0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (251)
  • R250 - R500 (867)
  • R500+ (13,692)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing (Hardcover, 2013... Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing (Hardcover, 2013 ed.)
Vinu V. Das
R5,276 Discovery Miles 52 760 Ships in 18 - 22 working days

Third International Conference on Recent Trends in Information, Telecommunication and Computing - ITC 2012. ITC 2012 will be held during Aug 03-04, 2012, Kochi, India. ITC 2012, is to bring together innovative academics and industrial experts in the field of Computer Science, Information Technology, Computational Engineering, and Communication to a common forum. The primary goal of the conference is to promote research and developmental activities in Computer Science, Information Technology, Computational Engineering, and Communication. Another goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners.

Steiner Trees in Industry (Hardcover, 2001 ed.): Xiuzhen Cheng, Dingzhu Du Steiner Trees in Industry (Hardcover, 2001 ed.)
Xiuzhen Cheng, Dingzhu Du
R5,423 Discovery Miles 54 230 Ships in 18 - 22 working days

This book is a collection of articles studying various Steiner tree prob lems with applications in industries, such as the design of electronic cir cuits, computer networking, telecommunication, and perfect phylogeny. The Steiner tree problem was initiated in the Euclidean plane. Given a set of points in the Euclidean plane, the shortest network interconnect ing the points in the set is called the Steiner minimum tree. The Steiner minimum tree may contain some vertices which are not the given points. Those vertices are called Steiner points while the given points are called terminals. The shortest network for three terminals was first studied by Fermat (1601-1665). Fermat proposed the problem of finding a point to minimize the total distance from it to three terminals in the Euclidean plane. The direct generalization is to find a point to minimize the total distance from it to n terminals, which is still called the Fermat problem today. The Steiner minimum tree problem is an indirect generalization. Schreiber in 1986 found that this generalization (i.e., the Steiner mini mum tree) was first proposed by Gauss."

The Grid 2 - Blueprint for a New Computing Infrastructure (Hardcover, 2nd edition): Ian Foster, Carl Kesselman The Grid 2 - Blueprint for a New Computing Infrastructure (Hardcover, 2nd edition)
Ian Foster, Carl Kesselman
R1,682 Discovery Miles 16 820 Ships in 10 - 15 working days

"The Grid is an emerging infrastructure that will fundamentally change the way we think about-and use-computing. The word Grid is used by analogy with the electric power grid, which provides pervasive access to electricity and has had a dramatic impact on human capabilities and society. Many believe that by allowing all components of our information technology infrastructure-computational capabilities, databases, sensors, and people-to be shared flexibly as true collaborative tools the Grid will have a similar transforming effect, allowing new classes of applications to emerge."
-From the Preface
In 1998, Ian Foster and Carl Kesselman introduced a whole new concept in computing with the first edition of this book. Today there is a broader and deeper understanding of the nature of the opportunities offered by Grid computing and the technologies needed to realize those opportunities. In Grid 2, the editors reveal the revolutionary impact of large-scale resource sharing and virtualization within science and industry, the intimate relationships between organization and resource sharing structures and the new technologies required to enable secure, reliable, and efficient resource sharing on large scale.
Foster and Kesselman have once again assembled a team of experts to present an up-to-date view of Grids that reports on real experiences and explains the available technologies and new technologies emerging from labs, companies and standards bodies. Grid 2, like its predecessor, serves as a manifesto, design blueprint, user guide and research agenda for future Grid systems.
*30 chapters including more than a dozen completely new chapters.
*Web access to 13 unchanged chapters from the first edition.
*Three personal essays by influential thinkers on the significance of Grids from the perspectives of infrastructure, industry, and science.
*A foundational overview of the central Grid concepts and architectural principles.
*Twelve application vignettes showcase working Grids in science, engineering, industry, and commerce.
*Detailed discussions of core architecture and services, data and knowledge management, and higher-level tools.
*Focused presentations on production Grid deployment, computing platforms, peer-to-peer technologies, and network infrastructures.
*Extensive bibliography and glossary.

