0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (275)
  • R250 - R500 (877)
  • R500+ (13,584)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Perspectives and Implications for the Development of Information Infrastructures (Hardcover, New): Panos Constantinides Perspectives and Implications for the Development of Information Infrastructures (Hardcover, New)
Panos Constantinides
R4,430 Discovery Miles 44 300 Ships in 18 - 22 working days

In the same way that infrastructures such as transportation, electricity, sewage, and water supply are widely assumed to be integrators of urban spaces, information infrastructures are assumed to be integrators of information spaces. With the advent of Web 2.0 and new types of information infrastructures such as online social networks and smart mobile platforms, a more in-depth understanding of the various rights to access, use, develop, and modify information infrastructure resources is necessary. Perspectives and Implications for the Development of Information Infrastructures aims at addressing this need by offering a fresh new perspective on information infrastructure development. It achieves this by drawing on and adapting theory that was initially developed to study natural resource commons arrangements such as inshore fisheries, forests, irrigation systems, and pastures, while placing great emphasis on the complex problems and social dilemmas that often arise in the negotiations.

Privacy-Respecting Intrusion Detection (Hardcover, 2007 ed.): Ulrich Flegel Privacy-Respecting Intrusion Detection (Hardcover, 2007 ed.)
Ulrich Flegel
R2,690 Discovery Miles 26 900 Ships in 18 - 22 working days

Effective response to misuse or abusive activity in IT systems requires the capability to detect and understand improper activity. Intrusion Detection Systems observe IT activity, record these observations in audit data, and analyze the collected audit data to detect misuse. Privacy-Respecting Intrusion Detection introduces the concept of technical purpose binding, which restricts the linkability of pseudonyms in audit data to the amount necessary for misuse detection. Also, it limits the recovery of personal data to pseudonyms involved in a detected misuse scenario. The book includes case studies demonstrating this theory, and solutions that are constructively validated by providing algorithms.

Anti-Spam Measures - Analysis and Design (Hardcover, 2007 ed.): Guido Schryen Anti-Spam Measures - Analysis and Design (Hardcover, 2007 ed.)
Guido Schryen
R1,419 Discovery Miles 14 190 Ships in 18 - 22 working days

This book examines anti-spam measures in terms of their potentials, limitations, advantages, and drawbacks. These factors determine to which extent the measures can contribute to the reduction of spam in the long run. It examines legislative, organizational, behavioral, and technological anti-spam measures, including an insight into their effectiveness. In addition, it presents the conceptual development and analysis of an infrastructural e-mail framework, which features such a complementary application, and considers deployment issues.

Protocols, Servers and Projects for Multimedia Realtime Systems (Hardcover): Dimitris N Chorafas Protocols, Servers and Projects for Multimedia Realtime Systems (Hardcover)
Dimitris N Chorafas
R2,679 Discovery Miles 26 790 Ships in 18 - 22 working days

This book addresses the changing role of networks and the evolving structure of an Infrastructure Superhighway. The requirements for leadership in telecommunications are reviewed from different viewpoints: Network operators, equipment manufacturers, software developers and user organizations. Emphasis is placed on multimedia and what multimedia solutions would mean to telephone utilities and endusers. Based on extensive research undertaken in Europe, US and Japan, Dimitris Chorafas identifies new domains of applications, presents the breakthroughs which have currently been achieved and outlines the systems solutions necessary to fruitfully exploit new technology.

Reflexing Interfaces - The Complex Coevolution of Information Technology Ecosystems (Hardcover): Franco F. Orsucci, Nicoletta... Reflexing Interfaces - The Complex Coevolution of Information Technology Ecosystems (Hardcover)
Franco F. Orsucci, Nicoletta Sala
R4,615 Discovery Miles 46 150 Ships in 18 - 22 working days

Information and communication technologies are increasingly prolific worldwide, exposing the issues and challenges of the assimilation of existing living environments to the shift in technological communication infrastructure. ""Reflexing Interfaces"" discusses the application of complex theories in information and communication technology, with a focus on the interaction between living systems and information technologies. This innovative view provides researcher, scholars, and IT professionals with a fundamental resource on such compelling topics as virtual reality; fuzzy logic systems; and complexity science in artificial intelligence, evolutionary computation, neural networks, and 3-D modeling.

