0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (38)
  • R250 - R500 (217)
  • R500+ (8,061)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > General

Reconfigurable RF Power Amplifiers on Silicon for Wireless Handsets (Hardcover, 2011 ed.): Laurent Leyssenne, Eric Kerherve,... Reconfigurable RF Power Amplifiers on Silicon for Wireless Handsets (Hardcover, 2011 ed.)
Laurent Leyssenne, Eric Kerherve, Yann Deval
R2,746 Discovery Miles 27 460 Ships in 18 - 22 working days

"Reconfigurable RF Power Amplifiers on Silicon for Wireless Handsets" is intended to designers and researchers who have to tackle the efficiency/linearity trade-off in modern RF transmitters so as to extend their battery lifetime. High data rate 3G/4G standards feature broad channel bandwidths, high dynamic range and critical envelope variations which generally forces the power amplifier (PA) to operate in a low efficiency "backed-off" regime. Classic efficiency enhancement techniques such as Envelope Elimination and Restoration reveal to be little compliant with handset-dedicated PA implementation due to their channel-bandwidth-limited behavior and their increased die area consumption and/or bill-of-material. The architectural advances that are proposed in this book circumvent these issues since they put the stress on low die-area /low power-consumption control circuitry. The advantages of silicon over III/V technologies are highlighted by several analogue signal processing techniques that can be implemented on-chip with a power amplifier. System-level and transistor-level simulations are combined to illustrate the principles of the proposed power adaptive solutions. Measurement on BICMOS demonstrators allows validating the functionality of dynamic linearity/efficiency management. In "Reconfigurable RF Power Amplifiers on Silicon for Wireless Handsets," PA designers will find a review of technologies, architectures and theoretical formalisms (Volterra series...) that are traditionally related to PA design. Specific issues that one encounters in power amplifiers (such as thermal / memory effects, stability, VSWR sensitivity...) and the way of overcoming them are also extensively considered throughout this book.

Distributed Applications and Interoperable Systems (Hardcover, 1997 ed.): Hartmut Koenig, Kurt Geihs, Thomas Preuss Distributed Applications and Interoperable Systems (Hardcover, 1997 ed.)
Hartmut Koenig, Kurt Geihs, Thomas Preuss
R4,172 Discovery Miles 41 720 Ships in 18 - 22 working days

Distribution and interoperability in heterogeneous computing environments are the key requirements for state-of-the-art information processing systems. Distributed applications are making a critical contribution in many application sectors, such as office automation, finance, manufacturing, telecommunications, aerospace, and transportation. Users demand support for the construction, integration and management of their application systems as well as for the interoperability of independent application components. DAIS '97 provides a forum for researchers, application designers and users to review, discuss and learn about new approaches and concepts in the fields of distributed applications. DAIS '97 will especially focus on the interoperability between different applications and services, different implementations of the same and of different distributed platforms.

Technological Aspects of Virtual Organizations - Enabling the Intelligent Enterprise (Hardcover, 2004 ed.): Alea M. Fairchild Technological Aspects of Virtual Organizations - Enabling the Intelligent Enterprise (Hardcover, 2004 ed.)
Alea M. Fairchild
R2,741 Discovery Miles 27 410 Ships in 18 - 22 working days

This textbook was inspired by an undergraduate elective course given on virtual organizations and technology. The instructor could not find a suitable text that covered both the organizational and technological aspects including examples based on today's industry. Other books were either too strategic or too technical for an audience of undergraduate business and technology students who were to use the book. But why was that the case? For the same reason that business and IT people in industry tended not to speak the same "language": indeed, the integration of technology into business strategy has been a recent occurrence, and traditional strategy issues have been decided too high in the organizational structure while technology was too detailed in tactical implementation. With the Internet and the advent of e-commerce, m-commerce, and c-commerce (and the other letters of the alphabet soon to follow), business and technology finally started to become closer, and the interest in technology as an enabler for strategic business decision-making evolved into a mainstream concept. How are we defining a virtual organization? Most definitions of the concept of virtual organizations start with stating that it is "a network between organisations or individuals . . . ". The Oxford Concise Dictionary defines 'virtual' as: "that is such/or practical purposes, though not in name or according to a strict definition. " An organization may be thought of as a number of individuals systematically united for some end or work.

