0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (275)
  • R250 - R500 (877)
  • R500+ (13,584)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Wireless Sensor Networks - Deployments and Design Frameworks (Hardcover, 2010 ed.): Elena Gaura, Lewis Girod, James Brusey,... Wireless Sensor Networks - Deployments and Design Frameworks (Hardcover, 2010 ed.)
Elena Gaura, Lewis Girod, James Brusey, Michael Allen, Geoffrey Challen
R4,172 Discovery Miles 41 720 Ships in 18 - 22 working days

The twentieth century ended with the vision of smart dust: a network of wirelessly connected devices whose size would match that of a dust particle, each one a se- containedpackageequippedwithsensing, computation, communication, andpower. Smart dust held the promise to bridge the physical and digital worlds in the most unobtrusive manner, blending together realms that were previously considered well separated. Applications involved scattering hundreds, or even thousands, of smart dust devices to monitor various environmental quantities in scenarios ranging from habitat monitoring to disaster management. The devices were envisioned to se- organize to accomplish their task in the most ef?cient way. As such, smart dust would become a powerful tool, assisting the daily activities of scientists and en- neers in a wide range of disparate disciplines. Wireless sensor networks (WSNs), as we know them today, are the most no- worthy attempt at implementing the smart dust vision. In the last decade, this ?eld has seen a fast-growing investment from both academia and industry. Signi?cant ?nancial resources and manpower have gone into making the smart dust vision a reality through WSNs. Yet, we still cannot claim complete success. At present, only specialist computerscientists or computerengineershave the necessary background to walk the road from conception to a ?nal, deployed, and running WSN syst

Emerging Topics and Technologies in Information Systems (Hardcover): Miltiadis D Lytras, Patricia Ordonez De Pablos Emerging Topics and Technologies in Information Systems (Hardcover)
Miltiadis D Lytras, Patricia Ordonez De Pablos
R4,940 Discovery Miles 49 400 Ships in 18 - 22 working days

Today, the information systems (IS) discipline faces new challenges. Emerging technologies as well as matured approaches for the social, technical, and developmental role of IS provide a new context for the evolution of the discipline over the next few years. ""Emerging Topics and Technologies in Information Systems"" communicates the challenges and opportunities that information systems research is dealing with today while promoting cutting-edge research on how current IS support is creating the critical backbone for the knowledge society. This book is an essential reference for policy makers, government officers, academicians, and practitioners thirsty for knowledge on IS and IT beyond traditional textbooks.

Systematic Design of Sigma-Delta Analog-to-Digital Converters (Hardcover, 2004 ed.): Ovidiu Bajdechi, Johan Huijsing Systematic Design of Sigma-Delta Analog-to-Digital Converters (Hardcover, 2004 ed.)
Ovidiu Bajdechi, Johan Huijsing
R4,119 Discovery Miles 41 190 Ships in 18 - 22 working days

Systematic Design of Sigma-Delta Analog-to-Digital Converters describes the issues related to the sigma-delta analog-to-digital converters (ADCs) design in a systematic manner: from the top level of abstraction represented by the filters defining signal and noise transfer functions (STF, NTF), passing through the architecture level where topology-related performance is calculated and simulated, and finally down to parameters of circuit elements like resistors, capacitors, and amplifier transconductances used in individual integrators. The systematic approach allows the evaluation of different loop filters (order, aggressiveness, discrete-time or continuous-time implementation) with quantizers varying in resolution. Topologies explored range from simple single loops to multiple cascaded loops with complex structures including more feedbacks and feedforwards. For differential circuits, with switched-capacitor integrators for discrete-time (DT) loop filters and active-RC for continuous-time (CT) ones, the passive integrator components are calculated and the power consumption is estimated, based on top-level requirements like harmonic distortion and noise budget.
This unified, systematic approach to choosing the best sigma-delta ADC implementation for a given design target yields an interesting solution for a high-resolution, broadband (DSL-like) ADC operated at low oversampling ratio, which is detailed down to transistor-level schematics.
The target audience of Systematic Design of Sigma-Delta Analog-to-Digital Converters are engineers designing sigma-delta ADCs and/or switched-capacitor and continuous-time filters, both beginners and experienced. It is also intended forstudents/academics involved in sigma-delta and analog CAD research.

