Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer communications & networking > General
Sustaining a competitive edge in today's business world requires innovative approaches to product, service, and management systems design and performance. Advances in computing technologies have presented managers with additional challenges as well as further opportunities to enhance their business models Business Transformation and Sustainability through Cloud System Implementation presents novel computing technologies designed for use in business and corporate environments, enabling managers and associates to make the most of the technologies at their disposal. This premier reference work seeks to alert firm management professionals and researchers to the potential risks and benefits associated with emerging technologies and guide firms on the proper selection, maintenance, and use of Web-based computing systems.
Some Obstacles on the Road to ATM; D. Abensour, L. Felton. Electropolitical Correctness and High Speed Networking, or, Why ATM Is Like a Nose; D. Stevenson. An Overview of the ATM Forum and the Traffic Management Activities; L. Gun, G.A. Marin. Communication Subsystems for High Speed Networks; D.N. Serpanos. SMDS and Frame Relay; J.P. Bernoux. ATM Systems in Support of BISDN, Frame Relay, and SMDS Services; P. Holzworth. Approaching BISDN; C. Bisdikian, et al. On Transport Systems for ATM Networks; M. Zitterbart, et al. XTP Bucket Error Control; S. Fdida, H. Santoso. Congestion Control Mechanisms for ATM Networks; D.S. Holtsinger. Highly-Bursty Sources and their Admission Control in ATM Networks; K. Sohraby. A User Relief Approach to Congestion Control in ATM Networks; I. Stavrakakis, et al. Space Priority Buffer Management; D. Tipper, et al. 4 additional articles. Index.
This book consists of eight chapters, five of which provide a summary of the tutorials and workshops organised as part of the cHiPSet Summer School: High-Performance Modelling and Simulation for Big Data Applications Cost Action on "New Trends in Modelling and Simulation in HPC Systems," which was held in Bucharest (Romania) on September 21-23, 2016. As such it offers a solid foundation for the development of new-generation data-intensive intelligent systems. Modelling and simulation (MS) in the big data era is widely considered the essential tool in science and engineering to substantiate the prediction and analysis of complex systems and natural phenomena. MS offers suitable abstractions to manage the complexity of analysing big data in various scientific and engineering domains. Unfortunately, big data problems are not always easily amenable to efficient MS over HPC (high performance computing). Further, MS communities may lack the detailed expertise required to exploit the full potential of HPC solutions, and HPC architects may not be fully aware of specific MS requirements. The main goal of the Summer School was to improve the participants' practical skills and knowledge of the novel HPC-driven models and technologies for big data applications. The trainers, who are also the authors of this book, explained how to design, construct, and utilise the complex MS tools that capture many of the HPC modelling needs, from scalability to fault tolerance and beyond. In the final three chapters, the book presents the first outcomes of the school: new ideas and novel results of the research on security aspects in clouds, first prototypes of the complex virtual models of data in big data streams and a data-intensive computing framework for opportunistic networks. It is a valuable reference resource for those wanting to start working in HPC and big data systems, as well as for advanced researchers and practitioners.
This book introduces fundamentals and trade-offs of data de-duplication techniques. It describes novel emerging de-duplication techniques that remove duplicate data both in storage and network in an efficient and effective manner. It explains places where duplicate data are originated, and provides solutions that remove the duplicate data. It classifies existing de-duplication techniques depending on size of unit data to be compared, the place of de-duplication, and the time of de-duplication. Chapter 3 considers redundancies in email servers and a de-duplication technique to increase reduction performance with low overhead by switching chunk-based de-duplication and file-based de-duplication. Chapter 4 develops a de-duplication technique applied for cloud-storage service where unit data to be compared are not physical-format but logical structured-format, reducing processing time efficiently. Chapter 5 displays a network de-duplication where redundant data packets sent by clients are encoded (shrunk to small-sized payload) and decoded (restored to original size payload) in routers or switches on the way to remote servers through network. Chapter 6 introduces a mobile de-duplication technique with image (JPEG) or video (MPEG) considering performance and overhead of encryption algorithm for security on mobile device.
