0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (49)
  • R250 - R500 (232)
  • R500+ (8,197)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > General

Advances in Digital Forensics IV (Hardcover, 2008 ed.): Indrajit Ray, Sujeet Shenoi Advances in Digital Forensics IV (Hardcover, 2008 ed.)
Indrajit Ray, Sujeet Shenoi
R3,156 Discovery Miles 31 560 Ships in 10 - 15 working days

Practically every crime now involves some aspect of digital evidence. This is the most recent volume in the Advances in Digital Forensics series. It describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations.

This book contains a selection of twenty-eight edited papers from the Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, held at Kyoto University, Kyoto, Japan in the spring of 2008.

Human Rights Treaties - Considering Patterns of Participation, 1948-2000 (Hardcover): Mark Sachleben Human Rights Treaties - Considering Patterns of Participation, 1948-2000 (Hardcover)
Mark Sachleben
R4,083 Discovery Miles 40 830 Ships in 12 - 17 working days

The book examines patterns of participation in human rights treaties. International relations theory is divided on what motivates states to participate in treaties, specifically human rights treaties. Instead of examining the specific motivations, this dissertation examines patterns of participation. In doing so, it attempts to match theoretical expectations of state behavior with participation. The conclusion of this study is that the data suggests there are multiple motivations that lead states to participate in human rights treaties. The book is divided into five substantive chapters. After an introduction, the second chapter examines the literature on why states join treaties in general, and human rights treaties in particular. The third chapter reviews the obligations states commit to under the fifteen treaties under consideration. The fourth chapter uses basic quantitative methods to examine any differences in the participation rates between democratic and non-democratic states. The fifth chapter examines reservations, declarations, and objections made in conjuncture with the fifteen treaties. The chapter employs both quantitative and qualitative methods to determine if there are substantial differences between democratic and non-democratic states. Finally, the sixth chapter examines those states that participate in the most human rights treaties to determine if there are characteristics that help to identify these states. Additionally, the chapter examines and evaluates theoretical predictions about participation.

Complex Networks and Their Applications VII - Volume 1 Proceedings The 7th International Conference on Complex Networks and... Complex Networks and Their Applications VII - Volume 1 Proceedings The 7th International Conference on Complex Networks and Their Applications COMPLEX NETWORKS 2018 (Hardcover, 1st ed. 2019)
Luca Maria Aiello, Chantal Cherifi, Hocine Cherifi, Renaud Lambiotte, Pietro Lio, …
R5,921 Discovery Miles 59 210 Ships in 10 - 15 working days

This book highlights cutting-edge research in the field of network science, offering scientists, researchers, students and practitioners a unique update on the latest advances in theory, together with a wealth of applications. It presents the peer-reviewed proceedings of the VII International Conference on Complex Networks and their Applications (COMPLEX NETWORKS 2018), which was held in Cambridge on December 11-13, 2018. The carefully selected papers cover a wide range of theoretical topics such as network models and measures; community structure and network dynamics; diffusion, epidemics and spreading processes; and resilience and control; as well as all the main network applications, including social and political networks; networks in finance and economics; biological and neuroscience networks; and technological networks.

The CPHIMS Review Guide, 4th Edition - Preparing for Success in Healthcare Information and Management Systems (Paperback, 4th... The CPHIMS Review Guide, 4th Edition - Preparing for Success in Healthcare Information and Management Systems (Paperback, 4th edition)
Mara Daiker; Healthcare Information & Management Systems Society (HIMSS)
R4,579 Discovery Miles 45 790 Ships in 9 - 15 working days