Multi-Threaded Object-Oriented MPI-Based Message Passing Interface - The ARCH Library (Hardcover, 1998 ed.): Jean-Marc Adamo Multi-Threaded Object-Oriented MPI-Based Message Passing Interface - The ARCH Library (Hardcover, 1998 ed.)
Jean-Marc Adamo
R4,116 Discovery Miles 41 160 Ships in 18 - 22 working days

Multi-Threaded Object-Oriented MPI-Based Message Passing Interface: The ARCH Library presents ARCH, a library built as an extension to MPI. ARCH relies on a small set of programming abstractions that allow the writing of well-structured multi-threaded parallel codes according to the object-oriented programming style. ARCH has been written with C++. The book describes the built-in classes, and illustrates their use through several template application cases in several fields of interest: Distributed Algorithms (global completion detection, distributed process serialization), Parallel Combinatorial Optimization (A* procedure), Parallel Image-Processing (segmentation by region growing). It shows how new application-level distributed data types - such as a distributed tree and a distributed graph - can be derived from the built-in classes. A feature of interest to readers is that both the library and the application codes used for illustration purposes are available via the Internet. The material can be downloaded for installation and personal parallel code development on the reader's computer system. ARCH can be run on Unix/Linux as well as Windows NT-based platforms. Current installations include the IBM-SP2, the CRAY-T3E, the Intel Paragon, PC-networks under Linux or Windows NT. Multi-Threaded Object-Oriented MPI-Based Message Passing Interface: The ARCH Library is aimed at scientists who need to implement parallel/distributed algorithms requiring complicated local and/or distributed control structures. It can also benefit parallel/distributed program developers who wish to write codes in the object-oriented style. The author has been using ARCH for several years as a medium to teach parallel and network programming. Teachers can employ the library for the same purpose while students can use it for training. Although ARCH has been used so far in an academic environment, it will be an effective tool for professionals as well. Multi-Threaded Object-Oriented MPI-Based Message Passing Interface: The ARCH Library is suitable as a secondary text for a graduate level course on Data Communications and Networks, Programming Languages, Algorithms and Computational Theory and Distributed Computing and as a reference for researchers and practitioners in industry.

High Performance Networks - Frontiers and Experience (Hardcover, 1993 ed.): Ahmed N. Tantawy High Performance Networks - Frontiers and Experience (Hardcover, 1993 ed.)
Ahmed N. Tantawy
R4,137 Discovery Miles 41 370 Ships in 18 - 22 working days

'The world of information processing is going through a major phase of its evolution. Networking has been associated with computers since the 1960's. Communicating machines, exchanging information or cooperating to solve complex problems, were the dream of many scientists and engineers. Rudi mentary networks and protocols were invented. Local area networks capable of carrying a few megabits per second became basic components of corporate computing installations in the 1980's. At the same time, advances in optical transmission and switching technologies made it possible to transfer billions of bits per second. 'The availability of this huge bandwidth is making people wonder about the seemingly unlimited possibilities of these "fat information pipes" A new world where all interesting up-to-date information becomes instantaneously available to everyone everywhere is often portrayed to be around the comer. New applications are envisioned and their requirements are defined. 'The new field of High Performance Networking is burgeoning with activities at various levels. Several frontiers are being explored simultaneously. In order to achieve more bandwidth and better performance, work is progressing in optical transmission, high speed switching and network resource manage ment. Some researchers have started to investigate all-optical networking as a promising approach to remove the relatively slow electronics from the network infrastructure. This will also introduce a new environment with unique characteristics that will have a definite impact on network architec tures, topologies, addressing schemes, and protocols."

Integrated Network Management IV - Proceedings of the fourth international symposium on integrated network management, 1995... Integrated Network Management IV - Proceedings of the fourth international symposium on integrated network management, 1995 (Hardcover, 1995 ed.)
A.S. Sethi, Y. Raynaud, F. Faure-Vincent
R8,035 Discovery Miles 80 350 Ships in 18 - 22 working days

Integrated network management plays a pivotal role in establishing and maintaining an efficient worldwide information infrastructure. This volume presents a state-of-the-art review of the latest worldwide research results covering this topic. The book contains the selected proceedings of the fourth International Symposium on Integrated Network Management, arranged by the International Federation for Information Processing and jointly sponsored by the IEEE. The Symposium was held in Santa Barbara, California, May 1995.

