![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > General
Local ATM.- Architecture of Local and Metropolitan ATM Networks: New Trends.- Supercomputer Communications as an Application for ATM Local Area Networks.- Gigabit Local Area Networks.- Congestion Control I.- An Overview of Bandwidth Management Procedures in High-Speed Networks.- Performance of the Buffered Leaky Bucket Policing Mechanism.- Congestion Control II.- Explicit Foward Congestion Notification in ATM Networks.- A Novel Architecture and Flow Control Scheme for Private ATM Networks.- Gateway Congestion Controls in High-Speed Backbone Networks.- Standards.- What's New in B-ISDN Standards?.- Routing.- Routing in ATM Networks.- A Queueing-Network Model for Half-Duplex Routing in Data Communication Networks.- Transport Protocols.- The Xpress Transfer Protocol.- Radiology Communications for Imaging Systems.- High-Speed Transport Protocol Evaluation in the VISTAnet Project.- Traffic Measurements.- Traffic Models for ISDN and B-ISDN Users.- Traffic Characterization in a Wide Area Network.- Telecommunications Software Engineering.- Engineering of Telecommunications Software.- Reliability of Telecommunications Software: Assessing Sensitivity of Least Squares Reliability Estimates.- Software Metrics and the Quality of Telecommunication Software.
The development and availability of new computing and communication devices, and the increased connectivity between these devices, thanks to wired and wireless networks, are enabling new opportunities for people to perform their operations anywhere and anytime. This technological expansion has developed a multitude of challenges that demand further research. ""Advances in Ubiquitous Computing: Future Paradigms and Directions"" investigates the technology foreground of ubiquitous computing, the emerging applications and services, as well as certain social issues that are vital for the successful deployment of a ubiquitous computing application, through a multi-perspective analytical lens.Providing academics and practitioners with high quality, authoritative content on such topics as device design, wireless communication, location sensing, privacy concerns, attention focus, multi-person interaction, and direct interaction, work patterns, this Premier Reference Source is a must-have addition to library collections worldwide.
DAPSY (Austrian-Hungarian Workshop on Distributed and Parallel Systems) is an international conference series with biannual events dedicated to all aspects of distributed and parallel computing. DAPSY started under a different name in 1992 (Sopron, Hungary) as regional meeting of Austrian and Hungarian researchers focusing on transputer-related parallel computing; a hot research topic of that time. A second workshop followed in 1994 (Budapest, Hungary). As transputers became history, the scope of the workshop widened to include parallel and distributed systems in general and the 1st DAPSYS in 1996 (Miskolc, Hungary) reflected the results of these changes. Distributed and Parallel Systems: Cluster and Grid Computing is an edited volume based on DAPSYS, 2004, the 5th Austrian-Hungarian Workshop on Distributed and Parallel Systems. The workshop was held in conjunction with EuroPVM/MPI-2004, Budapest, Hungary September 19-22, 2004.
Bayesian networks are now being used in a variety of artificial intelligence applications. These networks are high-level representations of probability distributions over a set of variables that are used for building a model of the problem domain. ""Bayesian Network Technologies: Applications and Graphical Models"" provides an excellent and well-balanced collection of areas where Bayesian networks have been successfully applied. This book describes the underlying concepts of Bayesian Networks in an interesting manner with the help of diverse applications, and theories that prove Bayesian networks valid. ""Bayesian Network Technologies: Applications and Graphical Models"" provides specific examples of how Bayesian networks are powerful machine learning tools critical in solving real-life problems.
This book describes Smart Cities and the information technologies that will provide better living conditions in the cities of tomorrow. It brings together research findings from 27 countries across the globe, from academia, industry and government. It addresses a number of crucial topics in state of the arts of technologies and solutions related to smart cities, including big data and cloud computing, collaborative platforms, communication infrastructures, smart health, sustainable development and energy management. Information Innovation Technology in Smart Cities is essential reading for researchers working on intelligence and information communication systems, big data, Internet of Things, Cyber Security, and cyber-physical energy systems. It will be also invaluable resource for advanced students exploring these areas.
In the developed world, there is an increasing trend towards the use of e-government to further involve citizens in the maintenance of their country. This is not only an improved way to promote existing methods of citizen engagement such as voting or taxation; it also makes information more accessible and increases opportunities for average citizens to make their voices heard. Cloud Computing Technologies for Connected Government explores the latest research on the use of e-government for enhancing the effectiveness and transparency of public institutions. Featuring coverage on cloud-related frameworks and strategies, barriers to e-government development and practice, and case studies revealing the best guidelines for efficient technology use, this timely publication is indispensable for students, educators, information system specialists, technology experts, and anyone involved in public administration or the management of government departments. This book highlights chapters on a broad scope of topics including, but not limited to, citizen empowerment, collaborative public service, communication through social media, cost benefits of the Cloud, electronic voting systems, identity management, legal issues, and security and privacy for e-government users.