CSSLP Certified Secure Software Lifecycle Professional All-in-One Exam Guide, Third Edition (Paperback, 3rd edition): Wm.... CSSLP Certified Secure Software Lifecycle Professional All-in-One Exam Guide, Third Edition (Paperback, 3rd edition)
Wm. Arthur Conklin, Daniel Shoemaker
R1,109 Discovery Miles 11 090 Ships in 10 - 15 working days

Providing 100% coverage of the latest CSSLP exam, this self-study guide offers everything you need to ace the exam CSSLP Certification All-in-One Exam Guide, Third Edition covers all eight exam domains of the challenging CSSLP exam, developed by the International Information Systems Security Certification Consortium (ISC) (R). Thoroughly revised and updated for the latest exam release, this guide includes real-world examples and comprehensive coverage on all aspects of application security within the entire software development lifecycle. It also includes hands-on exercises, chapter review summaries and notes, tips, and cautions that provide real-world insight and call out potentially harmful situations. With access to 350 exam questions online, you can practice either with full-length, timed mock exams or by creating your own custom quizzes by chapter or exam objective. CSSLP Certification All-in-One Exam Guide, Third Edition provides thorough coverage of all eight exam domains: Secure Software Concepts Secure Software Requirements Secure Software Design Secure Software Implementation Programming Secure Software Testing Secure Lifecycle Management Software Deployment, Operations, and Maintenance Supply Chain and Software Acquisition

Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso... Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R9,442 Discovery Miles 94 420 Ships in 18 - 22 working days
Modeling and Simulation Environment for Satellite and Terrestrial Communications Networks - Proceedings of the European COST... Modeling and Simulation Environment for Satellite and Terrestrial Communications Networks - Proceedings of the European COST Telecommunications Symposium (Hardcover, 2002 ed.)
A. Nejat Ince
R2,880 Discovery Miles 28 800 Ships in 18 - 22 working days

Modeling and Simulation Environment for Satellite and Terrestrial Communications Networks: Proceedings of the European COST Telecommunications Symposium will be of interest to network designers, developers, and operators. This book is a collection of papers given at the European Cost Telecommunications Symposium. The Symposium was broken down into four sessions: Modelling and Simulation. Teletraffic Modelling. Communications Networks Simulation. Problems in Simulation. Each session addressed a wide spectrum of subjects. The symposium covered nearly all of the important aspects of simulation modeling and tools for the design and performance evaluation of communication techniques and systems. Emerging techniques were emphasized. Modeling and Simulation Environment for Satellite and Terrestrial Communications Networks: Proceedings of the European COST Telecommunications Symposium is a useful reference work for practicing engineers and academic researchers.

Graph Theoretic Approaches for Analyzing Large-Scale Social Networks (Hardcover): Natarajan Meghanathan Graph Theoretic Approaches for Analyzing Large-Scale Social Networks (Hardcover)
Natarajan Meghanathan
R5,674 Discovery Miles 56 740 Ships in 18 - 22 working days

Social network analysis has created novel opportunities within the field of data science. The complexity of these networks requires new techniques to optimize the extraction of useful information. Graph Theoretic Approaches for Analyzing Large-Scale Social Networks is a pivotal reference source for the latest academic research on emerging algorithms and methods for the analysis of social networks. Highlighting a range of pertinent topics such as influence maximization, probabilistic exploration, and distributed memory, this book is ideally designed for academics, graduate students, professionals, and practitioners actively involved in the field of data science. The many academic areas covered in this publication include, but are not limited to: Content Specific Modeling Distributed Memory Graph Mining Influence Maximization Information Spread Control Link Prediction Probabilistic Exploration

