![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer communications & networking
This book focuses on novel and state-of-the-art scientific work in the area of detection and prediction techniques using information found generally in graphs and particularly in social networks. Community detection techniques are presented in diverse contexts and for different applications while prediction methods for structured and unstructured data are applied to a variety of fields such as financial systems, security forums, and social networks. The rest of the book focuses on graph-based techniques for data analysis such as graph clustering and edge sampling. The research presented in this volume was selected based on solid reviews from the IEEE/ACM International Conference on Advances in Social Networks, Analysis, and Mining (ASONAM '17). Chapters were then improved and extended substantially, and the final versions were rigorously reviewed and revised to meet the series standards. This book will appeal to practitioners, researchers and students in the field.
The rate of cybercrimes is increasing because of the fast-paced advancements in computer and internet technology. Crimes employing mobile devices, data embedding/mining systems, computers, network communications, or any malware impose a huge threat to data security. Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems addresses current problems and issues emerging in cyber forensics and investigations and proposes new solutions that can be adopted and implemented to counter security breaches within various organizations. The publication examines a variety of topics such as advanced techniques for forensic developments in computer and communication-link environments and legal perspectives including procedures for cyber investigations, standards, and policies. It is designed for policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.
The growing presence of smart phones and smart devices has caused significant changes to wireless networks. With the ubiquity of these technologies, there is now increasingly more available data for mobile operators to utilize. Big Data Applications in the Telecommunications Industry is a comprehensive reference source for the latest scholarly material on the use of data analytics to study wireless networks and examines how these techniques can increase reliability and profitability, as well as network performance and connectivity. Featuring extensive coverage on relevant topics, such as accessibility, traffic data, and customer satisfaction, this publication is ideally designed for engineers, students, professionals, academics, and researchers seeking innovative perspectives on data science and wireless network communications. Topics Covered The many academic areas covered in this publication include, but are not limited to: Anomaly Detection Co-Occurrence Data Modeling Consumer Feedback Customer Satisfaction and Retention Network Accessibility Social Networks Traffic Data
This book provides a comprehensive review of all aspects relating to visual quality assessment for stereoscopic images, including statistical mathematics, stereo vision and deep learning. It covers the fundamentals of stereoscopic image quality assessment (SIQA), the relevant engineering problems and research significance, and also offers an overview of the significant advances in visual quality assessment for stereoscopic images, discussing and analyzing the current state-of-the-art in SIQA algorithms, the latest challenges and research directions as well as novel models and paradigms. In addition, a large number of vivid figures and formulas help readers gain a deeper understanding of the foundation and new applications of objective stereoscopic image quality assessment technologies. Reviewing the latest advances, challenges and trends in stereoscopic image quality assessment, this book is a valuable resource for researchers, engineers and graduate students working in related fields, including imaging, displaying and image processing, especially those interested in SIQA research.
This book provides readers with an overview of the architectures, programming frameworks, and hardware accelerators for typical cloud computing applications in data centers. The authors present the most recent and promising solutions, using hardware accelerators to provide high throughput, reduced latency and higher energy efficiency compared to current servers based on commodity processors. Readers will benefit from state-of-the-art information regarding application requirements in contemporary data centers, computational complexity of typical tasks in cloud computing, and a programming framework for the efficient utilization of the hardware accelerators.
Modern society is increasingly information-driven, relying heavily on Information Systems (IS) and Information Technology (IT). Business enterprises are no exception, and managers and leaders must learn to make the most of the information resources at their disposal or risk falling behind the times. Information Systems and Technology for Organizations in a Networked Society discusses methods of using information technologies to support organizational and business objectives in both national and international contexts. This reference book describes the latest research on both the technical and non-technical aspects of contemporary information societies, including e-commerce, e-learning, e-government, and e-health; supporting professionals and academicians in developing a deeper understanding of the most effective models for communication, collaboration, and business development. This book is part of the Advances in Business Information Systems and Analytics series collection.
Blockchain Technology: Platforms, Tools and Use Cases, Volume 111, the latest release in the Advances in Computers series published since 1960, presents detailed coverage of innovations in computer hardware, software, theory, design and applications. In addition, it provides contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles usually allow. This volume has 8 Chapters that discuss the various aspects of Blockchain technology.
