0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (273)
  • R250 - R500 (896)
  • R500+ (13,668)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Fundamental Networking in Java (Hardcover, 2006 ed.): Esmond Pitt Fundamental Networking in Java (Hardcover, 2006 ed.)
Esmond Pitt
R1,619 Discovery Miles 16 190 Ships in 18 - 22 working days

The book provides complete coverage of fundamental IP networking in Java. It introduces the concepts behind TCP/IP and UDP and their intended use and purpose; gives complete coverage of Java networking APIs, includes an extended discussion of advanced server design, so that the various design principles and tradeoffs concerned are discussed and equips the reader with analytic queuing-theory tools to evaluate design alternatives; covers UDP multicasting, and covers multi-homed hosts, leading the reader to understand the extra programming steps and design considerations required in such environments.

After reading this book the reader will have an advanced knowledge of fundamental network design and programming concepts in the Java language, enabling them to design and implement distributed applications with advanced features and to predict their performance. Special emphasis is given to the scalable I/O facilities of Java 1.4 as well as complete treatments of multi-homing and UDP both unicast and multicast.

Advances in Digital Forensics IV (Hardcover, 2008 ed.): Indrajit Ray, Sujeet Shenoi Advances in Digital Forensics IV (Hardcover, 2008 ed.)
Indrajit Ray, Sujeet Shenoi
R2,859 Discovery Miles 28 590 Ships in 18 - 22 working days

Practically every crime now involves some aspect of digital evidence. This is the most recent volume in the Advances in Digital Forensics series. It describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations.

This book contains a selection of twenty-eight edited papers from the Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, held at Kyoto University, Kyoto, Japan in the spring of 2008.

An Introduction to Queueing Theory - and Matrix-Analytic Methods (Hardcover, 2005 ed.): L Breuer, Dieter Baum An Introduction to Queueing Theory - and Matrix-Analytic Methods (Hardcover, 2005 ed.)
L Breuer, Dieter Baum
R1,559 Discovery Miles 15 590 Ships in 18 - 22 working days

The present textbook contains the recordsof a two-semester course on que- ing theory, including an introduction to matrix-analytic methods. This course comprises four hours oflectures and two hours of exercises per week andhas been taughtattheUniversity of Trier, Germany, for about ten years in - quence. The course is directed to last year undergraduate and?rst year gr- uate students of applied probability and computer science, who have already completed an introduction to probability theory. Its purpose is to present - terial that is close enough to concrete queueing models and their applications, while providing a sound mathematical foundation for the analysis of these. Thus the goal of the present book is two-fold. On the one hand, students who are mainly interested in applications easily feel bored by elaborate mathematical questions in the theory of stochastic processes. The presentation of the mathematical foundations in our courses is chosen to cover only the necessary results, which are needed for a solid foundation of the methods of queueing analysis. Further, students oriented - wards applications expect to have a justi?cation for their mathematical efforts in terms of immediate use in queueing analysis. This is the main reason why we have decided to introduce new mathematical concepts only when they will be used in the immediate sequel. On the other hand, students of applied probability do not want any heur- tic derivations just for the sake of yielding fast results for the model at hand.

Semantic Management of Middleware (Hardcover, 2006 ed.): Daniel Oberle Semantic Management of Middleware (Hardcover, 2006 ed.)
Daniel Oberle
R2,808 Discovery Miles 28 080 Ships in 18 - 22 working days

Current middleware solutions, e.g., application servers and Web services, are very complex software products that are hard to tame because of intricacies of distributed systems. Their functionalities have mostly been developed and managed with the help of administration tools and corresponding configuration files, recently in XML. Though this constitutes flexibility for developing and administrating a distributed application, the conceptual model underlying the different configurations is only implicit.

To remedy such problems, Semantic Management of Middleware contributes an ontology-based approach to support the development and administration of middleware-based applications. The ontology is an explicit conceptual model with formal logic-based semantics. Its descriptions may therefore be queried, may foresight required actions, or may be checked to avoid inconsistent system configurations.

This book builds a rigorous approach towards giving the declarative descriptions of components and services a well-defined meaning by specifying ontological foundations and by showing how such foundations may be realized in practical, up-and-running systems.