Operational Semantics and Verification of Security Protocols (Hardcover, 2011): Cas Cremers, Sjouke Mauw Operational Semantics and Verification of Security Protocols (Hardcover, 2011)
Cas Cremers, Sjouke Mauw
R1,747 Discovery Miles 17 470 Ships in 18 - 22 working days

Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correctness. Combined with their typical small size, which suggests that one could easily assess their correctness, this often results in incorrectly designed protocols.

The authors present a methodology for formally describing security protocols and their environment. This methodology includes a model for describing protocols, their execution model, and the intruder model. The models are extended with a number of well-defined security properties, which capture the notions of correct protocols, and secrecy of data. The methodology can be used to prove that protocols satisfy these properties. Based on the model they have developed a tool set called Scyther that can automatically find attacks on security protocols or prove their correctness. In case studies they show the application of the methodology as well as the effectiveness of the analysis tool.

The methodology s strong mathematical basis, the strong separation of concerns in the model, and the accompanying tool set make it ideally suited both for researchers and graduate students of information security or formal methods and for advanced professionals designing critical security protocols.

"

Advances in Network and Distributed Systems Security - IFIP TC11 WG11.4 First Annual Working Conference on Network Security... Advances in Network and Distributed Systems Security - IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26-27, 2001, Leuven, Belgium (Hardcover, 2002 ed.)
Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen
R4,125 Discovery Miles 41 250 Ships in 18 - 22 working days

The first Annual Working Conference ofWG11.4oftheInter nationalFederationforInformation Processing (IFIP), focuseson variousstate of the art concepts in the field of Network and Dis tributedSystemsSecurity. Oursocietyisrapidly evolvingand irreversibly set onacourse governedby electronicinteractions. Wehave seen thebirthofe mail in the early seventies, and are now facing new challenging applicationssuchase commerce, e government, ....Themoreour societyrelies on electronicforms ofcommunication, themorethe securityofthesecommunicationnetworks isessentialforitswell functioning. Asaconsequence, researchonmethodsandtechniques toimprove network security iso fparam ount importance. ThisWorking Conference bringstogetherresearchersandprac tionersofvariousdisciplines, organisationsandcountries, todiscuss thelatestdevelopmentsinsecurity protocols, secure software engin eering, mobileagentsecurity, e commercesecurityandsecurityfor distributedcomputing. Wearealsopleasedtohaveattractedtwointernationalspeakers topresenttwo case studies, one dealing withBelgium'sintentionto replacetheidentity card ofitscitizensbyanelectronicversion, and theotherdiscussingtheimplicationsofthesecuritycertificationin amultinationalcorporation. ThisWorking Conference s houldalsobeconsideredasthekick off activity ofWG11.4, the aimsof which can be summarizedas follows: topromoteresearch on technical measures forsecuringcom puternetworks, including bothhardware andsoftware based techniques. to promote dissemination of research results in the field of network security in real lifenetworks in industry, academia and administrative ins titutions. viii topromoteeducationintheapplicationofsecuritytechniques, andtopromotegeneral awarenessa boutsecurityproblems in thebroadfieldofinformationtechnology. Researchers and practioners who want to get involved in this Working Group, are kindlyrequestedtocontactthechairman. MoreinformationontheworkingsofWG11.4isavailable from the officialIFIP website: http: //www.ifip.at.org/. Finally, wewish toexpressour gratitudetoallthosewho have contributedtothisconference in one wayoranother. Wearegr ate fultothe internationalrefereeboard whoreviewedallthe papers andtotheauthorsandinvitedspeakers, whosecontributionswere essential to the successof the conference. We would alsoliketo thanktheparticipantswhosepresenceand interest, togetherwith thechangingimperativesofsociety, willprovea drivingforce for futureconferen

Grid Middleware and Services - Challenges and Solutions (Hardcover, 2008 ed.): Domenico Talia, Ramin Yahyapour, Wolfgang Ziegler Grid Middleware and Services - Challenges and Solutions (Hardcover, 2008 ed.)
Domenico Talia, Ramin Yahyapour, Wolfgang Ziegler
R4,248 Discovery Miles 42 480 Ships in 18 - 22 working days

