0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (283)
  • R250 - R500 (875)
  • R500+ (13,603)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Real-Time Systems - Design Principles for Distributed Embedded Applications (Hardcover, 2nd ed. 2011): Hermann Kopetz Real-Time Systems - Design Principles for Distributed Embedded Applications (Hardcover, 2nd ed. 2011)
Hermann Kopetz
R2,480 Discovery Miles 24 800 Ships in 18 - 22 working days

"This book is a comprehensive text for the design of safety critical, hard real-time embedded systems. It offers a splendid example for the balanced, integrated treatment of systems and software engineering, helping readers tackle the hardest problems of advanced real-time system design, such as determinism, compositionality, timing and fault management. This book is an essential reading for advanced undergraduates and graduate students in a wide range of disciplines impacted by embedded computing and software. Its conceptual clarity, the style of explanations and the examples make the abstract conceptsaccessible for a wide audience."
Janos Sztipanovits, Director
E. Bronson Ingram Distinguished Professor of Engineering
Institute for Software Integrated Systems
Vanderbilt University

"Real-Time Systems" focuses on hard real-time systems, which are computing systems that must meet their temporal specification in all anticipated load and fault scenarios. The book stresses the system aspects of distributed real-time applications, treating the issues of real-time, distribution and fault-tolerance from an integral point of view. A unique cross-fertilization of ideas and concepts between the academic and industrial worlds has led to the inclusion of many insightful examples from industry to explain the fundamental scientific concepts in a real-world setting. Compared to the first edition, new developments incomplexity management, energy and power management, dependability, security, andthe internet of things, are addressed.

The book is written as a standard textbook for a high-level undergraduate or graduate course on real-time embedded systems or cyber-physical systems. Its practical approach to solving real-time problems, along with numerous summary exercises, makes it an excellent choice for researchers and practitioners alike."

Intelligent Decision Systems in Large-Scale Distributed Environments (Hardcover, 2011 ed.): Pascal Bouvry, Horacio... Intelligent Decision Systems in Large-Scale Distributed Environments (Hardcover, 2011 ed.)
Pascal Bouvry, Horacio Gonzalez-Velez, Joanna Kolodziej
R4,072 Discovery Miles 40 720 Ships in 18 - 22 working days

One of the most challenging issues for the intelligent decision systems is to effectively manage the large-scale complex distributed environments such as computational clouds, grids, ad hoc and P2P networks, under the different types of users, their relations, and real-world uncertainties. In this context the IT resources and services usually belong to different owners (institutions, enterprises, or individuals) and are managed by different administrators. These administrators conform to different sets of rules and configuration directives, and can impose different usage policies on the system users. Additionally, uncertainties are presented in various types of information that are incomplete, imprecise, fragmentary or overloading, which hinders the full and precise determination of the evaluation criteria, their subsequent and selection, the assignment scores, and eventually the final integrated decision result.

This book presents new ideas, analysis, implementations and evaluation of the next generation intelligent techniques for solving complex decision problems in large-scale distributed systems. In 15 chapters several important formulations of the decision problems in heterogeneous environments are identified and a review of the recent approaches, from game theoretical models and computational intelligent techniques, such as genetic, memetic and evolutionary algorithms, to intelligent multi-agent systems and networking are presented. We believe that this volume will serve as a reference for the students, researchers and industry practitioners working in or are interested in joining interdisciplinary works in the areas of intelligent decision systems using emergent distributed computing paradigms. It will also allow newcomers to grasp key concerns and potential solutions on the selected topics."

Scheduling in Distributed Computing Systems - Analysis, Design and Models (Hardcover, 1st Edition.
2nd Printing. 2008): Deo... Scheduling in Distributed Computing Systems - Analysis, Design and Models (Hardcover, 1st Edition. 2nd Printing. 2008)
Deo Prakash Vidyarthi, Biplab Kumer Sarker, Anil Kumar Tripathi, Laurence Tianruo Yang
R4,044 Discovery Miles 40 440 Ships in 18 - 22 working days

Scheduling in Distributed Computing Systems: Analysis, Design and Models intends to inculcate the innovative ideas for the scheduling aspect. Although the models in this book are designed for distributed systems, the same information is applicable for any type of system (i.e., where distributed processing is required). Scheduling in Distributed Computing Systems: Analysis, Design and Models will dramatically improve the design and management of the processes for industry professionals. This book deals exclusively with the scheduling aspect, which finds little space in other distributed operating system books. Scheduling in Distributed Computing Systems: Analysis, Design and Models is structured for a professional audience composed of researchers and practitioners in industry. This book is also suitable as a reference for graduate-level students in management sciences, and computer science for distributed computing system classes.

