0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (47)
  • R250 - R500 (215)
  • R500+ (8,034)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > General

Switching Networks: Recent Advances (Hardcover, 2001 ed.): Dingzhu Du, Hung Q. Ngo Switching Networks: Recent Advances (Hardcover, 2001 ed.)
Dingzhu Du, Hung Q. Ngo
R2,848 Discovery Miles 28 480 Ships in 18 - 22 working days

The switching net.work is an important. classic research area in t.ele- communication and comput.er net.works. It.s import.ancc st.ems from both theory and practice. In fact, some open problems, such as Benes conjec- ture on shuffle-exchange networks and Chung-Rmis conjecture on multi- rate rearrangeability, still attract many researchers and the further de- velopment in optical networks requires advanced technology in optical switching networks. In 1997, we had a workshop in switching networks held in NSF Sci- ence and Technology Center in Discrete Mathematics and Theoretical Computer Science (DIMACS), at Princeton University. This workshop was very successful. Many participants wished to have a similar activity every two or three years. This book is a result of such a wish. We are putting together SOllle important developments in this area during last. several years, including articles ill fault-tolerance, rearrang{~ability. non- blocking, optical networks. random permutation generat.ioll. and layout complexity. SOlllC of thos(~ art ides are research papers alld SOIllC an' sur- veys. All articles were reviewed. We would like to uWlItioll two special problems studied in those articles.

Integrated Network Management V - Integrated management in a virtual world Proceedings of the Fifth IFIP/IEEE International... Integrated Network Management V - Integrated management in a virtual world Proceedings of the Fifth IFIP/IEEE International Symposium on Integrated Network Management San Diego, California, U.S.A., May 12-16, 1997 (Hardcover, 1997 ed.)
Aurel Lazar, Robert Saracco
R8,080 Discovery Miles 80 800 Ships in 18 - 22 working days

Welcome to IM'97 We hope you had the opportunity to attend the Conference in beautiful San Diego. If that was the case, you will want to get back to these proceedings for further read ings and reflections. You'll find e-mail addresses of the main author of each paper, and you are surely encouraged to get in touch for further discussions. You can also take advantage of the CNOM (Committee on Network Operation and Management) web site where a virtual discus sion agora has been set up for IM'97 (URL: http: //www.cselt.stet.it/CNOMWWWIIM97.html). At this site you will find a brief summary of discussions that took place in the various panels, and slides that accompanied some of the presentations--all courtesy of the participants. If you have not been to the Conference, leafing through these proceedings may give you food for thought. Hopefully, you will also be joining the virtual world on the web for discussions with authors and others who were at the Conference. At IM'97 the two worlds of computer networks and telecommunications systems came to gether, each proposing a view to management that stems from their own paradigms. Each world made clear the need for end-to-end management and, therefore, each one stepped into the oth er's field. We feel that there is no winner but a mutual enrichment. The time is ripe for integra tion and it is likely that the next Conference will bear its fruit."

Computational Intelligence for Cybersecurity Management and Applications (Hardcover): Yassine Maleh, Mamoun Alazab, Soufyane... Computational Intelligence for Cybersecurity Management and Applications (Hardcover)
Yassine Maleh, Mamoun Alazab, Soufyane Mounir
R3,153 Discovery Miles 31 530 Ships in 9 - 17 working days

1. Propose the latest discoveries in terms of machine intelligence techniques and methods for cybersecurity and privacy; 2. Propose many case studies and applications of machine intelligence in various cybersecurity fields (Smart City, IoT, Cyber Physical System, etc) 3. Combine theory and practice so that readers of the few books (beginners or experts) can find both a description of the concepts and context related to machine intelligence for cybersecurity.

The Data Bank Society (Routledge Revivals) - Organizations, Computers and Social Freedom (Hardcover): Malcolm Warner, Mike Stone The Data Bank Society (Routledge Revivals) - Organizations, Computers and Social Freedom (Hardcover)
Malcolm Warner, Mike Stone
R3,288 R1,367 Discovery Miles 13 670 Save R1,921 (58%) Ships in 10 - 15 working days

This study, written in the context of its first publication in 1970, discusses and documents the invasion of privacy by the corporation and the social institution in the search for efficiency in information processing. Discussing areas such as the impact of the computer on administration, privacy and the storage on information, the authors assess the technical and social feasibility of constructing integrated data banks to cover the details of populations. The book was hugely influential both in terms of scholarship and legislation, and the years following saw the introduction of the Data Protection Act of 1984, which was then consolidated by the Act of 1998. The topics under discussion remain of great concern to the public in our increasingly web-based world, ensuring the continued relevance of this title to academics and students with an interest in data protection and public privacy.