Social Software and Web 2.0 Technology Trend - Blogs, Podcasts and Wikis (Hardcover): P. Candace Deans Social Software and Web 2.0 Technology Trend - Blogs, Podcasts and Wikis (Hardcover)
P. Candace Deans
R4,898 Discovery Miles 48 980 Ships in 18 - 22 working days

Very little has been written to address the emerging trends in social software and technology. With these technologies and applications being relatively new and evolving rapidly, research is wide open in these fields. Social Software and Web 2.0 Technology Trends fills this critical research need, providing an overview of the current state of Web 2.0 technologies and their impact on organizations and educational institutions. Written for academicians and practicing managers, this estimable book presents business applications as well as implementations for institutions of higher education with numerous examples of how these technologies are currently being used. Delivering authoritative insights to a rapidly evolving domain of technology application, this book is an invaluable resource for both academic libraries and for classroom instruction.

Interdisciplinary Applications of Electronic Collaboration Approaches and Technologies (Hardcover, New): Ned Kock Interdisciplinary Applications of Electronic Collaboration Approaches and Technologies (Hardcover, New)
Ned Kock
R4,441 Discovery Miles 44 410 Ships in 18 - 22 working days

With the advent and advancement of E-Collaboration tools, our way of social interaction and online social behavior has altered drastically. With new ways of communicating and working together, we must understand how this affects human behavior. Interdisciplinary Applications of Electronic Collaboration Approaches and Technologies addresses the design and implementation of e-collaboration technologies, assesses its behavioral impact on individuals and groups, and presents theoretical considerations on links between the use of e-collaboration technologies and behavioral patterns. An innovative collection of the latest research findings, this book covers significant topics such as Web-based chat tools, Web-based asynchronous conferencing tools, e-mail, listservs and many others, perfect for academics, researchers, and professionals alike.

Advances in Pervasive Computing and Networking (Hardcover, 2005 ed.): Boleslaw K. Szymanski, B ulent Yener Advances in Pervasive Computing and Networking (Hardcover, 2005 ed.)
Boleslaw K. Szymanski, B ulent Yener
R2,683 Discovery Miles 26 830 Ships in 18 - 22 working days

Pervasive Computing and Networking aim at providing ubiquitous, ever-present, adaptable, smart, enveloping and immersive environments in which computing components and humans can interact regardless of the location. The combination of an abundance of computational power of the processors and the communication bandwidth provided by the wireless and mobile networking everywhere and all the time makes such environments within the reach of current technology. Yet, to realize the full potential of such environments, many technical and economical challenges needs to be overcome. These challenges and the perspective on the seminal directions of the research in this area were the subject of the Workshop for Pervasive Computing and Networking at Rensselaer Polytechnic Institute, Troy, NY, USA. This book presents chapters based on presentations made at the workshop by leaders in the field. The scope of Advances in Pervasive Computing and Networking ranges from fundamental theory of pervasive computing and networking to crucial challenges and emerging applications.

Such seminal topics as a scalable, self-organizing technology for sensor networks, the fundamental relationship between the achievable capacity and delay in mobile wireless networks, the role of self-optimization in sensor networks or similarities and differences between computer networks and their biological counterparts are the subject of the first group of chapters.

The next group of chapters covers communication issues, such as cooperative communication in mobile, wireless and sensor networks, methods for maximizing aggregate throughput in 802.11 mesh networks with a physical carrier, and self-configuring location discovery systems for smart environments. The book closes with chapters focusing on sensor network emerging applications such as smart and safe buildings, a design for a distributed transmitter for reachback based on radar signals sensing and two-radio multi-channel clustering.