Computer Networks and Systems - Queueing Theory and Performance Evaluation (Hardcover, 3rd ed. 2000): Thomas G. Robertazzi Computer Networks and Systems - Queueing Theory and Performance Evaluation (Hardcover, 3rd ed. 2000)
Thomas G. Robertazzi
R2,712 Discovery Miles 27 120 Ships in 18 - 22 working days

This text, intended for a first course in performance evaluation, provides a self-contained treatment of all aspects of queueing theory. It starts by introducing readers to the terminology and usefulness of queueing theory and continues by considering Markovian queues in equilibrium, Little's law, reversibility, transient analysis and computation, and the M/G/1 queueing system. Subsequent chapters treat the theory of networks of queues and computational algorithms for networks of queues. Stochastic Petri networks, including those whose solutions can be given in product form, are covered in detail. A chapter on discrete-time queueing systems, which are of recent interest, discusses arrival processes, Geom/Geom/m queueing models, and case studies of discrete-time queueing networks arising in industrial applications. This third edition includes a new chapter on current models of network traffic as well as sixteen new homework problems on discrete-time models and a revised and updated set of references. The discussion of network traffic models includes a survey of continuous and discrete time models, a detailed discussion of burstiness, a complete introduction to self-similar traffic and a presentation of solution techniques. Solutions for all of the homework problems in this text are available in a separate volume.

Optical Communication Theory and Techniques (Hardcover, and and and an): Enrico Forestieri Optical Communication Theory and Techniques (Hardcover, and and and an)
Enrico Forestieri
R4,130 Discovery Miles 41 300 Ships in 18 - 22 working days

Since the advent of optical communications, a greattechnological effort has been devoted to the exploitation of the huge bandwidth of optical fibers. Sta- ing from a few Mb/s single channel systems, a fast and constant technological development has led to the actual 10 Gb/s per channel dense wavelength - vision multiplexing (DWDM) systems, with dozens of channels on a single fiber. Transmitters and receivers are now ready for 40 Gb/s, whereas hundreds of channels can be simultaneously amplified by optical amplifiers. Nevertheless, despite such a pace in technological progress, optical c- munications are still in a primitive stage if compared, for instance, to radio communications: the widely spread on-off keying (OOK) modulation format is equivalent to the rough amplitude modulation (AM) format, whereas the DWDM technique is nothing more than the optical version of the frequency - vision multiplexing (FDM) technique. Moreover, adaptive equalization, ch- nel coding or maximum likelihood detection are still considered something "exotic" in the optical world. This is mainly due to the favourable char- teristics of the fiber optic channel (large bandwidth, low attenuation, channel stability, ...), which so far allowed us to use very simple transmission and detection techniques.

Internet of Things (IoT) Applications for Enterprise Productivity (Hardcover): Erdinc Koc Internet of Things (IoT) Applications for Enterprise Productivity (Hardcover)
Erdinc Koc
R5,978 Discovery Miles 59 780 Ships in 18 - 22 working days

Development in information and communication technologies has led to the advancement of business and enabled enterprises to produce on a global scale. Productivity is a key function in maintaining a competitive advantage in today's market. The internet of things has rapidly become prevalent in the productivity efforts of businesses. Understanding these technologies and how to implement them into current business practices is vital for researchers and practitioners. Internet of Things (IoT) Applications for Enterprise Productivity is a collection of innovative research on the advancing methods productivity efforts of business through the implementation of the internet of things. While highlighting topics including employee motivation, enterprise productivity, and supply chain tracking, this book is ideally designed for manufacturing professionals, industrialists, engineers, managers, practitioners, academicians, and students seeking current research on enterprise production systems and its transformation using internet of things technologies.

Threat Hunting in the Cloud - Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks (Paperback): C Peiris Threat Hunting in the Cloud - Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks (Paperback)
C Peiris
R867 Discovery Miles 8 670 Ships in 10 - 15 working days