Communication Complexity and Parallel Computing (Hardcover, 1997 ed.): Juraj Hromkovic Communication Complexity and Parallel Computing (Hardcover, 1997 ed.)
Juraj Hromkovic
R1,595 Discovery Miles 15 950 Ships in 18 - 22 working days

The communication complexity of two-party protocols is an only 15 years old complexity measure, but it is already considered to be one of the fundamen tal complexity measures of recent complexity theory. Similarly to Kolmogorov complexity in the theory of sequential computations, communication complex ity is used as a method for the study of the complexity of concrete computing problems in parallel information processing. Especially, it is applied to prove lower bounds that say what computer resources (time, hardware, memory size) are necessary to compute the given task. Besides the estimation of the compu tational difficulty of computing problems the proved lower bounds are useful for proving the optimality of algorithms that are already designed. In some cases the knowledge about the communication complexity of a given problem may be even helpful in searching for efficient algorithms to this problem. The study of communication complexity becomes a well-defined indepen dent area of complexity theory. In addition to a strong relation to several funda mental complexity measures (and so to several fundamental problems of com plexity theory) communication complexity has contributed to the study and to the understanding of the nature of determinism, nondeterminism, and random ness in algorithmics. There already exists a non-trivial mathematical machinery to handle the communication complexity of concrete computing problems, which gives a hope that the approach based on communication complexity will be in strumental in the study of several central open problems of recent complexity theory."

Advanced Topics in System and Signal Theory - A Mathematical Approach (Hardcover, 2010 ed.): Volker Pohl, Holger Boche Advanced Topics in System and Signal Theory - A Mathematical Approach (Hardcover, 2010 ed.)
Volker Pohl, Holger Boche
R2,782 Discovery Miles 27 820 Ships in 18 - 22 working days

The requirement of causality in system theory is inevitably accompanied by the appearance of certain mathematical operations, namely the Riesz proj- tion,theHilberttransform,andthespectralfactorizationmapping.Aclassical exampleillustratingthisisthedeterminationoftheso-calledWiener?lter(the linear, minimum means square error estimation ?lter for stationary stochastic sequences [88]). If the ?lter is not required to be causal, the transfer function of the Wiener ?lter is simply given by H(?)=? (?)/? (?),where ? (?) xy xx xx and ? (?) are certain given functions. However, if one requires that the - xy timation ?lter is causal, the transfer function of the optimal ?lter is given by 1 ? (?) xy H(?)= P ,?? (??,?] . + [? ] (?) [? ] (?) xx + xx? Here [? ] and [? ] represent the so called spectral factors of ? ,and xx + xx? xx P is the so called Riesz projection. Thus, compared to the non-causal ?lter, + two additional operations are necessary for the determination of the causal ?lter, namely the spectral factorization mapping ? ? ([? ] ,[? ] ),and xx xx + xx? the Riesz projection P .

Wireless Sensor and Actor Networks II - Proceedings of the 2008 IFIP Conference on Wireless Sensor and Actor Networks (WSAN... Wireless Sensor and Actor Networks II - Proceedings of the 2008 IFIP Conference on Wireless Sensor and Actor Networks (WSAN 08), Ottawa, Ontario, Canada, July 14-15, 2008 (Hardcover, 2008 ed.)
Ali Miri
R2,808 Discovery Miles 28 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 2008 IFIP Conference on Wireless Sensors and Actor Networks held in Ottawa, Canada on July 14-15, 2008.

