Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer communications & networking
The purpose of this book is to provide tools for a better understanding of the fundamental tradeo's and interdependencies in wireless networks, with the goal of designing resource allocation strategies that exploit these int- dependencies to achieve signi?cant performance gains. Two facts prompted us to write it: First, future wireless applications will require a fundamental understanding of the design principles and control mechanisms in wireless networks. Second, the complexity of the network problems simply precludes the use of engineering common sense alone to identify good solutions, and so mathematics becomes the key avenue to cope with central technical problems in the design of wireless networks. In this book, two ?elds of mathematics play a central role: Perron-Frobenius theory for non-negative matrices and optimization theory. This book is a revised and expanded version of the research monograph "Resource Allocation in Wireless Networks" that was published as Lecture Notes in Computer Sciences (LNCS 4000) in 2006. Although the general structure has remained unchanged to a large extent, the book contains - merous additional results and more detailed discussion. For instance, there is a more extensive treatment of general nonnegative matrices and interf- ence functions that are described by an axiomatic model. Additional material on max-min fairness, proportional fairness, utility-based power control with QoS (quality of service) support and stochastic power control has been added.
This book provides a thorough treatment of privacy and security issues for researchers in the fields of smart grids, engineering, and computer science. It presents comprehensive insight to understanding the big picture of privacy and security challenges in both physical and information aspects of smart grids. The authors utilize an advanced interdisciplinary approach to address the existing security and privacy issues and propose legitimate countermeasures for each of them in the standpoint of both computing and electrical engineering. The proposed methods are theoretically proofed by mathematical tools and illustrated by real-world examples.
"Wireless Networks and Security" provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in applications. The contributions identify various vulnerabilities in the physical layer, MAC layer, network layer, transport layer, and application layer, and focus on ways of strengthening security mechanisms and services throughout the layers. This carefully edited monograph is targeting for researchers, post-graduate students in universities, academics, and industry practitioners or professionals.
This book presents a comprehensive analysis of D2D communication over LTE-A band. The book uses 3GPP LTE-A as a baseline and explains all fundamental requirements for deploying D2D network under cellular systems from an architectural, technical and business point of view. The contributors explain the standardization activities of Release 12 of LTE-A, which has been recently acknowledged as support of D2D communication in LTE-A. The text updates the research community on the D2D roadmap as well as new features emerging for consideration in 3GPP.
This is the first book to present a multidisciplinary approach to cyberterrorism. It traces the threat posed by cyberterrorism today, with chapters discussing possible technological vulnerabilities, potential motivations to engage in cyberterrorism, and the challenges of distinguishing this from other cyber threats. The book also addresses the range of potential responses to this threat by exploring policy and legislative frameworks as well as a diversity of techniques for deterring or countering terrorism in cyber environments. The case studies throughout the book are global in scope and include the United States, United Kingdom, Australia, New Zealand and Canada. With contributions from distinguished experts with backgrounds including international relations, law, engineering, computer science, public policy and politics, Cyberterrorism: Understanding, Assessment and Response offers a cutting edge analysis of contemporary debate on, and issues surrounding, cyberterrorism. This global scope and diversity of perspectives ensure it is of great interest to academics, students, practitioners, policymakers and other stakeholders with an interest in cyber security.
"Cryptographic Protocol: Security Analysis Based on Trusted
Freshness" mainly discusses how to analyze and design cryptographic
protocols based on the idea of system engineering and that of the
trusted freshness component. A novel freshness principle based on
the trusted freshness component is presented; this principle is the
basis for an efficient and easy method for analyzing the security
of cryptographic protocols. The reasoning results of the new
approach, when compared with the security conditions, can either
establish the correctness of a cryptographic protocol when the
protocol is in fact correct, or identify the absence of the
security properties, which leads the structure to construct attacks
directly. Furthermore, based on the freshness principle, a belief
multiset formalism is presented. This formalism s efficiency,
rigorousness, and the possibility of its automation are also
presented.