Whether you're taking the CPHIMS exam or simply want the most current and comprehensive overview in healthcare information and management systems today, this completely revised and updated fourth edition has it all. But for those preparing for the CPHIMS exam, this book is also an ideal study partner. The content reflects the outline of exam topics covering healthcare and technology environments; clinical informatics; analysis, design, selection, implementation, support, maintenance, testing, evaluation, privacy and security; and management and leadership. Candidates can challenge themselves with the sample multiple-choice questions given at the end of the book. The benefits of CPHIMS certification are broad and far-reaching. Certification is a process that is embraced in many industries, including healthcare information and technology. CPHIMS is recognized as the 'gold standard' in healthcare IT because it is developed by HIMSS, has a global focus and is valued by clinicians and non-clinicians, management and staff positions and technical and nontechnical individuals. Certification, specifically CPHIMS certification, provides a means by which employers can evaluate potential new hires, analyze job performance, evaluate employees, market IT services and motivate employees to enhance their skills and knowledge. Certification also provides employers with the evidence that the certificate holders have demonstrated an established level of job-related knowledge, skills and abilities and are competent practitioners of healthcare IT.

Elastic Load Balancing Application Load Balancers (Hardcover): Documentation Team Elastic Load Balancing Application Load Balancers (Hardcover)
Documentation Team
R962 Discovery Miles 9 620 Ships in 10 - 15 working days
Smart City Networks - Through the Internet of Things (Hardcover, 1st ed. 2017): Stamatina Th. Rassia, Panos M. Pardalos Smart City Networks - Through the Internet of Things (Hardcover, 1st ed. 2017)
Stamatina Th. Rassia, Panos M. Pardalos
R4,128 Discovery Miles 41 280 Ships in 12 - 17 working days

This book both analyzes and synthesizes new cutting-edge theories and methods for future design implementations in smart cities through interdisciplinary synergizing of architecture, technology, and the Internet of Things (IoT). Implementation of IoT enables the collection and data exchange of objects embedded with electronics, software, sensors, and network connectivity. Recently IoT practices have moved into uniquely identifiable objects that are able to transfer data directly into networks. This book features new technologically advanced ideas, highlighting properties of smart future city networks. Chapter contributors include theorists, computer scientists, mathematicians, and interdisciplinary planners, who currently work on identifying theories, essential elements, and practices where the IoT can impact the formation of smart cities and sustainability via optimization, network analyses, data mining, mathematical modeling and engineering. Moreover, this book includes research-based theories and real world practices aimed toward graduate researchers, experts, practitioners and the general public interested in architecture, engineering, mathematical modeling, industrial design, computer science technologies, and related fields.

Performance Modelling and Evaluation of ATM Networks (Hardcover, 1995 ed.): Demetres D. Kouvatsos Performance Modelling and Evaluation of ATM Networks (Hardcover, 1995 ed.)
Demetres D. Kouvatsos
R8,646 Discovery Miles 86 460 Ships in 12 - 17 working days

Asynchronous Transfer Mode (ATM) networks are widely considered to be the new generation of high speed communication systems both for broadband public information highways and for local and wide area private networks. ATM is designed to integrate existing and future voice, audio, image and data services. Moreover, ATM aims to simplify the complexity of switching and buffer management, to optimise intermediate node processing and buffering and to limit transmission delays. However, to support such diverse services on one integrated communication network, it is most essential, through careful engineering, to achieve a fruitful balance amongst the conflicting requirements of different quality of service constraints ensuring that one service does not have adverse implications on another. Over recent years there has been a great deal of progress in research and development of ATM technology, but there are still many interesting and important problems to be resolved such as traffic characterisation and control, routing and optimisation, ATM switching techniques and the provision of quality of service. This book presents thirty-two research papers, both from industry and academia, reflecting latest original achievements in the theory and practice of performance modelling of ATM networks worldwide. These papers were selected, subject to peer review, from those submitted as extended and revised versions out of fifty-nine shorter papers presented at the Second IFIP Workshop on "Performance Modelling and Evaluation of ATM Networks" July 4-7, 1994, Bradford University. At least three referees from the scientific committee and externally were involved in the selection of each paper.

Understanding IPv6 (Hardcover, 2005 ed.): Youngsong Mun, Hyewon Keren Lee Understanding IPv6 (Hardcover, 2005 ed.)
Youngsong Mun, Hyewon Keren Lee
R2,959 Discovery Miles 29 590 Ships in 10 - 15 working days

Covers the basic materials and up-to-date information to understand IPv6, including site local address often overlooked by most other books about IPv6 do not reflect this important fact.