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

Amazon CloudWatch Events User Guide (Hardcover): Documentation Team Amazon CloudWatch Events User Guide (Hardcover)
Documentation Team
R1,149 Discovery Miles 11 490 Ships in 18 - 22 working days
Principles of Protocol Design (Hardcover, 2008 ed.): Robin Sharp Principles of Protocol Design (Hardcover, 2008 ed.)
Robin Sharp
R4,298 Discovery Miles 42 980 Ships in 18 - 22 working days

This book introduces the reader to the principles used in the construction of a large range of modern data communication protocols. The approach we take is rather a formal one, primarily based on descriptions of protocols in the notation of CSP. This not only enables us to describe protocols in a concise manner, but also to reason about many of their interesting properties and formally to prove certain aspects of their correctness with respect to appropriate speci?cations. Only after considering the main principles do we go on to consider actual protocols where these principles are exploited. This is a completely new edition of a book which was ?rst published in 1994, where the main focus of many international efforts to develop data communication systems was on OSI - Open Systems Interconnection - the standardised archit- ture for communication systems developed within the International Organisation for Standardization, ISO. In the intervening 13 years, many of the speci?c protocols - veloped as part of the OSI initiative have fallen into disuse. However, the terms and concepts introduced in the OSI Reference Model are still essential for a systematic and consistent analysis of data communication systems, and OSI terms are therefore used throughout. There are three signi?cant changes in this second edition of the book which p- ticularly re?ect recent developments in computer networks and distributed systems.

5G Cyber Risks and Mitigation (Hardcover): Sabhyata Soni 5G Cyber Risks and Mitigation (Hardcover)
Sabhyata Soni
R3,166 Discovery Miles 31 660 Ships in 9 - 17 working days

• Technical language made simple • Researched matter • Maximum illustrations • To the point matter • Authored by a qualified person who is teaching in this field for the last 25 years

My personal Adaptive Global NET (MAGNET) (Hardcover, 2010 ed.): Ramjee Prasad My personal Adaptive Global NET (MAGNET) (Hardcover, 2010 ed.)
Ramjee Prasad
R4,262 Discovery Miles 42 620 Ships in 18 - 22 working days

Every endeavour is covered by some fault, just as ?re is covered by smoke. Therefore one should not give up the work born of his nature, even if such work is full of fault. - The Bhagvad-Gita (18.48) This book is the outcome of the research and developmentcontributions of partners from three different continents, Asia, Europe, America, coming from universities, research centers, industrial partners and SMEs (Small and Medium Enterprise), all of them collaborating in MAGNET (My Adaptive Personal Global Net) and MAGNET Beyond project supported by European Commission within the Sixth Framework Programme (FP6). The project was focusing on a secure user-centric approach developingsecure Personal Networks in multi-network, multi-device, and multi-user environments. The innovative concept of Personal Network (PN), which was introduced and developed in MAGNET, ?nds in this book the ?rst con?rmation of the success that the future of wireless communications is bound to achieve. The importance of this book is not only related to being the ?rst work on PNs, it also gives an overview of operation of a big project, like MAGNET, and in fact the organisation of the book re?ects how then project itself has been structured

Comparative E-Government (Hardcover, 2010 ed.): Christopher G. Reddick Comparative E-Government (Hardcover, 2010 ed.)
Christopher G. Reddick
R5,521 Discovery Miles 55 210 Ships in 18 - 22 working days

Comparative E-Government examines the impact of information and communication technology (ICT) on governments throughout the world. It focuses on the adoption of e-government both by comparing different countries, and by focusing on individual countries and the success and challenges that they have faced. With 32 chapters from leading e-government scholars and practitioners from around the world, there is representation of developing and developed countries and their different stages of e-government adoption. Part I compares the adoption of e-government in two or more countries. The purpose of these chapters is to discern the development of e-government by comparing different counties and their individual experiences. Part II provides a more in-depth focus on case studies of e-government adoption in select countries. Part III, the last part of the book, examines emerging innovations and technologies in the adoption of e-government in different countries. Some of the emerging technologies are the new social media movement, the development of e-participation, interoperability, and geographic information systems (GIS).

