![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking
Embedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? How can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration of design methodologies for secure embedded systems. This Festschrift is dedicated to him and his research on the occasion of his 60th birthday.
Network Science, Nonlinear Science and Infrastructure Systems has been written by leading scholars in these areas. Its express purpose is to develop common theoretical underpinnings to better solve modern infrastructural problems. It is felt by many who work in these fields that many modern communication problems, ranging from transportation networks to telecommunications, Internet, supply chains, etc., are fundamentally infrastructure problems. Moreover, these infrastructure problems would benefit greatly from a confluence of theoretical and methodological work done with the areas of Network Science, Dynamical Systems and Nonlinear Science. This book is dedicated to the formulation of infrastructural tools that will better solve these types of infrastructural problems.
"Satellite Network Robust QoS-aware Routing" presents a novel routing strategy for satellite networks. This strategy is useful for the design of multi-layered satellite networks as it can greatly reduce the number of time slots in one system cycle. The traffic prediction and engineering approaches make the system robust so that the traffic spikes can be handled effectively. The multi-QoS optimization routing algorithm can satisfy various potential user requirements. Clear and sufficient illustrations are also presented in the book. As the chapters cover the above topics independently, readers from different research backgrounds in constellation design, multi-QoS routing, and traffic engineering can benefit from the book. Fei Long is a senior engineer at Beijing R&D Center of 54th Research Institute of China Electronics Technology Group Corporation.
An aerial robot is a system capable of sustained flight with no direct human control and able to perform a specific task. A lighter than air robot is an aerial robot that relies on the static lift to balance its own weight. It can also be defined as a lighter than air unmanned aerial vehicle or an unmanned airship with sufficient autonomy. Lighter than air systems are particularly appealing since the energy to keep them airborne is small. They are increasingly considered for various tasks such as monitoring, surveillance, advertising, freight carrier, transportation. This book familiarizes readers with a hierarchical decoupled planning and control strategy that has been proven efficient through research. It is made up of a hierarchy of modules with well defined functions operating at a variety of rates, linked together from top to bottom. The outer loop, closed periodically, consists of a discrete search that produces a set of waypoints leading to the goal while avoiding obstacles and weighed regions. The second level smoothes this set so that the generated paths are feasible given the vehicle's velocity and accelerations limits. The third level generates flyable, timed trajectories and the last one is the tracking controller that attempts to minimize the error between the robot measured trajectory and the reference trajectory. This hierarchy is reflected in thestructure and contentof the book. Topics treated are: Modelling, Flight Planning, Trajectory Design and Control. Finally, some actual projects are described in the appendix. This volume will prove useful for researchers and practitioners working in Robotics and Automation, Aerospace Technology, Control and Artificial Intelligence. "
This book is a collection of articles studying various Steiner tree prob lems with applications in industries, such as the design of electronic cir cuits, computer networking, telecommunication, and perfect phylogeny. The Steiner tree problem was initiated in the Euclidean plane. Given a set of points in the Euclidean plane, the shortest network interconnect ing the points in the set is called the Steiner minimum tree. The Steiner minimum tree may contain some vertices which are not the given points. Those vertices are called Steiner points while the given points are called terminals. The shortest network for three terminals was first studied by Fermat (1601-1665). Fermat proposed the problem of finding a point to minimize the total distance from it to three terminals in the Euclidean plane. The direct generalization is to find a point to minimize the total distance from it to n terminals, which is still called the Fermat problem today. The Steiner minimum tree problem is an indirect generalization. Schreiber in 1986 found that this generalization (i.e., the Steiner mini mum tree) was first proposed by Gauss."
The emergence of open access, web technology, and e-publishing has slowly transformed modern libraries into digital libraries. With this variety of technologies utilized, cloud computing and virtual technology has become an advantage for libraries to provide a single efficient system that saves money and time. Cloud Computing and Virtualization Technologies in Libraries highlights the concerns and limitations that need addressed in order to optimize the benefits of cloud computing to the virtualization of libraries. Focusing on the latest innovations and technological advancements, this book is essential for professionals, students, and researchers interested in cloud library management and development in different types of information environments.
This book presents the latest developments in biometrics technologies and reports on new approaches, methods, findings, and technologies developed or being developed by the research community and the industry. The book focuses on introducing fundamental principles and concepts of key enabling technologies for biometric systems applied for both physical and cyber security. The authors disseminate recent research and developing efforts in this area, investigate related trends and challenges, and present case studies and examples such as fingerprint, face, iris, retina, keystroke dynamics, and voice applications . The authors also investigate the advances and future outcomes in research and development in biometric security systems. The book is applicable to students, instructors, researchers, industry practitioners, and related government agencies staff. Each chapter is accompanied by a set of PowerPoint slides for use by instructors.
The chapters in this book present the work of researchers, scientists, engineers, and teachers engaged with developing unified foundations, principles, and technologies for cyber-physical security. They adopt a multidisciplinary approach to solving related problems in next-generation systems, representing views from academia, government bodies, and industrial partners, and their contributions discuss current work on modeling, analyzing, and understanding cyber-physical systems.