Highlights Teredo, a transistion tool that permits web sites using two different protocols to interact, with complete-chapter coverage..

Since popular applications such as web service can not be operated without DNS. Chapter 9 covers modifications in DNS for IPv6 which other books rarely cover.

Other topics covered that make it a most up-to-date and valuable resource: hierarchical mobility management, fast handoff, and security features such as VPN traversal and firewall traversal.

Runtime Reconfiguration in Networked Embedded Systems - Design and Testing Practices (Hardcover, 1st ed. 2016): Zoltan Papp,... Runtime Reconfiguration in Networked Embedded Systems - Design and Testing Practices (Hardcover, 1st ed. 2016)
Zoltan Papp, George Exarchakos
R3,406 Discovery Miles 34 060 Ships in 12 - 17 working days

This book focuses on the design and testing of large-scale, distributed signal processing systems, with a special emphasis on systems architecture, tooling and best practices. Architecture modeling, model checking, model-based evaluation and model-based design optimization occupy central roles. Target systems with resource constraints on processing, communication or energy supply require non-trivial methodologies to model their non-functional requirements, such as timeliness, robustness, lifetime and "evolution" capacity. Besides the theoretical foundations of the methodology, an engineering process and toolchain are described. Real-world cases illustrate the theory and practice tested by the authors in the course of the European project ARTEMIS DEMANES. The book can be used as a "cookbook" for designers and practitioners working with complex embedded systems like sensor networks for the structural integrity monitoring of steel bridges, and distributed micro-climate control systems for greenhouses and smart homes.

Advances in Communication, Cloud, and Big Data - Proceedings of 2nd National Conference on CCB 2016 (Hardcover, 1st ed. 2019):... Advances in Communication, Cloud, and Big Data - Proceedings of 2nd National Conference on CCB 2016 (Hardcover, 1st ed. 2019)
Hiren Kumar Deva Sarma, Samarjeet Borah, Nitul Dutta
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

This book is an outcome of the second national conference on Communication, Cloud and Big Data (CCB) held during November 10-11, 2016 at Sikkim Manipal Institute of Technology. The nineteen chapters of the book are some of the accepted papers of CCB 2016. These chapters have undergone review process and then subsequent series of improvements. The book contains chapters on various aspects of communication, computation, cloud and big data. Routing in wireless sensor networks, modulation techniques, spectrum hole sensing in cognitive radio networks, antenna design, network security, Quality of Service issues in routing, medium access control protocol for Internet of Things, and TCP performance over different routing protocols used in mobile ad-hoc networks are some of the topics discussed in different chapters of this book which fall under the domain of communication. Moreover, there are chapters in this book discussing topics like applications of geographic information systems, use of radar for road safety, image segmentation and digital media processing, web content management system, human computer interaction, and natural language processing in the context of Bodo language. These chapters may fall under broader domain of computation. Issues like robot navigation exploring cloud technology, and application of big data analytics in higher education are also discussed in two different chapters. These chapters fall under the domains of cloud and big data, respectively.

Depth From Defocus: A Real Aperture Imaging Approach (Hardcover, 1999 ed.): Subhasis Chaudhuri Depth From Defocus: A Real Aperture Imaging Approach (Hardcover, 1999 ed.)
Subhasis Chaudhuri; Foreword by A.P. Pentland; A.N. Rajagopalan
R3,037 Discovery Miles 30 370 Ships in 10 - 15 working days

Computer vision is becoming increasingly important in several industrial applications such as automated inspection, robotic manipulations and autonomous vehicle guidance. These tasks are performed in a 3-D world and it is imperative to gather reliable information on the 3-D structure of the scene. This book is about passive techniques for depth recovery, where the scene is illuminated only by natural light as opposed to active methods where a special lighting device is used for scene illumination. Passive methods have a wider range of applicability and also correspond to the way humans infer 3-D structure from visual images.