Dissemination of Information in Communication Networks - Broadcasting, Gossiping, Leader Election, and Fault-Tolerance... Dissemination of Information in Communication Networks - Broadcasting, Gossiping, Leader Election, and Fault-Tolerance (Hardcover, 2005 ed.)
Juraj Hromkovic, Ralf Klasing, A Pelc, Peter Ruzicka, Walter Unger
R1,608 Discovery Miles 16 080 Ships in 18 - 22 working days

Preface Due to the development of hardware technologies (such as VLSI) in the early 1980s, the interest in parallel and distributive computing has been rapidly growingandinthelate1980sthestudyofparallelalgorithmsandarchitectures became one of the main topics in computer science. To bring the topic to educatorsandstudents, severalbooksonparallelcomputingwerewritten. The involvedtextbook IntroductiontoParallelAlgorithmsandArchitectures by F. Thomson Leighton in 1992 was one of the milestones in the development of parallel architectures and parallel algorithms. But in the last decade or so the main interest in parallel and distributive computing moved from the design of parallel algorithms and expensive parallel computers to the new distributive reality the world of interconnected computers that cooperate (often asynchronously) in order to solve di?erent tasks. Communication became one of the most frequently used terms of computer science because of the following reasons: (i) Considering the high performance of current computers, the communi- tion is often moretime consuming than the computing time of processors. As a result, the capacity of communication channels is the bottleneck in the execution of many distributive algorithms. (ii) Many tasks in the Internet are pure communication tasks. We do not want to compute anything, we only want to execute some information - change or to extract some information as soon as possible and as cheaply as possible. Also, we do not have a central database involving all basic knowledge. Instead, wehavea distributed memorywherethe basickno- edgeisdistributedamongthelocalmemoriesofalargenumberofdi?erent computers. The growing importance of solving pure communication tasks in the - terconnected world is the main motivation for writing this book."

Networking Infrastructure for Pervasive Computing - Enabling Technologies and Systems (Hardcover, 2003 ed.): Debashis Saha,... Networking Infrastructure for Pervasive Computing - Enabling Technologies and Systems (Hardcover, 2003 ed.)
Debashis Saha, Amitava Mukherjee, Somprakash Bandyopadhyay
R4,172 Discovery Miles 41 720 Ships in 18 - 22 working days

Networking Infrastructure for Pervasive Computing: Enabling Technologies & Systems is a comprehensive guide to tomorrow's world of ubiquitous computing where users can access and manipulate information from everywhere at all times.
The emphasis is on networking, systems and standards rather than detailed physical implementation. Addressed are many technical obstacles, such as, connectivity, levels of service, performance, and reliability and fairness. The authors also describe the existing enabling off-the-shelf technologies and its underlying infrastructure known as pervasive networking (PervNet). PervNet ties different sets of smart nodes together enabling them to communicate with each other to provide pervasive computing services to users. Throughout the book, important issues related to scalability, transparency, security, energy management, QoS provisioning, fault tolerance, and disconnected operations are discussed.
This work provides a research and development perspective to the field of PervNet and will serve as an essential reference for network designers, operators and developers.

Wireless and Mobile Networking - IFIP Joint Conference on Mobile Wireless Communications Networks (MWCN'2008) and Personal... Wireless and Mobile Networking - IFIP Joint Conference on Mobile Wireless Communications Networks (MWCN'2008) and Personal Wireless Communications (PWC'2008), Toulouse, France, September 30 - October 2, 2008 (Hardcover, 2008 ed.)
Zoubir Mammeri
R4,279 Discovery Miles 42 790 Ships in 18 - 22 working days

Research and development in wireless and mobile networks and services areas have been going on for some time, reaching the stage of products. Graceful evo- tion of networks, new access schemes, flexible protocols, increased variety of services and applications, networks reliability and availability, security, are some of the present and future challenges that have to be met. MWCN (Mobile and Wireless Communications Networks) and PWC (Personal Wireless Communications) are two conferences sponsored by IFIP WG 6.8 that provide forum for discussion between researchers, practitioners and students interested in new developments in mobile and wireless networks, services, applications and computing. In 2008, MWCN and PWC were held in Toulouse, France, from September 30 to October 2, 2008. MWNC'2008 and PWC'2008 were coupled to form the first edition of IFIP Wireless and Mobile Networking Conference (WMNC'2008). MWCN and PWC topics were revisited in order to make them complementary and covering together the main hot issues in wireless and mobile networks, services, applications, computing, and technologies.

