0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (276)
  • R250 - R500 (879)
  • R500+ (13,587)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Secure Broadcast Communication - In Wired and Wireless Networks (Hardcover, 2003 ed.): Adrian Perrig, J. D. Tygar Secure Broadcast Communication - In Wired and Wireless Networks (Hardcover, 2003 ed.)
Adrian Perrig, J. D. Tygar
R2,779 Discovery Miles 27 790 Ships in 18 - 22 working days

Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including:
*key distribution for access control,
*source authentication of transmissions, and
*non-repudiation of streams.

This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network.

This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study.

Dissemination of Information in Communication Networks - Broadcasting, Gossiping, Leader Election, and Fault-Tolerance... Dissemination of Information in Communication Networks - Broadcasting, Gossiping, Leader Election, and Fault-Tolerance (Hardcover, 2005 ed.)
Juraj Hromkovic, Ralf Klasing, A Pelc, Peter Ruzicka, Walter Unger
R1,608 Discovery Miles 16 080 Ships in 18 - 22 working days

Preface Due to the development of hardware technologies (such as VLSI) in the early 1980s, the interest in parallel and distributive computing has been rapidly growingandinthelate1980sthestudyofparallelalgorithmsandarchitectures became one of the main topics in computer science. To bring the topic to educatorsandstudents, severalbooksonparallelcomputingwerewritten. The involvedtextbook IntroductiontoParallelAlgorithmsandArchitectures by F. Thomson Leighton in 1992 was one of the milestones in the development of parallel architectures and parallel algorithms. But in the last decade or so the main interest in parallel and distributive computing moved from the design of parallel algorithms and expensive parallel computers to the new distributive reality the world of interconnected computers that cooperate (often asynchronously) in order to solve di?erent tasks. Communication became one of the most frequently used terms of computer science because of the following reasons: (i) Considering the high performance of current computers, the communi- tion is often moretime consuming than the computing time of processors. As a result, the capacity of communication channels is the bottleneck in the execution of many distributive algorithms. (ii) Many tasks in the Internet are pure communication tasks. We do not want to compute anything, we only want to execute some information - change or to extract some information as soon as possible and as cheaply as possible. Also, we do not have a central database involving all basic knowledge. Instead, wehavea distributed memorywherethe basickno- edgeisdistributedamongthelocalmemoriesofalargenumberofdi?erent computers. The growing importance of solving pure communication tasks in the - terconnected world is the main motivation for writing this book."

Cryptography and Network Security (Hardcover): Marcelo Sampaio De Alencar Cryptography and Network Security (Hardcover)
Marcelo Sampaio De Alencar
R3,456 Discovery Miles 34 560 Ships in 9 - 17 working days
Networking Infrastructure for Pervasive Computing - Enabling Technologies and Systems (Hardcover, 2003 ed.): Debashis Saha,... Networking Infrastructure for Pervasive Computing - Enabling Technologies and Systems (Hardcover, 2003 ed.)
Debashis Saha, Amitava Mukherjee, Somprakash Bandyopadhyay
R4,172 Discovery Miles 41 720 Ships in 18 - 22 working days

Networking Infrastructure for Pervasive Computing: Enabling Technologies & Systems is a comprehensive guide to tomorrow's world of ubiquitous computing where users can access and manipulate information from everywhere at all times.
The emphasis is on networking, systems and standards rather than detailed physical implementation. Addressed are many technical obstacles, such as, connectivity, levels of service, performance, and reliability and fairness. The authors also describe the existing enabling off-the-shelf technologies and its underlying infrastructure known as pervasive networking (PervNet). PervNet ties different sets of smart nodes together enabling them to communicate with each other to provide pervasive computing services to users. Throughout the book, important issues related to scalability, transparency, security, energy management, QoS provisioning, fault tolerance, and disconnected operations are discussed.
This work provides a research and development perspective to the field of PervNet and will serve as an essential reference for network designers, operators and developers.