Trust Management II - Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security,... Trust Management II - Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway (Hardcover, 2008 ed.)
Yucel Karabulut, John C. Mitchell, Peter Herrmann, Christian Damsgaard Jensen
R2,859 Discovery Miles 28 590 Ships in 18 - 22 working days

This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Trondheim, Norway from June 18 to June 20, 2008. IFIPTM 2008 provides a truly global platform for the reporting of research, development, policy and practice in the interdependent areas of Privacy, Security, and Trust. Following the traditions inherited from the highly successful iTrust and PST conference series, IFIPTM 2008 focuses on trust, privacy and security from multidisciplinary perspectives. The conference is an arena for discussion about re levant problems from both research and practice in the areas of academia, busi ness, and government. IFIPTM 2008 is an open IFIP conference, which only accepts contributed pa pers, so all papers in these proceedings have passed strict peer review. The pro gram of the conference features both theoretical research papers and reports of real world case studies. IFIPTM 2008 received 62 submissions. The program commit tee selected 22 papers for presentation and inclusion in the proceedings. In addi tion, the program and the proceedings include 3 demo descriptions. The highlights of IFIPTM 2008 include invited talks and tutorials by industri al and academic experts in the fields of trust management, privacy and security, including Jon Bing and Michael Steiner.

Trusted Cloud Computing (Hardcover, 2014 ed.): Helmut Krcmar, Ralf Reussner, Bernhard Rumpe Trusted Cloud Computing (Hardcover, 2014 ed.)
Helmut Krcmar, Ralf Reussner, Bernhard Rumpe
R3,754 R2,002 Discovery Miles 20 020 Save R1,752 (47%) Ships in 10 - 15 working days

This book documents the scientific results of the projects related to the Trusted Cloud Program, covering fundamental aspects of trust, security, and quality of service for cloud-based services and applications. These results aim to allow trustworthy IT applications in the cloud by providing a reliable and secure technical and legal framework. In this domain, business models, legislative circumstances, technical possibilities, and realizable security are closely interwoven and thus are addressed jointly. The book is organized in four parts on "Security and Privacy", "Software Engineering and Software Quality", "Platforms, Middleware and Integration", and "Social Aspects, Business Models and Standards". It thus provides a holistic view on technological, societal, and legal aspects, which are indispensable not only to ensure the security of cloud services and the data they process, but also to gain the trust of society, business, industry, and science in these services. The ultimate goal of the book, as well as of the Trusted Cloud Program in general, is to distribute these results to a broader audience in both academia and industry, and thus to help with the proliferation of "Industry 4.0" services.

Sustainable Interdependent Networks - From Theory to Application (Hardcover, 1st ed. 2018): M. Hadi Amini, Kianoosh G.... Sustainable Interdependent Networks - From Theory to Application (Hardcover, 1st ed. 2018)
M. Hadi Amini, Kianoosh G. Boroojeni, S.S. Iyengar, Panos M. Pardalos, Frede Blaabjerg, …
R4,211 R3,410 Discovery Miles 34 100 Save R801 (19%) Ships in 10 - 15 working days

This book focuses on the theory and application of interdependent networks. The contributors consider the influential networks including power and energy networks, transportation networks, and social networks. The first part of the book provides the next generation sustainability framework as well as a comprehensive introduction of smart cities with special emphasis on energy, communication, data analytics and transportation. The second part offers solutions to performance and security challenges of developing interdependent networks in terms of networked control systems, scalable computation platforms, and dynamic social networks. The third part examines the role of electric vehicles in the future of sustainable interdependent networks. The fourth and last part of this volume addresses the promises of control and management techniques for the future power grids.

Iso/Iec 27001 - 2022: An introduction to information security and the ISMS standard (Paperback, Revised ed.): Steve G. Watkins Iso/Iec 27001 - 2022: An introduction to information security and the ISMS standard (Paperback, Revised ed.)
Steve G. Watkins
R444 Discovery Miles 4 440 Ships in 18 - 22 working days

