![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > General
Quantum Communication, Quantum Networks, and Quantum Sensing represents a self-contained introduction to quantum communication, quantum error-correction, quantum networks, and quantum sensing. It starts with basic concepts from classical detection theory, information theory, and channel coding fundamentals before continuing with basic principles of quantum mechanics including state vectors, operators, density operators, measurements, and dynamics of a quantum system. It continues with fundamental principles of quantum information processing, basic quantum gates, no-cloning and theorem on indistinguishability of arbitrary quantum states. The book then focuses on quantum information theory, quantum detection and Gaussian quantum information theories, and quantum key distribution (QKD). The book then covers quantum error correction codes (QECCs) before introducing quantum networks. The book concludes with quantum sensing and quantum radars, quantum machine learning and fault-tolerant quantum error correction concepts.
Piecewise Linear (PL) approximation of non-linear behaviour is a well-known technique in synthesis and analysis of electrical networks. However, the PL description should be efficient in data storage and the description should allow simple retrieval of the stored information. Furthermore, it would be useful if the model description could handle a large class of piecewise linear mappings. Piecewise Linear Modeling and Analysis explains in detail all possible model descriptions for efficiently storing piecewise linear functions, starting with the Chua descriptions. Detailed explanation on how the model parameter can be obtained for a given mapping is provided and demonstrated by examples. The models are ranked to compare them and to show which model can handle the largest class of PL mappings. All model descriptions are implicitly related to the Linear Complementarity Problem and most solution techniques for this problem, like Katzenelson and Lemke, are discussed according to examples that are explained in detail. To analyse PL electrical networks a simulator is mandatory. Piecewise Linear Modeling and Analysis provides a detailed outline of a possible PL simulator, including pseudo-programming code. Several simulation domains like transient, AC and distortion are discussed. The book explains the attractive features of PL simulators with respect to mixed-level and mixed-signal simulation while paying due regard also to hierarchical simulation. Piecewise Linear Modeling and Analysis shows in detail how many existing components in electrical networks can be modeled. These range from digital logic and analog basic elements such as transistors to complex systems like Phase-Locked Loops and detection systems. Simulation results are also provided. The book concludes with a discussion on how to find multiple solutions for PL functions or networks. Again, the most common techniques are outlined using clear examples. Piecewise Linear Modeling and Analysis is an indispensable guide for researchers and designers interested in network theory, network synthesis and network analysis.
The ongoing migration of computing and information access from stationary environments to mobile computing devices for eventual use in mobile environments, such as Personal Digital Assistants (PDAs), tablet PCs, next generation mobile phones, and in-car driver assistance systems, poses critical challenges for natural human-computer interaction. Spoken dialogue is a key factor in ensuring natural and user-friendly interaction with such devices which are meant not only for computer specialists, but also for everyday users. Speech supports hands-free and eyes-free operation, and becomes a key alternative interaction mode in mobile environments, e.g. in cars where driver distraction by manually operated devices may be a significant problem. On the other hand, the use of mobile devices in public places, may make the possibility of using alternative modalities possibly in combination with speech, such as graphics output and gesture input, preferable due to e.g. privacy issues. Researchers' interest is progressively turning to the integration of speech with other modalities such as gesture input and graphics output, partly to accommodate more efficient interaction and partly to accommodate different user preferences. This book: Audience: Computer scientists, engineers, and others who work in
the area of spoken multimodal dialogue systems in academia and in
the industry;
The main links with your PC and the outside world are the centronic
port, used for connecting the printer, the RS232 port, used for the
mouse, and the games port for a joystick. This book explores how
these input/output (I/O) ports can be put to use through a range of
other interfacing applications. This is especially useful for
laptop and palmtop PCs which cannot be fitted with internal I/O
cards. A novel approach is taken by this book, combining the
hardware through which the ports can be explored, and the software
programming needed to carry out a range of experiments.