Cryptographic Algorithms on Reconfigurable Hardware (Hardcover, 2007 ed.): Francisco Rodriguez-henriquez, N. A. Saqib, Arturo... Cryptographic Algorithms on Reconfigurable Hardware (Hardcover, 2007 ed.)
Francisco Rodriguez-henriquez, N. A. Saqib, Arturo Diaz Perez, Cetin Kaya Koc
R4,898 Discovery Miles 48 980 Ships in 18 - 22 working days

Software-based cryptography can be used for security applications where data traffic is not too large and low encryption rate is tolerable. But hardware methods are more suitable where speed and real-time encryption are needed. Until now, there has been no book explaining how cryptographic algorithms can be implemented on reconfigurable hardware devices. This book covers computational methods, computer arithmetic algorithms, and design improvement techniques needed to implement efficient cryptographic algorithms in FPGA reconfigurable hardware platforms. The author emphasizes the practical aspects of reconfigurable hardware design, explaining the basic mathematics involved, and giving a comprehensive description of state-of-the-art implementation techniques.

Advances in Ubiquitous Computing - Future Paradigms and Directions (Hardcover): Soraya Kouadri Mostefaoui, Zakaria Maamar,... Advances in Ubiquitous Computing - Future Paradigms and Directions (Hardcover)
Soraya Kouadri Mostefaoui, Zakaria Maamar, George M Giaglis
R2,627 Discovery Miles 26 270 Ships in 18 - 22 working days

The development and availability of new computing and communication devices, and the increased connectivity between these devices, thanks to wired and wireless networks, are enabling new opportunities for people to perform their operations anywhere and anytime. This technological expansion has developed a multitude of challenges that demand further research. ""Advances in Ubiquitous Computing: Future Paradigms and Directions"" investigates the technology foreground of ubiquitous computing, the emerging applications and services, as well as certain social issues that are vital for the successful deployment of a ubiquitous computing application, through a multi-perspective analytical lens.Providing academics and practitioners with high quality, authoritative content on such topics as device design, wireless communication, location sensing, privacy concerns, attention focus, multi-person interaction, and direct interaction, work patterns, this Premier Reference Source is a must-have addition to library collections worldwide.

Advances in Mobile Cloud Computing and Big Data in the 5G Era (Hardcover, 1st ed. 2017): Constandinos X. Mavromoustakis, George... Advances in Mobile Cloud Computing and Big Data in the 5G Era (Hardcover, 1st ed. 2017)
Constandinos X. Mavromoustakis, George Mastorakis, Ciprian Dobre
R5,113 Discovery Miles 51 130 Ships in 10 - 15 working days

This book reports on the latest advances on the theories, practices, standards and strategies that are related to the modern technology paradigms, the Mobile Cloud computing (MCC) and Big Data, as the pillars and their association with the emerging 5G mobile networks. The book includes 15 rigorously refereed chapters written by leading international researchers, providing the readers with technical and scientific information about various aspects of Big Data and Mobile Cloud Computing, from basic concepts to advanced findings, reporting the state-of-the-art on Big Data management. It demonstrates and discusses methods and practices to improve multi-source Big Data manipulation techniques, as well as the integration of resources availability through the 3As (Anywhere, Anything, Anytime) paradigm, using the 5G access technologies.

Configuring ISA Server 2004 (Paperback, 2nd ed): Thomas W. Shinder, Debra Littlejohn Shinder Configuring ISA Server 2004 (Paperback, 2nd ed)
Thomas W. Shinder, Debra Littlejohn Shinder; Edited by Martin Grasdal
R893 Discovery Miles 8 930 Ships in 10 - 15 working days

Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and ISAserver.org. Tom and Deb's book on the first release of the product "Configuring ISA Server 2000" dominated the ISA Server 2000 book market having sold over 40,000 copies worldwide, and the ISA Server community is eagerly awaiting Tom and Deb's book on ISA Server 2004, which is the dramatically upgraded new release from Microsoft.
Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and ISAserver.org. Tom and Deb's book on the first release of the product "Configuring ISA Server 2000" dominated the ISA Server 2000 book market having sold over 40,000 copies worldwide, and the ISA Server community is eagerly awaiting Tom and Deb's book on ISA Server 2004, which is the dramatically upgraded new release from Microsoft. This book will be featured prominently on the ISAserver.org home page as well as referenced on Microsoft TechNet and ISA Server Web pages. Tom and Deb's unparalleled technical expertise combined with prime on-line marketing opportunities will make this the #1 book again in the ISA Server market.
* This book will provide readers with unparalleled information on installing, confiuguring, and troubleshooting ISA Server 2004 by teaching readers to: * Deploy ISA Server 2004 in small businesses and large organizations.
* Learn how to configure complex DMZ configurations using ISA Server 2004's new network awareness features and built-in multinetworking capabilities.
* Learn how to take advantage of ISA Server 2004's new VPN capabilities

QoS in Packet Networks (Hardcover): Kun I. Park QoS in Packet Networks (Hardcover)
Kun I. Park
R2,669 Discovery Miles 26 690 Ships in 18 - 22 working days

QoS is an important subject which occupies a central place in overall packet network technologies. A complex subject, its analysis involves such mathematical disciplines as probability, random variables, stochastic processes and queuing. These mathematical subjects are abstract, not easy to grasp for uninitiated persons.

QoS in Packet Networks is written with two objectives. The first explains the fundamental mathematical concepts used in QoS analysis as plainly as possible, in layman's terms to afford the reader a better appreciation of the subject of QoS treated in this book. The second explains in plain language, the various parts of QoS in packet networks, to provide the reader with a complete view of this complex and dynamic area of communications networking technology. Discussion of the functional requirements of the packet networks to provide QoS is included.

Communication Networking - An Analytical Approach (Hardcover): Anurag Kumar, D Manjunath, Joy Kuri Communication Networking - An Analytical Approach (Hardcover)
Anurag Kumar, D Manjunath, Joy Kuri
R2,269 Discovery Miles 22 690 Ships in 10 - 15 working days

Communication Networking is a comprehensive, effectively organized introduction to the realities of communication network engineering. Written for both the workplace and the classroom, this book lays the foundation and provides the answers required for building an efficient, state-of-the-art network-one that can expand to meet growing demand and evolve to capitalize on coming technological advances. It focuses on the three building blocks out of which a communication network is constructed: multiplexing, switching, and routing. The discussions are based on the viewpoint that communication networking is about efficient resource sharing. The progression is natural: the book begins with individual physical links and proceeds to their combination in a network. The approach is analytical: discussion is driven by mathematical analyses of and solutions to specific engineering problems. Fundamental concepts are explained in detail and design issues are placed in context through real world examples from current technologies. The text offers in-depth coverage of many current topics, including network calculus with deterministically-constrained traffic; congestion control for elastic traffic; packet switch queuing; switching architectures; virtual path routing; and routing for quality of service. It also includes more than 200 hands-on exercises and class-tested problems, dozens of schematic figures, a review of key mathematical concepts, and a glossary. This book will be of interest to networking professionals whose work is primarily architecture definition and implementation, i.e., network engineers and designers at telecom companies, industrial research labs, etc. It will also appeal to final year undergrad and first year graduate students in EE, CE, and CS programs.

Resource Allocation with Carrier Aggregation in Cellular Networks - Optimality and Spectrum Sharing using C++ and MATLAB... Resource Allocation with Carrier Aggregation in Cellular Networks - Optimality and Spectrum Sharing using C++ and MATLAB (Hardcover, 1st ed. 2018)
Haya Shajaiah, Ahmed Abdelhadi, Charles Clancy
R4,283 Discovery Miles 42 830 Ships in 10 - 15 working days

This book introduces an efficient resource management approach for future spectrum sharing systems. The book focuses on providing an optimal resource allocation framework based on carrier aggregation to allocate multiple carriers' resources efficiently among mobile users. Furthermore, it provides an optimal traffic dependent pricing mechanism that could be used by network providers to charge mobile users for the allocated resources. The book provides different resource allocation with carrier aggregation solutions, for different spectrum sharing scenarios, and compares them. The provided solutions consider the diverse quality of experience requirement of multiple applications running on the user's equipment since different applications require different application performance. In addition, the book addresses the resource allocation problem for spectrum sharing systems that require user discrimination when allocating the network resources.

