0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (288)
  • R250 - R500 (832)
  • R500+ (14,092)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Performance Modeling and Engineering (Hardcover, 2008 ed.): Zhen Liu, Cathy H. Xia Performance Modeling and Engineering (Hardcover, 2008 ed.)
Zhen Liu, Cathy H. Xia
R2,887 Discovery Miles 28 870 Ships in 10 - 15 working days

With the fast development of networking and software technologies, information processing infrastructure and applications have been growing at an impressive rate in both size and complexity, to such a degree that the design and development of high performance and scalable data processing systems and networks have become an ever-challenging issue. As a result, the use of performance modeling and m- surementtechniquesas a critical step in designand developmenthas becomea c- mon practice. Research and developmenton methodologyand tools of performance modeling and performance engineering have gained further importance in order to improve the performance and scalability of these systems. Since the seminal work of A. K. Erlang almost a century ago on the mod- ing of telephone traf c, performance modeling and measurement have grown into a discipline and have been evolving both in their methodologies and in the areas in which they are applied. It is noteworthy that various mathematical techniques were brought into this eld, including in particular probability theory, stochastic processes, statistics, complex analysis, stochastic calculus, stochastic comparison, optimization, control theory, machine learning and information theory. The app- cation areas extended from telephone networks to Internet and Web applications, from computer systems to computer software, from manufacturing systems to s- ply chain, from call centers to workforce management.

Distributed Embedded Systems: Design, Middleware and Resources - IFIP 20th World Computer Congress, TC10 Working Conference on... Distributed Embedded Systems: Design, Middleware and Resources - IFIP 20th World Computer Congress, TC10 Working Conference on Distributed and Parallel Embedded Systems (DIPES 2008), September 7-10, 2008, Milano, Italy (Hardcover, 2008 ed.)
Bernd Kleinjohann, Lisa Kleinjohann, Marilyn Wolf
R3,010 Discovery Miles 30 100 Ships in 10 - 15 working days

This year, the IFIP Working Conference on Distributed and Parallel Embedded Sys tems (DIPES 2008) is held as part of the IFIP World Computer Congress, held in Milan on September 7 10, 2008. The embedded systems world has a great deal of experience with parallel and distributed computing. Many embedded computing systems require the high performance that can be delivered by parallel computing. Parallel and distributed computing are often the only ways to deliver adequate real time performance at low power levels. This year's conference attracted 30 submissions, of which 21 were accepted. Prof. Jor ] g Henkel of the University of Karlsruhe graciously contributed a keynote address on embedded computing and reliability. We would like to thank all of the program committee members for their diligence. Wayne Wolf, Bernd Kleinjohann, and Lisa Kleinjohann Acknowledgements We would like to thank all people involved in the organization of the IFIP World Computer Congress 2008, especially the IPC Co Chairs Judith Bishop and Ivo De Lotto, the Organization Chair Giulio Occhini, as well as the Publications Chair John Impagliazzo. Further thanks go to the authors for their valuable contributions to DIPES 2008. Last but not least we would like to acknowledge the considerable amount of work and enthusiasm spent by our colleague Claudius Stern in preparing theproceedingsofDIPES2008. Hemadeitpossibletoproducethemintheircurrent professional and homogeneous style."

Networks in Action - Communication, Economics and Human Knowledge (Hardcover, illustrated edition): David F. Batten, Etc, J.... Networks in Action - Communication, Economics and Human Knowledge (Hardcover, illustrated edition)
David F. Batten, Etc, J. Casti, R. Thord
R2,600 Discovery Miles 26 000 Ships in 12 - 19 working days

This book presents the latest information on both the theory and applications of networks, especially from the fields of transportation and communication, economics and human knowledge handling. It demonstrates that networks are of broad interest and that networks analysis from different disciplines offer unifying insight. Special attention is paid to networks in the ever increasing integration of Europe. Another point of focus is upon combinatorial aspects and the interactive effects between different networks, often known as synergetics.