This title addresses various open issues related to performance monitoring, performance management and performance control. It covers the performance management aspects of broadband wired and wireless cellular networks in an integrated fashion, and highlights the role of performance management in assisting network control procedures.
This book describes the concept of a Software Defined Mobile Network (SDMN), which will impact the network architecture of current LTE (3GPP) networks. SDN will also open up new opportunities for traffic, resource and mobility management, as well as impose new challenges on network security. Therefore, the book addresses the main affected areas such as traffic, resource and mobility management, virtualized traffics transportation, network management, network security and techno economic concepts. Moreover, a complete introduction to SDN and SDMN concepts. Furthermore, the reader will be introduced to cutting-edge knowledge in areas such as network virtualization, as well as SDN concepts relevant to next generation mobile networks. Finally, by the end of the book the reader will be familiar with the feasibility and opportunities of SDMN concepts, and will be able to evaluate the limits of performance and scalability of these new technologies while applying them to mobile broadb and networks.
This book reports on the latest advances on the theories, practices, standards and strategies that are related to the modern technology paradigms, the Mobile Cloud computing (MCC) and Big Data, as the pillars and their association with the emerging 5G mobile networks. The book includes 15 rigorously refereed chapters written by leading international researchers, providing the readers with technical and scientific information about various aspects of Big Data and Mobile Cloud Computing, from basic concepts to advanced findings, reporting the state-of-the-art on Big Data management. It demonstrates and discusses methods and practices to improve multi-source Big Data manipulation techniques, as well as the integration of resources availability through the 3As (Anywhere, Anything, Anytime) paradigm, using the 5G access technologies.
This book presents a detailed overview of a rapidly emerging topic in modern communications: cognitive wireless networks. The key aspects of cognitive and cooperative principles in wireless networks are discussed in this book. Furthermore, 'Cognitive Wireless Networks' advocates the concept of breaking up the cellular communication architecture by introducing cooperative strategies among wireless devices. Cognitive wireless networking is the key to success in handling the upcoming dynamic network configurations and exploiting this cross-over to the fullest extent.
This is the first book entirely devoted to providing a perspective on the state-of-the-art of cloud computing and energy services and the impact on designing sustainable systems. Cloud computing services provide an efficient approach for connecting infrastructures and can support sustainability in different ways. For example, the design of more efficient cloud services can contribute in reducing energy consumption and environmental impact. The chapters in this book address conceptual principles and illustrate the latest achievements and development updates concerning sustainable cloud and energy services. This book serves as a useful reference for advanced undergraduate students, graduate students and practitioners interested in the design, implementation and deployment of sustainable cloud based energy services. Professionals in the areas of power engineering, computer science, and environmental science and engineering will find value in the multidisciplinary approach to sustainable cloud and energy services presented in this book.
The efficient management of a consistent and integrated database is a central task in modern IT and highly relevant for science and industry. Hardly any critical enterprise solution comes without any functionality for managing data in its different forms. Web-Scale Data Management for the Cloud addresses fundamental challenges posed by the need and desire to provide database functionality in the context of the Database as a Service (DBaaS) paradigm for database outsourcing. This book also discusses the motivation of the new paradigm of cloud computing, and its impact to data outsourcing and service-oriented computing in data-intensive applications. Techniques with respect to the support in the current cloud environments, major challenges, and future trends are covered in the last section of this book. A survey addressing the techniques and special requirements for building database services are provided in this book as well.
Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art and culture, politics and government, and many others. As such, identity theft and unauthorized access to these systems are serious concerns. Theory and Practice of Cryptography Solutions for Secure Information Systems explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of professionals, academics, and students requiring dedicated information systems free from outside interference, as well as developers of secure IS applications. This book is part of the Advances in Information Security, Privacy, and Ethics series collection.
This book introduces an efficient resource management approach for future spectrum sharing systems. The book focuses on providing an optimal resource allocation framework based on carrier aggregation to allocate multiple carriers' resources efficiently among mobile users. Furthermore, it provides an optimal traffic dependent pricing mechanism that could be used by network providers to charge mobile users for the allocated resources. The book provides different resource allocation with carrier aggregation solutions, for different spectrum sharing scenarios, and compares them. The provided solutions consider the diverse quality of experience requirement of multiple applications running on the user's equipment since different applications require different application performance. In addition, the book addresses the resource allocation problem for spectrum sharing systems that require user discrimination when allocating the network resources.
This book describes the design and implementation of Cloud Armor, a novel approach for credibility-based trust management and automatic discovery of cloud services in distributed and highly dynamic environments. This book also helps cloud users to understand the difficulties of establishing trust in cloud computing and the best criteria for selecting a service cloud. The techniques have been validated by a prototype system implementation and experimental studies using a collection of real world trust feedbacks on cloud services. The authors present the design and implementation of a novel protocol that preserves the consumers' privacy, an adaptive and robust credibility model, a scalable availability model that relies on a decentralized architecture, and a cloud service crawler engine for automatic cloud services discovery. This book also analyzes results from a performance study on a number of open research issues for trust management in cloud environments including distribution of providers, geographic location and languages. These open research issues illustrate both an overview of the current state of cloud computing and potential future directions for the field. Trust Management in Cloud Services contains both theoretical and applied computing research, making it an ideal reference or secondary text book to both academic and industry professionals interested in cloud services. Advanced-level students in computer science and electrical engineering will also find the content valuable.