ISO/IEC 27001:2022 - An introduction to information security and the ISMS standardThe perfect introduction to the principles of information security management and ISO 27001:2022An ideal resource for anyone wanting a clear, concise and easy-to-read primer on information security, this pocket guide will ensure the ISMS (information security management system) you put in place is effective, reliable and auditable. Written by an acknowledged expert on the ISO/IEC 27001 standard, ISO/IEC 27001:2022 - An introduction to information security and the ISMS standard is an ideal primer for anyone implementing an ISMS aligned to ISO 27001:2022. This must-have resource gives a clear, concise and easy-to-read introduction to information security, providing guidance to ensure the management systems you put in place are effective, reliable and auditable. This pocket guide will help you to: Make informed decisions - Enables key employees to make better decisions before embarking on an information security project. Ensure everyone is up to speed - Gives the non-specialists on the project board and in the project team a clearer understanding of what an ISMS involves, reflecting ISO 27001:2022. Raise awareness among staff - Ensures that your staff know what is at stake with regard to information security and understand what is expected of them. Enhance your competitiveness - Gives you confidence to begin your ISO 27001:2022 implementation journey and let your customers know that the information you hold about them is managed and protected appropriately. Get up to speed with the ISO 27001:2022 updates and keep your information secure

Protocol Specification, Testing and Verification XIV (Hardcover, 1995 ed.): S.T. Vuong, Samuel T. Chanson Protocol Specification, Testing and Verification XIV (Hardcover, 1995 ed.)
S.T. Vuong, Samuel T. Chanson
R4,237 Discovery Miles 42 370 Ships in 18 - 22 working days

This PSTV'94 Symposium is the fourteenth of a series of annual meetings organized under the auspices of IFIP W.G. 6.1, a Working Group dedicated to "Architectures and Protocols for Computer Networks." This is the oldest and most established symposium in the emerging field of protocol engineering which has spawn many international conferences including FORTE (International Conference on Formal Description Tech niques), IWPTS (International Workshop on Protocol Test Systems), ICNP (Interna tional Conference on Network Protocols) and CAY (Conference on Computer-Aided Verification). The main objective of this PSTV symposium is to provide a forum for researchers and practitioners in industry and academia interested in advances in using formal methods and methodologies to specify, develop, test and verify communication protocols and distributed systems. This year's PSTV symposium enjoys a nice mixture of formal methods and practical issues in network protocols through the invited addresses of three outstanding speakers, Ed Brinksma (University of Twente), Raj Jain (Ohio State University) and David Tennenhouse (MIT) as well as 5 tutorials, in addition to 9 techni cal sessions and two practical panel sessions. The 5 tutorials are offered on the first day in two parallel tracks for intensive exposure on hot topics of current interest. This year, out of 51 submissions the Program Committee selected 18 regular papers (with an allotment of 16 pages in the Proceedings) and 9 mini-papers (of 8 pages)."

Topic Detection and Classification in Social Networks - The Twitter Case (Hardcover, 1st ed. 2018): Dimitrios Milioris Topic Detection and Classification in Social Networks - The Twitter Case (Hardcover, 1st ed. 2018)
Dimitrios Milioris
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book provides a novel method for topic detection and classification in social networks. The book addresses several research and technical challenges that are currently being investigated by the research community, from the analysis of relations and communications between members of a community, to quality, authority, relevance and timeliness of the content, traffic prediction based on media consumption, spam detection, to security, privacy and protection of personal information. Furthermore, the book discusses innovative techniques to address those challenges and provides novel solutions based on information theory, sequence analysis and combinatorics, which are applied on real data obtained from Twitter.

IP Networking over Next-Generation Satellite Systems - International Workshop, Budapest, July 2007 (Hardcover, 2008 ed.):... IP Networking over Next-Generation Satellite Systems - International Workshop, Budapest, July 2007 (Hardcover, 2008 ed.)
Linghang Fan, Haitham Cruickshank, Zhili Sun
R5,353 Discovery Miles 53 530 Ships in 18 - 22 working days

This workshop proceedings introduces the latest innovations and trends in IP-based applications and satellite networking. It explains many aspects of advanced satellite networking systems, such as deployment of IPv6 over satellites, working with WLAN and WiMax, and rules concerning multi-segment networks. In addition, the book covers hot-button issues such as security, architecture improvement, resource allocation, video networking, and service integration.