Trusted Computing (Hardcover, illustrated edition): Chris Mitchell Trusted Computing (Hardcover, illustrated edition)
Chris Mitchell
R2,841 Discovery Miles 28 410 Ships in 10 - 15 working days

As computers are increasingly embedded, ubiquitous and wirelessly connected, security becomes imperative. This has led to the development of the notion of a 'trusted platform', the chief characteristic of which is the possession of a trusted hardware element which is able to check all or part of the software running on this platform. This enables parties to verify the software environment running on a remote trusted platform, and hence to have some trust that the data sent to that machine will be processed in accordance with agreed rules. This new text introduces recent technological developments in trusted computing, and surveys the various current approaches to providing trusted platforms. It also includes application examples based on recent and ongoing research. The core of the book is based on an open workshop on Trusted Computing, held at Royal Holloway, University of London, UK.

Information Assurance - Managing Organizational IT Security Risks (Paperback): Joseph Boyce, Daniel Jennings Information Assurance - Managing Organizational IT Security Risks (Paperback)
Joseph Boyce, Daniel Jennings
R2,204 Discovery Miles 22 040 Ships in 10 - 15 working days

Written by two INFOSEC experts, this book provides a systematic and practical approach for establishing, managing and operating a comprehensive Information Assurance program. It is designed to provide ISSO managers, security managers, and INFOSEC professionals with an understanding of the essential issues required to develop and apply a targeted information security posture to both public and private corporations and government run agencies.
There is a growing concern among all corporations and within the security industry to come up with new approaches to measure an organization's information security risks and posture. Information Assurance explains and defines the theories and processes that will help a company protect its proprietary information including:
* The need to assess the current level of risk.
* The need to determine what can impact the risk.
* The need to determine how risk can be reduced.

The authors lay out a detailed strategy for defining information security, establishing IA goals, providing training for security awareness, and conducting airtight incident response to system compromise. Such topics as defense in depth, configuration management, IA legal issues, and the importance of establishing an IT baseline are covered in-depth from an organizational and managerial decision-making perspective.
* Experience-based theory provided in a logical and comprehensive manner.
* Management focused coverage includes establishing an IT security posture, implementing organizational awareness and training, and understanding the dynamics of new technologies.
* Numerous real-world examples provide a baseline for assessment and comparison.

I-Way Robbery - Crime on the Internet (Paperback): William C. Boni, Gerald L. Kovacich I-Way Robbery - Crime on the Internet (Paperback)
William C. Boni, Gerald L. Kovacich
R2,356 Discovery Miles 23 560 Ships in 10 - 15 working days

I-Way Robbery is for security, investigative, law enforcement, and other criminal justice professionals, offering a unique look at the Internet as the new crime environment for the 21st century. The book provides an overview of the Internet, its impact on nations, societies, criminals, security officers, and law enforcement professionals, and includes recommended basic, protective measures.
I-Way Robbery is written in non-technical terms. It is also an excellent reference for business and government agency managers who must understand their responsibilities as they relate to asset protection - especially those who have on and off ramps connected to the I-Way.
Boni and Kovacich start with the basics and teach users about the internet before teaching them about the security risks. This addresses the subject from the non-information systems perspective and educates the average user about the overall risks and appropriate protective measures they should enforce and follow.
This book is a must-have for anyone with an interest in the pitfalls and precautions of doing business on the internet.

I-Way Robbery: Crime on the Internet, uniquely approaches the much talked about topic of Internet Crime and security. It is written for anyone who wants a basic understanding of the Internet crime environment now and into the 21st Century. It covers related Internet business, government, global, laws, politics and privacy issues; techniques being used to commit crimes; what can be done about it; and what challenges the future may hold including topics such as information warfare.
Drawing on their decades of experience in high-technology and Internet crime investigations William Boni and Dr. Gerald L. Kovacich have written not only an excellent reference book for business and government agency managers, small business owners, and teachers, but for anyone who drives along the I-Way.
Addresses the subject of internet security from the non-information systems perspective
Detailed incident reports to fully illustrate the specific issues readers must understand to fully appreciate the risks of I-Way activity
Covers a broad range of issues