Protocol Test Systems - 7th workshop 7th IFIP WG 6.1 international workshop on protocol text systems (Hardcover, 1995 ed.):... Protocol Test Systems - 7th workshop 7th IFIP WG 6.1 international workshop on protocol text systems (Hardcover, 1995 ed.)
Tadanori Mizuno, Teruo Higashino, Norio Shiratori
R4,201 Discovery Miles 42 010 Ships in 18 - 22 working days

This is the Proceedings of the 7th IFIP WG6.1 International Workshop on Protocol Test Systems (IWPTS'94) which was held in Tokyo, Japan on November 8-10, 1994. After having been organized in Vancouver (Canada, 1988), Berlin (Germany, 1989), McLean (USA, 1990), Leidschendam (The Netherlands, 1991), Montreal (Canada, 1992) and Pau (France, 1993), this is the 7th international workshop. The aim of the workshop is to be a meeting point between research and industry and between theory and practice of the testing of data communication systems. The workshop consists of the presentations of reviewed and invited papers, tool demonstrations and panel sessions. All submitted papers have been reviewed by the members of the Program Committee and the following additional reviewers including: L. Andrey, N. Arakawa, D. Becam, L. Boullier, R. Dssouli, B. Forghani, M. Higuchi, L. Heerink, G. Huecas, M. Hunter, S. lisaku, Y. Kakuda, K. Kazama, L-S. Koh , R. Langerak, D. Lee, G. Leon, G. Luo, P. Maigron, M. Mori, A. Nakamura, S. Nightingale, K. Okada, K. Okano, N. Okazaki, A. Petrenko, M. Phalippou, A. Rennoch, F. Sato, Y. Sugito, D. Tang, D. Toggweiler, F. Vallo and J. Zhu. The Program Committee has selected excellent papers among them. This proceedings includes two invited papers, fifteen regular papers, six short papers, two panel reports and one panel paper which were presented in the workshop.

Physical Security for IT (Paperback): Michael Erbschloe Physical Security for IT (Paperback)
Michael Erbschloe
R2,041 Discovery Miles 20 410 Ships in 10 - 15 working days

The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an office and sit down at a computer and gain access to systems and applications.
Even though the skill level required to hack systems and write viruses is becoming widespread, the skill required to wield an ax, hammer, or fire hose and do thousands of dollars in damage is even more common. Although many books cover computer security from one perspective or another, they do not thoroughly address physical security. This book shows organizations how to design and implement physical security plans. It provides practical, easy-to-understand and readily usable advice to help organizations to improve physical security for IT, network, and telecommunications assets.
* Expert advice on identifying physical security needs
* Guidance on how to design and implement security plans to prevent the physical destruction of, or tampering with computers, network equipment, and telecommunications systems
* Explanation of the processes for establishing a physical IT security function
* Step-by-step instructions on how to accomplish physical security objectives
* Illustrations of the major elements of a physical IT security plan
* Specific guidance on how to develop and document physical security methods and procedures

Wireless and Mobile Networking - IFIP Joint Conference on Mobile Wireless Communications Networks (MWCN'2008) and Personal... Wireless and Mobile Networking - IFIP Joint Conference on Mobile Wireless Communications Networks (MWCN'2008) and Personal Wireless Communications (PWC'2008), Toulouse, France, September 30 - October 2, 2008 (Hardcover, 2008 ed.)
Zoubir Mammeri
R4,279 Discovery Miles 42 790 Ships in 18 - 22 working days

Research and development in wireless and mobile networks and services areas have been going on for some time, reaching the stage of products. Graceful evo- tion of networks, new access schemes, flexible protocols, increased variety of services and applications, networks reliability and availability, security, are some of the present and future challenges that have to be met. MWCN (Mobile and Wireless Communications Networks) and PWC (Personal Wireless Communications) are two conferences sponsored by IFIP WG 6.8 that provide forum for discussion between researchers, practitioners and students interested in new developments in mobile and wireless networks, services, applications and computing. In 2008, MWCN and PWC were held in Toulouse, France, from September 30 to October 2, 2008. MWNC'2008 and PWC'2008 were coupled to form the first edition of IFIP Wireless and Mobile Networking Conference (WMNC'2008). MWCN and PWC topics were revisited in order to make them complementary and covering together the main hot issues in wireless and mobile networks, services, applications, computing, and technologies.