Performance Analysis of Multi-Channel and Multi-Traffic on Wireless Communication Networks (Hardcover, 2002 ed.): Wuyi Yue,... Performance Analysis of Multi-Channel and Multi-Traffic on Wireless Communication Networks (Hardcover, 2002 ed.)
Wuyi Yue, Yutaka Matsumoto
R4,552 Discovery Miles 45 520 Ships in 10 - 15 working days

With rapid increase of mobile users of laptop computers and cellular phones, support of Internet services like e-mail and World Wide Web (WWW) access in a mobile environment is an indispensable requirement. The wireless networks must have the ability to provide real-time bursty traffic (such as voice or video) and data traffic in a multimedia environment with high quality of service. To satisfy the huge demand for wireless multimedia service, efficient channel access methods must be devised. For design and tuning of the channel access methods, the system performance must be mathematically analysed. To do so, very accurate models, that faithfully reproduce the stochastic behaviour of multimedia wireless communication and computer networks, must be constructed.
There exist several books on the performance analysis and evaluation for data communication networks or computer networks. This book attempts to present exact and approximate analytical solution methods and techniques using queueing theory in the complex multimedia traffic systems with procedures of random multiple access schemes. In particular, this book presents how to approximate the system performance of discrete-time multimedia networks, the probability distribution of the interarrival time of internetwork packets at the adjacent network and the higher moments of the transmission departure distribution and delay in wireless multimedia communication environment. In general the modeling of discrete-time multimedia communication systems are more complex than that of continuous-time systems because multiple state changes can occur from one time-unit to the next. This complicates the analysis of the model. This book alsodiscusses numerical results that illustrate the applications of the theory and various properties.
Performance Analysis of Multichannel and Multi-Traffic on Wireless Communication Networks should prove useful to a post-graduate course in computer science or electrical engineering. It can be a pre requisite to some other more advanced courses like network design and management or queueing theory with applications to multimedia communication and computer networks. It can also be used for a course on stochastic models in applied mathematics and operations research departments.

Secure Group Communications Over Data Networks (Hardcover, 2005 ed.): Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras Secure Group Communications Over Data Networks (Hardcover, 2005 ed.)
Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras
R2,876 Discovery Miles 28 760 Ships in 10 - 15 working days

The ubiquitous nature of the Internet is enabling a new generation of - pUcations to support collaborative work among geographically distant users. Security in such an environment is of utmost importance to safeguard the pri vacy of the communication and to ensure the integrity of the applications. 'Secure group communications' (SGC) refers to a scenario in which a group of participants can receive and send messages to group members, in a way that outsiders are unable to glean any information even when they are able to intercept the messages. SGC is becoming extremely important for researchers and practitioners because many applications that require SGC are now widely used, such as teleconferencing, tele-medicine, real-time information services, distributed interactive simulations, collaborative work, grid computing, and the deployment of VPN (Virtual Private Networks). Even though considerable research accomplishments have been achieved in SGC, few books exist on this very important topic. The purpose of this book is to provide a comprehensive survey of principles and state-of-the-art techniques for secure group communications over data net works. The book is targeted towards practitioners, researchers and students in the fields of networking, security, and software applications development. The book consists of 7 chapters, which are listed and described as follows."

Formal Description Techniques IX - Theory, application and tools (Hardcover, 1996 ed.): R. Gotzhein, J. Bredereke Formal Description Techniques IX - Theory, application and tools (Hardcover, 1996 ed.)
R. Gotzhein, J. Bredereke
R8,593 Discovery Miles 85 930 Ships in 10 - 15 working days

This book is the combined proceedings of the latest IFIP Formal Description Techniques (FDTs) and Protocol Specification, Testing and Verification (PSTV) series. It addresses FDTs applicable to communication protocols and distributed systems, with special emphasis on standardised FDTs. It features state-of-the-art in theory, application, tools and industrialisation of formal description.

Cyber Warfare - Building the Scientific Foundation (Hardcover, 2015 ed.): Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian,... Cyber Warfare - Building the Scientific Foundation (Hardcover, 2015 ed.)
Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang
R4,341 Discovery Miles 43 410 Ships in 12 - 19 working days

This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially government employees or contractors. Advanced-level students in computer science and electrical engineering with an interest in security will also find this content valuable as a secondary textbook or reference.

Intelligent Information Processing IX - 10th IFIP TC 12 International Conference, IIP 2018, Nanning, China, October 19-22,... Intelligent Information Processing IX - 10th IFIP TC 12 International Conference, IIP 2018, Nanning, China, October 19-22, 2018, Proceedings (Hardcover, 1st ed. 2018)
Zhongzhi Shi, Eunika Mercier-Laurent, Jiuyong Li
R1,602 Discovery Miles 16 020 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th IFIP TC 12 International Conference on Intelligent Information Processing, IIP 2018, held in Nanning, China, in October 2018. The 37 full papers and 8 short papers presented were carefully reviewed and selected from 80 submissions. They are organized in topical sections on machine learning, deep learning, multi-agent systems, neural computing and swarm intelligence, natural language processing, recommendation systems, social computing, business intelligence and security, pattern recognition, and image understanding.