Switching Theory - Insight through Predicate Logic (Hardcover, 2004 ed.): Shimon Peter Vingron Switching Theory - Insight through Predicate Logic (Hardcover, 2004 ed.)
Shimon Peter Vingron
R2,889 Discovery Miles 28 890 Ships in 18 - 22 working days

The author’s main concern is to promote understanding of the basic ideas underlying switching theory. Nothing is taken for granted, whether it is the concept of a logic variable, that of feedback in a latch or sequential circuit, or the necessity to encode internal states. This very basic and thorough approach enables the development of new concepts such as Composition, or Verification. The theoretical side is enhanced by using predicate (instead of propositional) logic allowing for formal proofs till now unattainable. On the practical side, sequential circuits that hitherto were obtained intuitively are now open to a formal synthesis procedure.

Security in E-Learning (Hardcover, 2005 ed.): Edgar R. Weippl Security in E-Learning (Hardcover, 2005 ed.)
Edgar R. Weippl
R2,657 Discovery Miles 26 570 Ships in 18 - 22 working days

As e-learning increases in popularity and reach, more people are taking online courses and thus need to understand security issues relevant to this topic. 'Security for E-Learning' discusses typical threats to e-learning projects and will introduce how these issues have been and should be addressed.

Insider Threats in Cyber Security (Hardcover, 2010 ed.): Christian W. Probst, Jeffrey Hunker, Matt Bishop, Dieter Gollmann Insider Threats in Cyber Security (Hardcover, 2010 ed.)
Christian W. Probst, Jeffrey Hunker, Matt Bishop, Dieter Gollmann
R2,990 Discovery Miles 29 900 Ships in 18 - 22 working days

Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together. This volume brings together a critical mass of well-established worldwide researchers, and provides a unique multidisciplinary overview. Monica van Huystee, Senior Policy Advisor at MCI, Ontario, Canada comments "The book will be a must read, so of course I'll need a copy."

Insider Threats in Cyber Security covers all aspects of insider threats, from motivation to mitigation. It includes how to monitor insider threats (and what to monitor for), how to mitigate insider threats, and related topics and case studies.

Insider Threats in Cyber Security is intended for a professional audience composed of the military, government policy makers and banking; financing companies focusing on the Secure Cyberspace industry. This book is also suitable for advanced-level students and researchers in computer science as a secondary text or reference book.

Human Rights Treaties - Considering Patterns of Participation, 1948-2000 (Paperback): Mark Sachleben Human Rights Treaties - Considering Patterns of Participation, 1948-2000 (Paperback)
Mark Sachleben
R1,500 Discovery Miles 15 000 Ships in 10 - 15 working days

The book examines patterns of participation in human rights treaties. International relations theory is divided on what motivates states to participate in treaties, specifically human rights treaties. Instead of examining the specific motivations, this dissertation examines patterns of participation. In doing so, it attempts to match theoretical expectations of state behavior with participation. This book provides significant evidence that there are multiple motivations that lead states to participate in human rights treaties.

Long Term Evolution - 4G and Beyond (Hardcover, 1st ed. 2016): Alberto Paradisi, Michel Daoud Yacoub, Fabricio Lira Figueiredo,... Long Term Evolution - 4G and Beyond (Hardcover, 1st ed. 2016)
Alberto Paradisi, Michel Daoud Yacoub, Fabricio Lira Figueiredo, Tania Tronco
R2,447 R1,817 Discovery Miles 18 170 Save R630 (26%) Ships in 10 - 15 working days

This book focus on Long Term Evolution (LTE) and beyond. The chapters describe different aspects of research and development in LTE, LTE-Advanced (4G systems) and LTE-450 MHz such as telecommunications regulatory framework, voice over LTE, link adaptation, power control, interference mitigation mechanisms, performance evaluation for different types of antennas, cognitive mesh network, integration of LTE network and satellite, test environment, power amplifiers and so on. It is useful for researchers in the field of mobile communications.