Network Intrusion Detection and Prevention - Concepts and Techniques (Hardcover, 2010 ed.): Ali A. Ghorbani, Wei Lu, Mahbod... Network Intrusion Detection and Prevention - Concepts and Techniques (Hardcover, 2010 ed.)
Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee
R4,032 Discovery Miles 40 320 Ships in 10 - 15 working days

Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theoretical foundation of attack detection approaches, implementation, data collection, evaluation, and intrusion response. Additionally, it provides an overview of some of the commercially/publicly available intrusion detection and response systems. On the topic of intrusion detection system it is impossible to include everything there is to say on all subjects. However, we have tried to cover the most important and common ones.

Network Intrusion Detection and Prevention: Concepts and Techniques is designed for researchers and practitioners in industry. This book is suitable for advanced-level students in computer science as a reference book as well.

Virtualization of Universities - Digital Media and the Organization of Higher Education Institutions (Hardcover, 2012 ed.):... Virtualization of Universities - Digital Media and the Organization of Higher Education Institutions (Hardcover, 2012 ed.)
Thomas Pfeffer
R2,655 Discovery Miles 26 550 Ships in 18 - 22 working days

The purpose of this volume is to shape conceptual tools to understand the impact of new information and communication technologies (ICTs) on the organization of universities. Traditional research-based universities, the most typical representatives of the higher education system, find themselves challenged by the speed and the wide range of technical innovations, but also by a vast array of implicit assumptions and explicit promises associated with the distribution of digital media.

The author observes that as universities increasingly use digital media (computers and the Internet) to accomplish their tasks, a transformation takes place in an "evolutionary" rather than in a revolutionary way.Using the University of Klagenfurt as an in-depth case study, he explores such dynamic issues as how digital media affect the practice of research, the preservation and dissemination of knowledge (for example, through publishing and archiving), and delivery of education at universities.More broadly, he considers issues of organizational culture and design, administration, and leadership as universities integrate digital technologies into all aspects of their operations."

E-Commerce Security and Privacy (Hardcover, 2001 ed.): Anup K. Ghosh E-Commerce Security and Privacy (Hardcover, 2001 ed.)
Anup K. Ghosh
R2,752 Discovery Miles 27 520 Ships in 18 - 22 working days

While e-commerce has experienced meteoric growth recently, security risks have similarly grown in scope and magnitude. Three major factors have driven the security risks in e-commerce: the growing reliance on the electronic medium for a company's core business, the growing complexity of the software systems needed to support e-commerce, and the value of the digital assets brought online to an inherently insecure medium - the Internet. While security has long been a primary concern in e-commerce, more recently privacy has also grown in importance to consumers. Many of the same Internet technologies that make e-commerce possible also make it possible to create detailed profiles of an individual's purchases, to spy on individual Web usage habits, and even to peer into confidential files that reside on an individual's machine. E-Commerce Security and Privacy is the first volume to pull together leading researchers and practitioners in diverse areas of computer science and software engineering to explore their technical innovations to problems in security and privacy in e-commerce. The information is drawn from selected papers presented at the first Workshop on Security and Privacy in E-Commerce (WSPEC'00) held in Athens, Greece, November 4, 2000. As such, E-Commerce Security and Privacy introduces both practitioners and researchers to innovations in secure and private e-commerce. Practitioners will gain great insight from the case studies, and researchers will learn about state-of-the-art protocols in secure and private e-commerce that will serve as the basis for future innovations in applied e-commerce technologies. E-Commerce Security and Privacy is suitable as a secondary text for agraduate level course, and as a reference for researchers and practitioners in industry.