Human Rights Treaties - Considering Patterns of Participation, 1948-2000 (Hardcover): Mark Sachleben Human Rights Treaties - Considering Patterns of Participation, 1948-2000 (Hardcover)
Mark Sachleben
R4,503 Discovery Miles 45 030 Ships in 10 - 15 working days

The book examines patterns of participation in human rights treaties. International relations theory is divided on what motivates states to participate in treaties, specifically human rights treaties. Instead of examining the specific motivations, this dissertation examines patterns of participation. In doing so, it attempts to match theoretical expectations of state behavior with participation. The conclusion of this study is that the data suggests there are multiple motivations that lead states to participate in human rights treaties. The book is divided into five substantive chapters. After an introduction, the second chapter examines the literature on why states join treaties in general, and human rights treaties in particular. The third chapter reviews the obligations states commit to under the fifteen treaties under consideration. The fourth chapter uses basic quantitative methods to examine any differences in the participation rates between democratic and non-democratic states. The fifth chapter examines reservations, declarations, and objections made in conjuncture with the fifteen treaties. The chapter employs both quantitative and qualitative methods to determine if there are substantial differences between democratic and non-democratic states. Finally, the sixth chapter examines those states that participate in the most human rights treaties to determine if there are characteristics that help to identify these states. Additionally, the chapter examines and evaluates theoretical predictions about participation.

Complex Networks and Their Applications VII - Volume 1 Proceedings The 7th International Conference on Complex Networks and... Complex Networks and Their Applications VII - Volume 1 Proceedings The 7th International Conference on Complex Networks and Their Applications COMPLEX NETWORKS 2018 (Hardcover, 1st ed. 2019)
Luca Maria Aiello, Chantal Cherifi, Hocine Cherifi, Renaud Lambiotte, Pietro Lio, …
R5,340 Discovery Miles 53 400 Ships in 18 - 22 working days

This book highlights cutting-edge research in the field of network science, offering scientists, researchers, students and practitioners a unique update on the latest advances in theory, together with a wealth of applications. It presents the peer-reviewed proceedings of the VII International Conference on Complex Networks and their Applications (COMPLEX NETWORKS 2018), which was held in Cambridge on December 11-13, 2018. The carefully selected papers cover a wide range of theoretical topics such as network models and measures; community structure and network dynamics; diffusion, epidemics and spreading processes; and resilience and control; as well as all the main network applications, including social and political networks; networks in finance and economics; biological and neuroscience networks; and technological networks.

Social Engineering - The Science of Human Hacking 2e (Paperback, 2nd Edition): C Hadnagy Social Engineering - The Science of Human Hacking 2e (Paperback, 2nd Edition)
C Hadnagy
R862 R657 Discovery Miles 6 570 Save R205 (24%) Ships in 10 - 15 working days

Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited. Networks and systems can be hacked, but they can also be protected; when the "system" in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer's bag of tricks. Examine the most common social engineering tricks used to gain access Discover which popular techniques generally don't work in the real world Examine how our understanding of the science behind emotions and decisions can be used by social engineers Learn how social engineering factors into some of the biggest recent headlines Learn how to use these skills as a professional social engineer and secure your company Adopt effective counter-measures to keep hackers at bay By working from the social engineer's playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts. Social Engineering gives you the inside information you need to mount an unshakeable defense.

Depth From Defocus: A Real Aperture Imaging Approach (Hardcover, 1999 ed.): Subhasis Chaudhuri Depth From Defocus: A Real Aperture Imaging Approach (Hardcover, 1999 ed.)
Subhasis Chaudhuri; Foreword by A.P. Pentland; A.N. Rajagopalan
R2,752 Discovery Miles 27 520 Ships in 18 - 22 working days

Computer vision is becoming increasingly important in several industrial applications such as automated inspection, robotic manipulations and autonomous vehicle guidance. These tasks are performed in a 3-D world and it is imperative to gather reliable information on the 3-D structure of the scene. This book is about passive techniques for depth recovery, where the scene is illuminated only by natural light as opposed to active methods where a special lighting device is used for scene illumination. Passive methods have a wider range of applicability and also correspond to the way humans infer 3-D structure from visual images.