Grid Middleware and Services: Challenges and Solutions is the eighth volume of the CoreGRID series. The CoreGrid Proceedings is the premiere European event on Grid Computing. This book aims to strengthen and advance scientific and technological excellence in the area of Grid Computing. The main focus in this volume is on Grid middleware and service level agreement. Grid middleware and Grid services are two pillars of grid computing systems and applications. This book includes high-level contributions by leading researchers in both areas and presents current solutions together with future challenges. This volume includes sections on knowledge and data management on grids, Grid resource management and scheduling, Grid information, resource and workflow monitoring services, and service level agreements. Grid Middleware and Services: Challenges and Solutions is designed for a professional audience, composed of researchers and practitioners in industry. This volume is also suitable for graduate-level students in computer science.

Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives (Hardcover, New): Raghu Santanam Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives (Hardcover, New)
Raghu Santanam
R4,568 Discovery Miles 45 680 Ships in 18 - 22 working days

Recent developments in cyber security, crime, and forensics have attracted researcher and practitioner interests from technological, organizational and policy-making perspectives. Technological advances address challenges in information sharing, surveillance and analysis, but organizational advances are needed to foster collaboration between federal, state and local agencies as well as the private sector. Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives provides broad coverage of technical and socio-economic perspectives for utilizing information and communication technologies and developing practical solutions in cyber security, cyber crime and cyber forensics.

High Performance Networks - Technology and Protocols (Hardcover, 1994 ed.): Ahmed N. Tantawy High Performance Networks - Technology and Protocols (Hardcover, 1994 ed.)
Ahmed N. Tantawy
R4,139 Discovery Miles 41 390 Ships in 18 - 22 working days

In the last few years, the world of information networks has undergone significant changes that will revolutionize the future of communications. Data rates have reached the gigabit per second range. Optical fibers have become the transmission medium of choice. Standardization activities have very aggressively produced a set of well established standard for future LANs, MANs and WANs. It has become very difficult for computer and communications professionals to follow these rapidly evolving technologies and standards. High Performance Networks: Technology and Protocols provides a timely technical overview of the start-of-the-art in high performance networking. Chapters cover lightweight protocols, high performance protocol implementation techniques, high speed MAC protocols, optical networks, as well as emerging standards, including ATM, SMDS, B-ISDN, SONET, FCS and HIPPI. Professionals, engineers, and researchers in communications and computers, who need to understand the underlying technologies of high performance (gigabit) networks, will find this volume to be an invaluable reference. The book is also suitable for use as a text for advanced courses on the subject.

Transactions on Engineering Technologies - Special Volume of the World Congress on Engineering 2013 (Hardcover, 2014): Gi-Chul... Transactions on Engineering Technologies - Special Volume of the World Congress on Engineering 2013 (Hardcover, 2014)
Gi-Chul Yang, Sio-Iong Ao, L. Engelman
R5,283 Discovery Miles 52 830 Ships in 18 - 22 working days

This book contains revised and extended research articles written by prominent researchers participating in the international conference on Advances in Engineering Technologies and Physical Science ("London, U.K., 3-5 July, 2013)." Topics covered include mechanical engineering, bioengineering, internet engineering, image engineering, wireless networks, knowledge engineering, manufacturing engineering, and industrial applications. The book offers state of art of tremendous advances in engineering technologies and physical science and applications, and also serves as an excellent reference work for researchers and graduate students working with/on engineering technologies and physical science.

Mobile Information Systems - IFIP TC 8 Working Conference on Mobile Information Systems (MOBIS) 15-17 September 2004, Oslo,... Mobile Information Systems - IFIP TC 8 Working Conference on Mobile Information Systems (MOBIS) 15-17 September 2004, Oslo, Norway (Hardcover, 2005 ed.)
Elaine Lawrence, Barbara Pernici, John Krogstie
R4,203 Discovery Miles 42 030 Ships in 18 - 22 working days