The evolution of modern computers began more than 50 years ago and has been driven to a large extend by rapid advances in electronic technology during that period. The first computers ran one application (user) at a time. Without the benefit of operating systems or compilers, the application programmers were responsible for managing all aspects of the hardware. The introduction of compilers allowed programmers to express algorithms in abstract terms without being concerned with the bit level details of their implementation. Time sharing operating systems took computing systems one step further and allowed several users and/or applications to time share the computing services of com puters. With the advances of networks and software tools, users and applications were able to time share the logical and physical services that are geographically dispersed across one or more networks. Virtual Computing (VC) concept aims at providing ubiquitous open computing services in analogous way to the services offered by Telephone and Elec trical (utility) companies. The VC environment should be dynamically setup to meet the requirements of a single user and/or application. The design and development of a dynamically programmable virtual comput ing environments is a challenging research problem. However, the recent advances in processing and network technology and software tools have successfully solved many of the obstacles facing the wide deployment of virtual computing environments as will be outlined next."
This book covers performance analysis of computer networks, and begins by providing the necessary background in probability theory, random variables, and stochastic processes. Queuing theory and simulation are introduced as the major tools analysts have access to. It presents performance analysis on local, metropolitan, and wide area networks, as well as on wireless networks. It concludes with a brief introduction to self-similarity. Designed for a one-semester course for senior-year undergraduates and graduate engineering students, it may also serve as a fingertip reference for engineers developing communication networks, managers involved in systems planning, and researchers and instructors of computer communication networks.
The terms groupware and CSCW (Computer-Supported Cooperative Work) have received significant attention in computer science and related disciplines for quite some time now. This book has two main objectives: first, to outline the meaning of both terms, and second, to point out both the numerous opportunities for users of CSCW systems and the risks of applying them. The book introduces in detail an interdisciplinary application area of distributed systems, namely the computer support of individuals trying to solve a problem in cooperation with each other but not necessarily having identical work places or working times. CSCW can be viewed as a synergism between the areas of distributed systems and (multimedia) communications on the one hand and those of information science and socio-organizational theory on the other hand. Thus, the book is addressed to students of all these disciplines, as well as to users and developers of systems with group communication and cooperation as top priorities.
As more and more of our data is stored remotely, accessing that data wherever and whenever it is needed is a critical concern. More concerning is managing the databanks and storage space necessary to enable cloud systems. Resource Management of Mobile Cloud Computing Networks and Environments reports on the latest advances in the development of computationally intensive and cloud-based applications. Covering a wide range of problems, solutions, and perspectives, this book is a scholarly resource for specialists and end-users alike making use of the latest cloud technologies.
Metropolitan Area WDM Networks: An AWG Based Approach provides a comprehensive and technically detailed overview of the latest metropolitan area WDM network experimental systems, architectures, and access protocols. Its main focus is on the novel star WDM networks based on a wavelength-selective Arrayed-Waveguide Grating (AWG). Network researchers, engineers, professionals, and graduate students will benefit from the thorough overview and gain an in-depth understanding of current and next-generation metro WDM networks. The AWG based metro star WDM network is discussed at length and
extensively investigated by means of stochastic analyses and
simulations. The book provides:
Security is the science and technology of secure communications and resource protection from security violation such as unauthorized access and modification. Putting proper security in place gives us many advantages. It lets us exchange confidential information and keep it confidential. We can be sure that a piece of information received has not been changed. Nobody can deny sending or receiving a piece of information. We can control which piece of information can be accessed, and by whom. We can know when a piece of information was accessed, and by whom. Networks and databases are guarded against unauthorized access. We have seen the rapid development of the Internet and also increasing security requirements in information networks, databases, systems, and other information resources. This comprehensive book responds to increasing security needs in the marketplace, and covers networking security and standards. There are three types of readers who are interested in security: non-technical readers, general technical readers who do not implement security, and technical readers who actually implement security. This book serves all three by providing a comprehensive explanation of fundamental issues of networking security, concept and principle of security standards, and a description of some emerging security technologies. The approach is to answer the following questions: 1. What are common security problems and how can we address them? 2. What are the algorithms, standards, and technologies that can solve common security problems? 3.