Communication Networking is a comprehensive, effectively organized introduction to the realities of communication network engineering. Written for both the workplace and the classroom, this book lays the foundation and provides the answers required for building an efficient, state-of-the-art network-one that can expand to meet growing demand and evolve to capitalize on coming technological advances. It focuses on the three building blocks out of which a communication network is constructed: multiplexing, switching, and routing. The discussions are based on the viewpoint that communication networking is about efficient resource sharing. The progression is natural: the book begins with individual physical links and proceeds to their combination in a network. The approach is analytical: discussion is driven by mathematical analyses of and solutions to specific engineering problems. Fundamental concepts are explained in detail and design issues are placed in context through real world examples from current technologies. The text offers in-depth coverage of many current topics, including network calculus with deterministically-constrained traffic; congestion control for elastic traffic; packet switch queuing; switching architectures; virtual path routing; and routing for quality of service. It also includes more than 200 hands-on exercises and class-tested problems, dozens of schematic figures, a review of key mathematical concepts, and a glossary. This book will be of interest to networking professionals whose work is primarily architecture definition and implementation, i.e., network engineers and designers at telecom companies, industrial research labs, etc. It will also appeal to final year undergrad and first year graduate students in EE, CE, and CS programs.
Emerging vehicular networks are fast becoming a reality that will enable a variety of applications such as safety, traffic efficiency, and infotainment. ""Automotive Informatics and Communicative Systems: Principles in Vehicular Networks and Data Exchange"" introduces vehicular networks and advanced information technologies applied in the automotive region. Presenting advanced research works in secure remote monitoring and control of vehicles, this book provides future trends of information technologies in the automotive domain.
Networks have become nearly ubiquitous and increasingly complex, and their support of modern enterprise environments has become fundamental. Accordingly, robust network management techniques are essential to ensure optimal performance of these networks. This monograph treats the application of numerous graph-theoretic algorithms to a comprehensive analysis of dynamic enterprise networks. Network dynamics analysis yields valuable information about network performance, efficiency, fault prediction, cost optimization, indicators and warnings. Based on many years of applied research of generic network dynamics, this work covers a number of elegant applications (including many new and experimental results) of traditional graph theory algorithms and techniques to computationally tractable network dynamics analysis to motivate network analysts, practitioners and researchers alike. The material is also suitable for graduate courses addressing state-of-the-art applications of graph theory in analysis of dynamic communication networks, dynamic databasing, and knowledge management.
The purpose of this volume is to shape conceptual tools to understand the impact of new information and communication technologies (ICTs) on the organization of universities. Traditional research-based universities, the most typical representatives of the higher education system, find themselves challenged by the speed and the wide range of technical innovations, but also by a vast array of implicit assumptions and explicit promises associated with the distribution of digital media. The author observes that as universities increasingly use digital media (computers and the Internet) to accomplish their tasks, a transformation takes place in an "evolutionary" rather than in a revolutionary way.Using the University of Klagenfurt as an in-depth case study, he explores such dynamic issues as how digital media affect the practice of research, the preservation and dissemination of knowledge (for example, through publishing and archiving), and delivery of education at universities.More broadly, he considers issues of organizational culture and design, administration, and leadership as universities integrate digital technologies into all aspects of their operations."
In the last few years, a stimulating idea is fast emergingin the wireless scenario: the pervasive presence around us of a variety of "things" or "objects," such as RFID, sensors, actuators, mobile phones, which, through unique addressing schemes, are able to interact with each other and cooperate with their neighboring "smart" c- ponents to reach common goals. This novel paradigm, named "The Internet of Things" (IoT) continues on the path set by the concept of smart environments and paves the way to the depl- ment of numerous applications with a signi cant impact on many elds of future every-day life. In this context, logistics, Intelligent Transportation Systems (ITS), business/process management, assisted living, and e-health are only a few examples of possible application elds in which this novel paradigm will play a leading role in the next future. Actually, manychallengingissues still needto be addressedand both technolo- calandsocialnodesuntiedbeforethe IoTideabeingwidelyaccepted.Centralissues are making a full interoperabilityof such devices possible, enablingtheir adaptation and autonomousbehavior, as well as guaranteeingtrust, privacy, and security. Also, the IoT idea poses several new problemsconcerningthe networkingaspects. In fact, the "things" composing the IoT will be characterized by low resources in terms of both computation and energy capacity. Accordingly, the proposed solutions need to payspecial attentionto resourceef ciencybesides the obviousscalability problems. The papers included in this volume present a picture of the current state of the art on the above issues; more speci cally, concepts and ideas are discussed on n- working, middleware, security and privacy, RFID and sensor networks, as well as electromagnetic aspects.
