|
|
Books > Computing & IT > Computer communications & networking > General
First designed to generate personalized recommendations to users in
the 90s, recommender systems apply knowledge discovery techniques
to users' data to suggest information, products, and services that
best match their preferences. In recent decades, we have seen an
exponential increase in the volumes of data, which has introduced
many new challenges. Divided into two volumes, this comprehensive
set covers recent advances, challenges, novel solutions, and
applications in big data recommender systems. Volume 1 contains 14
chapters addressing foundations, algorithms and architectures,
approaches for big data, and trust and security measures. Volume 2
covers a broad range of application paradigms for recommender
systems over 22 chapters.
Modern businesses are on the lookout for ventures that boost their
profits and marketability. Certain new and innovative technological
advances can help enterprises accomplish their ambitious goals
while providing detailed information to assess all aspects of the
business. Global Virtual Enterprises in Cloud Computing
Environments is a collection of innovative studies on business
processes, procedures, methods, strategy, management thinking, and
utilization of technology in cloud computing environments. While
highlighting topics including international business strategy,
virtual reality, and intellectual capital, this book is ideally
designed for corporate executives, research scholars, and students
pursuing courses in the areas of management and big data
applications seeking current research on effective open innovation
strategies in global business.
The optimization of traffic management operations has become a
considerable challenge in today's global scope due to the
significant increase in the number of vehicles, traffic
congestions, and automobile accidents. Fortunately, there has been
substantial progress in the application of intelligent computing
devices to transportation processes. Vehicular ad-hoc networks
(VANETs) are a specific practice that merges the connectivity of
wireless technologies with smart vehicles. Despite its relevance,
empirical research is lacking on the developments being made in
VANETs and how certain intelligent technologies are being applied
within transportation systems. IoT and Cloud Computing Advancements
in Vehicular Ad-Hoc Networks provides emerging research exploring
the theoretical and practical aspects of intelligent transportation
systems and analyzing the modern techniques that are being applied
to smart vehicles through cloud technology. Featuring coverage on a
broad range of topics such as health monitoring, node localization,
and fault tolerance, this book is ideally designed for network
designers, developers, analysists, IT specialists, computing
professionals, researchers, academics, and post-graduate students
seeking current research on emerging computing concepts and
developments in vehicular ad-hoc networks.
6G Key Technologies An accessible and integrated roadmap to the
technologies enabling 6G development In 6G Key Technologies: A
Comprehensive Guide, two internationally well-recognized experts
deliver a thoroughly original and comprehensive exploration of the
technologies enabling and contributing to the development of 6G.
The book presents the vision of 6G by reviewing the evolution of
communications technologies toward 6G and examining the factors
driving that development, as well as their requirements, use cases,
key performance indicators, and more. Readers will discover:
Thorough introductions to the standardization and technology
evolution toward 6G, as well as the vision behind the development
of 6G in terms of architectures, algorithms, protocols, and
applications. In-depth explorations of full-spectrum wireless
technologies in 6G, including enhanced millimeter wave
technologies, terahertz-based communications and networking,
visible-light and optical wireless communications. Fulsome
discussions of smart radio networks and new air interface
technologies for 6G including intelligent reflecting surface,
cellular massive MIMO, cell-free massive MIMO, adaptive and
non-orthogonal multiple access technologies. Perfect for
professional engineers, researchers, manufacturers, network
operators, and software developers, 6G Key Technologies: A
Comprehensive Guide will also earn a place in the libraries of
graduate students studying in wireless communications, artificial
intelligence, signal processing, microwave technology, information
theory, antenna and propagation, system-on-chip implementation, and
computer networks.
Complex Systems and Clouds: A Self-Organization and Self-Management
Perspective provides insights into the intricate world of
self-organizing systems. Large scale distributed computer systems
have evolved into very complex systems and are at the point where
they need to borrow self-adapting organizing concepts from nature.
The book explores complexity in big distributed systems and in the
natural processes in physics and chemistry, building a platform for
understanding how self-organization in big distributed systems can
be achieved. It goes beyond the theoretical description of
self-organization to present principles for designing
self-organizing systems, and concludes by showing the need for a
paradigm shift in the development of large-scale systems from
strictly deterministic to non-deterministic and adaptive.
Autonomic networking aims to solve the mounting problems created by
increasingly complex networks, by enabling devices and
service-providers to decide, preferably without human intervention,
what to do at any given moment, and ultimately to create
self-managing networks that can interface with each other, adapting
their behavior to provide the best service to the end-user in all
situations. This book gives both an understanding and an assessment
of the principles, methods and architectures in autonomous network
management, as well as lessons learned from, the ongoing
initiatives in the field. It includes contributions from industry
groups at Orange Labs, Motorola, Ericsson, the ANA EU Project and
leading universities. These groups all provide chapters examining
the international research projects to which they are contributing,
such as the EU Autonomic Network Architecture Project and Ambient
Networks EU Project, reviewing current developments and
demonstrating how autonomic management principles are used to
define new architectures, models, protocols, and mechanisms for
future network equipment.
This book is a convenient, targeted, single-source guide to
integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike
longwinded "comprehensive resources" it doesn't waste time
re-hashing general information on the architectures and purposes of
ISA and Exchange for raw beginners. Instead, its pragmatic purpose
is to smooth the path of the busy administrator who is under
pressure to get the integration done quickly, and done right, the
first time. It features "break-out sessions" for issues that
require in-depth discussion, "tips and tricks" sections that hone
in on and demystify trouble spots, and "FAQs" alphabetized by topic
that act as a quick-reference for readers who just want a quick
answer to a specific question.