Electronics System Design Techniques for Safety Critical Applications (Hardcover, 2009 ed.): Luca Sterpone Electronics System Design Techniques for Safety Critical Applications (Hardcover, 2009 ed.)
Luca Sterpone
R2,735 Discovery Miles 27 350 Ships in 18 - 22 working days

What is exactly "Safety"? A safety system should be defined as a system that will not endanger human life or the environment. A safety-critical system requires utmost care in their specification and design in order to avoid possible errors in their implementation that should result in unexpected system's behavior during his operating "life." An inappropriate method could lead to loss of life, and will almost certainly result in financial penalties in the long run, whether because of loss of business or because the imposition of fines. Risks of this kind are usually managed with the methods and tools of the "safety engineering." A life-critical system is designed to 9 lose less than one life per billion (10 ). Nowadays, computers are used at least an order of magnitude more in safety-critical applications compared to two decades ago. Increasingly electronic devices are being used in applications where their correct operation is vital to ensure the safety of the human life and the environment. These application ranging from the anti-lock braking systems (ABS) in automobiles, to the fly-by-wire aircrafts, to biomedical supports to the human care. Therefore, it is vital that electronic designers be aware of the safety implications of the systems they develop. State of the art electronic systems are increasingly adopting progr- mable devices for electronic applications on earthling system. In particular, the Field Programmable Gate Array (FPGA) devices are becoming very interesting due to their characteristics in terms of performance, dimensions and cost.

Smart Card Security and Applications (Hardcover): Mike Hendry Smart Card Security and Applications (Hardcover)
Mike Hendry
R2,845 Discovery Miles 28 450 Ships in 18 - 22 working days

Smart cards have recently emerged as a key computer network and Internet security technology. These plastic cards contain an embedded microprocessor, allowing them to be programmed to perform specific duties. This extensively updated, second edition of the popular Artech House book, Smart Card Security and Applications, offers a current overview of the ways smart cards address the computer security issues of today's varied applications. Brand new discussions on multi-application operating systems, computer networks, and the Internet are included to keep technical and business professionals abreast of the very latest developments in this field. The book provides technical details on the newest protection mechanisms, features a discussion on the effects of recent attacks, and presents a clear methodology for solving unique security problems.

High-speed Communication Networks - Proceedings of TriComm '92 Held in Raleigh, North Carolina, February 27-28, 1992... High-speed Communication Networks - Proceedings of TriComm '92 Held in Raleigh, North Carolina, February 27-28, 1992 (Hardcover, New)
Harry G. Perros
R2,425 Discovery Miles 24 250 Ships in 18 - 22 working days

Local ATM.- Architecture of Local and Metropolitan ATM Networks: New Trends.- Supercomputer Communications as an Application for ATM Local Area Networks.- Gigabit Local Area Networks.- Congestion Control I.- An Overview of Bandwidth Management Procedures in High-Speed Networks.- Performance of the Buffered Leaky Bucket Policing Mechanism.- Congestion Control II.- Explicit Foward Congestion Notification in ATM Networks.- A Novel Architecture and Flow Control Scheme for Private ATM Networks.- Gateway Congestion Controls in High-Speed Backbone Networks.- Standards.- What's New in B-ISDN Standards?.- Routing.- Routing in ATM Networks.- A Queueing-Network Model for Half-Duplex Routing in Data Communication Networks.- Transport Protocols.- The Xpress Transfer Protocol.- Radiology Communications for Imaging Systems.- High-Speed Transport Protocol Evaluation in the VISTAnet Project.- Traffic Measurements.- Traffic Models for ISDN and B-ISDN Users.- Traffic Characterization in a Wide Area Network.- Telecommunications Software Engineering.- Engineering of Telecommunications Software.- Reliability of Telecommunications Software: Assessing Sensitivity of Least Squares Reliability Estimates.- Software Metrics and the Quality of Telecommunication Software.