Mobility is perhaps the most important market and technological trend within information and communication technology. With the advent of new mobile infrastructures providing higher bandwidth and constant connection to the network from virtually everywhere, the way people use information resources is predicted to be radically transformed. Over the last years, a new breed of information systems, referred to as mCommerce systems or mobile information systems, has appeared to address this emerging situation. In 2000, the IFIP 8.1 WG decided to look into establishing a task group to look closer at this area, and the idea was adopted and extended by IFIP TC8 the following year. After the arrangement of several workshop, this task group has been the driving force behind the arrangement of MOBIS (IFIP TC 8 Working Conference on Mobile Information systems) held in Oslo, Norway, 15-17 September 2004. The objective of the working conference was to provide a forum for researchers and practitioners interested in planning, analysis, design, construction, modification, implementation, utilization, evaluation, and management of mobile information systems to meet, and exchange research ideas and results. Specifically, we tried to use the working conference to * Clarify differences and similarities between the development of mobile vs. more traditional information systems * Investigate organizational impact of mobile information systems * Investigate mobile commerce applications combined with the advantages of mobile communications technologies X Mobile Information Systems * Evaluate existing and newly developed approaches for analysis, design, implementation, and evolution of mobile information systems.

Spyware and Adware (Hardcover, 2011 ed.): John Aycock Spyware and Adware (Hardcover, 2011 ed.)
John Aycock
R2,732 Discovery Miles 27 320 Ships in 18 - 22 working days

"Spyware and Adware" introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. This book not only brings together current sources of information on spyware and adware but also looks at the future direction of this field.

"Spyware and Adware" is a reference book designed for researchers and professors in computer science, as well as a secondary text for advanced-level students. This book is also suitable for practitioners in industry.

A Deeper Perspective on the Fundamentals of Digital Communication, Security, and Privacy Protocols (Paperback): Kutub Thakur,... A Deeper Perspective on the Fundamentals of Digital Communication, Security, and Privacy Protocols (Paperback)
Kutub Thakur, Abu Kamruzzaman, Al-Sakib Khan Pathan
R1,531 Discovery Miles 15 310 Ships in 9 - 17 working days

This book, divided into three parts, describes the detailed concepts of Digital Communication, Security, and Privacy protocols. In Part One, the first chapter provides a deeper perspective on communications, while Chapters 2 and 3 focus on analog and digital communication networks. Part Two then delves into various Digital Communication protocols. Beginning first in Chapter 4 with the major Telephony protocols, Chapter 5 then focuses on important Data Communication protocols, leading onto the discussion of Wireless and Cellular Communication protocols in Chapter 6 and Fiber Optic Data Transmission protocols in Chapter 7. Part Three covers Digital Security and Privacy protocols including Network Security protocols (Chapter 8), Wireless Security protocols (Chapter 9), and Server Level Security systems (Chapter 10), while the final chapter covers various aspects of privacy related to communication protocols and associated issues. This book will offer great benefits to graduate and undergraduate students, researchers, and practitioners. It could be used as a textbook as well as reference material for these topics. All the authors are well-qualified in this domain. The authors have an approved textbook that is used in some US, Saudi, and Bangladeshi universities since Fall 2020 semester - although used in online lectures/classes due to COVID-19 pandemic.

Security for Web Services and Service-Oriented Architectures (Hardcover, 2010 ed.): Elisa Bertino, Lorenzo Martino, Federica... Security for Web Services and Service-Oriented Architectures (Hardcover, 2010 ed.)
Elisa Bertino, Lorenzo Martino, Federica Paci, Anna Squicciarini
R2,098 Discovery Miles 20 980 Ships in 18 - 22 working days

Web services technologies are advancing fast and being extensively deployed in many di?erent application environments. Web services based on the eXt- sible Markup Language (XML), the Simple Object Access Protocol (SOAP), andrelatedstandards, anddeployedinService-OrientedArchitectures(SOAs) are the key to Web-based interoperability for applications within and across organizations. Furthermore, they are making it possible to deploy appli- tions that can be directly used by people, and thus making the Web a rich and powerful social interaction medium. The term Web 2.0 has been coined to embrace all those new collaborative applications and to indicate a new, "social" approach to generating and distributing Web content, characterized by open communication, decentralization of authority, and freedom to share and reuse. For Web services technologies to hold their promise, it is crucial that - curity of services and their interactions with users be assured. Con?dentiality, integrity, availability, anddigitalidentitymanagementareallrequired.People need to be assured that their interactions with services over the Web are kept con?dential and the privacy of their personal information is preserved. People need to be sure that information they use for looking up and selecting s- vicesiscorrectanditsintegrityisassured.Peoplewantservicestobeavailable when needed. They also require interactions to be convenient and person- ized, in addition to being private. Addressing these requirements, especially when dealing with open distributed applications, is a formidable challenge.