Choosing the right mobile phone and service plan can be
overwhelming, particularly if you travel abroad - this truly
international guide is ideal for the mobile executive
RFID is a method of remotely storing and receiving data using
devices called RFID tags. RFID tags can be small adhesive stickers
containing antennas that receive and respond to transmissions from
RFID transmitters. RFID tags are used to identify and track
everything from food, dogs, beer kegs to library books.
This work presents the research results of students of the Graduiertenkolleg "Communication-Based Systems" to an international community. To stimulate the scientific discussion, experts have been invited to give their views on the following research areas: formal specification and mathematical foundations of distributed systems using process algebra, graph transformations, process calculi and temporal logics; performance evaluation, dependability modelling and analysis of real-time systems with different kinds of timed Petri-nets; specification and analysis of communication protocols; reliability, security and dependability in distributed systems; object orientation in distributed systems architecture; software development and concepts for distributed applications; computer network architecture and management; and language concepts for distributed systems.
This volume contains the proceedings of the Seventh Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net'2008), celebrated in Palma de Mallorca (llles Balears, Spain) during June 25-27, 2008. This IFIP TC6 Workshop was organized by the Universitat de les Illes Balears in cooperation with the Asociaci6n de Tdcnicos de lnform tica and sponsored by the following Working Groups: WG6.3 (Performance of Computer Networks) and WG6.8 (Mobile and Wireless Communications). The rapid evolution of the networking industry introduces new exciting challenges that need to be explored by the research community. Aside the adoption of Internet as the global network infrastructure these last years have shown the growing of a set of new network architectures without a rigid and known a priori architecture using wireless techniques, like sensor and ad-hoc networks. These new types of networks are opening the possibility to create a large number of new applications ranging from domestic to nature surveying. These new networks are generating new technical challenges like the capability of auto-reconfiguration in order to give the network an optimal configuration, the energy saving need when the nodes have not a source of energy other than a small battery, new protocols to access the network and to convey the information across the network when its structure is not completely known or should be discovered, new paradigms for keeping the needed information security and privacy in a quite uncontrolled environment, and others.
This book focuses on partitional clustering algorithms, which are commonly used in engineering and computer scientific applications. The goal of this volume is to summarize the state-of-the-art in partitional clustering. The book includes such topics as center-based clustering, competitive learning clustering and density-based clustering. Each chapter is contributed by a leading expert in the field.
This book presents research from many of the major projects involved in the emerging global grid infrastructure. With a particular focus on the practical advantages and applications of grid computing - including real case studies - the book provides an in-depth study of grid technology for a wide range of different needs. Topics: examines a remote instrumentation infrastructure, and a methodology to support e-science applications on e-infrastructures; describes the GEMS storage system, and pipeline workflows for optimizing end-to-end performance in wide-area networks; investigates semantic grid system architecture, social grid agents, and monitoring platforms designed for large-scale distributed systems; explores job control using service-level agreements; introduces the Composable Services Architecture for dynamic service provisioning, and the semantically driven communication middleware platform, Phoenix; discusses the PhyloGrid application, and a numerical simulation performed using grid computing.
This book presents the technical program of the International Embedded Systems Symposium (IESS) 2009. Timely topics, techniques and trends in embedded system design are covered by the chapters in this volume, including modelling, simulation, verification, test, scheduling, platforms and processors. Particular emphasis is paid to automotive systems and wireless sensor networks. Sets of actual case studies in the area of embedded system design are also included. Over recent years, embedded systems have gained an enormous amount of proce- ing power and functionality and now enter numerous application areas, due to the fact that many of the formerly external components can now be integrated into a single System-on-Chip. This tendency has resulted in a dramatic reduction in the size and cost of embedded systems. As a unique technology, the design of embedded systems is an essential element of many innovations. Embedded systems meet their performance goals, including real-time constraints, through a combination of special-purpose hardware and software components tailored to the system requirements. Both the development of new features and the reuse of existing intellectual property components are essential to keeping up with ever more demanding customer requirements. Furthermore, design complexities are steadily growing with an increasing number of components that have to cooperate properly. Embedded system designers have to cope with multiple goals and constraints simul- neously, including timing, power, reliability, dependability, maintenance, packaging and, last but not least, price.