Implement a vendor-neutral and multi-cloud cybersecurity and risk mitigation framework with advice from seasoned threat hunting pros In Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, celebrated cybersecurity professionals and authors Chris Peiris, Binil Pillai, and Abbas Kudrati leverage their decades of experience building large scale cyber fusion centers to deliver the ideal threat hunting resource for both business and technical audiences. You'll find insightful analyses of cloud platform security tools and, using the industry leading MITRE ATT&CK framework, discussions of the most common threat vectors. You'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services and deliver a multi-cloud strategy for enterprise customers. And you will find out how to create a vendor-neutral environment with rapid disaster recovery capability for maximum risk mitigation. With this book you'll learn: Key business and technical drivers of cybersecurity threat hunting frameworks in today's technological environment Metrics available to assess threat hunting effectiveness regardless of an organization's size How threat hunting works with vendor-specific single cloud security offerings and on multi-cloud implementations A detailed analysis of key threat vectors such as email phishing, ransomware and nation state attacks Comprehensive AWS and Azure "how to" solutions through the lens of MITRE Threat Hunting Framework Tactics, Techniques and Procedures (TTPs) Azure and AWS risk mitigation strategies to combat key TTPs such as privilege escalation, credential theft, lateral movement, defend against command & control systems, and prevent data exfiltration Tools available on both the Azure and AWS cloud platforms which provide automated responses to attacks, and orchestrate preventative measures and recovery strategies Many critical components for successful adoption of multi-cloud threat hunting framework such as Threat Hunting Maturity Model, Zero Trust Computing, Human Elements of Threat Hunting, Integration of Threat Hunting with Security Operation Centers (SOCs) and Cyber Fusion Centers The Future of Threat Hunting with the advances in Artificial Intelligence, Machine Learning, Quantum Computing and the proliferation of IoT devices. Perfect for technical executives (i.e., CTO, CISO), technical managers, architects, system admins and consultants with hands-on responsibility for cloud platforms, Threat Hunting in the Cloud is also an indispensable guide for business executives (i.e., CFO, COO CEO, board members) and managers who need to understand their organization's cybersecurity risk framework and mitigation strategy.

Building QoS into Distributed Systems - IFIP TC6 WG6.1 Fifth International Workshop on Quality of Service (IWQOS '97),... Building QoS into Distributed Systems - IFIP TC6 WG6.1 Fifth International Workshop on Quality of Service (IWQOS '97), 21-23 May 1997, New York, USA (Hardcover, 1997 ed.)
Andrew T. Campbell, Klara Nahrstedt
R5,385 Discovery Miles 53 850 Ships in 18 - 22 working days

Welcome to IWQOS'97 in New York City! Over the past several years, there has been a considerable amount of research within the field of Quality of Service (QOS). Much of that work has taken place within the context of QOS support for distributed multimedia systems, operating systems, transport subsystems, networks, devices and formal languages. The objective of the Fifth International Workshop on Quality of Service (IWQOS) is to bring together researchers, developers and practitioners working in all facets of QOS research. While many workshops and conferences offer technical sessions on the topic QOS, none other than IWQOS, provide a single-track workshop dedicated to QOS research. The theme of IWQOS'97 is building QOS into distributed systems. Implicit in that theme is the notion that the QOS community should now focus on discussing results from actual implementations of their work. As QOS research moves from theory to practice, we are interested in gauging the impact of ideas discussed at previous workshops on development of actual systems. While we are interested in experimental results, IWQOS remains a forum for fresh and innovative ideas emerging in the field. As a result of this, authors were solicited to provide experimental research (long) papers and more speculative position (short) statements for consideration. We think we have a great invited and technical program lined up for you this year. The program reflects the Program Committees desire to hear about experiment results, controversial QOS subjects and retrospectives on where we are and where we are going.

Mathematical Theories of Distributed Sensor Networks (Hardcover, 2014 ed.): Sitharama S. Iyengar, Kianoosh G. Boroojeni, N.... Mathematical Theories of Distributed Sensor Networks (Hardcover, 2014 ed.)
Sitharama S. Iyengar, Kianoosh G. Boroojeni, N. Balakrishnan
R3,264 Discovery Miles 32 640 Ships in 10 - 15 working days

This book provides a Mathematical Theory of Distributed Sensor Networks. It introduces the Mathematical & Computational Structure by discussing what they are, their applications and how they differ from traditional systems. It also explains how mathematics are utilized to provide efficient techniques implementing effective coverage, deployment, transmission, data processing, signal processing, and data protection within distributed sensor networks. Finally, it discusses some important challenges facing mathematics to get more incite to the multidisciplinary area of distributed sensor networks. -This book will help design engineers to set up WSN-based applications providing better use of resources while optimizing processing costs. -This book is highly useful for graduate students starting their first steps in research to apprehend new approaches and understand the mathematics behind them and face promising challenges. -This book aims at presenting a formal framework allowing to show how mathematical theories can be used to provide distributed sensor modeling and to solve important problems such as coverage hole detection and repair. -This book aims at presenting the current state of the art in formal issues related to sensor networking. It can be used as a handbook for different classes at the graduate level and the undergraduate level. It is self contained and comprehensive, presenting a complete picture of the discipline of optical network engineering including modeling functions, controlling quality of service, allocation resources, monitoring traffic, protecting infrastructure, and conducting planning. This book addresses a large set of theoretical aspects. It is designed for specialists in ad hoc and wireless sensor networks and does not include discusses on very promising areas such as homotopy, computational geometry, and wavelet transforms.