Telecommunications firms worldwide are actively involved in AI applications for resolving network management and telecommunications problems. This book addresses the following major functional areas: planning, scheduling, monitoring, control, fault classification and diagnosis, training, and help desks. Several AI techniques are applied, including neural networks, expert systems, integrating rule-based systems with case-based reasoning systems, genetic algorithms, distributed AI, and intelligent tutoring systems. It is of interest to researchers and professionals in telecommunication, AI experts, and graduate students.
A clear, comprehensive guide to VMware's latest virtualization solution Mastering VMware NSX for vSphere is the ultimate guide to VMware's network security virtualization platform. Written by a rock star in the VMware community, this book offers invaluable guidance and crucial reference for every facet of NSX, with clear explanations that go far beyond the public documentation. Coverage includes NSX architecture, controllers, and edges; preparation and deployment; logical switches; VLANS and VXLANS; logical routers; virtualization; edge network services; firewall security; and much more to help you take full advantage of the platform's many features. More and more organizations are recognizing both the need for stronger network security and the powerful solution that is NSX; usage has doubled in the past year alone, and that trend is projected to grow--and these organizations need qualified professionals who know how to work effectively with the NSX platform. This book covers everything you need to know to exploit the platform's full functionality so you can: Step up security at the application level Automate security and networking services Streamline infrastructure for better continuity Improve compliance by isolating systems that handle sensitive data VMware's NSX provides advanced security tools at a lower cost than traditional networking. As server virtualization has already become a de facto standard in many circles, network virtualization will follow quickly--and NSX positions VMware in the lead the way vSphere won the servers. NSX allows you to boost security at a granular level, streamline compliance, and build a more robust defense against the sort of problems that make headlines. Mastering VMware NSX for vSphere helps you get up to speed quickly and put this powerful platform to work for your organization.
An in-depth analysis of how the Fortune 1000 companies have dealt with the strategic use of computers and communications, what applications have been successful and which have faltered, and how upcoming technologies will provide the foundation for a new generation of strategic applications.
IT technology engineering changes everyday life, especially in Computing and Communications. The goal of this book is to further explore the theoretical and practical issues of Future Computing and Communications. It also aims to foster new ideas and collaboration between researchers and practitioners.
This book is an introductory text on design science, intended to support both graduate students and researchers in structuring, undertaking and presenting design science work. It builds on established design science methods as well as recent work on presenting design science studies and ethical principles for design science, and also offers novel instruments for visualizing the results, both in the form of process diagrams and through a canvas format. While the book does not presume any prior knowledge of design science, it provides readers with a thorough understanding of the subject and enables them to delve into much deeper detail, thanks to extensive sections on further reading. Design science in information systems and technology aims to create novel artifacts in the form of models, methods, and systems that support people in developing, using and maintaining IT solutions. This work focuses on design science as applied to information systems and technology, but it also includes examples from, and perspectives of, other fields of human practice. Chapter 1 provides an overview of design science and outlines its ties with empirical research. Chapter 2 discusses the various types and forms of knowledge that can be used and produced by design science research, while Chapter 3 presents a brief overview of common empirical research strategies and methods. Chapter 4 introduces a methodological framework for supporting researchers in doing design science research as well as in presenting their results. This framework includes five core activities, which are described in detail in Chapters 5 to 9. Chapter 10 discusses how to communicate design science results, while Chapter 11 compares the proposed methodological framework with methods for systems development and shows how they can be combined. Chapter 12 discusses how design science relates to research paradigms, in particular to positivism and interpretivism, and Chapter 13 discusses ethical issues and principles for design science research. The new Chapter 14 showcases a study on digital health consultations and illustrates the whole process in one comprehensive example. Also added to this 2nd edition are a number of sections on practical guidelines for carrying out basic design science tasks, a discussion on design thinking and its relationship to design science, and the description of artefact classifications. Eventually, both the references in each chapter and the companion web site were updated to reflect recent findings.