Photonic Slot Routing in Optical Transport Networks (Hardcover, 2003 ed.): Gosse Wedzinga Photonic Slot Routing in Optical Transport Networks (Hardcover, 2003 ed.)
Gosse Wedzinga
R2,768 Discovery Miles 27 680 Ships in 18 - 22 working days

All-optical networking is generally believed to be the only solution for coping with the ever-increasing demands in bandwidth, such as the World Wide Web application.
Optical backbone networks efficiently achieve a high level of traffic aggregation by multiplexing numerous users on circuit-switched wavelength paths - the so-called wavelength routing approach. In contrast, the reduced level of traffic aggregation in access and metro networks makes wavelength routing solutions not adequate. In these network areas, packet-interleaved optical time-division multiplexing with its finer and more dynamic bandwidth allocation is advocated.
The book presents such an approach, known as photonic slot routing. It illustrates how this approach may provide a cost-effective solution to deploying all-optical transport networks, using today's optical device technology. To that end, the author combines DWDM-technology with fixed slot optical switching, and gives a comprehensive description of this approach in which slots are aligned across the wavelengths to form groups of data-flows that propagate as a whole inside the network. Operating algorithms are developed, and network performance is analyzed, both by means of theoretical analysis and many simulations of sample networks.
This work will be of particular interest to researchers and professionals who are active in photonic networking.

The Temporal Logic of Reactive and Concurrent Systems - Specification (Hardcover, 1992 ed.): Zohar Manna, Amir Pnueli The Temporal Logic of Reactive and Concurrent Systems - Specification (Hardcover, 1992 ed.)
Zohar Manna, Amir Pnueli
R3,118 Discovery Miles 31 180 Ships in 18 - 22 working days

Reactive systems are computing systems which are interactive, such as real-time systems, operating systems, concurrent systems, control systems, etc. They are among the most difficult computing systems to program. Temporal logic is a formal tool/language which yields excellent results in specifying reactive systems. This volume, the first of two, subtitled Specification, has a self-contained introduction to temporal logic and, more important, an introduction to the computational model for reactive programs, developed by Zohar Manna and Amir Pnueli of Stanford University and the Weizmann Institute of Science, Israel, respectively.

Solutions for Sharepoint Server 2003 - Site Definitions, Custom Templates, and Global Customizations (Paperback): Jason... Solutions for Sharepoint Server 2003 - Site Definitions, Custom Templates, and Global Customizations (Paperback)
Jason Nadrowski, Stacy Draper
R1,248 Discovery Miles 12 480 Ships in 10 - 15 working days

In "SharePoint 2003 Advanced Concepts," two world-class SharePoint consultants show how to make SharePoint " jump through hoops" for you-and do exactly what you want. Jason Nadrowski and Stacy Draper have built some of the most diverse SharePoint enterprise implementations. Now, drawing on their extraordinary " in the trenches" experience, they present solutions, techniques, and examples you simply won' t find anywhere else. "SharePoint 2003 Advanced Concepts" addresses every facet of SharePoint customization, from site definitions and templates to document libraries and custom properties. The authors cover both Windows SharePoint Services and SharePoint Portal Server 2003 and illuminate SharePoint' s interactions with other technologies-helping you troubleshoot problems far more effectively. Next time you encounter a tough SharePoint development challenge, don' t waste time: get your proven solution right here, in "SharePoint 2003 Advanced Concepts," - Construct more powerful site and list templates - Control how SharePoint uses ghosted and unghosted pages - Use custom site definitions to gain finer control over your site - Build list definitions with custom metadata, views, and forms - Troubleshoot WEBTEMP, ONET.XML, SCHEMA.XML, SharePoint databases, and their interactions - Create custom property types to extend SharePoint' s functionality - Integrate with other systems and SharePoint sites so that you can use their information more effectively - Customize themes and interactive Help, one step at a time - Customize email alerts and system notifications - Extend the capabilities of document libraries - Control document display and behavior based on extensions

Optical Switching (Hardcover, 2006 ed.): Tarek S. El-Bawab Optical Switching (Hardcover, 2006 ed.)
Tarek S. El-Bawab
R4,266 Discovery Miles 42 660 Ships in 18 - 22 working days

Applications of optical switching in network elements and communication networks are discussed in considerable depth. Optical circuits, packet, and burst switching are all included. Composed of distinct self-contained chapters with minimum overlaps and independent references. Provides up-to-date comprehensive coverage of optical switching, technologies, devices, systems and networks. Discusses applications of optical switching in network elements and communications networks.