Impacts and Risk Assessment of Technology for Internet Security - Enabled Information Small-Medium Enterprises (TEISMES)... Impacts and Risk Assessment of Technology for Internet Security - Enabled Information Small-Medium Enterprises (TEISMES) (Hardcover, 2005 ed.)
Charles A. Shoniregun
R2,763 Discovery Miles 27 630 Ships in 18 - 22 working days

The explosive popularity of the Internet as a business tool has created a new type of economy, which is called Technology-Enabled Information Economy (TEI). Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES) investigates TEI, discovering the opportunities and challenges presented by TEI to the new form of small medium enterprises (SME). This emerging economy is bringing with it new forms of TEI intermediation, online businesses, virtual supply chains, rapidly changing internet-electronic commerce technologies, increasing knowledge intensity, and unprecedented sensitivity of the time-to-market by customers. Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES) also identifies ways of minimizing risk liability of TEISME business operations as a result of their dependence on TEI (Internet-eC). The rapid evolution and spread of information technology (IT) during the last few years is challenging SMEs, governments and internet security professionals to rethink the very nature of risk exposure. Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES) is designed for a professional audience of researchers and practitioners in industry. This book is also suitable for graduate-level students in computer science.

Photonic Slot Routing in Optical Transport Networks (Hardcover, 2003 ed.): Gosse Wedzinga Photonic Slot Routing in Optical Transport Networks (Hardcover, 2003 ed.)
Gosse Wedzinga
R2,768 Discovery Miles 27 680 Ships in 18 - 22 working days

All-optical networking is generally believed to be the only solution for coping with the ever-increasing demands in bandwidth, such as the World Wide Web application.
Optical backbone networks efficiently achieve a high level of traffic aggregation by multiplexing numerous users on circuit-switched wavelength paths - the so-called wavelength routing approach. In contrast, the reduced level of traffic aggregation in access and metro networks makes wavelength routing solutions not adequate. In these network areas, packet-interleaved optical time-division multiplexing with its finer and more dynamic bandwidth allocation is advocated.
The book presents such an approach, known as photonic slot routing. It illustrates how this approach may provide a cost-effective solution to deploying all-optical transport networks, using today's optical device technology. To that end, the author combines DWDM-technology with fixed slot optical switching, and gives a comprehensive description of this approach in which slots are aligned across the wavelengths to form groups of data-flows that propagate as a whole inside the network. Operating algorithms are developed, and network performance is analyzed, both by means of theoretical analysis and many simulations of sample networks.
This work will be of particular interest to researchers and professionals who are active in photonic networking.

The Temporal Logic of Reactive and Concurrent Systems - Specification (Hardcover, 1992 ed.): Zohar Manna, Amir Pnueli The Temporal Logic of Reactive and Concurrent Systems - Specification (Hardcover, 1992 ed.)
Zohar Manna, Amir Pnueli
R3,118 Discovery Miles 31 180 Ships in 18 - 22 working days

Reactive systems are computing systems which are interactive, such as real-time systems, operating systems, concurrent systems, control systems, etc. They are among the most difficult computing systems to program. Temporal logic is a formal tool/language which yields excellent results in specifying reactive systems. This volume, the first of two, subtitled Specification, has a self-contained introduction to temporal logic and, more important, an introduction to the computational model for reactive programs, developed by Zohar Manna and Amir Pnueli of Stanford University and the Weizmann Institute of Science, Israel, respectively.

Security and Privacy in Biometrics (Hardcover, 2013 ed.): Patrizio Campisi Security and Privacy in Biometrics (Hardcover, 2013 ed.)
Patrizio Campisi
R4,632 R3,561 Discovery Miles 35 610 Save R1,071 (23%) Ships in 10 - 15 working days

Biometrics-based recognition systems offer many benefits over traditional authentication approaches. However, such systems raise new challenges related to personal data protection.

This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues.

Topics and features: presents a unique focus on novel approaches and new architectures for unimodal and multimodal template protection; examines signal processing techniques in the encrypted domain, security and privacy leakage assessment, and aspects of standardization; describes real-world applications, from face and fingerprint-based user recognition, to biometrics-based electronic documents, and biometric systems employing smart cards; reviews the ethical implications of the ubiquity of biometrics in everyday life, and its impact on human dignity; provides guidance on best practices for the processing of biometric data within a legal framework.

