hardcover, 2013 ed.): Joud S. Khoury, Chaouki T. Abdallah Internet Naming and Discovery - Architecture and Economics (Hardcover, 2013 ed.)
Joud S. Khoury, Chaouki T. Abdallah
R3,470 Discovery Miles 34 700 Ships in 12 - 19 working days

Naming is an integral building block within data networks and systems and is becoming ever more important as complex data-centric usage models emerge. Internet Naming and Discovery is timely in developing a unified model for studying the topic of naming and discovery. It details the architectural and economic tools needed for designing naming and discovery schemes within the broader context of internetwork architecture. Readers will find in this book a historic overview of the Internet and a comprehensive survey of the literature, followed by and an in-depth examination of naming and discovery. Specific topics covered include: * formal definitions of name, address, identifier, locator, binding, routing, discovery, mapping, and resolution; * a discussion of the properties of names and bindings, along with illustrative case studies; * taxonomy that helps in organizing the solution space, and more importantly in identifying new avenues for contributing to the field; * a general model for exploring the tradeoffs involved in designing discovery systems; * an illustrative design exercise for differentiated discovery services; * broad treatment of the main economic issues that arise in the context of discovery; and * a game-theoretic incentive model for route distribution (and discovery) in the context of path-vector routing protocols (mainly BGP). Internet Naming and Discovery will be of great value to readers, including graduate students, engineers and computer scientists, theoreticians and practitioners, seeking a training in advanced networking, or specializing in computer and communications networks.

Trusted Computing Platforms - TPM2.0 in Context (Hardcover, 1st ed. 2014): Graeme Proudler, Liqun Chen, Chris Dalton Trusted Computing Platforms - TPM2.0 in Context (Hardcover, 1st ed. 2014)
Graeme Proudler, Liqun Chen, Chris Dalton
R5,157 Discovery Miles 51 570 Ships in 12 - 19 working days

In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.

Local Area Network Interconnection - Proceedings of the First International Conference Held in Research Triangle Park, North... Local Area Network Interconnection - Proceedings of the First International Conference Held in Research Triangle Park, North Carolina, October 20-22, 1993 (Hardcover, New)
Raif O. Onvural, Arne Nilsson
R2,616 Discovery Miles 26 160 Ships in 12 - 19 working days

QoS Enhancements and the New Transport Services; A. Danthine, et al. Performance Evaluation and Monitoring of Heterogenous Networks; J. Neuman, et al. Application of High Speed Networks in Hospital Environment; J.R. Rao. On Allocation Schemes for the Interconnection of LANs and Multimedia Sources over Broadband Networks; M. Mateescu. A Superposition of Bursty Sources in a LAN Interconnection Environment; J.M. Karlsson. Interconnecting LANs for Real Time Traffic Application; I. Chlamtac. An Analytical Model for ATM Based Networks which Utilize LookAhead Contention Resolution Switching; J.V. Luciani, C.Y. Roger Chen. Transient Analysis of Nonhomogenous Continuous Time Markov Chains Describing Realistic LAN Systems; A. Rindos, et al. Closed Queueing Network Modeling for End-to-End Performance Analysis of ISO LLC Transport Protocols over Bridged Networks; T. Ikegawa. A Preview of APPN High Performance Routing; J.P. Gray, M.L. Peters. 12 additional articles. Index.

Preserving Privacy in Data Outsourcing (Hardcover, 2011 Ed.): Sara Foresti Preserving Privacy in Data Outsourcing (Hardcover, 2011 Ed.)
Sara Foresti
R2,983 Discovery Miles 29 830 Ships in 10 - 15 working days

Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive data, thus reducing query execution efficiency and preventing selective information release.