RFID Security - A Lightweight Paradigm (Hardcover, 1st ed. 2017): Ahmed Khattab, Zahra Jeddi, Esmaeil Amini, Magdy Bayoumi RFID Security - A Lightweight Paradigm (Hardcover, 1st ed. 2017)
Ahmed Khattab, Zahra Jeddi, Esmaeil Amini, Magdy Bayoumi
R3,290 Discovery Miles 32 900 Ships in 10 - 15 working days

This book provides a comprehensive treatment of security in the widely adopted, Radio Frequency Identification (RFID) technology. The authors present the fundamental principles of RFID cryptography in a manner accessible to a broad range of readers, enabling them to improve their RFID security design. This book also offers the reader a range of interesting topics portraying the current state-of-the-art in RFID technology and how it can be integrated with today's Internet of Things (IoT) vision. The authors describe a first-of-its-kind, lightweight symmetric authenticated encryption cipher called Redundant Bit Security (RBS), which enables significant, multi-faceted performance improvements compared to existing cryptosystems. This book is a must-read for anyone aiming to overcome the constraints of practical implementation in RFID security technologies.

Distributed and Parallel Systems - Cluster and Grid Computing (Hardcover, 2004 ed.): Zoltan Juhasz, Peter Kacsuk, Dieter... Distributed and Parallel Systems - Cluster and Grid Computing (Hardcover, 2004 ed.)
Zoltan Juhasz, Peter Kacsuk, Dieter Kranzlmuller
R2,661 Discovery Miles 26 610 Ships in 18 - 22 working days

DAPSY (Austrian-Hungarian Workshop on Distributed and Parallel Systems) is an international conference series with biannual events dedicated to all aspects of distributed and parallel computing. DAPSY started under a different name in 1992 (Sopron, Hungary) as regional meeting of Austrian and Hungarian researchers focusing on transputer-related parallel computing; a hot research topic of that time. A second workshop followed in 1994 (Budapest, Hungary). As transputers became history, the scope of the workshop widened to include parallel and distributed systems in general and the 1st DAPSYS in 1996 (Miskolc, Hungary) reflected the results of these changes.

Distributed and Parallel Systems: Cluster and Grid Computing is an edited volume based on DAPSYS, 2004, the 5th Austrian-Hungarian Workshop on Distributed and Parallel Systems. The workshop was held in conjunction with EuroPVM/MPI-2004, Budapest, Hungary September 19-22, 2004.

Cybersecurity in the European Union - Resilience and Adaptability in Governance Policy (Hardcover, 1st ed. 2016): George... Cybersecurity in the European Union - Resilience and Adaptability in Governance Policy (Hardcover, 1st ed. 2016)
George Christou
R4,245 Discovery Miles 42 450 Ships in 10 - 15 working days

Cybercrime affects over 1 million people worldwide a day, and cyber attacks on public institutions and businesses are increasing. This book interrogates the European Union's evolving cybersecurity policies and strategy and argues that while progress is being made, much remains to be done to ensure a secure and resilient cyberspace in the future.

Bayesian Network Technologies - Applications and Graphical Models (Hardcover): Bayesian Network Technologies - Applications and Graphical Models (Hardcover)
R2,624 Discovery Miles 26 240 Ships in 18 - 22 working days

Bayesian networks are now being used in a variety of artificial intelligence applications. These networks are high-level representations of probability distributions over a set of variables that are used for building a model of the problem domain. ""Bayesian Network Technologies: Applications and Graphical Models"" provides an excellent and well-balanced collection of areas where Bayesian networks have been successfully applied. This book describes the underlying concepts of Bayesian Networks in an interesting manner with the help of diverse applications, and theories that prove Bayesian networks valid. ""Bayesian Network Technologies: Applications and Graphical Models"" provides specific examples of how Bayesian networks are powerful machine learning tools critical in solving real-life problems.