This timely and authoritative volume is essential reading for all practitioners and researchers involved in biometrics-based automatic human recognition. Graduate students of computer science and electrical engineering will also find the text to be an invaluable practical reference.

Synchronizing E-Security (Hardcover, 2004 ed.): Godfried B. Williams Synchronizing E-Security (Hardcover, 2004 ed.)
Godfried B. Williams
R2,712 Discovery Miles 27 120 Ships in 18 - 22 working days

Synchronizing E-Security is a critical investigation and empirical analysis of studies conducted among companies that support electronic commerce transactions in both advanced and developing economies. This book presents insights into the validity and credibility of current risk assessment methods that support electronic transactions in the global economy. Synchronizing E-Security focuses on a number of case studies of IT companies, within selected countries in West Africa, Europe, Asia and the United States. The foundation of this work is based on previous studies by Williams G., Avudzivi P.V (Hawaii 2002) on the retrospective view of information security management and the impact of tele-banking on the end-user.

Optical Switching (Hardcover, 2006 ed.): Tarek S. El-Bawab Optical Switching (Hardcover, 2006 ed.)
Tarek S. El-Bawab
R4,266 Discovery Miles 42 660 Ships in 18 - 22 working days

Applications of optical switching in network elements and communication networks are discussed in considerable depth. Optical circuits, packet, and burst switching are all included. Composed of distinct self-contained chapters with minimum overlaps and independent references. Provides up-to-date comprehensive coverage of optical switching, technologies, devices, systems and networks. Discusses applications of optical switching in network elements and communications networks.

Wireless Ad-Hoc Networks (Hardcover): Timothy Kolaya Wireless Ad-Hoc Networks (Hardcover)
Timothy Kolaya
R1,803 Discovery Miles 18 030 Ships in 10 - 15 working days
Solutions for Sharepoint Server 2003 - Site Definitions, Custom Templates, and Global Customizations (Paperback): Jason... Solutions for Sharepoint Server 2003 - Site Definitions, Custom Templates, and Global Customizations (Paperback)
Jason Nadrowski, Stacy Draper
R1,229 Discovery Miles 12 290 Ships in 10 - 15 working days

In "SharePoint 2003 Advanced Concepts," two world-class SharePoint consultants show how to make SharePoint " jump through hoops" for you-and do exactly what you want. Jason Nadrowski and Stacy Draper have built some of the most diverse SharePoint enterprise implementations. Now, drawing on their extraordinary " in the trenches" experience, they present solutions, techniques, and examples you simply won' t find anywhere else. "SharePoint 2003 Advanced Concepts" addresses every facet of SharePoint customization, from site definitions and templates to document libraries and custom properties. The authors cover both Windows SharePoint Services and SharePoint Portal Server 2003 and illuminate SharePoint' s interactions with other technologies-helping you troubleshoot problems far more effectively. Next time you encounter a tough SharePoint development challenge, don' t waste time: get your proven solution right here, in "SharePoint 2003 Advanced Concepts," - Construct more powerful site and list templates - Control how SharePoint uses ghosted and unghosted pages - Use custom site definitions to gain finer control over your site - Build list definitions with custom metadata, views, and forms - Troubleshoot WEBTEMP, ONET.XML, SCHEMA.XML, SharePoint databases, and their interactions - Create custom property types to extend SharePoint' s functionality - Integrate with other systems and SharePoint sites so that you can use their information more effectively - Customize themes and interactive Help, one step at a time - Customize email alerts and system notifications - Extend the capabilities of document libraries - Control document display and behavior based on extensions

Performance Evaluation and Applications of ATM Networks (Hardcover, 2000 ed.): Demetres D. Kouvatsos Performance Evaluation and Applications of ATM Networks (Hardcover, 2000 ed.)
Demetres D. Kouvatsos
R5,398 Discovery Miles 53 980 Ships in 18 - 22 working days