Preserving Privacy in Data Outsourcing presents a comprehensive approach for protecting highly sensitive information when it is stored on systems that are not under the data owner's control. The approach illustrated combines access control and encryption, enforcing access control via structured encryption. This solution, coupled with efficient algorithms for key derivation and distribution, provides efficient and secure authorization management on outsourced data, allowing the data owner to outsource not only the data but the security policy itself. To reduce the amount of data to be encrypted the book also investigates data fragmentation as a possible way to protect privacy of data associations and provide fragmentation as a complementary means for protecting privacy: associations broken by fragmentation will be visible only to users authorized (by knowing the proper key) to join fragments. The book finally investigates the problem of executing queries over possible data distributed at different servers and which must be controlled to ensure sensitive information and sensitive associations be visible only to parties authorized for that. Case Studies are provided throughout the book.

Privacy, data mining, data protection, data outsourcing, electronic commerce, machine learning professionals and others working in these related fields will find this book a valuable asset, as well as primary associations such as ACM, IEEE and Management Science. This book is also suitable for advanced level students and researchers concentrating on computer science as a secondary text or reference book.

Memory Machines - The Evolution of Hypertext (Paperback): Belinda Barnet Memory Machines - The Evolution of Hypertext (Paperback)
Belinda Barnet
R812 Discovery Miles 8 120 Ships in 12 - 19 working days
Cyber Crime and the Victimization of Women - Laws, Rights and Regulations (Hardcover, New): Debarati Halder, K Jaishankar Cyber Crime and the Victimization of Women - Laws, Rights and Regulations (Hardcover, New)
Debarati Halder, K Jaishankar
R5,325 Discovery Miles 53 250 Ships in 10 - 15 working days

While women benefit from using new digital and Internet technologies for self-expression, networking, and professional activities, cyber victimization remains an underexplored barrier to their participation. Women often outnumber men in surveys on cyber victimization. Cyber Crime and the Victimization of Women: Laws, Rights and Regulations is a unique and important contribution to the literature on cyber crime. It explores gendered dimensions of cyber crimes like adult bullying, cyber stalking, hacking, defamation, morphed pornographic images, and electronic blackmailing. These and other tactics designed to inflict intimidation, control, and other harms are frequently committed by perpetrators who, for many reasons, are unlikely to be identified or punished. Scholars, researchers, law makers, and ordinary women and their supporters will gain a better understanding of cyber victimization and discover how to improve responses to cyber crimes against women.

Communications in Interference Limited Networks (Hardcover, 1st ed. 2016): Wolfgang Utschick Communications in Interference Limited Networks (Hardcover, 1st ed. 2016)
Wolfgang Utschick
R5,252 Discovery Miles 52 520 Ships in 12 - 19 working days

This book offers means to handle interference as a central problem of operating wireless networks. It investigates centralized and decentralized methods to avoid and handle interference as well as approaches that resolve interference constructively. The latter type of approach tries to solve the joint detection and estimation problem of several data streams that share a common medium. In fact, an exciting insight into the operation of networks is that it may be beneficial, in terms of an overall throughput, to actively create and manage interference. Thus, when handled properly, "mixing" of data in networks becomes a useful tool of operation rather than the nuisance as which it has been treated traditionally. With the development of mobile, robust, ubiquitous, reliable and instantaneous communication being a driving and enabling factor of an information centric economy, the understanding, mitigation and exploitation of interference in networks must be seen as a centrally important task.

Architecting the Internet of Things (Hardcover, 2011 Ed.): Dieter Uckelmann, Mark Harrison, Florian Michahelles Architecting the Internet of Things (Hardcover, 2011 Ed.)
Dieter Uckelmann, Mark Harrison, Florian Michahelles
R4,255 Discovery Miles 42 550 Ships in 12 - 19 working days

Many of the initial developments towards the Internet of Things have focused on the combination of Auto-ID and networked infrastructures in business-to-business logistics and product lifecycle applications. However, the Internet of Things is more than a business tool for managing business processes more efficiently and more effectively it will also enable a more convenient way of life.

Since the term "Internet of Things" first came to attention when the Auto-ID Center launched their initial vision for the EPC network for automatically identifying and tracing the flow of goods within supply-chains, increasing numbers of researchers and practitioners have further developed this vision.

