![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer communications & networking
High-Speed Networking for Multimedia Applications presents the latest research on the architecture and protocols for high-speed networks, focusing on communication support for distributed multimedia applications. This includes the two major issues of ATM Networking and quality of service for multimedia applications. It is to be expected that most of the bandwidth in future high-speed networks will be taken up by multimedia applications, transmitting digital audio and video. Traditional networking protocols are not suitable for this as they do not provide guaranteed bandwidth, end-to-end delay or delay jitter, nor do they have addressing schemes or routing algorithms for multicast connections. High-Speed Networking for Multimedia Applications is a collection of high quality research papers which address these issues, providing interesting and innovative solutions. It is an essential reference for engineers and computer scientists working in this area. It is also a comprehensive text for graduate students of high-speed networking and multimedia applications.
This two-volume handbook presents a collection of novel methodologies with applications and illustrative examples in the areas of data-driven computational social sciences. Throughout this handbook, the focus is kept specifically on business and consumer-oriented applications with interesting sections ranging from clustering and network analysis, meta-analytics, memetic algorithms, machine learning, recommender systems methodologies, parallel pattern mining and data mining to specific applications in market segmentation, travel, fashion or entertainment analytics. A must-read for anyone in data-analytics, marketing, behavior modelling and computational social science, interested in the latest applications of new computer science methodologies. The chapters are contributed by leading experts in the associated fields.The chapters cover technical aspects at different levels, some of which are introductory and could be used for teaching. Some chapters aim at building a common understanding of the methodologies and recent application areas including the introduction of new theoretical results in the complexity of core problems. Business and marketing professionals may use the book to familiarize themselves with some important foundations of data science. The work is a good starting point to establish an open dialogue of communication between professionals and researchers from different fields. Together, the two volumes present a number of different new directions in Business and Customer Analytics with an emphasis in personalization of services, the development of new mathematical models and new algorithms, heuristics and metaheuristics applied to the challenging problems in the field. Sections of the book have introductory material to more specific and advanced themes in some of the chapters, allowing the volumes to be used as an advanced textbook. Clustering, Proximity Graphs, Pattern Mining, Frequent Itemset Mining, Feature Engineering, Network and Community Detection, Network-based Recommending Systems and Visualization, are some of the topics in the first volume. Techniques on Memetic Algorithms and their applications to Business Analytics and Data Science are surveyed in the second volume; applications in Team Orienteering, Competitive Facility-location, and Visualization of Products and Consumers are also discussed. The second volume also includes an introduction to Meta-Analytics, and to the application areas of Fashion and Travel Analytics. Overall, the two-volume set helps to describe some fundamentals, acts as a bridge between different disciplines, and presents important results in a rapidly moving field combining powerful optimization techniques allied to new mathematical models critical for personalization of services. Academics and professionals working in the area of business anyalytics, data science, operations research and marketing will find this handbook valuable as a reference. Students studying these fields will find this handbook useful and helpful as a secondary textbook.
This handbook covers Electronic Medical Record (EMR) systems, which enable the storage, management, and sharing of massive amounts of demographic, diagnosis, medication, and genomic information. It presents privacy-preserving methods for medical data, ranging from laboratory test results to doctors' comments. The reuse of EMR data can greatly benefit medical science and practice, but must be performed in a privacy-preserving way according to data sharing policies and regulations. Written by world-renowned leaders in this field, each chapter offers a survey of a research direction or a solution to problems in established and emerging research areas. The authors explore scenarios and techniques for facilitating the anonymization of different types of medical data, as well as various data mining tasks. Other chapters present methods for emerging data privacy applications and medical text de-identification, including detailed surveys of deployed systems. A part of the book is devoted to legislative and policy issues, reporting on the US and EU privacy legislation and the cost of privacy breaches in the healthcare domain. This reference is intended for professionals, researchers and advanced-level students interested in safeguarding medical data.