Managing Business and Service Networks (Hardcover, 2001 ed.): Lundy Lewis Managing Business and Service Networks (Hardcover, 2001 ed.)
Lundy Lewis
R4,250 Discovery Miles 42 500 Ships in 18 - 22 working days

Most everything in our experience requires management in some form or other: our gardens, our automobiles, our minds, our bodies, our love lives, our businesses, our forests, our countries, etc. Sometimes we don't call it "management" per se. We seldom talk about managing our minds or automobiles. But if we think of management in terms of monitoring, maintaining, and cultivating with respect to some goal, then it makes sense. We certainly monitor an automobile, albeit unconsciously, to make sure that it doesn't exhibit signs of trouble. And we certainly try to cultivate our minds. This book is about managing networks. That itself is not a new concept. We've been managing the networks that support our telephones for about 100 years, and we've been managing the networks that support our computers for about 20 years. What is new (and what motivated me to write this book) is the following: (i) the enormous advancements in networking technology as we transition th st from the 20 century to the 21 century, (ii) the increasing dependence of human activities on networking technology, and (iii) the commercialization of services that depend on networking technology (e.g., email and electronic commerce).

Performance Evaluation and Planning Methods for the Next Generation Internet (Hardcover, 2005 ed.): Andre Girard, Brunilde... Performance Evaluation and Planning Methods for the Next Generation Internet (Hardcover, 2005 ed.)
Andre Girard, Brunilde Sanso, Felida Vazquez-Abad
R2,857 Discovery Miles 28 570 Ships in 18 - 22 working days

With the ever increasing growth of services and the corresponding demand for Quality of Service requirements that are placed on IP-based networks, the essential aspects of network planning will be critical in the coming years. A wide number of problems must be faced in order for the next generation of IP networks to meet their expected performance. With Performance Evaluation and Planning Methods for the Next Generation Internet, the editors have prepared a volume that outlines and illustrates these developing trends.

A number of the problems examined and analyzed in the book are:

-The design of IP networks and guaranteed performance

-Performances of virtual private networks

-Network design and reliability

-The issues of pricing, routing and the management of QoS

-Design problems arising from wireless networks

-Controlling network congestion

-New applications spawned from Internet use

-Several new models are introduced that will lead to better Internet performance

These are a few of the problem areas addressed in the book and only a selective example of some of the coming key areas in networks requiring performance evaluation and network planning.

Managing Cybersecurity Risk - Book 3 (Paperback): Jonathan Reuvid Managing Cybersecurity Risk - Book 3 (Paperback)
Jonathan Reuvid
R1,118 R923 Discovery Miles 9 230 Save R195 (17%) Ships in 10 - 15 working days
Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso... Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R9,436 Discovery Miles 94 360 Ships in 18 - 22 working days
Guide to e-Science - Next Generation Scientific Research and Discovery (Hardcover, Edition.): Xiaoyu Yang, Lizhe Wang, Wei Jie Guide to e-Science - Next Generation Scientific Research and Discovery (Hardcover, Edition.)
Xiaoyu Yang, Lizhe Wang, Wei Jie
R4,112 Discovery Miles 41 120 Ships in 18 - 22 working days

This guidebook on e-science presents real-world examples of practices and applications, demonstrating how a range of computational technologies and tools can be employed to build essential infrastructures supporting next-generation scientific research. Each chapter provides introductory material on core concepts and principles, as well as descriptions and discussions of relevant e-science methodologies, architectures, tools, systems, services and frameworks. Features: includes contributions from an international selection of preeminent e-science experts and practitioners; discusses use of mainstream grid computing and peer-to-peer grid technology for "open" research and resource sharing in scientific research; presents varied methods for data management in data-intensive research; investigates issues of e-infrastructure interoperability, security, trust and privacy for collaborative research; examines workflow technology for the automation of scientific processes; describes applications of e-science.