The authors in this book provide a research perspective on current and future developments in the Internet of Things. The different chapters cover a broad range of topics from system design aspects and core architectural approaches to end-user participation, business perspectives and applications.

DCOM Explained (Paperback): Rosemary Rock-Evans DCOM Explained (Paperback)
Rosemary Rock-Evans
R1,296 Discovery Miles 12 960 Ships in 12 - 19 working days

DCOM Explained describes what services DCOM provides, both development and runtime. Thus the aim of the book is not to teach how to program using DCOM, but to explain what DCOM does so readers will become better able to use it more effectively, understand the options available when using DCOM, and understand the types of applications that can be built by using DCOM.
This book describes:
. what each of the services mean, including load balancing, security, guaranteed delivery, deferred delivery, broadcasting and multi-casting, and session handling.
. what the service aims to do, such as saving time and effort or providing a secure, resilient, reliable, high performance network
. how the service could be provided, and what other solutions exist for achieving the same end
. how Microsoft has tackled the problem

Provides a complete, easy to understand, and compact picture of all the services of DCOM
Written from a designer or manager's point of view
Compares DCOM with other middleware"

Electronics, Communications and Networks V - Proceedings of the 5th International Conference on Electronics, Communications and... Electronics, Communications and Networks V - Proceedings of the 5th International Conference on Electronics, Communications and Networks (CECNet 2015) (Hardcover, 1st ed. 2016)
Amir Hussain
R8,125 R6,858 Discovery Miles 68 580 Save R1,267 (16%) Ships in 12 - 19 working days

This book comprises peer-reviewed contributions presented at the 5th International Conference on Electronics, Communications and Networks (CECNet 2015), held in Shanghai, China, 12-15 December, 2015. It includes new multi-disciplinary topics spanning a unique depth and breadth of cutting-edge research areas in Electronic Engineering, Communications and Networks, and Computer Technology. More generally, it is of interest to academics, students and professionals involved in Consumer Electronics Technology, Communication Engineering and Technology, Wireless Communication Systems and Technology, and Computer Engineering and Technology.

Context-Aware Communication and Computing: Applications for Smart Environment (Hardcover, 1st ed. 2018): Punnarumol Temdee,... Context-Aware Communication and Computing: Applications for Smart Environment (Hardcover, 1st ed. 2018)
Punnarumol Temdee, Ramjee Prasad
R4,027 R3,458 Discovery Miles 34 580 Save R569 (14%) Ships in 12 - 19 working days

This book introduces context-aware computing, providing definitions, categories, characteristics, and context awareness itself and discussing its applications with a particular focus on smart learning environments. It also examines the elements of a context-aware system, including acquisition, modelling, reasoning, and distribution of context. It also reviews applications of context-aware computing - both past and present - to offer readers the knowledge needed to critically analyse how context awareness can be put to use. It is particularly to those new to the subject area who are interested in learning how to develop context-aware computing-oriented applications, as well as postgraduates and researchers in computer engineering, communications engineering related areas of information technology (IT). Further it provides practical know-how for professionals working in IT support and technology, consultants and business decision-makers and those working in the medical, human, and social sciences.

Optical Networks - Design and Modelling / IFIP TC6 Second International Working Conference on Optical Network Design and... Optical Networks - Design and Modelling / IFIP TC6 Second International Working Conference on Optical Network Design and Modelling (ONDM'98) February 9-11, 1998 Rome, Italy (Hardcover, 1999 ed.)
Giancarlo De Marchis, Roberto Sabella
R2,900 Discovery Miles 29 000 Ships in 10 - 15 working days

Optical Network Design and Modelling is an essential issue for planning and operating networks for the next century. The main issues in optical networking are being widely investigated, not only for WDM networks but also for optical TDM and optical packet switching. This book contributes to further progress in optical network architectures, design, operation and management and covers the following topics in detail:
-- Routing strategies and algorithms for optical networks; -- Network planning and design; -- Wavelength conversion and wavelength assignment in optical networks; -- Technologies for optical networks (transport, access and local area networks); -- Transmission aspects in wide area optical networks; -- New paradigms for traffic modelling.