Securing Web Services - Practical Usage of Standards and Specifications (Hardcover): Panos Periorellis Securing Web Services - Practical Usage of Standards and Specifications (Hardcover)
Panos Periorellis
R4,610 Discovery Miles 46 100 Ships in 18 - 22 working days

'Securing Web Services' investigates the security-related specifications that encompass message level security, transactions, and identity management.

Design Methodologies for Secure Embedded Systems - Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss (Hardcover, 2011 ed.):... Design Methodologies for Secure Embedded Systems - Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss (Hardcover, 2011 ed.)
Alexander Biedermann, Gregor H Molter
R4,126 Discovery Miles 41 260 Ships in 18 - 22 working days

Embedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? How can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration of design methodologies for secure embedded systems. This Festschrift is dedicated to him and his research on the occasion of his 60th birthday.

Optical Networks - Architecture and Survivability (Hardcover, 2003 ed.): Hussein T. Mouftah, Pin-Han Ho Optical Networks - Architecture and Survivability (Hardcover, 2003 ed.)
Hussein T. Mouftah, Pin-Han Ho
R4,047 Discovery Miles 40 470 Ships in 18 - 22 working days

Optical Networks - Architecture and Survivability, is a state-of-the-art work on survivable and cost-effective design of control and management for networks with IP directly over Wavelength Division Multiplexing (WDM) technology (or called Optical Internet). The authors address issues of signaling mechanisms, resource reservation, and survivable routing and wavelength assignment. Special emphasis has been given to the design of meshed, middle-sized, and wavelength-routed networks with dynamic traffic in the optical domain, such as the next-generation Metropolitan Area Network.

Research and development engineers, graduate students studying wavelength-routed WDM networks, and senior undergraduate students with a background in algorithms and networking will find this book interesting and useful. This work may also be used as supplemental readings for graduate courses on internetworking, routing, survivability, and network planning algorithms.

AWS Database Migration Service User Guide (Hardcover): Documentation Team AWS Database Migration Service User Guide (Hardcover)
Documentation Team
R1,199 Discovery Miles 11 990 Ships in 18 - 22 working days
Satellite Network Robust QoS-aware Routing (Hardcover, 2014 ed.): Fei Long Satellite Network Robust QoS-aware Routing (Hardcover, 2014 ed.)
Fei Long
R3,182 Discovery Miles 31 820 Ships in 18 - 22 working days

"Satellite Network Robust QoS-aware Routing" presents a novel routing strategy for satellite networks. This strategy is useful for the design of multi-layered satellite networks as it can greatly reduce the number of time slots in one system cycle. The traffic prediction and engineering approaches make the system robust so that the traffic spikes can be handled effectively. The multi-QoS optimization routing algorithm can satisfy various potential user requirements. Clear and sufficient illustrations are also presented in the book. As the chapters cover the above topics independently, readers from different research backgrounds in constellation design, multi-QoS routing, and traffic engineering can benefit from the book.

Fei Long is a senior engineer at Beijing R&D Center of 54th Research Institute of China Electronics Technology Group Corporation.

Cloud Computing Technologies for Connected Government (Hardcover): Zaigham Mahmood Cloud Computing Technologies for Connected Government (Hardcover)
Zaigham Mahmood
R4,890 Discovery Miles 48 900 Ships in 18 - 22 working days

In the developed world, there is an increasing trend towards the use of e-government to further involve citizens in the maintenance of their country. This is not only an improved way to promote existing methods of citizen engagement such as voting or taxation; it also makes information more accessible and increases opportunities for average citizens to make their voices heard. Cloud Computing Technologies for Connected Government explores the latest research on the use of e-government for enhancing the effectiveness and transparency of public institutions. Featuring coverage on cloud-related frameworks and strategies, barriers to e-government development and practice, and case studies revealing the best guidelines for efficient technology use, this timely publication is indispensable for students, educators, information system specialists, technology experts, and anyone involved in public administration or the management of government departments. This book highlights chapters on a broad scope of topics including, but not limited to, citizen empowerment, collaborative public service, communication through social media, cost benefits of the Cloud, electronic voting systems, identity management, legal issues, and security and privacy for e-government users.