An Introduction to ATM Networks (Hardcover): H.G. Perros An Introduction to ATM Networks (Hardcover)
H.G. Perros
R2,802 Discovery Miles 28 020 Ships in 18 - 22 working days

Asynchronous Transfer Mode (ATM) has revolutionized telecommunications, and has become an integral part of the networking infrastructure.

This introductory well-structured text on ATM networks describes their development, architecture, congestion control, deployment, and signalling in an intuitive, accessible way. It covers extensive background information and includes exercises that support the explanations throughout the book.

The networking expert Harry G. Perros explains ATM networks, including such hot topics as:

  • ATM adaptation layer 2

  • Quality of Service

  • Congestion control

  • Tag switching and MPLS (Multi-Protocol Label Switching)

  • ADSL-based access networks

  • Signalling

  • PNNI (Private Network Node Interface)
An Introduction to ATM Networks is a textbook for graduate and undergraduate students in electrical engineering and computer science as well as a reference work for networking engineers.

A Real-Time In-Memory Discovery Service - Leveraging Hierarchical Packaging Information in a Unique Identifier Network to... A Real-Time In-Memory Discovery Service - Leveraging Hierarchical Packaging Information in a Unique Identifier Network to Retrieve Track and Trace Information (Hardcover, 2013 ed.)
Jurgen Muller
R3,005 R1,834 Discovery Miles 18 340 Save R1,171 (39%) Ships in 10 - 15 working days

The research presented in this book discusses how to efficiently retrieve track and trace information for an item of interest that took a certain path through a complex network of manufacturers, wholesalers, retailers, and consumers. To this end, a super-ordinate system called "Discovery Service" is designed that has to handle large amounts of data, high insert-rates, and a high number of queries that are submitted to the discovery service. An example that is used throughout this book is the European pharmaceutical supply chain, which faces the challenge that more and more counterfeit medicinal products are being introduced. Between October and December 2008, more than 34 million fake drug pills were detected at customs control at the borders of the European Union. These fake drugs can put lives in danger as they were supposed to fight cancer, take effect as painkiller or antibiotics, among others. The concepts described in this book can be adopted for supply chain management use cases other than track and trace, such as recall, supply chain optimization, or supply chain analytics.

Operating Systems and Services (Hardcover, Reprinted from REAL-TIME SYSTEMS, 16:2-3, 1999): Ragunathan Rajkumar Operating Systems and Services (Hardcover, Reprinted from REAL-TIME SYSTEMS, 16:2-3, 1999)
Ragunathan Rajkumar
R2,757 Discovery Miles 27 570 Ships in 18 - 22 working days

Operating Systems and Services brings together in one place important contributions and up-to-date research results in this fast moving area. Operating Systems and Services serves as an excellent reference, providing insight into some of the most challenging research issues in the field.

Decision Support in Organizational Transformation - IFIP TC8 WG8.3 International Conference on Organizational Transformation... Decision Support in Organizational Transformation - IFIP TC8 WG8.3 International Conference on Organizational Transformation and Decision Support, 15-16 September 1997, La Gomera, Canary Islands (Hardcover, 1997 ed.)
Patrick Humphreys, Sabino Ayestaran, Andrew McCosh, Bill Mayon-White
R4,163 Discovery Miles 41 630 Ships in 18 - 22 working days

The main purpose of this paper is to contribute to the discussion about the design of computer and communication systems that can aid the management process. 1.1 Historical Overview We propose that Decision Support System can be considered as a design conception conceived within the computer industry to facilitate the use of computer technology in organisations (Keen, 1991). This framework, built during the late 1970s, offers computer and communication technology as support to the decision process which constitutes, in this view, the core of the management process. The DSS framework offers the following capabilities: * Access: ease of use, wide variety of data, analysis and modelling capacity. * Technological: software gel)eration tools. * Development modes: interactive and evolutionary. Within this perspective, computer and communication technologies are seen as an amplification of the human data processing capabilities which limit the decision process. Thus, the human being is understood metaphorically as a data processing machine. Mental processes are associated with the manipulation of symbols aOO human communication to signal transmission.