From the reviews: "This book is intended for an assembly production house setting, appropriate for management, designers, chief operators, as well as wirebond production engineers. Operational issues such as specifying and optimizing wire and automatic bonders for a product line are included. The book is very good with "visual" explanations for quick grasping of the issues. In addition, the fundamental metallurgical or mechanical root causes behind material and process choices are presented. The book has a clear prose style and a very readable font and page layout. The figures, although effective, are simply low resolution screen prints from a personal computer and thus have aliasing and fuzziness. This book has excellent overall tutorial and enough description of wire and bonding equipment so the reader could specify and negotiate correctly for with suppliers. The majority of the book dwells on establishing the bonding process for a particular product; determining the "window" of adjustments. The book ends with discussions on establishing quality metrics and reliability assurance tests. Each chapter of the book includes enough tutorial information to allow it to alone with little need to page backwards. A short but good reference section is at the end. If you have not read a wirebonding book, or the one you read 10 years ago was borrowed and never returned, now is the time to buy this book." (" CMPT Newsletter," June 2005)
In today's market, emerging technologies are continually assisting in common workplace practices as companies and organizations search for innovative ways to solve modern issues that arise. Prevalent applications including internet of things, big data, and cloud computing all have noteworthy benefits, but issues remain when separately integrating them into the professional practices. Significant research is needed on converging these systems and leveraging each of their advantages in order to find solutions to real-time problems that still exist. Challenges and Opportunities for the Convergence of IoT, Big Data, and Cloud Computing is a pivotal reference source that provides vital research on the relation between these technologies and the impact they collectively have in solving real-world challenges. While highlighting topics such as cloud-based analytics, intelligent algorithms, and information security, this publication explores current issues that remain when attempting to implement these systems as well as the specific applications IoT, big data, and cloud computing have in various professional sectors. This book is ideally designed for academicians, researchers, developers, computer scientists, IT professionals, practitioners, scholars, students, and engineers seeking research on the integration of emerging technologies to solve modern societal issues.
High-Performance Networks for Multimedia Applications presents the latest research on the services and protocols for networks providing the communication support for distributed multimedia applications. The need for end-to-end QoS for these multimedia applications is raising the stakes for a powerful shaping and scheduling in the network adapter. It is also creating a need for new services at the ATM layer, CBR and VBR being augmented by UBR, ABR and GFR which have to be evaluated in the TCP/IP environment of today and tomorrow. With the pressure of all the new technologies available today, the backbone architecture needs to be revisited and the success of the TCP/IP must not eliminate the possibility of adding a native ATM access to it. Most of the research in communication services such as IntServ, DiffServ and Native ATM is driven by the requirements of multimedia systems and this book illustrates the new emphasis by bringing telecommunication and computer communication experts together with application designers. This is particularly true for the security issues also addressed here. Last but not least, modeling techniques and mathematical models are essential to assess the performance of the networks to be built and to evaluate next century scenarios unachievable by a simple scaling of today's solutions. High-Performance Networks for Multimedia Applications is a collection of high quality research papers and the in-depth treatment of the subjects provides interesting and innovative solutions. It is an essential reference for telecommunication and computer experts and QoS-based application designers. It is also a comprehensive text for graduate students in high-perforrnance networks and multimedia applications.
This volume contains the proceedings of the IFIPTM 2007, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Moncton, New Brunswick, Canada from July 29 to August 2, 2007. The annual iTrust international conference looks at trust from multidisciplinary perspectives: economic, legal, psychology, philosophy, sociology as well as information technology. The annual PST conference has quickly established itself as a leader in multidisciplinary research on a wide range of topics related to Privacy, Security and Trust, looked at from research and practice, through academe, business, and government. The two conferences have come together this year to take a more thorough look at all elements of trust management. The highlights of IFIPTM 2007 included invited talks by industrial and academic experts including Larry Korba from NRC-IIT, Brian O'Higgins of 3rd Brigade, Jim Robbins from EWA, Jonathan Cave from RAND, Roger London, and Bruce Cowper from Microsoft Canada.