This book provides a timely overview of the impacts of digitalization from the perspective of everyday life, and argues that one central issue in digitalization is the development of new types of services that digitalization enables, but which are often overlooked due to the focus on new technologies and devices. The book summarizes the past 20 years of research into the relationship between information and communications technology (ICT) and service innovation, and reveals that the ongoing digitalization is a qualitatively different phenomenon and represents a true paradigm shift. The all-encompassing integration and distribution of data raises critical issues such as preserving human dignity and individual autonomy; moreover, interaction practices that foster broad participation, trust, learning, and a willingness to share knowledge are called for. Citizen empowerment and multi-actor co-creation have become central to using digitalization to support the development of wellbeing and sustainability. Further, the book shows how employees and professionals can and should be involved in designing their future work, and in evaluating it. Proactiveness and participation in innovation endeavours are ways to guarantee meaningful work in an age of socio-technical transition. The book employs a variety of theoretical approaches and perspectives from diverse disciplines to illustrate these needs. In addition to theoretical analyses, some specific application areas are examined, e.g. services in health and social care, and problems linked to robots in elderly care. Given its scope, the book is highly recommended to all readers seeking an overview of the current understanding of the human side of digitalization and searching for concrete cases from different countries to illustrate the topic.
Introduction: Background and Status. Design before Evaluation. Prerequisite Knowledge Areas: Supportive Tools and Techniques. Interface Structures. Basic Measures. Measurement and Evaluation: Evaluation Terms and Aspects. Tailored Measures of Performance. Evaluation Approaches and Methods. Special Topics: Stress and User Satisfaction. Visualizable Objects and Spaces. Interaction and Mental Involvement. Structural Specification and Utility. Index.
Collaborative Networks is a fast developing area, as shown by the already large number of diverse real-world implemented cases and the dynamism of its related involved research community. Benefiting from contributions of multiple areas, nameley management, economy, social sciences, law and ethics, etc., the area of Collaborative Networs is being consolidated as a new scientific discipline of its own. On one hand significant steps towards a stronger theoretical foundation for this new discipline are developed and applied in industry and services. Based on the experiences and lessons learned in many research projects and pilot cases developed during the last decade, a new emphasis is now being put on the development of holistic frameworks, combining business models, conceptual models, governance principles and methods, as well as supporting infrastructures and services. In fact, researching the phase in which the computer and networking technologies provide a good starting basis for the establishment of collaborative platforms, the emphasis is now turning to the understanding of the collaboration promotion mechanisms and CN governance principles. Therefore, issues such as the value systems, trust, performance and benefits distribution are gaining more importance. Encompassing all these developments, the efforts to develp reference models for collaborative networks represent a major challenge in order to provide the foundation for further developments of the CN. PRO-VE represents a good synthesis of the work in this area, and plays an active role in the promotion of these activities. Being recognized as the most focused scientific and technical conference on CollaborativeNetworks, PRO-VE continues to offer the opportunity for presentation and discussion of both the latest research developments as well as the practical application case studies. Following the vision of IFIP and SOCOLNET, the PRO-VE conference offers a forum for collaboration and knowledge exchange among experts from different regions of the world.
Lo, soul! seest thou not God's purpose from the first? The earth to be spann'd, connected by net-work From Passage to India! Walt Whitman, "Leaves of Grass", 1900. The Internet is growing at a tremendous rate today. New services, such as telephony and multimedia, are being added to the pure data-delivery framework of yesterday. Such high demands on capacity could lead to a "bandwidth-crunch" at the core wide-area network resulting in degra dation of service quality. Fortunately, technological innovations have emerged which can provide relief to the end-user to overcome the In ternet's well-known delay and bandwidth limitations. At the physical layer, a major overhaul of existing networks has been envisaged from electronic media (such as twisted-pair and cable) to optical fibers - in the wide area, in the metropolitan area, and even in the local area set tings. In order to exploit the immense bandwidth potential of the optical fiber, interesting multiplexing techniques have been developed over the years. Wavelength division multiplexing (WDM) is such a promising tech nique in which multiple channels are operated along a single fiber si multaneously, each on a different wavelength. These channels can be independently modulated to accommodate dissimilar bit rates and data formats, if so desired. Thus, WDM carves up the huge bandwidth of an optical fiber into channels whose bandwidths (1-10 Gbps) are compati ble with peak electronic processing speed.