This book discusses the new roles that the VLSI (very-large-scale integration of semiconductor circuits) is taking for the safe, secure, and dependable design and operation of electronic systems. The book consists of three parts. Part I, as a general introduction to this vital topic, describes how electronic systems are designed and tested with particular emphasis on dependability engineering, where the simultaneous assessment of the detrimental outcome of failures and cost of their containment is made. This section also describes the related research project "Dependable VLSI Systems," in which the editor and authors of the book were involved for 8 years. Part II addresses various threats to the dependability of VLSIs as key systems components, including time-dependent degradations, variations in device characteristics, ionizing radiation, electromagnetic interference, design errors, and tampering, with discussion of technologies to counter those threats. Part III elaborates on the design and test technologies for dependability in such applications as control of robots and vehicles, data processing, and storage in a cloud environment and heterogeneous wireless telecommunications. This book is intended to be used as a reference for engineers who work on the design and testing of VLSI systems with particular attention to dependability. It can be used as a textbook in graduate courses as well. Readers interested in dependable systems from social and industrial-economic perspectives will also benefit from the discussions in this book.
This book presents the proceedings of SICC 2017, a conference devoted to promoting the dissemination of the different methodologies, techniques, theories, strategies, technologies and best practices on the prevention and mitigation of CBRNE risks. As the first scientific international conference on safety & security issues in the CBRNE field, SICC 2017 attracted contributions resulting from fruitful inter-professional collaborations between university and military experts, specialized operators, decision makers and the industry. As such, these proceedings are primarily intended for academics and professionals from public, private and military entities. It is the first trans-disciplinary collection of scientific papers from the numerous fields related to CBRNE.
Microsoft Exchange 2000 Infrastructure Design explains from a
system designer's and administrator's perspective Microsoft's
Active Directory and its interaction with Exchange 2000, details
issues concerned with migration to Exchange 2000, and outlines the
specific technology and design issues relating to connectivity with
Exchange 2000. Readers will learn to use these technologies to
seamlessly co-exist with their current environment, migrate to a
native Exchange 2000 environment, and connect to the Internet as
well as to other messaging systems. The book's blend of expert
instruction and best practices will help any organization create
optimal system designs and configurations to support different
technical and business scenarios.
Broad and up-to-date coverage of the principles and practice in the fast moving area of Distributed Systems. Distributed Systems provides students of computer science and engineering with the skills they will need to design and maintain software for distributed applications. It will also be invaluable to software engineers and systems designers wishing to understand new and future developments in the field. From mobile phones to the Internet, our lives depend increasingly on distributed systems linking computers and other devices together in a seamless and transparent way. The fifth edition of this best-selling text continues to provide a comprehensive source of material on the principles and practice of distributed computer systems and the exciting new developments based on them, using a wealth of modern case studies to illustrate their design and development. The depth of coverage will enable students to evaluate existing distributed systems and design new ones.
The recent developments in wireless communications, networking, and embedded systems have driven various innovative Internet of Things (IoT) applications, e.g., smart cities, mobile healthcare, autonomous driving and drones. A common feature of these applications is the stringent requirements for low-latency communications. Considering the typical small payload size of IoT applications, it is of critical importance to reduce the size of the overhead message, e.g., identification information, pilot symbols for channel estimation, and control data. Such low-overhead communications also help to improve the energy efficiency of IoT devices. Recently, structured signal processing techniques have been introduced and developed to reduce the overheads for key design problems in IoT networks, such as channel estimation, device identification, and message decoding. By utilizing underlying system structures, including sparsity and low rank, these methods can achieve significant performance gains. This book provides an overview of four general structured signal processing models: a sparse linear model, a blind demixing model, a sparse blind demixing model, and a shuffled linear model, and discusses their applications in enabling low-overhead communications in IoT networks. Further, it presents practical algorithms based on both convex and nonconvex optimization approaches, as well as theoretical analyses that use various mathematical tools.