Surviving Cyberwar (Hardcover): Richard Stiennon Surviving Cyberwar (Hardcover)
Richard Stiennon
R2,853 Discovery Miles 28 530 Ships in 10 - 15 working days

Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon argues the era of cyber warfare has already begun. Recent cyber attacks on United States government departments and the Pentagon corroborate this claim. China has compromised email servers at the German Chancellery, Whitehall, and the Pentagon. In August 2008, Russia launched a cyber attack against Georgia that was commensurate with their invasion of South Ossetia. This was the first time that modern cyber attacks were used in conjunction with a physical attack. Every day, thousands of attempts are made to hack into America's critical infrastructure. These attacks, if successful, could have devastating consequences. In Surviving Cyberwar, Stiennon introduces cyberwar, outlines an effective defense against cyber threats, and explains how to prepare for future attacks. The book: *begins with Shawn Carpenter and his discovery that China had hacked into his work place, Sandia Labs; *follows the rise of cyber espionage on the part of the Chinese People's Liberation Army (PLA) as increasingly sophisticated and overt attacks are carried out against government and military networks around the world; *moves from cyber espionage to cyberwar itself, revealing the rise of distributed denial of service (DDoS) as a means of attacking servers, websites, and countries; *provides a historical perspective on technology and warfare is provided, drawing on lessons learned from Sun Tsu to Lawrence of Arabia to Winston Churchill; and *finishes by considering how major democracies are preparing for cyberwar and predicts ways that a new era of cyber conflict is going to impact the Internet, privacy, and the way the world works. This text is a stimulating and informative look at one of the gravest threats to Homeland Security today, offering new insights to technologists on the front lines, helping policy makers understand the challenges they face, and providing guidance for every organization to help reduce exposure to cyber threats. It is essential reading for anyone concerned with the current geopolitical state of affairs.

Information Innovation Technology in Smart Cities (Hardcover, 1st ed. 2018): Leila Ismail, Liren Zhang Information Innovation Technology in Smart Cities (Hardcover, 1st ed. 2018)
Leila Ismail, Liren Zhang
R4,778 Discovery Miles 47 780 Ships in 10 - 15 working days

This book describes Smart Cities and the information technologies that will provide better living conditions in the cities of tomorrow. It brings together research findings from 27 countries across the globe, from academia, industry and government. It addresses a number of crucial topics in state of the arts of technologies and solutions related to smart cities, including big data and cloud computing, collaborative platforms, communication infrastructures, smart health, sustainable development and energy management. Information Innovation Technology in Smart Cities is essential reading for researchers working on intelligence and information communication systems, big data, Internet of Things, Cyber Security, and cyber-physical energy systems. It will be also invaluable resource for advanced students exploring these areas.

Cloud Computing Technologies for Connected Government (Hardcover): Zaigham Mahmood Cloud Computing Technologies for Connected Government (Hardcover)
Zaigham Mahmood
R4,890 Discovery Miles 48 900 Ships in 18 - 22 working days

In the developed world, there is an increasing trend towards the use of e-government to further involve citizens in the maintenance of their country. This is not only an improved way to promote existing methods of citizen engagement such as voting or taxation; it also makes information more accessible and increases opportunities for average citizens to make their voices heard. Cloud Computing Technologies for Connected Government explores the latest research on the use of e-government for enhancing the effectiveness and transparency of public institutions. Featuring coverage on cloud-related frameworks and strategies, barriers to e-government development and practice, and case studies revealing the best guidelines for efficient technology use, this timely publication is indispensable for students, educators, information system specialists, technology experts, and anyone involved in public administration or the management of government departments. This book highlights chapters on a broad scope of topics including, but not limited to, citizen empowerment, collaborative public service, communication through social media, cost benefits of the Cloud, electronic voting systems, identity management, legal issues, and security and privacy for e-government users.

Research Anthology on Artificial Intelligence Applications in Security, VOL 4 (Hardcover): Information Reso Management... Research Anthology on Artificial Intelligence Applications in Security, VOL 4 (Hardcover)
Information Reso Management Association
R9,817 Discovery Miles 98 170 Ships in 18 - 22 working days
The Internet and Its Protocols - A Comparative Approach (Hardcover, New): Adrian Farrel The Internet and Its Protocols - A Comparative Approach (Hardcover, New)
Adrian Farrel
R1,567 Discovery Miles 15 670 Ships in 10 - 15 working days

The view presented in "The Internet and Its Protocols" is at once broad and deep. It covers all the common protocols and how they combine to create the Internet in its totality. More importantly, it describes each one completely, examining the requirements it addresses and the exact means by which it does its job. These descriptions include message flows, full message formats, and message exchanges for normal and error operation. They are supported by numerous diagrams and tables.
This book's comparative approach gives you something more valuable: insight into the decisions you face as you build and maintain your network, network device, or network application. Author Adrian Farrel s experience and advice will dramatically smooth your path as you work to offer improved performance and a wider range of services.
* Provides comprehensive, in-depth, and comparative coverage of the Internet Protocol (both IPv4 and IPv6) and its many related technologies.
* Written for developers, operators, and managers, and designed to be used as both an overview and a reference.
* Discusses major concepts in traffic engineering, providing detailed looks at MPLS and GMPLS and how they control both IP and non-IP traffic.
* Covers protocols for governing routing and transport, and for managing switches, components, and the network as a whole, along with higher-level application protocols.
* Offers thoughtful guidance on choosing between protocols, selecting features within a protocol, and other service- and performance-related decisions."