Pricing Communication Networks - Economics, Technology & Modelling (Hardcover): C. Courcoubetis Pricing Communication Networks - Economics, Technology & Modelling (Hardcover)
C. Courcoubetis
R5,097 R4,231 Discovery Miles 42 310 Save R866 (17%) Ships in 10 - 15 working days

Recent advances in technology, combined with the deregulation of the telecommunication market and the proliferation of the Internet, have created a highly competitive environment for communication service providers. There is no simple recipe for pricing network service contracts in all contexts. Pricing is a complex subject, which depends on parameters of the actual market - including the degree of competition and customer demand - and parameters of technology, such as resource consumption, network architecture, resource availability, and cost.

Pricing Communication Networks: Economics, Technology and Modelling covers many important issues in providing new services, the relation between pricing and resource allocation in networks, and the emergence of the Internet and its pricing. It provides a framework of mathematical models for pricing multidimensional contracts with quality of service guarantees, and includes a useful background on network services and contracts, network technology, basic economics, and pricing strategy.

  • Provides a broad overview of network services and contracts.

  • Includes a primer on modern network technology and the economic concepts relevant to pricing and competition.

  • Discusses mathematical models for multiplexing bursty traffic flows, and applies these to measuring network capability and deriving pricing strategies for services with statistical quality guarantees.

  • Discusses definitions of cost for communication networks and explains the intricacies of cost-based pricing.

  • Explains congestion pricing and its potential applications in the Internet.

  • Illustrated throughout by detailed examples and figures.

  • Includes coverage of specialist topics, such as regulation, multicasting, interconnection, and auctions.
Pricing Communication Networks: Economics, Technology and Modelling is an essential reference for graduate students, researchers and practitioners from electrical engineering, computer science, economics and operations research. It can be used by economists to fill in the gaps in their knowledge of network services and technology and by engineers and operational researchers to gain the background in the economics that is required to understand how to price communication networks effectively.
Agent-Based Service-Oriented Computing (Hardcover, 2010 Ed.): Nathan Griffiths, Kuo-Ming Chao Agent-Based Service-Oriented Computing (Hardcover, 2010 Ed.)
Nathan Griffiths, Kuo-Ming Chao
R2,804 Discovery Miles 28 040 Ships in 18 - 22 working days

Service-Oriented Computing (SOC) allows software development time to be shortened by the composition of existing services across the Internet. Further exploitation of this revolutionary trend is feasible through automation, thanks to the use of software agents and techniques from distributed artificial intelligence.

This book provides an overview of the related technologies and insight into state-of-the art research results in the field. The topics discussed cover the various stages in the life cycle of service-oriented software development using agent technologies to automate the development process and to manage services in a dynamic environment. The book presents both academic research results and the latest developments from industry.

Researchers from academia and industry, as well as postgraduates, will find this cutting-edge volume indispensable in order to gain understanding of the issues associated with agent-based service-oriented computing along with recent, and likely future technology trends.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Health Informatics and Patient Safety in…
Narasimha Rao Vajjhala, Philip Eappen Hardcover R8,510 Discovery Miles 85 100
Engineering Drawing with CAD…
O. Ostrowsky Hardcover R4,352 Discovery Miles 43 520
A Textbook of Engineering Graphics
D A Hindoliya Hardcover R3,037 R2,553 Discovery Miles 25 530
Tourette Syndrome
Davide Martino, James F. Leckman Hardcover R6,536 Discovery Miles 65 360
Nanotechnology in Medicine - Toxicity…
M. Rai Hardcover R3,687 Discovery Miles 36 870
Design and Development of Affordable…
Arindam Bit Hardcover R6,105 Discovery Miles 61 050
Using Multimedia Systems, Tools, and…
Amit Kumar Tyagi Hardcover R9,375 Discovery Miles 93 750
Engineering Mechanics: Statics plus…
Russell Hibbeler Digital product license key R2,446 Discovery Miles 24 460
Contemporary Internal Medicine…
Juan M. Bowen, Ernest L. Mazzaferri Hardcover R5,985 Discovery Miles 59 850
Autodesk Inventor 2022 Black Book…
Gaurav Verma, Matt Weber Hardcover R2,122 Discovery Miles 21 220

 

Partners