Performance Modelling and Evaluation of ATM Networks (Hardcover, 1995 ed.): Demetres D. Kouvatsos Performance Modelling and Evaluation of ATM Networks (Hardcover, 1995 ed.)
Demetres D. Kouvatsos
R7,979 Discovery Miles 79 790 Ships in 18 - 22 working days

Asynchronous Transfer Mode (ATM) networks are widely considered to be the new generation of high speed communication systems both for broadband public information highways and for local and wide area private networks. ATM is designed to integrate existing and future voice, audio, image and data services. Moreover, ATM aims to simplify the complexity of switching and buffer management, to optimise intermediate node processing and buffering and to limit transmission delays. However, to support such diverse services on one integrated communication network, it is most essential, through careful engineering, to achieve a fruitful balance amongst the conflicting requirements of different quality of service constraints ensuring that one service does not have adverse implications on another. Over recent years there has been a great deal of progress in research and development of ATM technology, but there are still many interesting and important problems to be resolved such as traffic characterisation and control, routing and optimisation, ATM switching techniques and the provision of quality of service. This book presents thirty-two research papers, both from industry and academia, reflecting latest original achievements in the theory and practice of performance modelling of ATM networks worldwide. These papers were selected, subject to peer review, from those submitted as extended and revised versions out of fifty-nine shorter papers presented at the Second IFIP Workshop on "Performance Modelling and Evaluation of ATM Networks" July 4-7, 1994, Bradford University. At least three referees from the scientific committee and externally were involved in the selection of each paper.

Runtime Reconfiguration in Networked Embedded Systems - Design and Testing Practices (Hardcover, 1st ed. 2016): Zoltan Papp,... Runtime Reconfiguration in Networked Embedded Systems - Design and Testing Practices (Hardcover, 1st ed. 2016)
Zoltan Papp, George Exarchakos
R3,290 Discovery Miles 32 900 Ships in 10 - 15 working days

This book focuses on the design and testing of large-scale, distributed signal processing systems, with a special emphasis on systems architecture, tooling and best practices. Architecture modeling, model checking, model-based evaluation and model-based design optimization occupy central roles. Target systems with resource constraints on processing, communication or energy supply require non-trivial methodologies to model their non-functional requirements, such as timeliness, robustness, lifetime and "evolution" capacity. Besides the theoretical foundations of the methodology, an engineering process and toolchain are described. Real-world cases illustrate the theory and practice tested by the authors in the course of the European project ARTEMIS DEMANES. The book can be used as a "cookbook" for designers and practitioners working with complex embedded systems like sensor networks for the structural integrity monitoring of steel bridges, and distributed micro-climate control systems for greenhouses and smart homes.

Model-Driven Risk Analysis - The CORAS Approach (Hardcover, 2011 ed.): Mass Soldal Lund, Bjornar Solhaug, Ketil Stolen Model-Driven Risk Analysis - The CORAS Approach (Hardcover, 2011 ed.)
Mass Soldal Lund, Bjornar Solhaug, Ketil Stolen
R1,499 Discovery Miles 14 990 Ships in 18 - 22 working days

The term risk is known from many fields, and we are used to references to contractual risk, economic risk, operational risk, legal risk, security risk, and so forth. We conduct risk analysis, using either offensive or defensive approaches to identify and assess risk. Offensive approaches are concerned with balancing potential gain against risk of investment loss, while defensive approaches are concerned with protecting assets that already exist. In this book, Lund, Solhaug and Stolen focus on defensive risk analysis, and more explicitly on a particular approach called CORAS. CORAS is a model-driven method for defensive risk analysis featuring a tool-supported modelling language specially designed to model risks. Their book serves as an introduction to risk analysis in general, including the central concepts and notions in risk analysis and their relations. The authors' aim is to support risk analysts in conducting structured and stepwise risk analysis. To this end, the book is divided into three main parts. Part I of the book introduces and demonstrates the central concepts and notation used in CORAS, and is largely example-driven. Part II gives a thorough description of the CORAS method and modelling language. After having completed this part of the book, the reader should know enough to use the method in practice. Finally, Part III addresses issues that require special attention and treatment, but still are often encountered in real-life risk analysis and for which CORAS offers helpful advice and assistance. This part also includes a short presentation of the CORAS tool support. The main target groups of the book are IT practitioners and students at graduate or undergraduate level. They will appreciate a concise introduction into the emerging field of risk analysis, supported by a sound methodology, and completed with numerous examples and detailed guidelines.

Understanding IPv6 (Hardcover, 2005 ed.): Youngsong Mun, Hyewon Keren Lee Understanding IPv6 (Hardcover, 2005 ed.)
Youngsong Mun, Hyewon Keren Lee
R2,682 Discovery Miles 26 820 Ships in 18 - 22 working days

Covers the basic materials and up-to-date information to understand IPv6, including site local address often overlooked by most other books about IPv6 do not reflect this important fact.