Automotive Informatics and Communicative Systems - Principles in Vehicular Networks and Data Exchange (Hardcover): Huaqun Guo Automotive Informatics and Communicative Systems - Principles in Vehicular Networks and Data Exchange (Hardcover)
Huaqun Guo
R4,945 Discovery Miles 49 450 Ships in 18 - 22 working days

Emerging vehicular networks are fast becoming a reality that will enable a variety of applications such as safety, traffic efficiency, and infotainment. ""Automotive Informatics and Communicative Systems: Principles in Vehicular Networks and Data Exchange"" introduces vehicular networks and advanced information technologies applied in the automotive region. Presenting advanced research works in secure remote monitoring and control of vehicles, this book provides future trends of information technologies in the automotive domain.

The Secure Information Society - Ethical, Legal and Political Challenges (Hardcover, 2013 ed.): Joerg Kruger, Bertram Nickolay,... The Secure Information Society - Ethical, Legal and Political Challenges (Hardcover, 2013 ed.)
Joerg Kruger, Bertram Nickolay, Sandro Gaycken
R3,621 R3,320 Discovery Miles 33 200 Save R301 (8%) Ships in 10 - 15 working days

In our modern information societies, we not only use and welcome computers; we are highly dependent upon them. There is a downside of this kind of progress, however. Computers are not 100% reliable. They are insecure. They are vulnerable to attackers. They can either be attacked directly, to disrupt their services, or they can be abused in clever ways to do the bidding of an attacker as a dysfunctional user. Decision-makers and experts alike always struggle with the amount of interdisciplinary knowledge needed to understand the nuts and bolts of modern information societies and their relation to security, the implications of technological or political progress or the lack thereof. This holds in particular for new challenges to come. These are harder to understand and to categorize; their development is difficult to predict. To mitigate this problem and to enable more foresight, The Secure Information Society provides an interdisciplinary spotlight onto some new and unfolding aspects of the uneasy relationship between information technology and information society, to aid the dialogue not only in its current and ongoing struggle, but to anticipate the future in time and prepare perspectives for the challenges ahead.

A Graph-Theoretic Approach to Enterprise Network Dynamics (Hardcover, 2007 ed.): Horst Bunke, Peter J. Dickinson, Miro Kraetzl,... A Graph-Theoretic Approach to Enterprise Network Dynamics (Hardcover, 2007 ed.)
Horst Bunke, Peter J. Dickinson, Miro Kraetzl, Walter D. Wallis
R2,777 Discovery Miles 27 770 Ships in 18 - 22 working days

Networks have become nearly ubiquitous and increasingly complex, and their support of modern enterprise environments has become fundamental. Accordingly, robust network management techniques are essential to ensure optimal performance of these networks. This monograph treats the application of numerous graph-theoretic algorithms to a comprehensive analysis of dynamic enterprise networks. Network dynamics analysis yields valuable information about network performance, efficiency, fault prediction, cost optimization, indicators and warnings. Based on many years of applied research of generic network dynamics, this work covers a number of elegant applications (including many new and experimental results) of traditional graph theory algorithms and techniques to computationally tractable network dynamics analysis to motivate network analysts, practitioners and researchers alike. The material is also suitable for graduate courses addressing state-of-the-art applications of graph theory in analysis of dynamic communication networks, dynamic databasing, and knowledge management.

Virtualization of Universities - Digital Media and the Organization of Higher Education Institutions (Hardcover, 2012 ed.):... Virtualization of Universities - Digital Media and the Organization of Higher Education Institutions (Hardcover, 2012 ed.)
Thomas Pfeffer
R2,655 Discovery Miles 26 550 Ships in 18 - 22 working days

The purpose of this volume is to shape conceptual tools to understand the impact of new information and communication technologies (ICTs) on the organization of universities. Traditional research-based universities, the most typical representatives of the higher education system, find themselves challenged by the speed and the wide range of technical innovations, but also by a vast array of implicit assumptions and explicit promises associated with the distribution of digital media.