Use your interpersonal and communication skills as a financial professional to work successfully with clients Embark on a journey to further develop your career when you read People-Centric Skills Interpersonal and Communication Skills for Financial Professionals, 2nd Edition. Business leaders consider employee communication skills and critical thinking abilities as essential elements for success. In their work, all professionals must communicate clearly and rely on their interpersonal skills to be successful. This second edition of People-Centric Skills shares the fictional story of Dalton Zimmer, executive coach and public speaker. Dalton, all the while juggling his business, kids and social life, provides coaching and communication strategies for handling challenging situations faced by his clients. This insightful narrative will help you expand communication and soft skills as a CPA, auditor, financial planner or other financial professional. As Generation Z is entering the work force, the communication gap between Z and Boomers or Generation X is widening significantly. New to the second edition, you'll find a discussion of communication between generations and how to bridge them as a financial professional. You can be a more people-centric leader as you engage with a wide range of clients and associates. This book can be a first step to improving interpersonal and communication skills as you continue to develop in your career.
This book presents the application of a comparatively simple nonparametric regression algorithm, known as the multivariate adaptive regression splines (MARS) surrogate model, which can be used to approximate the relationship between the inputs and outputs, and express that relationship mathematically. The book first describes the MARS algorithm, then highlights a number of geotechnical applications with multivariate big data sets to explore the approach's generalization capabilities and accuracy. As such, it offers a valuable resource for all geotechnical researchers, engineers, and general readers interested in big data analysis.
The introduction of Enterprise Identity Management Systems (EIdMS) in organizations even beyond the purely technological level is a costly and challenging endeavor. However, for decision makers it seems difficult to fully understand the impacts and opportunities arising from the introduction of EIdMS. This book explores the relevant aspects for an ex-ante evaluation of EIdMS. Therefore it examines this domain by employing a qualitative expert interview study to better understand the nature of EIdMS, as they are situated between security and productive IT systems. To this regard, the focus is put on the general nature of EIdMS projects and the constructs being relevant for analyzing such projects in the decision support phase. Based on the derived constructs and thematic topics from the interviews, an explanatory model for EIdMS introductions is derived and iteratively improved and evaluated. Finally, a possible application use-case for the creation of adequate decision support tools is presented.
This professional guide and reference examines the challenges of assessing security vulnerabilities in computing infrastructure. Various aspects of vulnerability assessment are covered in detail, including recent advancements in reducing the requirement for expert knowledge through novel applications of artificial intelligence. The work also offers a series of case studies on how to develop and perform vulnerability assessment techniques using start-of-the-art intelligent mechanisms. Topics and features: provides tutorial activities and thought-provoking questions in each chapter, together with numerous case studies; introduces the fundamentals of vulnerability assessment, and reviews the state of the art of research in this area; discusses vulnerability assessment frameworks, including frameworks for industrial control and cloud systems; examines a range of applications that make use of artificial intelligence to enhance the vulnerability assessment processes; presents visualisation techniques that can be used to assist the vulnerability assessment process. In addition to serving the needs of security practitioners and researchers, this accessible volume is also ideal for students and instructors seeking a primer on artificial intelligence for vulnerability assessment, or a supplementary text for courses on computer security, networking, and artificial intelligence.
This contributed volume provides the state-of-the-art development on security and privacy for cyber-physical systems (CPS) and industrial Internet of Things (IIoT). More specifically, this book discusses the security challenges in CPS and IIoT systems as well as how Artificial Intelligence (AI) and Machine Learning (ML) can be used to address these challenges. Furthermore, this book proposes various defence strategies, including intelligent cyber-attack and anomaly detection algorithms for different IIoT applications. Each chapter corresponds to an important snapshot including an overview of the opportunities and challenges of realizing the AI in IIoT environments, issues related to data security, privacy and application of blockchain technology in the IIoT environment. This book also examines more advanced and specific topics in AI-based solutions developed for efficient anomaly detection in IIoT environments. Different AI/ML techniques including deep representation learning, Snapshot Ensemble Deep Neural Network (SEDNN), federated learning and multi-stage learning are discussed and analysed as well. Researchers and professionals working in computer security with an emphasis on the scientific foundations and engineering techniques for securing IIoT systems and their underlying computing and communicating systems will find this book useful as a reference. The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, cyber security, and information systems. It also applies to advanced-level students studying electrical engineering and system engineering, who would benefit from the case studies.