This proceedings volume highlights a selection of papers presented at the Sixth International Conference on High Performance Scientific Computing, which took place in Hanoi, Vietnam on March 16-20, 2015. The conference was jointly organized by the Heidelberg Institute of Theoretical Studies (HITS), the Institute of Mathematics of the Vietnam Academy of Science and Technology (VAST), the Interdisciplinary Center for Scientific Computing (IWR) at Heidelberg University, and the Vietnam Institute for Advanced Study in Mathematics, Ministry of Education The contributions cover a broad, interdisciplinary spectrum of scientific computing and showcase recent advances in theory, methods, and practical applications. Subjects covered numerical simulation, methods for optimization and control, parallel computing, and software development, as well as the applications of scientific computing in physics, mechanics, biomechanics and robotics, material science, hydrology, biotechnology, medicine, transport, scheduling, and industry.
This proceedings volume highlights a selection of papers presented at the 7th International Conference on High Performance Scientific Computing, which took place in Hanoi, Vietnam, during March 19-23, 2018. The conference has been organized by the Institute of Mathematics of the Vietnam Academy of Science and Technology, the Interdisciplinary Center for Scientific Computing (IWR) of Heidelberg University and the Vietnam Institute for Advanced Study in Mathematics. The contributions cover a broad, interdisciplinary spectrum of scientific computing and showcase recent advances in theory, methods, and practical applications. Subjects covered include numerical simulation, methods for optimization and control, machine learning, parallel computing and software development, as well as the applications of scientific computing in mechanical engineering, airspace engineering, environmental physics, decision making, hydrogeology, material science and electric circuits.
Modern military coalition operations rely on the ability of multiple independently developed networks to function cohesively, allowing information collected by different sources to be transmitted, analyzed, processed, and provided to troops involved in tactical operations. Network Science for Military Coalition Operations: Information Exchange and Interaction presents an advanced view of this delicate and vital operation. However, an understanding of the science behind coalition operations can benefit not just military operations, but any context in the modern world where two independent organizations need to collaborate together for a shared goal. In this age of globalization, the research in this book becomes of unprecedented importance, not only for the military, where most stable and advance techniques are required, but also for society at large, which also demands constant improvement in network science.
Network-dependent companies are excited by the benefits promised
by the virtual private network, including lower costs, greater
flexibility, and improvements in connectivity. But they also have
questions: What benefits are real? How can they be measured? What
are the expenses and the dangers? Virtual Private Networks: Making the Right Connection is an
intelligent introduction written especially for business and IT
professionals who want a realistic assessment of what a VPN can
provide for their organizations. Covering advantages and risks,
this book expands your understanding of what you can do with a VPN,
while detailing all that implementing it will demand of you. With
its help, you'll find your way through VPN hype to the answers you
need to make sound decisions.
This volume brings together contributions representing the state-of-the-art in new multimedia and future technology information research, currently a major topic in computer science and electronic engineering. Researchers aim to interoperate multimedia frameworks, transforming the way people work and interact with multimedia data. This book covers future information technology topics including digital and multimedia convergence, ubiquitous and pervasive computing, intelligent computing and applications, embedded systems, mobile and wireless communications, bio-inspired computing, grid and cloud computing, semantic web, human-centric computing and social networks, adaptive and context-aware computing, security and trust computing and related areas. Representing the combined proceedings of the 9th International Conference on Multimedia and Ubiquitous Engineering (MUE-15) and the 10th International Conference on Future Information Technology (Future Tech 2015), this book aims to provide a complete coverage of the areas outlined and to bring together researchers from academic and industry and other practitioners to share their research ideas, challenges and solutions.