The author observes that as universities increasingly use digital media (computers and the Internet) to accomplish their tasks, a transformation takes place in an "evolutionary" rather than in a revolutionary way.Using the University of Klagenfurt as an in-depth case study, he explores such dynamic issues as how digital media affect the practice of research, the preservation and dissemination of knowledge (for example, through publishing and archiving), and delivery of education at universities.More broadly, he considers issues of organizational culture and design, administration, and leadership as universities integrate digital technologies into all aspects of their operations."

The Internet of Things - 20th Tyrrhenian Workshop on Digital Communications (Hardcover, Edition.): Daniel Giusto, Antonio Iera,... The Internet of Things - 20th Tyrrhenian Workshop on Digital Communications (Hardcover, Edition.)
Daniel Giusto, Antonio Iera, Giacomo Morabito, Luigi Atzori
R5,396 Discovery Miles 53 960 Ships in 18 - 22 working days

In the last few years, a stimulating idea is fast emergingin the wireless scenario: the pervasive presence around us of a variety of "things" or "objects," such as RFID, sensors, actuators, mobile phones, which, through unique addressing schemes, are able to interact with each other and cooperate with their neighboring "smart" c- ponents to reach common goals. This novel paradigm, named "The Internet of Things" (IoT) continues on the path set by the concept of smart environments and paves the way to the depl- ment of numerous applications with a signi cant impact on many elds of future every-day life. In this context, logistics, Intelligent Transportation Systems (ITS), business/process management, assisted living, and e-health are only a few examples of possible application elds in which this novel paradigm will play a leading role in the next future. Actually, manychallengingissues still needto be addressedand both technolo- calandsocialnodesuntiedbeforethe IoTideabeingwidelyaccepted.Centralissues are making a full interoperabilityof such devices possible, enablingtheir adaptation and autonomousbehavior, as well as guaranteeingtrust, privacy, and security. Also, the IoT idea poses several new problemsconcerningthe networkingaspects. In fact, the "things" composing the IoT will be characterized by low resources in terms of both computation and energy capacity. Accordingly, the proposed solutions need to payspecial attentionto resourceef ciencybesides the obviousscalability problems. The papers included in this volume present a picture of the current state of the art on the above issues; more speci cally, concepts and ideas are discussed on n- working, middleware, security and privacy, RFID and sensor networks, as well as electromagnetic aspects.

Distributed Computing Innovations for Business, Engineering, and Science (Hardcover): Alfred Wai-Sing Loo Distributed Computing Innovations for Business, Engineering, and Science (Hardcover)
Alfred Wai-Sing Loo
R4,948 Discovery Miles 49 480 Ships in 18 - 22 working days

In recent years, distributed systems and computing applications continue to increase its approaches towards business, engineering, and science. Distributed Computing Innovations for Business, Engineering, and Science is a collection of widespread research providing relevant theoretical frameworks and research findings on the applications of distributed computing innovations to the business, engineering and science fields. This book aims to provide insights on the management of expertise, knowledge, information and organizational development in distributed computing.

Computer and Computing Technologies in Agriculture IV - 4th IFIP TC 12 International Conference, CCTA 2010, Nanchang, China,... Computer and Computing Technologies in Agriculture IV - 4th IFIP TC 12 International Conference, CCTA 2010, Nanchang, China, October 22-25, 2010, Selected Papers, Part IV (Hardcover, Edition.)
Daoliang Li, Yande Liu, Yingyi Chen
R2,813 Discovery Miles 28 130 Ships in 18 - 22 working days

This book constitutes Part IV of the refereed four-volume post-conference proceedings of the 4th IFIP TC 12 International Conference on Computer and Computing Technologies in Agriculture, CCTA 2010, held in Nanchang, China, in October 2010. The 352 revised papers presented were carefully selected from numerous submissions. They cover a wide range of interesting theories and applications of information technology in agriculture, including simulation models and decision-support systems for agricultural production, agricultural product quality testing, traceability and e-commerce technology, the application of information and communication technology in agriculture, and universal information service technology and service systems development in rural areas.