Formal Methods for Open Object-based Distributed Systems - Volume 2 (Hardcover, 1997 ed.): Howard Bowman, John Derrick Formal Methods for Open Object-based Distributed Systems - Volume 2 (Hardcover, 1997 ed.)
Howard Bowman, John Derrick
R5,403 Discovery Miles 54 030 Ships in 18 - 22 working days

This book presents the leading edge in several related fields, specifically object orientated programming, open distributed systems and formal methods for object oriented systems. With increased support within industry regarding these areas, this book captures the most up-to-date information on the subject. Many topics are discussed, including the following important areas: object oriented design and programming; formal specification of distributed systems; open distributed platforms; types, interfaces and behaviour; formalisation of object oriented methods.

An Introduction to Queueing Theory - and Matrix-Analytic Methods (Hardcover, 2005 ed.): L Breuer, Dieter Baum An Introduction to Queueing Theory - and Matrix-Analytic Methods (Hardcover, 2005 ed.)
L Breuer, Dieter Baum
R1,559 Discovery Miles 15 590 Ships in 18 - 22 working days

The present textbook contains the recordsof a two-semester course on que- ing theory, including an introduction to matrix-analytic methods. This course comprises four hours oflectures and two hours of exercises per week andhas been taughtattheUniversity of Trier, Germany, for about ten years in - quence. The course is directed to last year undergraduate and?rst year gr- uate students of applied probability and computer science, who have already completed an introduction to probability theory. Its purpose is to present - terial that is close enough to concrete queueing models and their applications, while providing a sound mathematical foundation for the analysis of these. Thus the goal of the present book is two-fold. On the one hand, students who are mainly interested in applications easily feel bored by elaborate mathematical questions in the theory of stochastic processes. The presentation of the mathematical foundations in our courses is chosen to cover only the necessary results, which are needed for a solid foundation of the methods of queueing analysis. Further, students oriented - wards applications expect to have a justi?cation for their mathematical efforts in terms of immediate use in queueing analysis. This is the main reason why we have decided to introduce new mathematical concepts only when they will be used in the immediate sequel. On the other hand, students of applied probability do not want any heur- tic derivations just for the sake of yielding fast results for the model at hand.

Semantic Management of Middleware (Hardcover, 2006 ed.): Daniel Oberle Semantic Management of Middleware (Hardcover, 2006 ed.)
Daniel Oberle
R2,808 Discovery Miles 28 080 Ships in 18 - 22 working days

Current middleware solutions, e.g., application servers and Web services, are very complex software products that are hard to tame because of intricacies of distributed systems. Their functionalities have mostly been developed and managed with the help of administration tools and corresponding configuration files, recently in XML. Though this constitutes flexibility for developing and administrating a distributed application, the conceptual model underlying the different configurations is only implicit.

To remedy such problems, Semantic Management of Middleware contributes an ontology-based approach to support the development and administration of middleware-based applications. The ontology is an explicit conceptual model with formal logic-based semantics. Its descriptions may therefore be queried, may foresight required actions, or may be checked to avoid inconsistent system configurations.

This book builds a rigorous approach towards giving the declarative descriptions of components and services a well-defined meaning by specifying ontological foundations and by showing how such foundations may be realized in practical, up-and-running systems.

Fundamental Networking in Java (Hardcover, 2006 ed.): Esmond Pitt Fundamental Networking in Java (Hardcover, 2006 ed.)
Esmond Pitt
R1,619 Discovery Miles 16 190 Ships in 18 - 22 working days

The book provides complete coverage of fundamental IP networking in Java. It introduces the concepts behind TCP/IP and UDP and their intended use and purpose; gives complete coverage of Java networking APIs, includes an extended discussion of advanced server design, so that the various design principles and tradeoffs concerned are discussed and equips the reader with analytic queuing-theory tools to evaluate design alternatives; covers UDP multicasting, and covers multi-homed hosts, leading the reader to understand the extra programming steps and design considerations required in such environments.

After reading this book the reader will have an advanced knowledge of fundamental network design and programming concepts in the Java language, enabling them to design and implement distributed applications with advanced features and to predict their performance. Special emphasis is given to the scalable I/O facilities of Java 1.4 as well as complete treatments of multi-homing and UDP both unicast and multicast.