This book provides an original graph theoretical approach to the fundamental properties of wireless mobile ad-hoc networks. This approach is combined with a realistic radio model for physical links between nodes to produce new insight into network characteristics like connectivity, degree distribution, hopcount, interference and capacity. The book establishes directives for designing ad-hoc networks and sensor networks. It will interest the academic community, and engineers who roll out ad-hoc and sensor networks.
This year, the IFIP Working Conference on Distributed and Parallel Embedded Sys tems (DIPES 2008) is held as part of the IFIP World Computer Congress, held in Milan on September 7 10, 2008. The embedded systems world has a great deal of experience with parallel and distributed computing. Many embedded computing systems require the high performance that can be delivered by parallel computing. Parallel and distributed computing are often the only ways to deliver adequate real time performance at low power levels. This year's conference attracted 30 submissions, of which 21 were accepted. Prof. Jor ] g Henkel of the University of Karlsruhe graciously contributed a keynote address on embedded computing and reliability. We would like to thank all of the program committee members for their diligence. Wayne Wolf, Bernd Kleinjohann, and Lisa Kleinjohann Acknowledgements We would like to thank all people involved in the organization of the IFIP World Computer Congress 2008, especially the IPC Co Chairs Judith Bishop and Ivo De Lotto, the Organization Chair Giulio Occhini, as well as the Publications Chair John Impagliazzo. Further thanks go to the authors for their valuable contributions to DIPES 2008. Last but not least we would like to acknowledge the considerable amount of work and enthusiasm spent by our colleague Claudius Stern in preparing theproceedingsofDIPES2008. Hemadeitpossibletoproducethemintheircurrent professional and homogeneous style."
With rapid increase of mobile users of laptop computers and
cellular phones, support of Internet services like e-mail and World
Wide Web (WWW) access in a mobile environment is an indispensable
requirement. The wireless networks must have the ability to provide
real-time bursty traffic (such as voice or video) and data traffic
in a multimedia environment with high quality of service. To
satisfy the huge demand for wireless multimedia service, efficient
channel access methods must be devised. For design and tuning of
the channel access methods, the system performance must be
mathematically analysed. To do so, very accurate models, that
faithfully reproduce the stochastic behaviour of multimedia
wireless communication and computer networks, must be constructed.
The interaction paradigm is a new conceptualization of computational phenomena that emphasizes interaction over algorithms, reflecting the shift in technology from main-frame number-crunching to distributed intelligent networks with graphical user interfaces. The book is arranged in four sections: "Introduction," comprising three chapters that explore and summarize the fundamentals of interactive computation; "Theory" with six chapters, each discussing a specific aspect of interaction; "Applications," five chapters showing how this principle is applied in subdisciplines of computer science; and "New Directions," presenting four multidisciplinary applications. The book challenges traditional Turing machine-based answers to fundamental questions of problem solving and the scope of computation.
This book constitutes Part III of the refereed four-volume post-conference proceedings of the 4th IFIP TC 12 International Conference on Computer and Computing Technologies in Agriculture, CCTA 2010, held in Nanchang, China, in October 2010. The 352 revised papers presented were carefully selected from numerous submissions. They cover a wide range of interesting theories and applications of information technology in agriculture, including simulation models and decision-support systems for agricultural production, agricultural product quality testing, traceability and e-commerce technology, the application of information and communication technology in agriculture, and universal information service technology and service systems development in rural areas.