Communication Protocol Specification and Verification (Hardcover, 1998 ed.): Richard Lai, Ajin Jirachiefpattana Communication Protocol Specification and Verification (Hardcover, 1998 ed.)
Richard Lai, Ajin Jirachiefpattana
R5,767 Discovery Miles 57 670 Ships in 10 - 15 working days

Communication protocols are rules whereby meaningful communication can be exchanged between different communicating entities. In general, they are complex and difficult to design and implement. Specifications of communication protocols written in a natural language (e.g. English) can be unclear or ambiguous, and may be subject to different interpretations. As a result, independent implementations of the same protocol may be incompatible. In addition, the complexity of protocols make them very hard to analyze in an informal way. There is, therefore, a need for precise and unambiguous specification using some formal languages. Many protocol implementations used in the field have almost suffered from failures, such as deadlocks. When the conditions in which the protocols work correctly have been changed, there has been no general method available for determining how they will work under the new conditions. It is necessary for protocol designers to have techniques and tools to detect errors in the early phase of design, because the later in the process that a fault is discovered, the greater the cost of rectifying it. Protocol verification is a process of checking whether the interactions of protocol entities, according to the protocol specification, do indeed satisfy certain properties or conditions which may be either general (e.g., absence of deadlock) or specific to the particular protocol system directly derived from the specification. In the 80s, an ISO (International Organization for Standardization) working group began a programme of work to develop formal languages which were suitable for Open Systems Interconnection (OSI). This group called such languages Formal Description Techniques (FDTs). Some of the objectives of ISO in developing FDTs were: enabling unambiguous, clear and precise descriptions of OSI protocol standards to be written, and allowing such specifications to be verified for correctness. There are two FDTs standardized by ISO: LOTOS and Estelle. Communication Protocol Specification and Verification is written to address the two issues discussed above: the needs to specify a protocol using an FDT and to verify its correctness in order to uncover specification errors in the early stage of a protocol development process. The readership primarily consists of advanced undergraduate students, postgraduate students, communication software developers, telecommunication engineers, EDP managers, researchers and software engineers. It is intended as an advanced undergraduate or postgraduate textbook, and a reference for communication protocol professionals.

Adaptive User Interfaces, Volume 10 - Principles and Practice (Hardcover): M.Schneider Hufschmidt, T. Kuhme, U. Malinowski Adaptive User Interfaces, Volume 10 - Principles and Practice (Hardcover)
M.Schneider Hufschmidt, T. Kuhme, U. Malinowski
R4,776 Discovery Miles 47 760 Ships in 12 - 19 working days

The area of intelligent and adaptive user interfaces has been of interest to the research community for a long time. Much effort has been spent in trying to find a stable theoretical base for adaptivity in human-computer interaction and to build prototypical systems showing features of adaptivity in real-life interfaces. To date research in this field has not led to a coherent view of problems, let alone solutions. A workshop was organized, which brought together a number of well-known researchers in the area of adaptive user interfaces with a view to


develop a coherent view of the results accomplished in the field


organize basic ideas which might lead to a more general methodology for adaptivity in order to overcome the problem of specialized, non-generalizable solutions, and


discuss possible areas for future research in the field and to define criteria for the selection of the most promising directions of such research.


The results of the workshop are presented in this volume. The authors have collected papers from the participants which describe both their research and their views on questions which were dealt with during the workshop. A state-of-the-art report and taxonomy for the field of adaptive interfaces and a discussion summary are also included in this volume.