The diversity of methodologies and applications in the literature for the performance modelling and analysis of ATM networks, widely considered as the new generation of high speed communication systems, attests to the breadth and richness of recent ATM research and developments Performance Evaluation and Applications of ATM Networks contains seventeen tutorial papers by eminent researchers and practitioners in the ATM field worldwide. It offers a fundamental source of reference, reflecting essential state-of-the-art material for further research and development in the performance evaluation and applications field of ATM networks. Topics discussed in this book include: ATM Traffic Modelling and Characterization; ATM Traffic Management and Control ATM Routing and Network Resilience; IP/ATM Networks Integration; ATM Special Topics: Optical, Wireless and Satellite Networks; Analytical Techniques for ATM Networks. Performance Evaluation and Applications of ATM Networks maintains throughout an effective balance between descriptive and quantitative approaches for the presentation of important ATM mechanisms and performance evaluation techniques. It unifies ATM performance modelling material already known and introduces readers to some unfamiliar and unexplored ATM performance evaluation and application research areas. Performance Evaluation and Applications of ATM Networks is ideal for personnel in computer/communication industries as well as academic researchers in computer science and electrical engineering.

Practical Intranet Security - Overview of the State of the Art and Available Technologies (Hardcover, 1999 ed.): Paul M.... Practical Intranet Security - Overview of the State of the Art and Available Technologies (Hardcover, 1999 ed.)
Paul M. Ashley, M. Vandenwauver
R5,170 Discovery Miles 51 700 Ships in 18 - 22 working days

Foreword by Lars Knudsen
"Practical Intranet Security" focuses on the various ways in which an intranet can be violated and gives a thorough review of the technologies that can be used by an organization to secure its intranet. This includes, for example, the new security architecture SESAME, which builds on the Kerberos authentication system, adding to it both public-key technology and a role-based access control service. Other technologies are also included such as a description of how to program with the GSS-API, and modern security technologies such as PGP, S/MIME, SSH, SSL IPSEC and CDSA. The book concludes with a comparison of the technologies.
This book is different from other network security books in that its aim is to identify how to secure an organization's intranet. Previously books have concentrated on the Internet, often neglecting issues relating to securing intranets. However the potential risk to business and the ease by which intranets can be violated is often far greater than via the Internet.
The aim is that network administrators and managers can get the information that they require to make informed choices on strategy and solutions for securing their own intranets.
The book is an invaluable reference for network managers and network administrators whose responsibility it is to ensure the security of an organization's intranet. The book also contains background reading on networking, network security and cryptography which makes it an excellent research reference and undergraduate/postgraduate text book.

Introduction to Computer Security - Pearson New International Edition (Paperback, Pearson New International Edition): Michael... Introduction to Computer Security - Pearson New International Edition (Paperback, Pearson New International Edition)
Michael Goodrich, Roberto Tamassia
R2,378 Discovery Miles 23 780 Ships in 9 - 17 working days

For computer-security courses that are taught at the undergraduate level and that have as their sole prerequisites an introductory computer science sequence (e.g., CS 1/CS 2). A new Computer Security textbook for a new generation of IT professionals. Unlike most other computer security textbooks available today, Introduction to Computer Security, 1e does NOT focus on the mathematical and computational foundations of security, and it does not assume an extensive background in computer science. Instead it looks at the systems, technology, management, and policy side of security, and offers students fundamental security concepts and a working knowledge of threats and countermeasures with "just-enough" background in computer science. The result is a presentation of the material that is accessible to students of all levels.

Blockchain Technology Solutions for the Security of IoT-Based Healthcare Systems (Paperback): Bharat Bhushan, Sudhir Kumar... Blockchain Technology Solutions for the Security of IoT-Based Healthcare Systems (Paperback)
Bharat Bhushan, Sudhir Kumar Sharma, Muzafer Saracevic, Azedine Boulmakoul
R2,945 Discovery Miles 29 450 Ships in 10 - 15 working days

Blockchain Technology Solutions for the Security of IoT-Based Healthcare Systems explores the various benefits and challenges associated with the integration of blockchain with IoT healthcare systems, focusing on designing cognitive-embedded data technologies to aid better decision-making, processing and analysis of large amounts of data collected through IoT. This book series targets the adaptation of decision-making approaches under cognitive computing paradigms to demonstrate how the proposed procedures, as well as big data and Internet of Things (IoT) problems can be handled in practice. Current Internet of Things (IoT) based healthcare systems are incapable of sharing data between platforms in an efficient manner and holding them securely at the logical and physical level. To this end, blockchain technology guarantees a fully autonomous and secure ecosystem by exploiting the combined advantages of smart contracts and global consensus. However, incorporating blockchain technology in IoT healthcare systems is not easy. Centralized networks in their current capacity will be incapable to meet the data storage demands of the incoming surge of IoT based healthcare wearables.