Technology has made it possible to conduct research and form research groups that are not limited by geographic location. The field of Collaborative and Distributed E-Research (CDER) studies this phenomenon, specifically focusing on the use of the Internet and Information Technology (IT) to develop international and distributed scientific research. Collaborative and Distributed E-Research: Innovations in Technologies, Strategies and Applications offers insight into practical and methodological issues related to collaborative e-research and furthers our understanding of current and future trends in online research and the types of technologies involved. This book provides a useful foundation for academics and professionals involved in Collaborative and Distributed E-Research, collaborative software development, and computer-supported collaborative work.
The vast reduction in size and power consumption of CMOS circuitry
has led to a large research effort based around the vision of
ubiquitous networks of wireless communication nodes. The wireless
devices are usually designed to run on batteries. However, as the
networks increase in number and the devices decrease in size, the
replacement of depleted batteries is not practical. Furthermore, a
battery that is large enough to last the lifetime of the device
would dominate the overall system size, and thus is not very
attractive. There is clearly a need to explore alternative methods
of powering these small communication nodes. This book, therefore,
focuses on potential "ambient" sources of power that can be
scavenged or harvested and subsequently used to run low power
electronics and wireless transceivers.
Broadband Fixed Wireless Access provides a systematic overview of the emerging WiMAX technology, and much of the material is based on the practical experiences of the authors in building new systems. This material will be of significant interest to network architects and developers of broadband fixed wireless access products. With the advent of the IEEE 802.16 standard (has the standard or any part of it been adopted or is likely to be adopted soon) and next generation equipment, this technology has been growing in interest. The authors discuss applications at microwave frequencies between 2 and 11 GHz that could be attractive options for operators without an existing access infrastructure for reaching end users. This introductory volume demystifies the technology and provides technical exposure to the various system trade-offs. Additionally, the book features the following highlights: detailed modeling of broadband fixed wireless access propagation channel, including new measurements for its time variation; an extensive overview of the IEEE 802.1 discussion of the suitability of various multi-antenna techniques; and elaboration of various techniques, i.e. autodirecting antennas, bridging with WLAN, and multi-hop networking, that can be used to reduce the cost of ownership of a WiMAX network for an operator. The authors cover a wide range of topics, from network deployment to implementation of terminals. Wireless professionals will gain a head start from the information on WiMAX technology. This is a must read book when starting with broadband fixed wireless access.
This book contains selected papers presented at the 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Ispra, Italy, in September 2017. The 12 revised full papers, 5 invited papers and 4 workshop papers included in this volume were carefully selected from a total of 48 submissions and were subject to a three-phase review process. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, and psychological. They are organized in the following topical sections: privacy engineering; privacy in the era of the smart revolution; improving privacy and security in the era of smart environments; safeguarding personal data and mitigating risks; assistive robots; and mobility and privacy.
This book addresses the emerging area of cloud computing, providing a comprehensive overview of the research areas, recent work and open research problems. The move to cloud computing is no longer merely a topic of discussion; it has become a core competency that every modern business needs to embrace and excel at. It has changed the way enterprise and internet computing is viewed, and this success story is the result of the long-term efforts of computing research community around the globe. It is predicted that by 2026 more than two-thirds of all enterprises across the globe will be entirely run in cloud. These predictions have led to huge levels of funding for research and development in cloud computing and related technologies. Accordingly, universities across the globe have incorporated cloud computing and its related technologies in their curriculum, and information technology (IT) organizations are accelerating their skill-set evolution in order to be better prepared to manage emerging technologies and public expectations of the cloud, such as new services.