Data Security in Cloud Computing (Hardcover): Vimal Kumar, Ryan Ko, Sivadon Chaisiri Data Security in Cloud Computing (Hardcover)
Vimal Kumar, Ryan Ko, Sivadon Chaisiri
R3,951 R3,553 Discovery Miles 35 530 Save R398 (10%) Ships in 10 - 15 working days

Cloud Computing has already been embraced by many organizations and individuals due to its benefits of economy, reliability, scalability and guaranteed quality of service among others. But since the data is not stored, analysed or computed on site, this can open security, privacy, trust and compliance issues. This one-stop reference covers a wide range of issues on data security in Cloud Computing ranging from accountability, to data provenance, identity and risk management. Data Security in Cloud Computing covers major aspects of securing data in Cloud Computing. Topics covered include NOMAD: a framework for ensuring data confidentiality in mission-critical cloud based applications; 3DCrypt: privacy-preserving pre-classification volume ray-casting of 3D images in the cloud; multiprocessor system-on-chip for processing data in Cloud Computing; distributing encoded data for private processing in the cloud; data protection and mobility management for cloud; understanding software defined perimeter; security, trust and privacy for Cloud Computing in transportation cyber-physical systems; review of data leakage attack techniques in cloud systems; Cloud Computing and personal data processing: sorting out legal requirements; the Waikato data privacy matrix; provenance reconstruction in clouds; and security visualization for Cloud Computing.

Digital Economy and Social Design (Hardcover, 2005 ed.): Osamu Sudoh Digital Economy and Social Design (Hardcover, 2005 ed.)
Osamu Sudoh
R3,014 Discovery Miles 30 140 Ships in 10 - 15 working days

The advent of the digital economy has the potential to dramatically change the conventional interrelationships among individuals, enterprises and society. There can be little doubt that to achieve vigorous socioeconomic developments in the 21st century, people will have to aggressively use information technology to boost innovation and to organically link the results of that innovation to solutions to global environmental issues and social challenges such as the opportunity divide. We are responsible for taking advantage of the opportunities opened up by the digital economy and for turning those opportunities into things that reflect our values and goals. The book examines the overall impact of the digital economy and the development of a practical institutional design.

Critical Information Infrastructures - Resilience and Protection (Hardcover, 2007 ed.): Maitland Hyslop Critical Information Infrastructures - Resilience and Protection (Hardcover, 2007 ed.)
Maitland Hyslop
R4,072 R3,215 Discovery Miles 32 150 Save R857 (21%) Ships in 12 - 19 working days

The world moves on Critical Information Infrastructures, and their resilience and protection is of vital importance. Starting with some basic definitions and assumptions on the topic, this book goes on to explore various aspects of Critical Infrastructures throughout the world including the technological, political, economic, strategic and defensive. This book will be of interest to the CEO and Academic alike as they grapple with how to prepare Critical Information Infrastructures for new challenges.

Scaling Networks v6 Labs & Study Guide (Paperback): Cisco Networking Academy, Allan Johnson Scaling Networks v6 Labs & Study Guide (Paperback)
Cisco Networking Academy, Allan Johnson
R1,559 Discovery Miles 15 590 Ships in 12 - 19 working days

Lab Manuals provide students enrolled in a Cisco Networking Academy course of the same name with a convenient, complete collection of all the course lab exercises that provide hands-on practice and challenges. The only authorized Labs & Study Guide for the Cisco Networking Academy Routing and Switching Essentials course in the CCNA Routing and Switching curriculum Each chapter of this book is divided into a Study Guide section followed by a Lab section. The Study Guide section offers exercises that help you learn the concepts, configurations, and troubleshooting skills crucial to your success as a CCENT exam candidate. Each chapter is slightly different and includes some or all the following types of exercises: Vocabulary Matching Exercises Concept Questions Exercises Skill-Building Activities and Scenarios Configuration Scenarios Packet Tracer Exercises Troubleshooting Scenarios The Labs & Activities include all the online course Labs and Packet Tracer activity instructions. If applicable, this section begins with a Command Reference that you will complete to highlight all the commands introduced in the chapter.

Computer Security: Principles and Practice, Global Edition (Paperback, 4th edition): William Stallings, Lawrie Brown Computer Security: Principles and Practice, Global Edition (Paperback, 4th edition)
William Stallings, Lawrie Brown
R2,286 Discovery Miles 22 860 Ships in 12 - 19 working days

For courses in computer/network security Computer Security: Principles and Practice, 4th Edition, is ideal for courses in Computer/Network Security. The need for education in computer security and related topics continues to grow at a dramatic rate-and is essential for anyone studying Computer Science or Computer Engineering. Written for both an academic and professional audience, the 4th Edition continues to set the standard for computer security with a balanced presentation of principles and practice. The new edition captures the most up-to-date innovations and improvements while maintaining broad and comprehensive coverage of the entire field. The extensive offering of projects provides students with hands-on experience to reinforce concepts from the text. The range of supplemental online resources for instructors provides additional teaching support for this fast-moving subject. The new edition covers all security topics considered Core in the ACM/IEEE Computer Science Curricula 2013, as well as subject areas for CISSP (Certified Information Systems Security Professional) certification. This textbook can be used to prep for CISSP Certification and is often referred to as the 'gold standard' when it comes to information security certification. The text provides in-depth coverage of Computer Security, Technology and Principles, Software Security, Management Issues, Cryptographic Algorithms, Internet Security and more.