This book constitutes Part IV of the refereed four-volume post-conference proceedings of the 4th IFIP TC 12 International Conference on Computer and Computing Technologies in Agriculture, CCTA 2010, held in Nanchang, China, in October 2010. The 352 revised papers presented were carefully selected from numerous submissions. They cover a wide range of interesting theories and applications of information technology in agriculture, including simulation models and decision-support systems for agricultural production, agricultural product quality testing, traceability and e-commerce technology, the application of information and communication technology in agriculture, and universal information service technology and service systems development in rural areas.
For generations, humans have fantasized about the ability to create devices that can see into a person's mind and thoughts, or to communicate and interact with machines through thought alone. Such ideas have long captured the imagination of humankind in the form of ancient myths and modern science fiction stories. Recent advances in cognitive neuroscience and brain imaging technologies have started to turn these myths into a reality, and are providing us with the ability to interface directly with the human brain. This ability is made possible through the use of sensors that monitor physical processes within the brain which correspond with certain forms of thought. Brain-Computer Interfaces: Applying our Minds to Human-Computer Interaction broadly surveys research in the Brain-Computer Interface domain. More specifically, each chapter articulates some of the challenges and opportunities for using brain sensing in Human-Computer Interaction work, as well as applying Human-Computer Interaction solutions to brain sensing work. For researchers with little or no expertise in neuroscience or brain sensing, the book provides background information to equip them to not only appreciate the state-of-the-art, but also ideally to engage in novel research. For expert Brain-Computer Interface researchers, the book introduces ideas that can help in the quest to interpret intentional brain control and develop the ultimate input device. It challenges researchers to further explore passive brain sensing to evaluate interfaces and feed into adaptive computing systems. Most importantly, the book will connect multiple communities allowing research to leverage their work and expertise and blaze into the future.
Software-based cryptography can be used for security applications where data traffic is not too large and low encryption rate is tolerable. But hardware methods are more suitable where speed and real-time encryption are needed. Until now, there has been no book explaining how cryptographic algorithms can be implemented on reconfigurable hardware devices. This book covers computational methods, computer arithmetic algorithms, and design improvement techniques needed to implement efficient cryptographic algorithms in FPGA reconfigurable hardware platforms. The author emphasizes the practical aspects of reconfigurable hardware design, explaining the basic mathematics involved, and giving a comprehensive description of state-of-the-art implementation techniques.
Blockchain Technology Solutions for the Security of IoT-Based Healthcare Systems explores the various benefits and challenges associated with the integration of blockchain with IoT healthcare systems, focusing on designing cognitive-embedded data technologies to aid better decision-making, processing and analysis of large amounts of data collected through IoT. This book series targets the adaptation of decision-making approaches under cognitive computing paradigms to demonstrate how the proposed procedures, as well as big data and Internet of Things (IoT) problems can be handled in practice. Current Internet of Things (IoT) based healthcare systems are incapable of sharing data between platforms in an efficient manner and holding them securely at the logical and physical level. To this end, blockchain technology guarantees a fully autonomous and secure ecosystem by exploiting the combined advantages of smart contracts and global consensus. However, incorporating blockchain technology in IoT healthcare systems is not easy. Centralized networks in their current capacity will be incapable to meet the data storage demands of the incoming surge of IoT based healthcare wearables.
Third International Conference on Recent Trends in Information, Telecommunication and Computing - ITC 2012. ITC 2012 will be held during Aug 03-04, 2012, Kochi, India. ITC 2012, is to bring together innovative academics and industrial experts in the field of Computer Science, Information Technology, Computational Engineering, and Communication to a common forum. The primary goal of the conference is to promote research and developmental activities in Computer Science, Information Technology, Computational Engineering, and Communication. Another goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners.
Optical Networks - Architecture and Survivability, is a state-of-the-art work on survivable and cost-effective design of control and management for networks with IP directly over Wavelength Division Multiplexing (WDM) technology (or called Optical Internet). The authors address issues of signaling mechanisms, resource reservation, and survivable routing and wavelength assignment. Special emphasis has been given to the design of meshed, middle-sized, and wavelength-routed networks with dynamic traffic in the optical domain, such as the next-generation Metropolitan Area Network. Research and development engineers, graduate students studying wavelength-routed WDM networks, and senior undergraduate students with a background in algorithms and networking will find this book interesting and useful. This work may also be used as supplemental readings for graduate courses on internetworking, routing, survivability, and network planning algorithms.