CDMA - Access & Switching for Terrestrial & Satellite Networks (Hardcover, Revised and Thu): DP Gerakoulis CDMA - Access & Switching for Terrestrial & Satellite Networks (Hardcover, Revised and Thu)
DP Gerakoulis
R6,050 Discovery Miles 60 500 Ships in 12 - 17 working days

CDMA: Access and Switching addresses two unique uses of CDMA. The first is its use as a generalized method for multiple access communications and the second is its use in switching applications. Hence, the concepts introduced will enable readers to understand that multi-user communications (whether access or switching) can be presented as generalized code division networks. Each new application presented is assessed and evaluated while each innovative design is followed by rigorous performed analysis.

  • Introduces the concepts of generalized CDMA and code division switching and analyzes spreading sequences for orthogonal, quasi-orthogonal and pseudo-orthogonal access systems
  • Presents the Satelite Switched CDMA (SS/CDMA) as a system application and evaluates its end-to-end BER performance and throughput
  • Features methods and procedures for random access, synchronization and carrier demodulation in CDMA networks and examines the CDMA performance under non-linear amplification
  • Discusses methods of adaptive power control and multi-user detection in asynchronous CDMA networks
Such a novel approach will be of great interest to researchers and will also benefit forward-looking system architects and designers. For graduate level students undergoing research work in terrestial wireless and satellite networks it will be a unique learning experience.
Social Multimedia Signals - A Signal Processing Approach to Social Network Phenomena (Hardcover, 2015 ed.): Suman Deb Roy,... Social Multimedia Signals - A Signal Processing Approach to Social Network Phenomena (Hardcover, 2015 ed.)
Suman Deb Roy, Wenjun Zeng
R3,974 R3,397 Discovery Miles 33 970 Save R577 (15%) Ships in 12 - 17 working days

This book provides a comprehensive coverage of the state-of-the-art in understanding media popularity and trends in online social networks through social multimedia signals. With insights from the study of popularity and sharing patterns of online media, trend spread in social media, social network analysis for multimedia and visualizing diffusion of media in online social networks. In particular, the book will address the following important issues: Understanding social network phenomena from a signal processing point of view; The existence and popularity of multimedia as shared and social media, how content or origin of sharing activity can affect its spread and popularity; The network-signal duality principle, i.e., how the signal tells us key properties of information diffusion in networks; The social signal penetration hypothesis, i.e., how the popularity of media in one domain can affect the popularity of media in another. The book will help researchers, developers and business (advertising/marketing) individuals to comprehend the potential in exploring social multimedia signals collected from social network data quantitatively from a signal processing perspective.

Handbook on Electronic Commerce (Hardcover): M. Shaw, Etc, R. Blanning, T Strader, Andrew Whinston Handbook on Electronic Commerce (Hardcover)
M. Shaw, Etc, R. Blanning, T Strader, Andrew Whinston
R2,561 Discovery Miles 25 610 Ships in 12 - 17 working days

The world is undergoing a revolution to a digital economy, with pronounced implications for corporate strategy, marketing, operations, information systems, customer services, global supply-chain management, and product distribution. This handbook examines the aspects of electronic commerce, including electronic storefront, on-line business, consumer interface, business-to-business networking, digital payment, legal issues, information product development, and electronic business models.
Indispensable for academics, students and professionals who are interested in Electronic Commerce and Internet Business.

Asymmetric Cryptography: Primitives and Protocols (Hardcover): Pointcheval Asymmetric Cryptography: Primitives and Protocols (Hardcover)
Pointcheval
R3,789 Discovery Miles 37 890 Ships in 12 - 17 working days

Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairings on elliptic curves. Asymmetric Cryptography starts by presenting encryption and signatures, the basic primitives in public-key cryptography. It goes on to explain the notion of provable security, which formally defines what "secure" means in terms of a cryptographic scheme. A selection of famous families of protocols are then described, including zero-knowledge proofs, multi-party computation and key exchange. After a general introduction to pairing-based cryptography, this book presents advanced cryptographic schemes for confidentiality and authentication with additional properties such as anonymous signatures and multi-recipient encryption schemes. Finally, it details the more recent topic of verifiable computation.