Web-Based Multimedia Advancements in Data Communications and Networking Technologies (Hardcover, New): Varadharajan Sridhar,... Web-Based Multimedia Advancements in Data Communications and Networking Technologies (Hardcover, New)
Varadharajan Sridhar, Debashis Saha
R5,229 Discovery Miles 52 290 Ships in 10 - 15 working days

New data communication technologies, and the resulting policies and management, can have a profound effect on the success of business organizations. By quantifying the impact of these new innovations, researchers can help these businesses thrive in the networking and business data communications fields. Web-Based Multimedia Advancements in Data Communications and Networking Technologies highlights comprehensive research which will enable readers to understand, manage, use, and maintain business data communication networks more effectively. It also addresses key technology, management, and policy issues for utilizing data communications and networking in business and the current best practices for aligning this important technology with the strategic goals of the organization.

Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance (Hardcover): Maria Manuela Cruz Cunha,... Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance (Hardcover)
Maria Manuela Cruz Cunha, Irene Maria Portela
R10,431 Discovery Miles 104 310 Ships in 10 - 15 working days

In our hyper-connected digital world, cybercrime prevails as a major threat to online security and safety. New developments in digital forensics tools and an understanding of current criminal activities can greatly assist in minimizing attacks on individuals, organizations, and society as a whole. The Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance combines the most recent developments in data protection and information communication technology (ICT) law with research surrounding current criminal behaviors in the digital sphere. Bridging research and practical application, this comprehensive reference source is ideally designed for use by investigators, computer forensics practitioners, and experts in ICT law, as well as academicians in the fields of information security and criminal science.

High Performance Networking - IFIP sixth international conference on high performance networking, 1995 (Hardcover, 1995 ed.):... High Performance Networking - IFIP sixth international conference on high performance networking, 1995 (Hardcover, 1995 ed.)
Ramon Puigjaner
R5,805 Discovery Miles 58 050 Ships in 10 - 15 working days

The communication of information is a crucial point in the development of our future way of life. We are living more and more in an information society. Perhaps the more obvious applications are those devoted to distributed cooperative multimedia systems. In both industry and academia, people are involved in such projects. HPN'95 is an international forum where both communities can find a place for dialogues and interchanges. The conference is targeted to the new mechanisms, protocols, services and architectures derived from the need of emerging applications, as well as from the requirements of new communication environments. This workshop belongs to the series started in 1987 in Aachen (Germany), followed by Liege (Belgium) in 1988, Berlin (Germany) in 1991, Liege (Belgium) again in 1992 and Grenoble (France) in 1994. HPN'95 is the sixth event of the series sponsored by IFIP WG 6.4 and will be held at the Arxiduc Lluis Salvador building on the campus of the University of the Balearic Islands in Palma de Mallorca (Spain) from September 13 to 15.

The Web Application Hacker's Handbook: Finding and  Exploiting Security Flaws 2e (Paperback, 2nd Edition): D Stuttard The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws 2e (Paperback, 2nd Edition)
D Stuttard
R1,354 R1,111 Discovery Miles 11 110 Save R243 (18%) Ships in 12 - 19 working days

The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side. * Reveals how to overcome the new technologies and techniques aimed at defending web applications against attacks that have appeared since the previous edition * Discusses new remoting frameworks, HTML5, cross-domain integration techniques, UI redress, framebusting, HTTP parameter pollution, hybrid file attacks, and more * Features a companion web site hosted by the authors that allows readers to try out the attacks described, gives answers to the questions that are posed at the end of each chapter, and provides a summarized methodology and checklist of tasks Focusing on the areas of web application security where things have changed in recent years, this book is the most current resource on the critical topic of discovering, exploiting, and preventing web application security flaws. Also available as a set with, CEHv8: Certified Hacker Version 8 Study Guide, Ethical Hacking and Web Hacking Set, 9781119072171.