Human Rights Treaties - Considering Patterns of Participation, 1948-2000 (Hardcover): Mark Sachleben Human Rights Treaties - Considering Patterns of Participation, 1948-2000 (Hardcover)
Mark Sachleben
R4,221 Discovery Miles 42 210 Ships in 10 - 15 working days

The book examines patterns of participation in human rights treaties. International relations theory is divided on what motivates states to participate in treaties, specifically human rights treaties. Instead of examining the specific motivations, this dissertation examines patterns of participation. In doing so, it attempts to match theoretical expectations of state behavior with participation. The conclusion of this study is that the data suggests there are multiple motivations that lead states to participate in human rights treaties. The book is divided into five substantive chapters. After an introduction, the second chapter examines the literature on why states join treaties in general, and human rights treaties in particular. The third chapter reviews the obligations states commit to under the fifteen treaties under consideration. The fourth chapter uses basic quantitative methods to examine any differences in the participation rates between democratic and non-democratic states. The fifth chapter examines reservations, declarations, and objections made in conjuncture with the fifteen treaties. The chapter employs both quantitative and qualitative methods to determine if there are substantial differences between democratic and non-democratic states. Finally, the sixth chapter examines those states that participate in the most human rights treaties to determine if there are characteristics that help to identify these states. Additionally, the chapter examines and evaluates theoretical predictions about participation.

An Introduction to Queueing Systems (Hardcover, 2002 ed.): Sanjay K. Bose An Introduction to Queueing Systems (Hardcover, 2002 ed.)
Sanjay K. Bose
R4,175 Discovery Miles 41 750 Ships in 18 - 22 working days

Queueing is an aspect of modern life that we encounter at every step in our daily activities. Whether it happens at the checkout counter in the supermarket or in accessing the Internet, the basic phenomenon of queueing arises whenever a shared facility needs to be accessed for service by a ]arge number of jobs or customers. The study of queueing is important as it gravides both a theoretical background to the kind of service that we may expect from such a facility and the way in which the facility itself may be designed to provide some specified grade of service to its customers. Our study of queueing was basically motivated by its use in the study of communication systems and computer networks. The various computers, routers and switches in such a network may be modelled as individual queues. The whole system may itself be modelled as a queueing network providing the required service to the messages, packets or cells that need to be carried. Application of queueing theory provides the theoretical framework for the design and study of such networks. The purpose of this book is to support a course on queueing systems at the senior undergraduate or graduate Ievels. Such a course would then provide the theoretical background on which a subsequent course on the performance modeHing and analysis of computer networks may be based.

Basic Concepts for Managing Telecommunications Networks - Copper to Sand to Glass to Air (Hardcover, 1999 ed.): Lawrence... Basic Concepts for Managing Telecommunications Networks - Copper to Sand to Glass to Air (Hardcover, 1999 ed.)
Lawrence Bernstein, C.M. Yuhas
R4,172 Discovery Miles 41 720 Ships in 18 - 22 working days

It is important to understand what came before and how to meld new products with legacy systems. Network managers need to understand the context and origins of the systems they are using. Programmers need an understanding of the reasons behind the interfaces they must satisfy and the relationship of the software they build to the whole network. And finally, sales representatives need to see the context into which their products must fit.

Stochastic Network Calculus (Hardcover, 2008 ed.): Yuming Jiang, Yong Liu Stochastic Network Calculus (Hardcover, 2008 ed.)
Yuming Jiang, Yong Liu
R1,424 Discovery Miles 14 240 Ships in 18 - 22 working days

Network calculus is a theory dealing with queuing systems found in computer networks. Its focus is on performance guarantees. Central to the theory is the use of alternate algebras such as the min-plus algebra to transform complex network systems into analytically tractable systems. To simplify the ana- sis, another idea is to characterize tra?c and service processes using various bounds. Since its introduction in the early 1990s, network calculus has dev- oped along two tracks-deterministic and stochastic. This book is devoted to summarizing results for stochastic network calculus that can be employed in the design of computer networks to provide stochastic service guarantees. Overview and Goal Like conventional queuing theory, stochastic network calculus is based on properly de?ned tra?c models and service models. However, while in c- ventional queuing theory an arrival process is typically characterized by the inter-arrival times of customers and a service process by the service times of customers, the arrival process and the service process are modeled in n- work calculus respectively by some arrival curve that (maybe probabilis- cally) upper-bounds the cumulative arrival and by some service curve that (maybe probabilistically) lower-bounds the cumulative service. The idea of usingboundstocharacterizetra?candservicewasinitiallyintroducedfor- terministic network calculus. It has also been extended to stochastic network calculus by exploiting the stochastic nature of arrival and service processes.