This book proposes that usage-based charging schemes are essential
to generate the incentives necessary for efficient operation of
multiservice networks. The rapid development of network technology
is enabling sophisticated new services and applications which
demand new charging models. The same technology provides the means
to operate the right charging schemes.Some of the work done in the
European collaborative project CA$hMAN (Charging and
Accounting Schemes in Multiservice ATM Networks). This project
combined performance and economic models of network resource usage
and cutomer utility to construct simple but effective charging
schemes which were implemented and trialled in an advanced
management platform.
This book serves as a starting point for people looking for a deeper principled understanding of REST, its applications, its limitations, and current research work in the area and as an architectural style. The authors focus on applying REST beyond Web applications (i.e., in enterprise environments), and in reusing established and well-understood design patterns. The book examines how RESTful systems can be designed and deployed, and what the results are in terms of benefits and challenges encountered in the process. This book is intended for information and service architects and designers who are interested in learning about REST, how it is applied, and how it is being advanced.
This book highlights technology trends and challenges that trace the evolution of antenna design, starting from 3rd generation phones and moving towards the latest release of LTE-A. The authors explore how the simple monopole and whip antenna from the GSM years have evolved towards what we have today, an antenna design that is compact, multi-band in nature and caters to multiple elements on the same patch to provide high throughput connectivity. The scope of the book targets a broad range of subjects, including the microstrip antenna, PIFA antenna, and the monopole antenna to be used for different applications over three different mobile generations. Beyond that, the authors take a step into the future and look at antenna requirements for 5G communications, which already has the 5G drive in place with prominent scenarios and use-cases emerging. They examine these, and put in place the challenges that lie ahead for antenna design, particularly in mm-Wave design. The book provides a reference for practicing engineers and under/post graduate students working in this field.
This book presents the edited proceedings of the 16th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2017), which was held on May 24-26, 2017 in Wuhan, China. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the various fields of computer science, share their experiences and exchange new ideas and information. The research results included relate to all aspects (theory, applications and tools) of computer and information science, and discuss the practical challenges encountered and the solutions adopted to solve them. The work selected represents 17 of the most promising papers from the conference, written by authors who are certain to make further significant contributions to the field of computer and information science.
This book provides formal and informal definitions and taxonomies for self-aware computing systems, and explains how self-aware computing relates to many existing subfields of computer science, especially software engineering. It describes architectures and algorithms for self-aware systems as well as the benefits and pitfalls of self-awareness, and reviews much of the latest relevant research across a wide array of disciplines, including open research challenges. The chapters of this book are organized into five parts: Introduction, System Architectures, Methods and Algorithms, Applications and Case Studies, and Outlook. Part I offers an introduction that defines self-aware computing systems from multiple perspectives, and establishes a formal definition, a taxonomy and a set of reference scenarios that help to unify the remaining chapters. Next, Part II explores architectures for self-aware computing systems, such as generic concepts and notations that allow a wide range of self-aware system architectures to be described and compared with both isolated and interacting systems. It also reviews the current state of reference architectures, architectural frameworks, and languages for self-aware systems. Part III focuses on methods and algorithms for self-aware computing systems by addressing issues pertaining to system design, like modeling, synthesis and verification. It also examines topics such as adaptation, benchmarks and metrics. Part IV then presents applications and case studies in various domains including cloud computing, data centers, cyber-physical systems, and the degree to which self-aware computing approaches have been adopted within those domains. Lastly, Part V surveys open challenges and future research directions for self-aware computing systems. It can be used as a handbook for professionals and researchers working in areas related to self-aware computing, and can also serve as an advanced textbook for lecturers and postgraduate students studying subjects like advanced software engineering, autonomic computing, self-adaptive systems, and data-center resource management. Each chapter is largely self-contained, and offers plenty of references for anyone wishing to pursue the topic more deeply.
Introduction: Historical Perspective. Definitions and Dependencies. Prerequisite Knowledge Areas: User Capabilities and Limitations. Computer Applications and Tasks. Computer Capabilities and Limitations. Interaction Characteristics and Options. Representation Models and Methods. Supportive Tools and Techniques. Design and Development: Design Terms and Decision Constructs. Design Approaches and Methods. Design Objects, Modules, and Models. Special-Purpose Designs: Network-Oriented Design. Adaptive Design. Index.