This book contains the selected proceedings of the Second International Working Conference on Optical Network Design and Modelling, which was sponsored by the International Federation for Information Processing (IFIP), and held in February 1998, in Rome, Italy.

This valuable new book will be essential reading for personnel in computer/communication industries, and for academic and research staff in computer science and electrical engineering.

Distributed Computing in Big Data Analytics - Concepts, Technologies and Applications (Hardcover, 1st ed. 2017): Sourav... Distributed Computing in Big Data Analytics - Concepts, Technologies and Applications (Hardcover, 1st ed. 2017)
Sourav Mazumder, Robin Singh Bhadoria, Ganesh Chandra Deka
R4,496 Discovery Miles 44 960 Ships in 12 - 19 working days

Big data technologies are used to achieve any type of analytics in a fast and predictable way, thus enabling better human and machine level decision making. Principles of distributed computing are the keys to big data technologies and analytics. The mechanisms related to data storage, data access, data transfer, visualization and predictive modeling using distributed processing in multiple low cost machines are the key considerations that make big data analytics possible within stipulated cost and time practical for consumption by human and machines. However, the current literature available in big data analytics needs a holistic perspective to highlight the relation between big data analytics and distributed processing for ease of understanding and practitioner use. This book fills the literature gap by addressing key aspects of distributed processing in big data analytics. The chapters tackle the essential concepts and patterns of distributed computing widely used in big data analytics. This book discusses also covers the main technologies which support distributed processing. Finally, this book provides insight into applications of big data analytics, highlighting how principles of distributed computing are used in those situations. Practitioners and researchers alike will find this book a valuable tool for their work, helping them to select the appropriate technologies, while understanding the inherent strengths and drawbacks of those technologies.

Software Failure Investigation - A Near-Miss Analysis Approach (Hardcover, 1st ed. 2018): Jan H.P. Eloff, Madeleine Bihina Bella Software Failure Investigation - A Near-Miss Analysis Approach (Hardcover, 1st ed. 2018)
Jan H.P. Eloff, Madeleine Bihina Bella
R3,703 R3,421 Discovery Miles 34 210 Save R282 (8%) Ships in 12 - 19 working days

This book reviews existing operational software failure analysis techniques and proposes near-miss analysis as a novel, and new technique for investigating and preventing software failures. The authors provide details on how near-miss analysis techniques focus on the time-window before the software failure actually unfolds, so as to detect the high-risk conditions that can lead to a major failure. They detail how by alerting system users of an upcoming software failure, the detection of near misses provides an opportunity to collect at runtime failure-related data that is complete and relevant. They present a near-miss management systems (NMS) for detecting upcoming software failures, which can contribute significantly to the improvement of the accuracy of the software failure analysis. A prototype of the NMS is implemented and is discussed in the book. The authors give a practical hands-on approach towards doing software failure investigations by means of near-miss analysis that is of use to industry and academia

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Guide to Networking Essentials
Greg Tomsho Paperback R1,452 R1,344 Discovery Miles 13 440
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,932 Discovery Miles 19 320
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,420 R1,316 Discovery Miles 13 160
Introduction to Copper Cabling…
John Crisp Paperback R1,024 Discovery Miles 10 240
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,397 Discovery Miles 13 970
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R3,056 Discovery Miles 30 560
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,539 Discovery Miles 15 390
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,420 R1,316 Discovery Miles 13 160
Community Engagement in the Online Space
Michelle Dennis, James H Albert Hardcover R5,824 Discovery Miles 58 240
Digital Signal Processing and…
Dag Stranneby Paperback R1,454 Discovery Miles 14 540

 

Partners