Wireless Network Security (Hardcover, 2007 ed.): Yang Xiao, Xuemin Shen, Dingzhu Du Wireless Network Security (Hardcover, 2007 ed.)
Yang Xiao, Xuemin Shen, Dingzhu Du
R4,076 Discovery Miles 40 760 Ships in 18 - 22 working days

This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications and multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking.

The Data Bank Society (Routledge Revivals) - Organizations, Computers and Social Freedom (Hardcover): Malcolm Warner, Mike Stone The Data Bank Society (Routledge Revivals) - Organizations, Computers and Social Freedom (Hardcover)
Malcolm Warner, Mike Stone
R3,288 R1,451 Discovery Miles 14 510 Save R1,837 (56%) Ships in 10 - 15 working days

This study, written in the context of its first publication in 1970, discusses and documents the invasion of privacy by the corporation and the social institution in the search for efficiency in information processing. Discussing areas such as the impact of the computer on administration, privacy and the storage on information, the authors assess the technical and social feasibility of constructing integrated data banks to cover the details of populations. The book was hugely influential both in terms of scholarship and legislation, and the years following saw the introduction of the Data Protection Act of 1984, which was then consolidated by the Act of 1998. The topics under discussion remain of great concern to the public in our increasingly web-based world, ensuring the continued relevance of this title to academics and students with an interest in data protection and public privacy.

Complex Intelligent Systems and Their Applications (Hardcover, 2010 ed.): Fatos Xhafa, Leonard Barolli, Petraq Papajorgji Complex Intelligent Systems and Their Applications (Hardcover, 2010 ed.)
Fatos Xhafa, Leonard Barolli, Petraq Papajorgji
R2,802 Discovery Miles 28 020 Ships in 18 - 22 working days

"Complex Intelligent Systems and Applications" presents the most up-to-date advances in complex, software intensive and intelligent systems. Each self-contained chapter is the contribution of distinguished experts in areas of research relevant to the study of complex, intelligent, and software intensive systems. These contributions focus on the resolution of complex problems from areas of networking, optimization and artificial intelligence. The book is divided into three parts focusing on complex intelligent network systems, efficient resource management in complex systems, and artificial data mining systems. Through the presentation of these diverse areas of application, the volume provides insights into the multidisciplinary nature of complex problems. Throughout the entire book, special emphasis is placed on optimization and efficiency in resource management, network interaction, and intelligent system design. This book presents the most recent interdisciplinary results in this area of research and can serve as a valuable tool for researchers interested in defining and resolving the types of complex problems that arise in networking, optimization, and artificial intelligence.

Multiaccess, Mobility and Teletraffic in Wireless Communications: Volume 4 (Hardcover, 1999 ed.): Ezio Biglieri, Luigi Fratta,... Multiaccess, Mobility and Teletraffic in Wireless Communications: Volume 4 (Hardcover, 1999 ed.)
Ezio Biglieri, Luigi Fratta, Bijan Jabbari
R4,183 Discovery Miles 41 830 Ships in 18 - 22 working days