Cyber-physical systems (CPS) are characterized as a combination of physical (physical plant, process, network) and cyber (software, algorithm, computation) components whose operations are monitored, controlled, coordinated, and integrated by a computing and communicating core. The interaction between both physical and cyber components requires tools allowing analyzing and modeling both the discrete and continuous dynamics. Therefore, many CPS can be modeled as hybrid dynamic systems in order to take into account both discrete and continuous behaviors as well as the interactions between them. Guaranteeing the security and safety of CPS is a challenging task because of the inherent interconnected and heterogeneous combination of behaviors (cyber/physical, discrete/continuous) in these systems. This book presents recent and advanced approaches and tech-niques that address the complex problem of analyzing the diagnosability property of cyber physical systems and ensuring their security and safety against faults and attacks. The CPS are modeled as hybrid dynamic systems using different model-based and data-driven approaches in different application domains (electric transmission networks, wireless communication networks, intrusions in industrial control systems, intrusions in production systems, wind farms etc.). These approaches handle the problem of ensuring the security of CPS in presence of attacks and verifying their diagnosability in presence of different kinds of uncertainty (uncertainty related to the event occurrences, to their order of occurrence, to their value etc.).
A new product can be easy or difficult to use, it can be efficient or cumbersome, engaging or dispiriting, it can support the way we work and think - or not. What options are available for systematically addressing such parameters and provide users with an appropriate functionality, usability and experience? In the last decades, several fields have evolved that encompass a user-centred approach to create better products for the people who use them. This book provides a comprehensible introduction to the subject. It is aimed first and foremost at people involved in software and product development - product managers, project managers, consultants and analysts, who face the major challenge of developing highly useful and usable products. Topics include: The most important user-centred techniques and their alignment in the development process Planning examples of user-centred activities for projects User-oriented approaches for organisations Real-life case studies Checklists, tips and a lot of background information provide help for practitioners
This book presents the proceedings of the International Science and Technology Conference "FarEastCon 2019," which took place on October 1-4, 2019, in Vladivostok, Russian Federation. The conference provided a platform for gathering expert opinions on projects and initiatives aimed at the implementation of far-sighted scientific research and development, and allowed current theoretical and practical advances to be shared with the broader research community. Featuring selected papers from the conference, this book will be of interest to experts in various fields whose work involves developing innovative solutions and increasing the efficiency of economic activities.
This book constitutes the refereed post-conference proceedings of the 10th IFIP WG 5.14 International Conference on Computer and Computing Technologies in Agriculture, CCTA 2016, held in Dongying, China, in October 2016. The 55 revised papers presented were carefully reviewed and selected from 128 submissions. They cover a wide range of interesting theories and applications of information technology in agriculture, including intelligent sensing, cloud computing, key technologies of the Internet of Things, precision agriculture, animal husbandry information technology, including Internet + modern animal husbandry, livestock big data platform and cloud computing applications, intelligent breeding equipment, precision production models, water product networking and big data , including fishery IoT, intelligent aquaculture facilities, and big data applications. |
You may like...
Exploring the Convergence of Computer…
Ricardo Queiros, Bruno Cunha, …
Hardcover
R11,190
Discovery Miles 111 900
CCNA 200-301 Network Simulator
Sean Wilkins
Digital product license key
R4,838
Discovery Miles 48 380
Network+ Guide to Networks
Jill West, Jean Andrews, …
Paperback
Opinion Mining and Text Analytics on…
Pantea Keikhosrokiani, Moussa Pourya Asl
Hardcover
R9,808
Discovery Miles 98 080
Community Engagement in the Online Space
Michelle Dennis, James H Albert
Hardcover
R5,631
Discovery Miles 56 310
Strengthening SME Performance Through…
Sikandar Ali Qalati, Dragana Ostic, …
Hardcover
R6,527
Discovery Miles 65 270
|