Brain-Computer Interfaces - Applying our Minds to Human-Computer Interaction (Hardcover, 2010): Desney S Tan, Anton Nijholt Brain-Computer Interfaces - Applying our Minds to Human-Computer Interaction (Hardcover, 2010)
Desney S Tan, Anton Nijholt
R2,812 Discovery Miles 28 120 Ships in 18 - 22 working days

For generations, humans have fantasized about the ability to create devices that can see into a person's mind and thoughts, or to communicate and interact with machines through thought alone. Such ideas have long captured the imagination of humankind in the form of ancient myths and modern science fiction stories. Recent advances in cognitive neuroscience and brain imaging technologies have started to turn these myths into a reality, and are providing us with the ability to interface directly with the human brain. This ability is made possible through the use of sensors that monitor physical processes within the brain which correspond with certain forms of thought. Brain-Computer Interfaces: Applying our Minds to Human-Computer Interaction broadly surveys research in the Brain-Computer Interface domain. More specifically, each chapter articulates some of the challenges and opportunities for using brain sensing in Human-Computer Interaction work, as well as applying Human-Computer Interaction solutions to brain sensing work. For researchers with little or no expertise in neuroscience or brain sensing, the book provides background information to equip them to not only appreciate the state-of-the-art, but also ideally to engage in novel research. For expert Brain-Computer Interface researchers, the book introduces ideas that can help in the quest to interpret intentional brain control and develop the ultimate input device. It challenges researchers to further explore passive brain sensing to evaluate interfaces and feed into adaptive computing systems. Most importantly, the book will connect multiple communities allowing research to leverage their work and expertise and blaze into the future.

Cryptographic Algorithms on Reconfigurable Hardware (Hardcover, 2007 ed.): Francisco Rodriguez-henriquez, N. A. Saqib, Arturo... Cryptographic Algorithms on Reconfigurable Hardware (Hardcover, 2007 ed.)
Francisco Rodriguez-henriquez, N. A. Saqib, Arturo Diaz Perez, Cetin Kaya Koc
R4,898 Discovery Miles 48 980 Ships in 18 - 22 working days

Software-based cryptography can be used for security applications where data traffic is not too large and low encryption rate is tolerable. But hardware methods are more suitable where speed and real-time encryption are needed. Until now, there has been no book explaining how cryptographic algorithms can be implemented on reconfigurable hardware devices. This book covers computational methods, computer arithmetic algorithms, and design improvement techniques needed to implement efficient cryptographic algorithms in FPGA reconfigurable hardware platforms. The author emphasizes the practical aspects of reconfigurable hardware design, explaining the basic mathematics involved, and giving a comprehensive description of state-of-the-art implementation techniques.

Disruptive Technologies, Innovation and Global Redesign - Emerging Implications (Hardcover): Ndubuisi Ekekwe, Nazrul Islam Disruptive Technologies, Innovation and Global Redesign - Emerging Implications (Hardcover)
Ndubuisi Ekekwe, Nazrul Islam
R4,685 Discovery Miles 46 850 Ships in 18 - 22 working days

In the last few years, most parts of the world have morphed into an electronically interdependent economic unit where a disruption in one marketplace affects the others. New technologies have emerged, transforming the ways we do business and, consequently, redesigning the world. Innovation in disruptive technologies pushes new and more agile firms to set new benchmarks and forces established companies to revisit existing models or re-invent themselves to stay competitive. Disruptive Technologies, Innovation and Global Redesign: Emerging Implications provides case studies as well as practical and theoretical papers on the issues surrounding disruptive technologies, innovation, global redesign. This book will be a useful reference for academics, students, policymakers and professionals in the fields of emerging and disruptive technologies, innovation, economic planning, technology and society, technology transfer, and general technology management.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Guide to Computer Forensics and…
Amelia Phillips, Bill Nelson, … Paperback R1,345 R1,248 Discovery Miles 12 480
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Network Routing, Volume 8
M.O. Ball, T.L. Magnanti, … Hardcover R1,550 Discovery Miles 15 500
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,452 Discovery Miles 14 520
PC Interfacing
Pei An Paperback R1,213 Discovery Miles 12 130
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,318 Discovery Miles 13 180
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
CISA - Certified Information Systems…
Cannon Paperback R1,635 R1,311 Discovery Miles 13 110
CompTIA Network+ Guide to Networks
Jill West Paperback R1,362 R1,269 Discovery Miles 12 690

 

Partners