In a local area network (LAN) or intranet, there are many pieces of
hardare trying to gain access to the network transmission media at
the same time (i.e., phone lines, coax, wireless, etc.). However, a
network cable or wireless transmission frequency can physically
only allow one node to use it at a given time. Therefore, there
must be some way to regulate which node has control of the medium
(a media access control, or MAC, protocol). Ethernet is a MAC
protocol; it is one way to regulate physical access to network
tranmission media.
This book presents new concepts as well as practical applications and experiences in the field of information technology for environmental engineering. The book has three main focus areas: firstly, it shows how information technologies can be employed to support natural resource management and conservation, environmental engineering, scientific simulation and integrated assessment studies. Secondly, it demonstrates the application of computing in the everyday practices of environmental engineers, natural scientists, economists and social scientists. And thirdly, it demonstrates how the complexity of natural phenomena can be approached using interdisciplinary methods, where computer science offers the infrastructure needed for environmental data collection and management, scientific simulations, decision support documentation and reporting.The book collects selected papers presented at the 7th International Symposium on Environmental Engineering, held in Port Elizabeth, South Africa in July 2015. It discusses recent success stories in eco-informatics, promising ideas and new challenges from the interdisciplinary viewpoints of computer scientists, environmental engineers, economists and social scientists, demonstrating new paradigms for problem-solving and decision-making.
This book explores current and emerging trends in policy, strategy, and practice related to cyber operations conducted by states and non-state actors. The book examines in depth the nature and dynamics of conflicts in the cyberspace, the geopolitics of cyber conflicts, defence strategy and practice, cyber intelligence and information security.
Expert guidance on how to use Amazon Web Services to supercharge your digital services business In Transforming Your Business with AWS: Getting the Most Out of Using AWS to Modernize and Innovate Your Digital Services, renowned international consultant and sought-after speaker Philippe Abdoulaye delivers a practical and accessible guide to using Amazon Web Services to modernize your business and the digital services you offer. This book provides you with a concrete action plan to build a team capable of creating world-class digital services and long-term competitive advantages. You'll discover what separates merely average digital service organizations from the truly outstanding, as well as how moving to the cloud will enable your business to deliver your services faster, better, and more efficiently. This book also includes: A comprehensive overview of building industry-leading digital service delivery capabilities, including discussions of the development lifecycle, best practices, and AWS-based development infrastructure Explanations of how to implement a digital business transformation strategy An exploration of key roles like DevOps Continuous Delivery, Continuous Deployment, Continuous Integration, Automation, and DevSecOps Hands-on treatments of AWS application management tools, including Elastic Beanstalk, CodeDeploy, and CodePipeline Perfect for executives, managers, and other business leaders attempting to clarify and implement their organization's digital vision and strategy, Transforming Your Business with AWS is a must-read reference that answers the "why" and, most importantly, the "how," of digital transformation with Amazon Web Services.
The objective of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012) is to facilitate an exchange of information on best practices for the latest research advances in the area of communications, networks and intelligence applications. These mainly involve computer science and engineering, informatics, communications and control, electrical engineering, information computing, and business intelligence and management. "Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012)" will focus on green information technology and applications, which will provide in-depth insights for engineers and scientists in academia, industry, and government. The book addresses the most innovative research developments including technical challenges, social and economic issues, and presents and discusses the authors' ideas, experiences, findings, and current projects on all aspects of advanced green information technology and applications. Yuhang Yang is a professor at the Department of Electronic Engineering, Shanghai Jiao Tong University. Maode Ma is an associate professor at the School of Electrical & Electronic Engineering, Nanyang Technological University.
This book provides an introduction to the field of Intrusion
Prevention and provides detailed information on various IPS methods
and technologies. Specific methods are covered in depth, including
both network and host IPS and response technologies such as port
deactivation, firewall/router network layer ACL modification,
session sniping, outright application layer data modification,
system call interception, and application shims.