The area of intelligent and adaptive user interfaces has been of interest to the research community for a long time. Much effort has been spent in trying to find a stable theoretical base for adaptivity in human-computer interaction and to build prototypical systems showing features of adaptivity in real-life interfaces. To date research in this field has not led to a coherent view of problems, let alone solutions. A workshop was organized, which brought together a number of well-known researchers in the area of adaptive user interfaces with a view to
With the fast development of networking and software technologies, information processing infrastructure and applications have been growing at an impressive rate in both size and complexity, to such a degree that the design and development of high performance and scalable data processing systems and networks have become an ever-challenging issue. As a result, the use of performance modeling and m- surementtechniquesas a critical step in designand developmenthas becomea c- mon practice. Research and developmenton methodologyand tools of performance modeling and performance engineering have gained further importance in order to improve the performance and scalability of these systems. Since the seminal work of A. K. Erlang almost a century ago on the mod- ing of telephone traf c, performance modeling and measurement have grown into a discipline and have been evolving both in their methodologies and in the areas in which they are applied. It is noteworthy that various mathematical techniques were brought into this eld, including in particular probability theory, stochastic processes, statistics, complex analysis, stochastic calculus, stochastic comparison, optimization, control theory, machine learning and information theory. The app- cation areas extended from telephone networks to Internet and Web applications, from computer systems to computer software, from manufacturing systems to s- ply chain, from call centers to workforce management.
The papers in this volume consider a general area of study known as network routing. The underlying problems are conceptually simple, yet mathematically complex and challenging. How can we best route material or people from one place to another? Or, how can we best design a system (for instance locate facilities) to provide services and goods as efficiently and equitably as possible? The problems encountered in answering these questions often have an underlying combinatorial structure, for example, either we dispatch a vehicle or we do not, or we use one particular route or another. The problems also typically have an underlying network structure (a communication or transportation network). In addition, models for these problems are often very large with hundreds or thousands of constraints and variables. A companion volume in the "Handbook" series, entitled "Network Models", treats basic network models such as minimum cost flows, matching and the travelling salesman problem, as well as, several complex network topics, not directly related to routing, such as network design and network reliability.
Today's advancements in technology have brought about a new era of speed and simplicity for consumers and businesses. Due to these new benefits, the possibilities of universal connectivity, storage and computation are made tangible, thus leading the way to new Internet-of Things solutions. Resource Management and Efficiency in Cloud Computing Environments is an authoritative reference source for the latest scholarly research on the emerging trends of cloud computing and reveals the benefits cloud paths provide to consumers. Featuring coverage across a range of relevant perspectives and topics, such as big data, cloud security, and utility computing, this publication is an essential source for researchers, students and professionals seeking current research on the organization and productivity of cloud computing environments. Topics Covered: Big Data Cloud Application Services (SaaS) Cloud Security Hybrid Cloud Internet of Things (IoT) Private Cloud Public Cloud Service Oriented Architecture (SOA) Utility Computing Virtualization Technology
New data communication technologies, and the resulting policies and management, can have a profound effect on the success of business organizations. By quantifying the impact of these new innovations, researchers can help these businesses thrive in the networking and business data communications fields. Web-Based Multimedia Advancements in Data Communications and Networking Technologies highlights comprehensive research which will enable readers to understand, manage, use, and maintain business data communication networks more effectively. It also addresses key technology, management, and policy issues for utilizing data communications and networking in business and the current best practices for aligning this important technology with the strategic goals of the organization. |
You may like...
Demystifying Graph Data Science - Graph…
Pethuru Raj, Abhishek Kumar, …
Hardcover
Community Engagement in the Online Space
Michelle Dennis, James H Albert
Hardcover
R5,370
Discovery Miles 53 700
The Host in the Machine - Examining the…
Angela Thomas-Jones
Paperback
R1,318
Discovery Miles 13 180
Cellular Internet of Things - From…
Olof Liberg, Marten Sundberg, …
Paperback
R2,403
Discovery Miles 24 030
|