Computer Networking First-Step (Paperback): Wendell Odom Computer Networking First-Step (Paperback)
Wendell Odom
R1,223 R764 Discovery Miles 7 640 Save R459 (38%) Ships in 12 - 17 working days

Your first step into the world of computer networking No experience required Includes clear and easily understood explanations Makes learning easy Your first step to computer networking begins here! Learn basic networking terminology Understand how information is routed from place to place Explore Internet connectivity secrets Protect your computer from intrusion Build local-area networks (LANs) Welcome to the world of networking! Networking and the Internet touch our lives in untold ways every day. From connecting our computers together at home and surfing the net at high speeds to editing and sharing digital music and video, computer networking has become both ubiquitous and indispensable. No experience needed! Computer Networking First-Step explains the basics of computer networking in easy-to-grasp language that all of us can understand. This book takes you on a guided tour of the core technologies that make up network and Internet traffic. Whether you are looking to take your first step into a career in networking or are interested in just gaining a conversational knowledge of the technology, this book is for you!

Telegeoinformatics - Location-Based Computing and Services (Hardcover): Hassan A. Karimi Telegeoinformatics - Location-Based Computing and Services (Hardcover)
Hassan A. Karimi
R5,425 Discovery Miles 54 250 Ships in 12 - 17 working days


Author Biography:
Dr. Hassan A. Karimi is Assistant Professor and Director of Geoinformatics Program in the Department of Information Science and Telecommunications at the University of Pittsburgh. His main research interests include geospatial information systems (GISs), Global Positioning System (GPS), remote sensing, location-based computing and services, mobile computing, spatial databases, spatial algorithms, computational geometry, parallel/distributed computing, and spatial uncertainty measurement and modelling.

Dr. Amin Hammad is a Visiting Scholar at Carnegie Mellon University and University of Pittsburgh. Prior to his current position, he was Assistant Professor in the Department of Civil Engineering of Nagoya University, Japan, for six years. His main research interest is the application of geomatics and mobile computing in civil engineering and urban planning.

Both editors have strong background in the theme of the proposed book. They have been actively engaged in research and teaching related to the subjects in the book.

Dimension-based Quality Modeling of Transmitted Speech (Hardcover, 2013 ed.): Marcel Waltermann Dimension-based Quality Modeling of Transmitted Speech (Hardcover, 2013 ed.)
Marcel Waltermann
R4,287 R3,429 Discovery Miles 34 290 Save R858 (20%) Ships in 12 - 17 working days

In this book, speech transmission quality is modeled on the basis of perceptual dimensions. The author identifies those dimensions that are relevant for today's public-switched and packet-based telecommunication systems, regarding the complete transmission path from the mouth of the speaker to the ear of the listener. Both narrowband (300-3400 Hz) as well as wideband (50-7000 Hz) speech transmission is taken into account. A new analytical assessment method is presented that allows the dimensions to be rated by non-expert listeners in a direct way. Due to the efficiency of the test method, a relatively large number of stimuli can be assessed in auditory tests. The test method is applied in two auditory experiments. The book gives the evidence that this test method provides meaningful and reliable results. The resulting dimension scores together with respective overall quality ratings form the basis for a new parametric model for the quality estimation of transmitted speech based on the perceptual dimensions. In a two-step model approach, instrumental dimension models estimate dimension impairment factors in a first step. The resulting dimension estimates are combined by a Euclidean integration function in a second step in order to provide an estimate of the total impairment.

The Active Defender - Immersion in the Offensive Security Mindset (Paperback): Catherine J. Ullman The Active Defender - Immersion in the Offensive Security Mindset (Paperback)
Catherine J. Ullman
R585 R533 Discovery Miles 5 330 Save R52 (9%) Ships in 12 - 17 working days