The unrelenting growth of wireless communications continues to raise new research and development problems that require unprecedented interactions among communication engineers. In particular, specialists in transmission and specialists in networks must often cross each other's boundaries. This is especially true for CDMA, an access technique that is being widely accepted as a system solution for next-generation mobile cellular systems, but it extends to other system aspects as well. Major challenges lie ahead, from the design of physical and radio access to network architecture, resource management, mobility management, and capacity and performance aspects. Several of these aspects are addressed in this volume, the fourth in the edited series on Multiaccess, Mobility and Teletraffic for Wireless Communications. It contains papers selected from MMT'99, the fifth Workshop held on these topics in October 1999 in Venezia, Italy. The focus of this workshop series is on identifying, presenting, and discussing the theoretical and implementation issues critical to the design of wireless communication networks. More specifically, these issues are examined from the viewpoint of the impact each one of them can have on the others. Specific emphasis is given to the evolutionary trends of universal wireless access and software radio. Performance improvements achieved by spectrally efficient codes and smart antennas in experimental GSM testbeds are presented. Several contributions address critical issues regarding multimedia services for Third-Generation Mobile Radio Networks ranging from high rate data transmission with CDMA technology to resource allocation for integrated Voice/WWW traffic.

Mapping Scientific Frontiers - The Quest for Knowledge Visualization (Hardcover, 2nd ed. 2014): Chaomei Chen Mapping Scientific Frontiers - The Quest for Knowledge Visualization (Hardcover, 2nd ed. 2014)
Chaomei Chen
R4,096 R3,543 Discovery Miles 35 430 Save R553 (14%) Ships in 10 - 15 working days

This is an examination of the history and the state of the art of the quest for visualizing scientific knowledge and the dynamics of its development. Through an interdisciplinary perspective this book presents profound visions, pivotal advances, and insightful contributions made by generations of researchers and professionals, which portrays a holistic view of the underlying principles and mechanisms of the development of science. This updated and extended second edition: highlights the latest advances in mapping scientific frontiers examines the foundations of strategies, principles, and design patterns provides an integrated and holistic account of major developments across disciplinary boundaries "Anyone who tries to follow the exponential growth of the literature on citation analysis and scientometrics knows how difficult it is to keep pace. Chaomei Chen has identified the significant methods and applications in visual graphics and made them clear to the uninitiated. Derek Price would have loved this book which not only pays homage to him but also to the key players in information science and a wide variety of others in the sociology and history of science." - Eugene Garfield "This is a wide ranging book on information visualization, with a specific focus on science mapping. Science mapping is still in its infancy and many intellectual challenges remain to be investigated and many of which are outlined in the final chapter. In this new edition Chaomei Chen has provided an essential text, useful both as a primer for new entrants and as a comprehensive overview of recent developments for the seasoned practitioner." - Henry Small Chaomei Chen is a Professor in the College of Information Science and Technology at Drexel University, Philadelphia, USA, and a ChangJiang Scholar at Dalian University of Technology, Dalian, China. He is the Editor-in-Chief of Information Visualization and the author of Turning Points: The Nature of Creativity (Springer, 2012) and Information Visualization: Beyond the Horizon (Springer, 2004, 2006).

Amazon CloudWatch Events User Guide (Hardcover): Documentation Team Amazon CloudWatch Events User Guide (Hardcover)
Documentation Team
R1,149 Discovery Miles 11 490 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Analog and Computer Electronics for…
B.H. Vassos Hardcover R5,295 Discovery Miles 52 950
Functional Decomposition with…
Christoph Scholl Hardcover R4,164 Discovery Miles 41 640
Nonuniform Line Microstrip Directional…
Sener Uysal Hardcover R3,214 Discovery Miles 32 140
Asynchronous Pulse Logic
Mika M. Nystrom, Alain Martin Hardcover R2,774 Discovery Miles 27 740
VLSI Circuit Simulation and Optimization
V. Litovski, Mark Zwolinski Hardcover R6,019 Discovery Miles 60 190
Power Electronics Applied to Industrial…
Nicolas Patin Hardcover R1,908 Discovery Miles 19 080
Closing the Gap Between ASIC & Custom…
David Chinnery, Kurt Keutzer Hardcover R4,243 Discovery Miles 42 430
Parasitic-Aware Optimization of CMOS RF…
David J. Allstot, Jinho Park, … Hardcover R2,653 Discovery Miles 26 530
Semiconductors for Solar Cells
Hans Joachim Moller Hardcover R2,387 Discovery Miles 23 870
On Optimal Interconnections for VLSI
Andrew B. Kahng, Gabriel Robins Hardcover R4,172 Discovery Miles 41 720

 

Partners