This book is the result of the first International Conference ICT Innovations 2009. The ICT Innovations conference is the primary scientific action of the Macedonian Society on Information and Communication Technologies (ICT-ACT). It promotes the publication of scientific results of the international community related to innovative fundamental and applied research in ICT. Today, ICT has enlarged its horizons and it is practiced under multidisciplinary contexts that introduce new challenges to theore- cal and technical approaches. The ICT Innovations 2009 conference gathered academics, professionals and pr- titioners reporting their valuable experiences in developing solutions and systems in the industrial and business arena especially innovative commercial implementations, novel applications of technology, and experience in applying recent research advances to practical situations, in any ICT areas. The conference focuses on issues concerning a variety of ICT fields like: * Multimedia Information Systems * Artificial Intelligence * Pervasive and Ubiquitous Computing * Eco and Bio Informatics * Internet and Web Applications and Services * Wireless and Mobile Communications and Services * Computer Networks, Security and Cryptography * Distributed Systems, GRID and Cloud Computing ICT Innovations 2009 Conference was held in Ohrid, Macedonia, in September 28-30, 2009. Local arrangements provided by the members of the Macedonian Society on Information and Communication Technologies - ICT-ACT, mainly consisting of teaching and research staff of Computer Science Department at Faculty of Electrical Engineering and Information Technologies and Institute of Informatics at Faculty of Natural Sciences, both at Ss. Cyril and Methodius University in Skopje, Macedonia.
This open access handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric recognition, i.e. vascular biometrics, including finger vein recognition, hand/palm vein recognition, retina recognition, and sclera recognition. After an introductory chapter summarizing the state of the art in and availability of commercial systems and open datasets/open source software, individual chapters focus on specific aspects of one of the biometric modalities, including questions of usability, security, and privacy. The book features contributions from both academia and major industrial manufacturers.
"Content Delivery Networks" enables the readers to understand the basics, to identify the underlying technology, to summarize their knowledge on concepts, ideas, principles and various paradigms which span on broad CDNs areas. Therefore, aspects of CDNs in terms of basics, design process, practice, techniques, performances, platforms, applications, and experimental results have been presented in a proper order. Fundamental methods, initiatives, significant research results, as well as references for further study have also been provided. Comparison of different design and development approaches are described at the appropriate places so that new researchers as well as advanced practitioners can use the CDNs evaluation as a research roadmap. All the contributions have been reviewed, edited, processed, and placed in the appropriate order to maintain consistency so that any reader irrespective of their level of knowledge and technological skills in CDNs would get the most out of it. The book is organized into three parts, namely, Part I: CDN Fundamentals; Part II: CDN Modeling and Performance; and Part III: Advanced CDN Platforms and Applications. The organization ensures the smooth flow of material as successive chapters build on prior ones.
Advances in social science research methodologies and data analytic methods are changing the way research in information systems is conducted. New developments in statistical software technologies for data mining (DM) such as regression splines or decision tree induction can be used to assist researchers in systematic post-positivist theory testing and development. Established management science techniques like data envelopment analysis (DEA), and value focused thinking (VFT) can be used in combination with traditional statistical analysis and data mining techniques to more effectively explore behavioral questions in information systems research. As adoption and use of these research methods expand, there is growing need for a resource book to assist doctoral students and advanced researchers in understanding their potential to contribute to a broad range of research problems. "Advances in Research Methods for Information Systems Research: Data Mining, Data Envelopment Analysis, Value Focused Thinking" focuses on bridging and unifying these three different methodologies in order to bring them together in a unified volume for the information systems community. This book serves as a resource that provides overviews on each method, as well as applications on how they can be employed to address IS research problems. Its goal is to help researchers in their continuous efforts to set the pace for having an appropriate interplay between behavioral research and design science. |
You may like...
Tax Law: An Introduction
Annet Wanyana Oguttu, Elzette Muller, …
Paperback
R1,291
Discovery Miles 12 910
Hockly's Insolvency Law Casebook
R. Sharrock, L.S. Steyn, …
Paperback
EU External Action in International…
Mads Andenas, Luca Pantaleo, …
Hardcover
R4,595
Discovery Miles 45 950
|