This book provides an overview of the most recent developments in Internet of Things (IoT) security and data protection. It presents the results of several international research projects addressing this topic from complementary angles. It starts by analyzing the main privacy and security threats on IoT, as well as the evolution of data protection norms, such as the European General Data Protection Regulation (GDPR), and their impact on IoT. Through a comprehensive and systematic approach, the contributors present new perspectives on IoT & Cloud Computing security requirements. They discuss the most recent approach to support trusted IoT, including new models of privacy risk assessment, labeling and certification, and contractual tools (such as Privacy PACT). Practical implementations, such as in the European Large Scale Pilots on IoT for Smart Cities (Synchronicity), are presented, explaining how they address security, privacy and data protection. Finally, innovative models to secure IoT systems are presented for the network and end-nodes security, including network threats analysis.
Over the past decade, the Command and Control (C2) field has been making a transformation from top-down, directive command to Network Centric Operations (NCO), peer-to-peer negation, self-synchronization, and agility. As the terms NCO and NEC suggest, C2 systems are regarded as networks, rather than a hierarchy. Accordingly, it is appropriate to view the C2 process and C2 systems through the lens of network theory. Network Topology in Command and Control: Organization, Operation, and Evolution aims to connect the fields of C2 and network science. Featuring timely research on topics pertaining to the C2 network evolution, security, and modelling, this publication is ideal for reference use by students, academicians, and security professionals in the fields of C2 and network science.
The progressive combination of cloud computing and Internet of Things (IoT) will enable new monitoring services, create powerful processing of sensory data streams, and provide a new method for intelligent perception and connection. Examining Cloud Computing Technologies Through the Internet of Things is a pivotal reference source for scholarly research on the latest and innovative facets of cloud-based Internet of Things systems including technical evaluations and comparisons of existing concepts. Featuring coverage on a broad range of topics such as fog computing, network programming, and data security, this book is geared towards advanced-level students, researchers, and professionals interested in exploring and implementing the IoT and related technologies.
Information security systems have become more popular due to the prevalence of criminal activity over benign attacks. Because computer systems are constantly changing, it is important to explore new security measures and unconventional approaches to solving issues. Information Security in Diverse Computing Environments provides the latest empirical research and theoretical frameworks in the area of information security. This reference book presents research on developing sufficient security measures for new environments by discussing challenges faced by researchers as well as unconventional solutions to these problems. This book will be useful for academics, students, professionals, executives, and researchers who want to improve their understanding of the role of information security at different levels of the knowledge society.
For courses on Distributed Systems, Distributed Operating Systems, and Advanced Operating Systems focusing on distributed systems, found in departments of Computer Science, Computer Engineering and Electrical Engineering. Very few textbooks today explore distributed systems in a manner appropriate for university students. In this unique text, esteemed authors Tanenbaum and van Steen provide full coverage of the field in a systematic way that can be readily used for teaching. No other text examines the underlying principles - and their applications to a wide variety of practical distributed systems - with this level of depth and clarity.
"The age of You" is about our new society and how we all breaks away from established rules about communication, relationships and the way we do business. Its also the history about a major shift: Increasingly, we take control over our personal and commercial relationships, we decide who we want to listen to, and how we want to engage ourselves. The book is explaining the historical development, concepts and the foundation of networks, relations, social media and the new connected society, as well as practical strategic guidelines to benefit from it. By using historical events, storytelling, models and case studies, the book is a thrilling story about YOU and how to succeed in the connected society. Storytelling in a connected society unlocks the need for new models and approaches. Here, the author gives us a deeper understanding of the challenges ahead and what we need to do to effectively connect with and earn relevance within society. Brian Solis, author of What's the Future of Business Really interesting. There is a major need for this type of literature. Anne Grethe Solberg, Sociologist and Doctor PH. D. The last year I have read almost everything about the subject. This is by far the best book on social media. Inger Line Skjerve, Master student (BI):
Wireless networking is considered by many to be the future of communication technology, as the demand for high quality, mobile connection increases across the world. Wireless Network Traffic and Quality of Service Support: Trends and Standards examines cutting edge approaches for the provision of Quality of Service (QoS) in wireless local area networks, presenting the latest solutions towards the optimization of the channel management and routing in infrastructure and ad hoc wireless networks. This book also analyzes traffic categorization issues and methods that can predict the available QoS, as well as managing wireless mesh networks and wireless sensor networks. It also examines the entire user experience, by treating energy conservation techniques to maximize mobile devices' battery lifetime. It is a vital foundation for researchers dealing with the problems of today to create the new networks of the future.