Readers will learn how to:
*Create the protocol definitions and firewall policy to allow only
authorized users to connect to your Exchange Server
*Configure SMTP Filtering and SMTP Message Screener
*Troubleshoot the SSL connection to your Exchange Server
*Take advantage of ISA 2006's integrated Exchange 2007
support
*Enable forms-based authentication for Outlook Web Access
*Leverage unified SSL, VPN, application-layer filtering and
endpoint security
to optimize access for mobile devices
*Configure user-based settings to provide pre-authenticated access
to specific Web applications
...and much more
*Practical and focused, this guide explains explains everything you
need to know in order to successfully integrate ISA 2006 and
Exchange 2007, without wasting time on minutiae
*Tips and tricks from the expert author help you avoid pitfalls
before you stumble into them, troubleshoot problems with ease, and
optimize performance
*In-depth coverage of Exchange SP1 highlights the many security
enhancements that optimize integration with ISA
Network Function Virtualization provides an architectural,
vendor-neutral level overview of the issues surrounding the large
levels of data storage and transmission requirements needed for
today's companies, also enumerating the benefits of NFV for the
enterprise. Drawing upon years of practical experience, and using
numerous examples and an easy-to-understand framework, authors Tom
Nadeau and Ken Gary discuss the relevancy of NFV and how it can be
effectively used to create and deploy new services. Readers will
learn how to determine if network function virtualization is right
for their enterprise network, be able to use hands-on, step-by-step
guides to design, deploy, and manage NFV in an enterprise, and
learn how to evaluate all relevant NFV standards, including ETSI,
IETF, Openstack, and Open Daylight.
Researchers have harnessed the flood of personal information and
opinions shared on social media platforms in a variety of ways.
People communicate not only what they imagine they are purposely
sharing but also unintentionally leak information, which allows
others to glimpse a sense of the subconscious and unconscious at a
macro level. Electronic Hive Minds on Social Media: Emerging
Research and Opportunities explores various research techniques to
profile the electronic hive mind around social topics as expressed
on various modalities of social media, from human, bot, and cyborg
social media accounts, and proposes new research methods for
harnessing public data from social media platforms. Highlighting
topics such as knowledge sharing, swarm intelligence, and social
psychology, this publication is designed for researchers, social
psychologists, practitioners, and students in marketing,
communications, mass media, and similar fields.
Cyber-Physical Systems: Foundations, Principles and Applications
explores the core system science perspective needed to design and
build complex cyber-physical systems. Using Systems Science's
underlying theories, such as probability theory, decision theory,
game theory, organizational sociology, behavioral economics, and
cognitive psychology, the book addresses foundational issues
central across CPS applications, including System Design -- How to
design CPS to be safe, secure, and resilient in rapidly evolving
environments, System Verification -- How to develop effective
metrics and methods to verify and certify large and complex CPS,
Real-time Control and Adaptation -- How to achieve real-time
dynamic control and behavior adaptation in a diverse environments,
such as clouds and in network-challenged spaces, Manufacturing --
How to harness communication, computation, and control for
developing new products, reducing product concepts to realizable
designs, and producing integrated software-hardware systems at a
pace far exceeding today's timeline. The book is part of the
Intelligent Data-Centric Systems: Sensor-Collected Intelligence
series edited by Fatos Xhafa, Technical University of Catalonia.
Indexing: The books of this series are submitted to EI-Compendex
and SCOPUS
This book gives a review of the principles, methods and techniques
of important and emerging research topics and technologies in
Channel Coding, including theory, algorithms, and applications.
Edited by leading people in the field who, through their
reputation, have been able to commission experts to write on a
particular topic. With this reference source you will: Quickly
grasp a new area of research Understand the underlying principles
of a topic and its applications Ascertain how a topic relates to
other areas and learn of the research issues yet to be resolved
Ongoing advancements in modern technology have led to significant
developments with smart technologies. With the numerous
applications available, it becomes imperative to conduct research
and make further progress in this field. Smart Technologies:
Breakthroughs in Research and Practice provides comprehensive and
interdisciplinary research on the most emerging areas of
information science and technology. Including innovative studies on
image and speech recognition, human-computer interface, and
wireless technologies, this multi-volume book is an ideal source
for researchers, academicians, practitioners, and students
interested in advanced technological applications and developments.
The development of software has expanded substantially in recent
years. As these technologies continue to advance, well-known
organizations have begun implementing these programs into the ways
they conduct business. These large companies play a vital role in
the economic environment, so understanding the software that they
utilize is pertinent in many aspects. Researching and analyzing the
tools that these corporations use will assist in the practice of
software engineering and give other organizations an outline of how
to successfully implement their own computational methods. Tools
and Techniques for Software Development in Large Organizations:
Emerging Research and Opportunities is an essential reference
source that discusses advanced software methods that prominent
companies have adopted to develop high quality products. This book
will examine the various devices that organizations such as Google,
Cisco, and Facebook have implemented into their production and
development processes. Featuring research on topics such as
database management, quality assurance, and machine learning, this
book is ideally designed for software engineers, data scientists,
developers, programmers, professors, researchers, and students
seeking coverage on the advancement of software devices in today's
major corporations.
|
|