Dr. Tom and Debra Shinder have become synonymous with Microsoft's
flagship firewall product ISA Server, as a result of Tom's
prominent role as a member of the beta development team, and Tom
and Deb's featured placement on both Microsoft's ISA Server Web
site and ISAserver.org. Tom and Deb's book on the first release of
the product "Configuring ISA Server 2000" dominated the ISA Server
2000 book market having sold over 40,000 copies worldwide, and the
ISA Server community is eagerly awaiting Tom and Deb's book on ISA
Server 2004, which is the dramatically upgraded new release from
Microsoft.
QoS is an important subject which occupies a central place in overall packet network technologies. A complex subject, its analysis involves such mathematical disciplines as probability, random variables, stochastic processes and queuing. These mathematical subjects are abstract, not easy to grasp for uninitiated persons. QoS in Packet Networks is written with two objectives. The first explains the fundamental mathematical concepts used in QoS analysis as plainly as possible, in layman's terms to afford the reader a better appreciation of the subject of QoS treated in this book. The second explains in plain language, the various parts of QoS in packet networks, to provide the reader with a complete view of this complex and dynamic area of communications networking technology. Discussion of the functional requirements of the packet networks to provide QoS is included.
"The Grid is an emerging infrastructure that will fundamentally
change the way we think about-and use-computing. The word Grid is
used by analogy with the electric power grid, which provides
pervasive access to electricity and has had a dramatic impact on
human capabilities and society. Many believe that by allowing all
components of our information technology
infrastructure-computational capabilities, databases, sensors, and
people-to be shared flexibly as true collaborative tools the Grid
will have a similar transforming effect, allowing new classes of
applications to emerge."
AD HOC NETWORKS: Technologies and Protocols is a concise in-depth treatment of various constituent components of ad hoc network protocols. It reviews issues related to medium access control, scalable routing, group communications, use of directional/smart antennas, network security, and power management among other topics. The authors examine various technologies that may aid ad hoc networking including the presence of an ability to tune transmission power levels or the deployment of sophisticated smart antennae. Contributors to this volume include experts that have been active in ad hoc network research and have published in the premier conferences and journals in this subject area. AD HOC NETWORKS: Protocols and Technologies will be immensely useful as a reference work to engineers and researchers as well as to advanced level students in the areas of wireless networks, and computer networks.
Heterogeneous wireless networking, which is sometimes referred to as the fourth-generation (4G) wireless, is a new frontier in the future wireless communications technology and there has been a growing interest on this topic among researchers and engineers in both academia and industry. This book will include a set of research and survey articles featuring the recent advances in theory and applications of heterogeneous wireless networking technology for the next generation (e.g., fourth generation) wireless communications systems. With the rapid growth in the number of wireless applications, services and devices, using a single wireless technology such as a second generation (2G) and third generation (3G) wireless system would not be efficient to deliver high speed data rate and quality-of-service (QoS) support to mobile users in a seamless way. Fourth generation (4G) wireless systems are devised with the vision of heterogeneity in which a mobile user/device will be able to connect to multiple wireless networks (e.g., WLAN, cellular, WMAN) simultaneously. This book intends to provide a unified view on the state-of-the-art of protocols and architectures for heterogeneous wireless networking. The contributed articles will cover both the theoretical concepts and system-level implementation issues related to design, analysis, and optimization of architectures and protocols for heterogeneous wireless access networks.
Embedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? How can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration of design methodologies for secure embedded systems. This Festschrift is dedicated to him and his research on the occasion of his 60th birthday.
Network Science, Nonlinear Science and Infrastructure Systems has been written by leading scholars in these areas. Its express purpose is to develop common theoretical underpinnings to better solve modern infrastructural problems. It is felt by many who work in these fields that many modern communication problems, ranging from transportation networks to telecommunications, Internet, supply chains, etc., are fundamentally infrastructure problems. Moreover, these infrastructure problems would benefit greatly from a confluence of theoretical and methodological work done with the areas of Network Science, Dynamical Systems and Nonlinear Science. This book is dedicated to the formulation of infrastructural tools that will better solve these types of infrastructural problems. |
You may like...
Knowledge-Based Software Engineering…
Maria Virvou, Fumihiro Kumeno, …
Hardcover
R4,034
Discovery Miles 40 340
Manipulation - Theory and Practice
Christian Coons, Michael Weber
Hardcover
R3,837
Discovery Miles 38 370
Porphyry, >On Principles and Matter< - A…
Yury Arzhanov, Porphyry
Hardcover
R3,775
Discovery Miles 37 750
|