AD HOC NETWORKS - Technologies and Protocols (Hardcover, 2005 ed.): Prasant Mohapatra, Srikanth Krishnamurthy AD HOC NETWORKS - Technologies and Protocols (Hardcover, 2005 ed.)
Prasant Mohapatra, Srikanth Krishnamurthy
R4,037 Discovery Miles 40 370 Ships in 18 - 22 working days

AD HOC NETWORKS: Technologies and Protocols is a concise in-depth treatment of various constituent components of ad hoc network protocols. It reviews issues related to medium access control, scalable routing, group communications, use of directional/smart antennas, network security, and power management among other topics. The authors examine various technologies that may aid ad hoc networking including the presence of an ability to tune transmission power levels or the deployment of sophisticated smart antennae. Contributors to this volume include experts that have been active in ad hoc network research and have published in the premier conferences and journals in this subject area.

AD HOC NETWORKS: Protocols and Technologies will be immensely useful as a reference work to engineers and researchers as well as to advanced level students in the areas of wireless networks, and computer networks.

Disruptive Technologies, Innovation and Global Redesign - Emerging Implications (Hardcover): Ndubuisi Ekekwe, Nazrul Islam Disruptive Technologies, Innovation and Global Redesign - Emerging Implications (Hardcover)
Ndubuisi Ekekwe, Nazrul Islam
R4,685 Discovery Miles 46 850 Ships in 18 - 22 working days

In the last few years, most parts of the world have morphed into an electronically interdependent economic unit where a disruption in one marketplace affects the others. New technologies have emerged, transforming the ways we do business and, consequently, redesigning the world. Innovation in disruptive technologies pushes new and more agile firms to set new benchmarks and forces established companies to revisit existing models or re-invent themselves to stay competitive. Disruptive Technologies, Innovation and Global Redesign: Emerging Implications provides case studies as well as practical and theoretical papers on the issues surrounding disruptive technologies, innovation, global redesign. This book will be a useful reference for academics, students, policymakers and professionals in the fields of emerging and disruptive technologies, innovation, economic planning, technology and society, technology transfer, and general technology management.

Economics of Information Security and Privacy (Hardcover, 2010 Ed.): Tyler Moore, David Pym, Christos Ioannidis Economics of Information Security and Privacy (Hardcover, 2010 Ed.)
Tyler Moore, David Pym, Christos Ioannidis
R5,322 Discovery Miles 53 220 Ships in 18 - 22 working days

The Workshop on the Economics of Information Security was established in 2002 to bring together computer scientists and economists to understand and improve the poor state of information security practice. WEIS was borne out of a realization that security often fails for non-technical reasons. Rather, the incentives of both - fender and attacker must be considered. Earlier workshops have answered questions ranging from?nding optimal levels of security investement to understanding why privacy has been eroded. In the process, WEIS has attracted participation from the diverse?elds such as law, management and psychology. WEIS has now established itself as the leading forum for interdisciplinary scholarship on information security. The eigth installment of the conference returned to the United Kingdom, hosted byUniversityCollegeLondononJune24-25,2009.Approximately100researchers, practitioners and government of?cials from across the globe convened in London to hear presentations from authors of 21 peer-reviewed papers, in addition to a panel and keynote lectures from Hal Varian (Google), Bruce Schneier (BT Co- terpane), Martin Sadler (HP Labs), and Robert Coles (Merrill Lynch). Angela Sasse and David Pym chaired the conference, while Christos Ioannidis and Tyler Moore chaired the program committee.