Immerse yourself in the offensive security mindset to better defend against attacks In The Active Defender: Immersion in the Offensive Security Mindset, Principal Technology Architect, Security, Dr. Catherine J. Ullman delivers an expert treatment of the Active Defender approach to information security. In the book, you’ll learn to understand and embrace the knowledge you can gain from the offensive security community. You’ll become familiar with the hacker mindset, which allows you to gain emergent insight into how attackers operate and better grasp the nature of the risks and threats in your environment. The author immerses you in the hacker mindset and the offensive security culture to better prepare you to defend against threats of all kinds. You’ll also find: Explanations of what an Active Defender is and how that differs from traditional defense models Reasons why thinking like a hacker makes you a better defender Ways to begin your journey as an Active Defender and leverage the hacker mindset An insightful and original book representing a new and effective approach to cybersecurity, The Active Defender will be of significant benefit to information security professionals, system administrators, network administrators, and other tech professionals with an interest or stake in their organization’s information security.

Mobile Communications (Paperback, 2nd edition): Jochen Schiller Mobile Communications (Paperback, 2nd edition)
Jochen Schiller
R1,714 Discovery Miles 17 140 Ships in 12 - 17 working days

Mobile Communications introduces the topic by providing a thorough grounding in the field of mobile communications. A wide range of examples is combined with a strong pedagogy to allow the book's use in high level courses and for self-study. This book provides a non-mathematical, computer science focus.

Analyzing US Census Data - Methods, Maps, and Models in R (Paperback): Kyle Walker Analyzing US Census Data - Methods, Maps, and Models in R (Paperback)
Kyle Walker
R1,698 Discovery Miles 16 980 Ships in 9 - 15 working days

Access US Census Bureau geographic and demographic data directly within R. Wrangle Census data with tidyverse tools and work with margins of error in the American Community Survey. Make maps and interactive web visualizations with US Census data. Explore Census data with spatial analysis using the sf package. Integrate Census data into spatial and machine learning models.

Propagation Phenomena in Real World Networks (Hardcover, 2015 ed.): Dariusz Krol, Damien Fay, Bogdan Gabrys Propagation Phenomena in Real World Networks (Hardcover, 2015 ed.)
Dariusz Krol, Damien Fay, Bogdan Gabrys
R4,476 R3,617 Discovery Miles 36 170 Save R859 (19%) Ships in 12 - 17 working days

"Propagation, which looks at spreading in complex networks, can be seen from many viewpoints; it is undesirable, or desirable, controllable, the mechanisms generating that propagation can be the topic of interest, but in the end all depends on the setting. This book covers leading research on a wide spectrum of propagation phenomenon and the techniques currently used in its modelling, prediction, analysis and control. Fourteen papers range over topics including epidemic models, models for trust inference, coverage strategies for networks, vehicle flow propagation, bio-inspired routing algorithms, P2P botnet attacks and defences, fault propagation in gene-cellular networks, malware propagation for mobile networks, information propagation in crisis situations, financial contagion in interbank networks, and finally how to maximize the spread of influence in social networks. The compendium will be of interest to researchers, those working in social networking, communications and finance and is aimed at providing a base point for further studies on current research. Above all, by bringing together research from such diverse fields, the book seeks to cross-pollinate ideas, and give the reader a glimpse of the breath of current research."

Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012): Volume 1 (Hardcover, 2013... Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012): Volume 1 (Hardcover, 2013 ed.)
Yuhang Yang, Maode Ma
R5,904 Discovery Miles 59 040 Ships in 10 - 15 working days

The objective of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012) is to facilitate an exchange of information on best practices for the latest research advances in the area of communications, networks and intelligence applications. These mainly involve computer science and engineering, informatics, communications and control, electrical engineering, information computing, and business intelligence and management.

"Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012)" will focus on green information technology and applications, which will provide in-depth insights for engineers and scientists in academia, industry, and government. The book addresses the most innovative research developments including technical challenges, social and economic issues, and presents and discusses the authors' ideas, experiences, findings, and current projects on all aspects of advanced green information technology and applications.

Yuhang Yang is a professor at the Department of Electronic Engineering, Shanghai Jiao Tong University. Maode Ma is an associate professor at the School of Electrical & Electronic Engineering, Nanyang Technological University.