Dimensions of Uncertainty in Communication Engineering (Paperback): Ezio Biglieri Dimensions of Uncertainty in Communication Engineering (Paperback)
Ezio Biglieri
R2,473 Discovery Miles 24 730 Ships in 10 - 15 working days

Dimensions of Uncertainty in Communication Engineering is a comprehensive and self-contained introduction to the problems of nonaleatory uncertainty and the mathematical tools needed to solve them. The book gathers together tools derived from statistics, information theory, moment theory, interval analysis and probability boxes, dependence bounds, nonadditive measures, and Dempster-Shafer theory. While the book is mainly devoted to communication engineering, the techniques described are also of interest to other application areas, and commonalities to these are often alluded to through a number of references to books and research papers. This is an ideal supplementary book for courses in wireless communications, providing techniques for addressing epistemic uncertainty, as well as an important resource for researchers and industry engineers. Students and researchers in other fields such as statistics, financial mathematics, and transport theory will gain an overview and understanding on these methods relevant to their field.

Performance Evaluation and Applications of ATM Networks (Hardcover, 2000 ed.): Demetres D. Kouvatsos Performance Evaluation and Applications of ATM Networks (Hardcover, 2000 ed.)
Demetres D. Kouvatsos
R5,398 Discovery Miles 53 980 Ships in 18 - 22 working days

The diversity of methodologies and applications in the literature for the performance modelling and analysis of ATM networks, widely considered as the new generation of high speed communication systems, attests to the breadth and richness of recent ATM research and developments Performance Evaluation and Applications of ATM Networks contains seventeen tutorial papers by eminent researchers and practitioners in the ATM field worldwide. It offers a fundamental source of reference, reflecting essential state-of-the-art material for further research and development in the performance evaluation and applications field of ATM networks. Topics discussed in this book include: ATM Traffic Modelling and Characterization; ATM Traffic Management and Control ATM Routing and Network Resilience; IP/ATM Networks Integration; ATM Special Topics: Optical, Wireless and Satellite Networks; Analytical Techniques for ATM Networks. Performance Evaluation and Applications of ATM Networks maintains throughout an effective balance between descriptive and quantitative approaches for the presentation of important ATM mechanisms and performance evaluation techniques. It unifies ATM performance modelling material already known and introduces readers to some unfamiliar and unexplored ATM performance evaluation and application research areas. Performance Evaluation and Applications of ATM Networks is ideal for personnel in computer/communication industries as well as academic researchers in computer science and electrical engineering.

Practical Intranet Security - Overview of the State of the Art and Available Technologies (Hardcover, 1999 ed.): Paul M.... Practical Intranet Security - Overview of the State of the Art and Available Technologies (Hardcover, 1999 ed.)
Paul M. Ashley, M. Vandenwauver
R5,170 Discovery Miles 51 700 Ships in 18 - 22 working days

Foreword by Lars Knudsen
"Practical Intranet Security" focuses on the various ways in which an intranet can be violated and gives a thorough review of the technologies that can be used by an organization to secure its intranet. This includes, for example, the new security architecture SESAME, which builds on the Kerberos authentication system, adding to it both public-key technology and a role-based access control service. Other technologies are also included such as a description of how to program with the GSS-API, and modern security technologies such as PGP, S/MIME, SSH, SSL IPSEC and CDSA. The book concludes with a comparison of the technologies.
This book is different from other network security books in that its aim is to identify how to secure an organization's intranet. Previously books have concentrated on the Internet, often neglecting issues relating to securing intranets. However the potential risk to business and the ease by which intranets can be violated is often far greater than via the Internet.
The aim is that network administrators and managers can get the information that they require to make informed choices on strategy and solutions for securing their own intranets.
The book is an invaluable reference for network managers and network administrators whose responsibility it is to ensure the security of an organization's intranet. The book also contains background reading on networking, network security and cryptography which makes it an excellent research reference and undergraduate/postgraduate text book.