CMOS Data Converters for Communications (Hardcover, 2000 ed.): Mikael Gustavsson, J. Jacob Wikner, Nianxiong Tan CMOS Data Converters for Communications (Hardcover, 2000 ed.)
Mikael Gustavsson, J. Jacob Wikner, Nianxiong Tan
R5,811 Discovery Miles 58 110 Ships in 10 - 15 working days

CMOS Data Converters for Communications distinguishes itself from other data converter books by emphasizing system-related aspects of the design and frequency-domain measures. It explains in detail how to derive data converter requirements for a given communication system (baseband, passband, and multi-carrier systems). The authors also review CMOS data converter architectures and discuss their suitability for communications. The rest of the book is dedicated to high-performance CMOS data converter architecture and circuit design. Pipelined ADCs, parallel ADCs with an improved passive sampling technique, and oversampling ADCs are the focus for ADC architectures, while current-steering DAC modeling and implementation are the focus for DAC architectures. The principles of the switched-current and the switched-capacitor techniques are reviewed and their applications to crucial functional blocks such as multiplying DACs and integrators are detailed. The book outlines the design of the basic building blocks such as operational amplifiers, comparators, and reference generators with emphasis on the practical aspects. To operate analog circuits at a reduced supply voltage, special circuit techniques are needed. Low-voltage techniques are also discussed in this book. CMOS Data Converters for Communications can be used as a reference book by analog circuit designers to understand the data converter requirements for communication applications. It can also be used by telecommunication system designers to understand the difficulties of certain performance requirements on data converters. It is also an excellent resource to prepare analog students for the new challenges ahead.

Cognitive Networked Sensing and Big Data (Hardcover, 2014 ed.): Robert Qiu, Michael Wicks Cognitive Networked Sensing and Big Data (Hardcover, 2014 ed.)
Robert Qiu, Michael Wicks
R4,471 Discovery Miles 44 710 Ships in 10 - 15 working days

Wireless Distributed Computing and Cognitive Sensing defines high-dimensional data processing in the context of wireless distributed computing and cognitive sensing. This book presents the challenges that are unique to this area such as synchronization caused by the high mobility of the nodes. The author will discuss the integration of software defined radio implementation and testbed development. The book will also bridge new research results and contextual reviews. Also the author provides an examination of large cognitive radio network; hardware testbed; distributed sensing; and distributed computing.

Multimedia Analysis, Processing and Communications (Hardcover, Edition.): Lin Weisi, Dacheng Tao, Janusz Kacprzyk, Zhu Li,... Multimedia Analysis, Processing and Communications (Hardcover, Edition.)
Lin Weisi, Dacheng Tao, Janusz Kacprzyk, Zhu Li, Ebroul Izquierdo, …
R9,681 Discovery Miles 96 810 Ships in 10 - 15 working days

This book has brought 24 groups of experts and active researchers around the world together in image processing and analysis, video processing and analysis, and communications related processing, to present their newest research results, exchange latest experiences and insights, and explore future directions in these important and rapidly evolving areas. It aims at increasing the synergy between academic and industry professionals working in the related field. It focuses on the state-of-the-art research in various essential areas related to emerging technologies, standards and applications on analysis, processing, computing, and communication of multimedia information. The target audience of this book is researchers and engineers as well as graduate students working in various disciplines linked to multimedia analysis, processing and communications, e.g., computer vision, pattern recognition, information technology, image processing, and artificial intelligence. The book is also meant to a broader audience including practicing professionals working in image/video applications such as image processing, video surveillance, multimedia indexing and retrieval, and so on. We hope that the researchers, engineers, students and other professionals who read this book would find it informative, useful and inspirational toward their own work in one way or another.