Resource Allocation in Decentralized Systems with Strategic Agents - An Implementation Theory Approach (Hardcover, 2013 ed.):... Resource Allocation in Decentralized Systems with Strategic Agents - An Implementation Theory Approach (Hardcover, 2013 ed.)
Ali Kakhbod
R2,927 Discovery Miles 29 270 Ships in 10 - 15 working days

This thesis presents a significant contribution to decentralized resource allocation problems with strategic agents. The study focused on three classes of problems arising in communication networks. (C1). Unicast service provisioning in wired networks. (C2). Multi-rate multicast service provisioning in wired networks. (C3). Power allocation and spectrum sharing in multi-user multi-channel wireless communication systems. Problems in (C1) are market problems; problems in (C2) are a combination of markets and public goods; problems in (C3) are public goods. Dr. Kakhbod developed game forms/mechanisms for unicast and multi-rate multicast service provisioning that possess specific properties. First, the allocations corresponding to all Nash equilibria (NE) of the games induced by the mechanisms are optimal solutions of the corresponding centralized allocation problems, where the objective is the maximization of the sum of the agents' utilities. Second, the strategic agents voluntarily participate in the allocation process. Third, the budget is balanced at the allocations corresponding to all NE of the game induced by the mechanism as well as at all other feasible allocations. For the power allocation and spectrum sharing problem, he developed a game form that possesses the second and third properties as detailed above along with a fourth property: the allocations corresponding to all NE of the game induced by the mechanism are Pareto optimal. The thesis contributes to the state of the art of mechanism design theory. In particular, designing efficient mechanisms for the class of problems that are a combination of markets and public goods, for the first time, have been addressed in this thesis. The exposition, although highly rigorous and technical, is elegant and insightful which makes this thesis work easily accessible to those just entering this field and will also be much appreciated by experts in the field.

Virtuality and Virtualization - Proceedings of the International Federation of Information Processing Working Groups 8.2 on... Virtuality and Virtualization - Proceedings of the International Federation of Information Processing Working Groups 8.2 on Information Systems and Organizations and 9.5 on Virtuality and Society, July 29-31, 2007, Portland, Oregon, USA (Hardcover, 2007 ed.)
Kevin Crowston, Sandra Sieber, Eleanor Wynn
R2,993 Discovery Miles 29 930 Ships in 10 - 15 working days

In today's rapidly changing global work environment, all workers directly experience increased organizational complexity. Companies are functionally distributed, many across the globe. Intense competition for markets and margins makes adaptiveness and innovation imperative. Information and communication technologies (ICT) are pervasive and fundamental infrastructures, their use deeply integrated into work processes. Workers collaborate electronically with co-workers they may never meet face-to-face or with employees of other companies. New boundaries of time, space, business unit, culture, company partnerships, and software tools are driving the adoption of a variety of novel organizational forms. On a macro level, these changes have started to reshape society, leading some to speak of the "Network Society" and "The Information Age."

This book begins with consideration of possible frameworks for understanding virtuality and virtualization. It includes papers that consider ways of analyzing virtual work in terms of work processes. Following that, the book takes a look at group processes within virtual teams, focusing in particular on leadership and group identity. The book goes on to consider the role of knowledge in virtual settings and other implications of the role of fiction in structuring virtuality.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,490 Discovery Miles 14 900
Introduction to Copper Cabling…
John Crisp Paperback R985 Discovery Miles 9 850
Digital Signal Processing and…
Dag Stranneby Paperback R1,406 Discovery Miles 14 060
Edge Networking - Internet of Edges
K Agha Hardcover R3,789 Discovery Miles 37 890
Distributed Systems: Theory and…
Ghosh Hardcover R2,568 Discovery Miles 25 680
Age Of Agency - Rise With A.I.
Kerushan Govender Paperback R350 R286 Discovery Miles 2 860
Computer Networks, Global Edition
Andrew Tanenbaum, Nick Feamster, … Paperback R2,573 R2,406 Discovery Miles 24 060
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,335 R1,223 Discovery Miles 12 230
Managing Business Projects - The…
Frank Einhorn Paperback R478 Discovery Miles 4 780
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990

 

Partners