Performance and Management of Complex Communication Networks - IFIP TC6 / WG6.3 & WG7.3 International Conference on the... Performance and Management of Complex Communication Networks - IFIP TC6 / WG6.3 & WG7.3 International Conference on the Performance and Management of Complex Communication Networks (PMCCN'97) 17-21 November 1997, Tsukuba Science City, Japan (Hardcover, 1998 ed.)
Toshiharu Hasegawa, Hideaki Takagi, Yukata Takahashi
R4,226 Discovery Miles 42 260 Ships in 18 - 22 working days

With the proliferation of ISDN and mobile communication systems, modern commu nication networks are becoming larger-scale, higher-speed, and more complex than ever before. Therefore, besides hardware development, extensive research on system technolo gies with respect to the performance evaluation and management is indispensable for the proper design, development and operation of future complex communication networks. The International Conference on the Performance and Management of Complex Com munication Systems (PMCCN '97) was held from November 17 to 21, 1997, at Tsukuba Science City, Japan. This was the fifth international conference on the performance as pects of communication networks held every three years in Japan (1985 in Tokyo; 1988, 1991, and 1994 in Kyoto). The conference was sponsored by the International Federa tion of Information Processing (IFIP) Working Group (WG) 6.3 Performance of Com munication Systems, and 7.3 Computer System Modelling, University of Tsukuba, Kyoto University, and The Telecommunication Advancement Foundation (TAF)."

AWS Elemental MediaTailor User Guide (Hardcover): Documentation Team AWS Elemental MediaTailor User Guide (Hardcover)
Documentation Team
R883 Discovery Miles 8 830 Ships in 18 - 22 working days
Intelligent Networks and Intelligence in Networks - IFIP TC6 WG6.7 International Conference on Intelligent Networks and... Intelligent Networks and Intelligence in Networks - IFIP TC6 WG6.7 International Conference on Intelligent Networks and Intelligence in Networks, 2-5 September 1997, Paris, France (Hardcover, 1997 ed.)
Dominique Gaiti
R5,407 Discovery Miles 54 070 Ships in 18 - 22 working days

International Conference Intelligent Network and Intelligence in Networks (2IN97) French Ministry of Telecommunication, 20 Avenue de Segur, Paris -France September 2-5, 1997 Organizer: IFIP WG 6.7 -Intelligent Networks Sponsorship: IEEE, Alcatel, Ericsson, France Telecom, Nokia, Nordic Teleoperators, Siemens, Telecom Finland, Lab. PRiSM Aim of the conference To identify and study current issues related to the development of intelligent capabilities in networks. These issues include the development and distribution of services in broadband and mobile networks. This conference belongs to a series of IFIP conference on Intelligent Network. The first one took place in Lappeeranta August 94, the second one in Copenhagen, August 95. The proceedings of both events have been published by Chapman&Hall. IFIP Working Group 6.7 on IN has concentrated with the research and development of Intelligent Networks architectures. First the activities have concentrated in service creation, service management, database issues, feature interaction, IN performance and advanced signalling for broadband services. Later on the research activities have turned towards the distribution of intelligence in networks and IN applications to multimedia and mobility. The market issues of new services have also been studied. From the system development point of view, topics from OMG and TINA-C have been considered.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Understanding PKI - Concepts, Standards…
Carlisle Adams, Steve Lloyd Paperback R2,283 Discovery Miles 22 830
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,452 Discovery Miles 14 520
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Community Engagement in the Online Space
Michelle Dennis, James H Albert Hardcover R5,370 Discovery Miles 53 700
CompTIA Network+ Guide to Networks
Jill West Paperback R1,362 R1,269 Discovery Miles 12 690
Blockchain Technology in Corporate…
K Sood Hardcover R4,308 Discovery Miles 43 080
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690

 

Partners