Testing of Communicating Systems - Methods and Applications (Hardcover, 1999 ed.): Gyula Csopaki, Margit Dibuz, Katalin Tarnay Testing of Communicating Systems - Methods and Applications (Hardcover, 1999 ed.)
Gyula Csopaki, Margit Dibuz, Katalin Tarnay
R4,587 Discovery Miles 45 870 Ships in 10 - 15 working days

Testing of Communicating Systems presents the latest worldwide results in both the theory and practice of the testing of communicating systems. This volume provides a forum that brings together the substantial volume of research on the testing of communicating systems, ranging from conference testing through interoperability testing to performance and QoS testing. The following topics are discussed in detail: Types of testing; Phases of the testing process; Classes of systems to be tested; and Theory and practice of testing.GBP/LISTGBP This book contains the selected proceedings of the 12th International Workshop on the Testing of Communicating Systems (formerly the International Workshop on Protocol Test Systems), sponsored by the International Federation for Information Processing (IFIP), and held in Budapest, Hungary, in September 1999. The book contains not only interesting research on testing different communication technologies from telecom and datacom systems to distributed systems, but also presents reports on the application of these results in industry. Testing of Communicating Systems will be essential reading for engineers, IT managers and research personnel working in computer science and telecommunications.

Smart Micro-Grid Systems Security and Privacy (Hardcover, 1st ed. 2018): Anne V. D. M. Kayem, Stephen D. Wolthusen, Christoph... Smart Micro-Grid Systems Security and Privacy (Hardcover, 1st ed. 2018)
Anne V. D. M. Kayem, Stephen D. Wolthusen, Christoph Meinel
R2,860 Discovery Miles 28 600 Ships in 12 - 19 working days

This book is centered on Smart grids and micro-grids, as a cost-effective method of ensuring fair and equitable access to power in urban areas. It also considers scenarios where deploying smart grids can be both cost-prohibitively expensive and logistically challenging. Deploying smart microgrids instead, offers a reliable power solution but, as is the case in smart grids, a key issue is guaranteeing usability, trust, and reliability while protecting against energy theft. This book considers aspects such as state estimation, capacity planning, demand forecasting, price signals, and demand management with respect to energy theft. Straight-forward approaches to provoking energy theft on smart grids and micro-grids include mis-recordings power consumption/generation information and exposures of personally identifiable information or sensitive information. Attack models based on mis-recorded generation and/or consumption data and exposure of personally identifiable information, are also studied. In each case, countermeasures are proposed to circumvent the power theft attacks raised. Researchers in Smart Micro-grids security, cyber-physical systems, and critical infrastructure will want to purchase this book as a reference. Professionals, Researchers, Academics and students working in security general and Security of Critical Infrastructure, Privacy, and Data Sharing will also want to purchase this book as a reference.

Algebraic Aspects of the Advanced Encryption Standard (Hardcover, 2006 ed.): Carlos Cid, Sean Murphy, Matthew Robshaw Algebraic Aspects of the Advanced Encryption Standard (Hardcover, 2006 ed.)
Carlos Cid, Sean Murphy, Matthew Robshaw
R3,209 Discovery Miles 32 090 Ships in 10 - 15 working days

It is now more than five years since the Belgian block cipher Rijndael was chosen as the Advanced Encryption Standard {AES). Joan Daemen and Vincent Rijmcn used algebraic techniques to provide an unparalleled level of assurance against many standard statistical cryptanalytic tech- niques. The cipher is a fitting tribute to their distinctive approach to cipher design. Since the publication of the AES, however, the very same algebraic structures have been the subject of increasing cryptanalytic attention and this monograph has been written to summarise current research. We hope that this work will be of interest to both cryptogra- phers and algebraists and will stimulate future research. During the writing of this monograph we have found reasons to thank many people. We are especially grateful to the British Engineering and Physical Sciences Research Council (EPSRC) for their funding of the research project Security Analysis of the Advanced Encryption System (Grant GR/S42637), and to Susan Lagerstrom-Fifc and Sharon Palleschi at Springer. Wo would also hke to thank Glaus Diem, Maura Paterson, and Ludovic Perret for their valuable comments. Finally, the support of our families at home and our colleagues at work has been invaluable and particularly appreciated.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,539 Discovery Miles 15 390
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,420 R1,316 Discovery Miles 13 160
System of Controls - I.T.'s Guide to…
William D Reed Hardcover R1,029 R890 Discovery Miles 8 900
Managing Business Projects - The…
Frank Einhorn Paperback R515 Discovery Miles 5 150
E-Learning and Digital Education in the…
M. Mahruf C. Shohel Hardcover R3,884 Discovery Miles 38 840
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,932 Discovery Miles 19 320
Guide to Networking Essentials
Greg Tomsho Paperback R1,452 R1,344 Discovery Miles 13 440
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,461 R1,230 Discovery Miles 12 300
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,420 R1,316 Discovery Miles 13 160
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R3,056 Discovery Miles 30 560

 

Partners