ISGC 2009, The International Symposium on Grid Computing was held at Academia Sinica, Taipei, Taiwan in April 2009 bringing together prestigious scientists and engineers worldwide to exchange ideas, present challenges/solutions and introduce future development in the field of Grid Computing. Managed Grids and Cloud Systems in the Asia-Pacific Research Community presents the latest achievements in grid technology including Cloud Computing. This volume also covers international projects in Grid Operation, Grid Middleware, E-Science applications, technical developments in grid operations and management, Security and Networking, Digital Library and more. The resources used to support these advances, such as volunteer grids, production managed grids, and cloud systems are discussed in detail. This book is designed for a professional audience composed of grid users, developers and researchers working in the grid computing. Advanced-level students focusing on computer science and engineering will find this book valuable as a reference or secondary text book.
In a knowledge economy urban form and functions are primarily shaped by global market forces rather than urban planning. As the role of knowledge in wealth creation becomes a critical issue in cities, urban administrations and planners need to discover new approaches to harness the considerable opportunities of abstract production for a global order. ""Creative Urban Regions"" explores the utilization of urban technology to support knowledge city initiatives, providing scholars and practitioners with essential fundamental techniques and processes for the successful integration of information technologies and urban production. Converging timely research on a multitude of cutting-edge urban information communication technology issues, this ""Premier Reference Source"" will make a valuable addition to every reference library.
Have you ever tried to figure out why your computer clock is off, or why your emails somehow have the wrong timestamp? Most likely, its due to an incorrect network time synchronization, which can be reset using the Network Time Protocol. Until now, most network administrators have been too paranoid to work with this, afraid that they would make the problem even worse. However, Expert Network Time Protocol: An Experience in Time with NTP takes the mystery out of time, and shows the network administrator how to regain the upper hand. This book is a fascinating look into NTP, and the stories behind the science. Written by Peter Rybaczyk, one of the foremost experts on NTP, this book will show the Network Administrator how to become more comfortable working with time.-->Table of Contents-->Multiple Views of TimeNetwork Administration and IT Trends Throughout History!NTP Operational, Historical, and Futuristic OverviewNTP ArchitectureNTP Design, Configuration, and Troubleshooting
The Workshop on the Economics of Information Security was established in 2002 to bring together computer scientists and economists to understand and improve the poor state of information security practice. WEIS was borne out of a realization that security often fails for non-technical reasons. Rather, the incentives of both - fender and attacker must be considered. Earlier workshops have answered questions ranging from?nding optimal levels of security investement to understanding why privacy has been eroded. In the process, WEIS has attracted participation from the diverse?elds such as law, management and psychology. WEIS has now established itself as the leading forum for interdisciplinary scholarship on information security. The eigth installment of the conference returned to the United Kingdom, hosted byUniversityCollegeLondononJune24-25,2009.Approximately100researchers, practitioners and government of?cials from across the globe convened in London to hear presentations from authors of 21 peer-reviewed papers, in addition to a panel and keynote lectures from Hal Varian (Google), Bruce Schneier (BT Co- terpane), Martin Sadler (HP Labs), and Robert Coles (Merrill Lynch). Angela Sasse and David Pym chaired the conference, while Christos Ioannidis and Tyler Moore chaired the program committee.
This dictionary is a collection of technical abbreviations and acronyms used in information and communication technologies and other industrial activities. They are used in industries, institutes, organisations and universities, all too often without mentioning their meaning. Areas covered by this dictionary are Information and Communication Technology (ICT), including hardware and software; Information Networks, including the Internet and the World Wide Web; Automatic Control; and ICT-related Computer-Aided Techniques and Activities. Apart from the technical terms this dictionary also lists abbreviated names of relevant organisations, conferences, symposia and workshops. This reference book is important for all practitioners and users in the areas mentioned above and those who consult or write technical material (manuals, guides, books, articles, marketing and teaching material). These publications often omit the meaning of acronyms and confront the reader with jargon too often difficult to understand. This edition contains over 33,000 items and differs from the previous one by deleting obsolete terms and less relevant acronyms. Ten thousand new items have been added.
Recently, cryptology problems, such as designing good cryptographic systems and analyzing them, have been challenging researchers. Many algorithms that take advantage of approaches based on computational intelligence techniques, such as genetic algorithms, genetic programming, and so on, have been proposed to solve these issues. Implementing Computational Intelligence Techniques for Security Systems Design is an essential research book that explores the application of computational intelligence and other advanced techniques in information security, which will contribute to a better understanding of the factors that influence successful security systems design. Featuring a range of topics such as encryption, self-healing systems, and cyber fraud, this book is ideal for security analysts, IT specialists, computer engineers, software developers, technologists, academicians, researchers, practitioners, and students. |
You may like...
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, …
Paperback
R1,452
Discovery Miles 14 520
Demystifying Graph Data Science - Graph…
Pethuru Raj, Abhishek Kumar, …
Hardcover
|