Highlights Teredo, a transistion tool that permits web sites using two different protocols to interact, with complete-chapter coverage..

Since popular applications such as web service can not be operated without DNS. Chapter 9 covers modifications in DNS for IPv6 which other books rarely cover.

Other topics covered that make it a most up-to-date and valuable resource: hierarchical mobility management, fast handoff, and security features such as VPN traversal and firewall traversal.

Smart City Networks - Through the Internet of Things (Hardcover, 1st ed. 2017): Stamatina Th. Rassia, Panos M. Pardalos Smart City Networks - Through the Internet of Things (Hardcover, 1st ed. 2017)
Stamatina Th. Rassia, Panos M. Pardalos
R3,982 Discovery Miles 39 820 Ships in 10 - 15 working days

This book both analyzes and synthesizes new cutting-edge theories and methods for future design implementations in smart cities through interdisciplinary synergizing of architecture, technology, and the Internet of Things (IoT). Implementation of IoT enables the collection and data exchange of objects embedded with electronics, software, sensors, and network connectivity. Recently IoT practices have moved into uniquely identifiable objects that are able to transfer data directly into networks. This book features new technologically advanced ideas, highlighting properties of smart future city networks. Chapter contributors include theorists, computer scientists, mathematicians, and interdisciplinary planners, who currently work on identifying theories, essential elements, and practices where the IoT can impact the formation of smart cities and sustainability via optimization, network analyses, data mining, mathematical modeling and engineering. Moreover, this book includes research-based theories and real world practices aimed toward graduate researchers, experts, practitioners and the general public interested in architecture, engineering, mathematical modeling, industrial design, computer science technologies, and related fields.

Advances in Communication, Cloud, and Big Data - Proceedings of 2nd National Conference on CCB 2016 (Hardcover, 1st ed. 2019):... Advances in Communication, Cloud, and Big Data - Proceedings of 2nd National Conference on CCB 2016 (Hardcover, 1st ed. 2019)
Hiren Kumar Deva Sarma, Samarjeet Borah, Nitul Dutta
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book is an outcome of the second national conference on Communication, Cloud and Big Data (CCB) held during November 10-11, 2016 at Sikkim Manipal Institute of Technology. The nineteen chapters of the book are some of the accepted papers of CCB 2016. These chapters have undergone review process and then subsequent series of improvements. The book contains chapters on various aspects of communication, computation, cloud and big data. Routing in wireless sensor networks, modulation techniques, spectrum hole sensing in cognitive radio networks, antenna design, network security, Quality of Service issues in routing, medium access control protocol for Internet of Things, and TCP performance over different routing protocols used in mobile ad-hoc networks are some of the topics discussed in different chapters of this book which fall under the domain of communication. Moreover, there are chapters in this book discussing topics like applications of geographic information systems, use of radar for road safety, image segmentation and digital media processing, web content management system, human computer interaction, and natural language processing in the context of Bodo language. These chapters may fall under broader domain of computation. Issues like robot navigation exploring cloud technology, and application of big data analytics in higher education are also discussed in two different chapters. These chapters fall under the domains of cloud and big data, respectively.

Social Multimedia Signals - A Signal Processing Approach to Social Network Phenomena (Hardcover, 2015 ed.): Suman Deb Roy,... Social Multimedia Signals - A Signal Processing Approach to Social Network Phenomena (Hardcover, 2015 ed.)
Suman Deb Roy, Wenjun Zeng
R3,812 R3,281 Discovery Miles 32 810 Save R531 (14%) Ships in 10 - 15 working days

This book provides a comprehensive coverage of the state-of-the-art in understanding media popularity and trends in online social networks through social multimedia signals. With insights from the study of popularity and sharing patterns of online media, trend spread in social media, social network analysis for multimedia and visualizing diffusion of media in online social networks. In particular, the book will address the following important issues: Understanding social network phenomena from a signal processing point of view; The existence and popularity of multimedia as shared and social media, how content or origin of sharing activity can affect its spread and popularity; The network-signal duality principle, i.e., how the signal tells us key properties of information diffusion in networks; The social signal penetration hypothesis, i.e., how the popularity of media in one domain can affect the popularity of media in another. The book will help researchers, developers and business (advertising/marketing) individuals to comprehend the potential in exploring social multimedia signals collected from social network data quantitatively from a signal processing perspective.