This book focuses on recent topics related to the convergence of information and communication technologies (ICT) and computing with smart devices. Domain areas of application include social, industrial, business development, and day to day life aspects. This book presents chapters related to the aforementioned topics including case studies showcasing future technological trends and challenges. Topics social inclusion solutions and social changes; smart devices and applications for day to day life; smart IoT and applications; and smart cities solutions. The book is applicable to researchers, students, professionals, and professors in a wide range of fields. Focuses on recent developments in ICT and smart devices that pose a clear benefit for users; Presents applications of ICT in education, health, electronics, communication, networking, computing, tourism, transportation; Appeals to researchers, academics, and professionals in a cross section of disciplines.
This book introduces readers to mobile information services for networks. The content is divided into eight chapters, each of which presents a specific concept and the latest related developments in mobile information services. Mobile information services for networks can be defined as platform-independent functional entities that provide various services based on the communication network platform. The book discusses the three main supporting technologies for mobile information services: neighbor discovery in the data link layer; routing and balanced association in the network layer; and community structure detection in the application layer. Lastly, the book describes the development of applications based on the authors' mobile information service platform, as well as related key technologies in the domains of intelligent transportation, smart tourism, and mobile payment, such as trajectory analysis, location recommendation, and mobile behavior authentication, which are promoting the development of mobile information services. This book offers a valuable reference guide for researchers in the field of computer science and technology, as well as those in the field of network mobile information service technology.
E-governance is an application of IT; holding uses for the delivery of Government services, information exchange between Government to public, e-business, and various. However, the aim of cybersecurity is to provide security from cyber-attacks from the view of emerging technology is used by hackers. Hence, it is important to provide fast protection application software and structure. In this scenario, the government may be focused to provide capable Internet carefully without the risk of fraud. These days the study deliberates about the issue of the world while technology is helping and fruitful on each step of life like e-Governance applications. Though, has been limited study has been done by a previous study on protocols of cybersecurity for e-Governance.
This book focuses on the multidisciplinary state-of-the-art of full-duplex wireless communications and applications. Moreover, this book contributes with an overview of the fundamentals of full-duplex communications, and introduces the most recent advances in self-interference cancellation from antenna design to digital domain. Moreover, the reader will discover analytical and empirical models to deal with residual self-interference and to assess its effects in various scenarios and applications. Therefore, this is a highly informative and carefully presented book by the leading scientists in the area, providing a comprehensive overview of full-duplex technology from the perspective of various researchers, and research groups worldwide. This book is designed for researchers and professionals working in wireless communications and engineers willing to understand the challenges and solutions full-duplex communication so to implement a full-duplex system.
Mission-Critical Microsoft Exchange 2000 is the definitive book on
how to design and maintain extremely reliable and adaptive Exchange
Server messaging systems that rarely crash and that preserve
valuable data and services in spite of technical disruptions.
E-mail systems are now a primary means of communication for
organizations, which can afford e-mail down-time no more than they
can afford to be without phones. Further, messaging systems
increasingly are supporting vital applications in addition to
e-mail, such as workflow and knowledge management, making the data
they store both voluminous and incredibly valuable. |
![]() ![]() You may like...
Applied Probability - From Random…
Valerie Girardin, Nikolaos Limnios
Hardcover
R2,284
Discovery Miles 22 840
Mathematics for Computer Science
Eric Lehman, F.Thomson Leighton, …
Hardcover
R1,660
Discovery Miles 16 600
Engineering Production-Grade Shiny Apps
Colin Fay, Sebastien Rochette, …
Paperback
R1,693
Discovery Miles 16 930
A Simple Guide to SPSS (R) for Political…
Lee Kirkpatrick, Quentin Kidd
Paperback
Statistical Trend Analysis of Physically…
Behrouz Zolfaghari, Khodakhast Bibak, …
Hardcover
R1,605
Discovery Miles 16 050
|