Complex Intelligent Systems and Their Applications (Hardcover, 2010 ed.): Fatos Xhafa, Leonard Barolli, Petraq Papajorgji Complex Intelligent Systems and Their Applications (Hardcover, 2010 ed.)
Fatos Xhafa, Leonard Barolli, Petraq Papajorgji
R2,802 Discovery Miles 28 020 Ships in 18 - 22 working days

"Complex Intelligent Systems and Applications" presents the most up-to-date advances in complex, software intensive and intelligent systems. Each self-contained chapter is the contribution of distinguished experts in areas of research relevant to the study of complex, intelligent, and software intensive systems. These contributions focus on the resolution of complex problems from areas of networking, optimization and artificial intelligence. The book is divided into three parts focusing on complex intelligent network systems, efficient resource management in complex systems, and artificial data mining systems. Through the presentation of these diverse areas of application, the volume provides insights into the multidisciplinary nature of complex problems. Throughout the entire book, special emphasis is placed on optimization and efficiency in resource management, network interaction, and intelligent system design. This book presents the most recent interdisciplinary results in this area of research and can serve as a valuable tool for researchers interested in defining and resolving the types of complex problems that arise in networking, optimization, and artificial intelligence.

AWS Elemental MediaTailor User Guide (Hardcover): Documentation Team AWS Elemental MediaTailor User Guide (Hardcover)
Documentation Team
R883 Discovery Miles 8 830 Ships in 18 - 22 working days
Multiaccess, Mobility and Teletraffic in Wireless Communications: Volume 4 (Hardcover, 1999 ed.): Ezio Biglieri, Luigi Fratta,... Multiaccess, Mobility and Teletraffic in Wireless Communications: Volume 4 (Hardcover, 1999 ed.)
Ezio Biglieri, Luigi Fratta, Bijan Jabbari
R4,183 Discovery Miles 41 830 Ships in 18 - 22 working days

The unrelenting growth of wireless communications continues to raise new research and development problems that require unprecedented interactions among communication engineers. In particular, specialists in transmission and specialists in networks must often cross each other's boundaries. This is especially true for CDMA, an access technique that is being widely accepted as a system solution for next-generation mobile cellular systems, but it extends to other system aspects as well. Major challenges lie ahead, from the design of physical and radio access to network architecture, resource management, mobility management, and capacity and performance aspects. Several of these aspects are addressed in this volume, the fourth in the edited series on Multiaccess, Mobility and Teletraffic for Wireless Communications. It contains papers selected from MMT'99, the fifth Workshop held on these topics in October 1999 in Venezia, Italy. The focus of this workshop series is on identifying, presenting, and discussing the theoretical and implementation issues critical to the design of wireless communication networks. More specifically, these issues are examined from the viewpoint of the impact each one of them can have on the others. Specific emphasis is given to the evolutionary trends of universal wireless access and software radio. Performance improvements achieved by spectrally efficient codes and smart antennas in experimental GSM testbeds are presented. Several contributions address critical issues regarding multimedia services for Third-Generation Mobile Radio Networks ranging from high rate data transmission with CDMA technology to resource allocation for integrated Voice/WWW traffic.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Digital Signal Processing and…
Dag Stranneby Paperback R1,371 Discovery Miles 13 710
Cybersecurity for Connected Medical…
Arnab Ray Paperback R2,061 Discovery Miles 20 610
The Gathering Cloud
J. R. Carpenter Paperback R396 Discovery Miles 3 960
Research Anthology on Architectures…
Information R Management Association Hardcover R12,630 Discovery Miles 126 300
Trustworthy Autonomic Computing
Thaddeus Eze Hardcover R2,997 R2,712 Discovery Miles 27 120
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,318 Discovery Miles 13 180
Web 2.0 and Cloud Technologies for…
Zaigham Mahmood Hardcover R5,405 Discovery Miles 54 050
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,452 Discovery Miles 14 520
Cloud Computing Applications and…
Saikat Gochhait, David Tawei Shou, … Hardcover R5,931 Discovery Miles 59 310
Cable Engineering for Local Area…
B.J. Elliott Hardcover R3,208 Discovery Miles 32 080

 

Partners