This book discusses various aspects of cloud computing, in which trust and fault-tolerance models are included in a multilayered, cloud architecture. The authors present a variety of trust and fault models used in the cloud, comparing them based on their functionality and the layer in the cloud to which they respond. Various methods are discussed that can improve the performance of cloud architectures, in terms of trust and fault-tolerance, while providing better performance and quality of service to user. The discussion also includes new algorithms that overcome drawbacks of existing methods, using a performance matrix for each functionality. This book provide readers with an overview of cloud computing and how trust and faults in cloud datacenters affects the performance and quality of service assured to the users. Discusses fundamental issues related to trust and fault-tolerance in Cloud Computing; Describes trust and fault management techniques in multi layered cloud architecture to improve security, reliability and performance of the system; Includes methods to enhance power efficiency and network efficiency, using trust and fault based resource allocation.
Secure two-party computation, called secure function evaluation (SFE), enables two mutually mistrusting parties, the client and server, to evaluate an arbitrary function on their respective private inputs while revealing nothing but the result. Originally the technique was considered to be too inefficient for practical privacy-preserving applications, but in recent years rapid speed-up in computers and communication networks, algorithmic improvements, automatic generation, and optimizations have enabled their application in many scenarios. The author offers an extensive overview of the most practical and efficient modern techniques used in the design and implementation of secure computation and related protocols. After an introduction that sets secure computation in its larger context of other privacy-enhancing technologies such as secure channels and trusted computing, he covers the basics of practically efficient secure function evaluation, circuit optimizations and constructions, hardware-assisted garbled circuit protocols, and the modular design of efficient SFE protocols. The goal of the author's research is to use algorithm engineering methods to engineer efficient secure protocols, both as a generic tool and for solving practical applications, and he achieves an excellent balance between the theory and applicability. The book is essential for researchers, students and practitioners in the area of applied cryptography and information security who aim to construct practical cryptographic protocols for privacy-preserving real-world applications.
This text evaluates wideband CDMA as an effective third generation technology option, giving a picture of the various wideband CDMA standardization activities underway worldwide in the late 1990s. The book compares a range of CDMA design techniques and examines how each affects system performance. It also describes how third generation system applications will impact radio access system design and compares and contrasts each major wideband CDMA standardization proposal currently on the table, including FRAMES wideband CDMA in Europe, Core-A in Japan, wideband IS-95 in the US, and wideband CDMA in Korea. It identifies and describes various air interface access schemes for third and fourth generation mobile communications systems; analyzes wideband CDMA performance in varying radio environments; and discusses the integration of the GSM core network with wideband CDMA.
The sequence of major events that occurred after entering the twenty-first century have all pointed to an effective emergency response as one of the most complex challenges many countries now face. ""Social Computing in Homeland Security: Disaster Promulgation and Response"" presents a theoretical framework addressing how to enhance national response capabilities and ready the public in the presence of human-made or natural disasters. A practical reference for those involved in disaster response and management, this book explores fascinating topics including designing effective threat warning advisories, quantifying public reactions to and confidence in warning advisories, and assessing how anxiety and fear translate into impacts on effective response and social productivity.
An all-encompassing guide to the business, engineering, and regulatory factors shaping the growth of the distance learning industry. This book examines potential providers, users, applications, and problem solutions, and includes actual case studies. An outstanding reference for educators, network service providers, public policy makers, and graduate level engineering students specializing in telecommunications. |
![]() ![]() You may like...
Using WAVES and VHDL for Effective…
James P. Hanna, Robert G. Hillman, …
Hardcover
R4,538
Discovery Miles 45 380
Optimal Operation and Control of Power…
Nnamdi Nwulu, Saheed Lekan Gbadamosi
Hardcover
R3,389
Discovery Miles 33 890
Dark Silicon and Future On-chip Systems…
Suyel Namasudra, Hamid Sarbazi-Azad
Hardcover
R4,186
Discovery Miles 41 860
System Design - A Practical Guide with…
Andreas Gerstlauer, Rainer Doemer, …
Hardcover
R4,505
Discovery Miles 45 050
|