Networks and Grids - Technology and Theory (Hardcover, 2007 ed.): Thomas G. Robertazzi Networks and Grids - Technology and Theory (Hardcover, 2007 ed.)
Thomas G. Robertazzi
R2,705 Discovery Miles 27 050 Ships in 10 - 15 working days

This useful volume adopts a balanced approach between technology and mathematical modeling in computer networks, covering such topics as switching elements and fabrics, Ethernet, and ALOHA design. The discussion includes a variety of queueing models, routing, protocol verification and error codes and divisible load theory, a new modeling technique with applications to grids and parallel and distributed processing. Examples at the end of each chapter provide ample material for practice. This book can serve as an text for an undergraduate or graduate course on computer networks or performance evaluation in electrical and computer engineering or computer science.

Telegeoinformatics - Location-Based Computing and Services (Hardcover): Hassan A. Karimi Telegeoinformatics - Location-Based Computing and Services (Hardcover)
Hassan A. Karimi
R5,508 Discovery Miles 55 080 Ships in 10 - 15 working days


Author Biography:
Dr. Hassan A. Karimi is Assistant Professor and Director of Geoinformatics Program in the Department of Information Science and Telecommunications at the University of Pittsburgh. His main research interests include geospatial information systems (GISs), Global Positioning System (GPS), remote sensing, location-based computing and services, mobile computing, spatial databases, spatial algorithms, computational geometry, parallel/distributed computing, and spatial uncertainty measurement and modelling.

Dr. Amin Hammad is a Visiting Scholar at Carnegie Mellon University and University of Pittsburgh. Prior to his current position, he was Assistant Professor in the Department of Civil Engineering of Nagoya University, Japan, for six years. His main research interest is the application of geomatics and mobile computing in civil engineering and urban planning.

Both editors have strong background in the theme of the proposed book. They have been actively engaged in research and teaching related to the subjects in the book.

Telecommunication Network Intelligence - IFIP TC6/WG6.7 Sixth International Conference on Intelligence in Networks (SmartNet... Telecommunication Network Intelligence - IFIP TC6/WG6.7 Sixth International Conference on Intelligence in Networks (SmartNet 2000), September 18-22, 2000, Vienna, Austria (Hardcover, 1997 ed.)
Harmen R.Van As
R5,490 Discovery Miles 54 900 Ships in 18 - 22 working days

Telecommunication Network Intelligence is a state-of-the-art book that deals with issues related to the development, distribution, and management of intelligent capabilities and services in telecommunication networks. The book contains recent results of research and development in the following areas, among others: Platforms for Advanced Services; Active and Programmable Networks; Network Security, Intelligence, and Monitoring; Quality-of-Service Management; Mobile Agents; Dynamic Switching and Network Control; Services in Wireless Networks; Infrastructure for Flexible Services. Telecommunication Network Intelligence comprises the proceedings of SmartNet 2000, the Sixth International Conference on Intelligence in Networks, which was sponsored by the International Federation for Information Processing (IFIP) and held at the Vienna University of Technology, Vienna, Austria, in September 2000.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cloud Technology - Concepts…
Irma Hardcover R17,858 Discovery Miles 178 580
If I Survive You
Jonathan Escoffery Paperback R295 R233 Discovery Miles 2 330
Instruction Level Parallelism
Alex Aiken, Utpal Banerjee, … Hardcover R2,735 Discovery Miles 27 350
Research Anthology on Physical and…
Information R Management Association Hardcover R10,574 Discovery Miles 105 740
Nova - Renegades: Book 2
Rebecca Yarros Paperback R305 R272 Discovery Miles 2 720
True Life Story of Dallas and Marie…
Dallas T Tillman Hardcover R601 R545 Discovery Miles 5 450
Fourth Wing - The Empyrean: Book 1
Rebecca Yarros Paperback  (3)
R305 R272 Discovery Miles 2 720
Parallel Programming for Modern High…
Pawel Czarnul Paperback R1,495 Discovery Miles 14 950
Cowgirl Up! - A History of Rodeo Women
Heidi Thomas Paperback R382 Discovery Miles 3 820
Limits to Parallel Computation…
Raymond Greenlaw, H. James Hoover, … Hardcover R5,295 Discovery Miles 52 950

 

Partners