Self-Repair Networks - A Mechanism Design (Hardcover, 1st ed. 2015): Yoshiteru Ishida Self-Repair Networks - A Mechanism Design (Hardcover, 1st ed. 2015)
Yoshiteru Ishida
R3,533 R3,273 Discovery Miles 32 730 Save R260 (7%) Ships in 10 - 15 working days

This book describes the struggle to introduce a mechanism that enables next-generation information systems to maintain themselves. Our generation observed the birth and growth of information systems, and the Internet in particular. Surprisingly information systems are quite different from conventional (energy, material-intensive) artificial systems, and rather resemble biological systems (information-intensive systems). Many artificial systems are designed based on (Newtonian) physics assuming that every element obeys simple and static rules; however, the experience of the Internet suggests a different way of designing where growth cannot be controlled but self-organized with autonomous and selfish agents. This book suggests using game theory, a mechanism design in particular, for designing next-generation information systems which will be self-organized by collective acts with autonomous components. The challenge of mapping a probability to time appears repeatedly in many forms throughout this book. The book contains interdisciplinary research encompassing game theory, complex systems, reliability theory and particle physics. All devoted to its central theme: what happens if systems self-repair themselves?

Software Defined Mobile Networks (SDMN) - Beyond LTE Network Architecture (Hardcover): M Liyanage Software Defined Mobile Networks (SDMN) - Beyond LTE Network Architecture (Hardcover)
M Liyanage
R2,577 Discovery Miles 25 770 Ships in 18 - 22 working days

This book describes the concept of a Software Defined Mobile Network (SDMN), which will impact the network architecture of current LTE (3GPP) networks. SDN will also open up new opportunities for traffic, resource and mobility management, as well as impose new challenges on network security. Therefore, the book addresses the main affected areas such as traffic, resource and mobility management, virtualized traffics transportation, network management, network security and techno economic concepts. Moreover, a complete introduction to SDN and SDMN concepts. Furthermore, the reader will be introduced to cutting-edge knowledge in areas such as network virtualization, as well as SDN concepts relevant to next generation mobile networks. Finally, by the end of the book the reader will be familiar with the feasibility and opportunities of SDMN concepts, and will be able to evaluate the limits of performance and scalability of these new technologies while applying them to mobile broadb and networks.

Cognitive Wireless Networks - Concepts, Methodologies and Visions Inspiring the Age of Enlightenment of Wireless Communications... Cognitive Wireless Networks - Concepts, Methodologies and Visions Inspiring the Age of Enlightenment of Wireless Communications (Hardcover, 2007 ed.)
Frank H. P. Fitzek, Marcos D. Katz
R2,803 Discovery Miles 28 030 Ships in 18 - 22 working days

This book presents a detailed overview of a rapidly emerging topic in modern communications: cognitive wireless networks. The key aspects of cognitive and cooperative principles in wireless networks are discussed in this book. Furthermore, 'Cognitive Wireless Networks' advocates the concept of breaking up the cellular communication architecture by introducing cooperative strategies among wireless devices. Cognitive wireless networking is the key to success in handling the upcoming dynamic network configurations and exploiting this cross-over to the fullest extent.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Giovanni Della Robbia
Allan Marquand Hardcover R862 Discovery Miles 8 620
Life with My Horses
Jean Mcfaddin Hardcover R752 Discovery Miles 7 520
The Art of Commemoration in the…
Irving Lavin Hardcover R1,171 Discovery Miles 11 710
Antony Gormley on Sculpture
Anthony Gormley Paperback R488 Discovery Miles 4 880
The History of Ancient Art
Johann Joachim Winckelmann Paperback R677 Discovery Miles 6 770
Constantin Brancusi - Sculpting the…
James Pearson Hardcover R903 Discovery Miles 9 030
The Arab Horse...
Spencer Borden Paperback R421 Discovery Miles 4 210
Training Your Foal - Raising a Foal from…
Renate Ettl Hardcover R1,072 Discovery Miles 10 720
Life of Chopin
Franz Liszt Paperback R461 Discovery Miles 4 610
Equine Stretching for Mobility - An…
Julie A Parsonage Hardcover R940 Discovery Miles 9 400

 

Partners