Sustainable Interdependent Networks - From Theory to Application (Hardcover, 1st ed. 2018): M. Hadi Amini, Kianoosh G.... Sustainable Interdependent Networks - From Theory to Application (Hardcover, 1st ed. 2018)
M. Hadi Amini, Kianoosh G. Boroojeni, S.S. Iyengar, Panos M. Pardalos, Frede Blaabjerg, …
R4,211 R3,410 Discovery Miles 34 100 Save R801 (19%) Ships in 10 - 15 working days

This book focuses on the theory and application of interdependent networks. The contributors consider the influential networks including power and energy networks, transportation networks, and social networks. The first part of the book provides the next generation sustainability framework as well as a comprehensive introduction of smart cities with special emphasis on energy, communication, data analytics and transportation. The second part offers solutions to performance and security challenges of developing interdependent networks in terms of networked control systems, scalable computation platforms, and dynamic social networks. The third part examines the role of electric vehicles in the future of sustainable interdependent networks. The fourth and last part of this volume addresses the promises of control and management techniques for the future power grids.

Advances in Digital Forensics IV (Hardcover, 2008 ed.): Indrajit Ray, Sujeet Shenoi Advances in Digital Forensics IV (Hardcover, 2008 ed.)
Indrajit Ray, Sujeet Shenoi
R2,859 Discovery Miles 28 590 Ships in 18 - 22 working days

Practically every crime now involves some aspect of digital evidence. This is the most recent volume in the Advances in Digital Forensics series. It describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations.

This book contains a selection of twenty-eight edited papers from the Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, held at Kyoto University, Kyoto, Japan in the spring of 2008.

Topic Detection and Classification in Social Networks - The Twitter Case (Hardcover, 1st ed. 2018): Dimitrios Milioris Topic Detection and Classification in Social Networks - The Twitter Case (Hardcover, 1st ed. 2018)
Dimitrios Milioris
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book provides a novel method for topic detection and classification in social networks. The book addresses several research and technical challenges that are currently being investigated by the research community, from the analysis of relations and communications between members of a community, to quality, authority, relevance and timeliness of the content, traffic prediction based on media consumption, spam detection, to security, privacy and protection of personal information. Furthermore, the book discusses innovative techniques to address those challenges and provides novel solutions based on information theory, sequence analysis and combinatorics, which are applied on real data obtained from Twitter.

Performance Modelling and Evaluation of ATM Networks (Hardcover, 1995 ed.): Demetres D. Kouvatsos Performance Modelling and Evaluation of ATM Networks (Hardcover, 1995 ed.)
Demetres D. Kouvatsos
R7,979 Discovery Miles 79 790 Ships in 18 - 22 working days

Asynchronous Transfer Mode (ATM) networks are widely considered to be the new generation of high speed communication systems both for broadband public information highways and for local and wide area private networks. ATM is designed to integrate existing and future voice, audio, image and data services. Moreover, ATM aims to simplify the complexity of switching and buffer management, to optimise intermediate node processing and buffering and to limit transmission delays. However, to support such diverse services on one integrated communication network, it is most essential, through careful engineering, to achieve a fruitful balance amongst the conflicting requirements of different quality of service constraints ensuring that one service does not have adverse implications on another. Over recent years there has been a great deal of progress in research and development of ATM technology, but there are still many interesting and important problems to be resolved such as traffic characterisation and control, routing and optimisation, ATM switching techniques and the provision of quality of service. This book presents thirty-two research papers, both from industry and academia, reflecting latest original achievements in the theory and practice of performance modelling of ATM networks worldwide. These papers were selected, subject to peer review, from those submitted as extended and revised versions out of fifty-nine shorter papers presented at the Second IFIP Workshop on "Performance Modelling and Evaluation of ATM Networks" July 4-7, 1994, Bradford University. At least three referees from the scientific committee and externally were involved in the selection of each paper.

Emerging Research in Cloud Distributed Computing Systems (Hardcover): Susmit Bagchi Emerging Research in Cloud Distributed Computing Systems (Hardcover)
Susmit Bagchi
R5,107 Discovery Miles 51 070 Ships in 18 - 22 working days

Traditional computing concepts are maturing into a new generation of cloud computing systems with wide-spread global applications. However, even as these systems continue to expand, they are accompanied by overall performance degradation and wasted resources. Emerging Research in Cloud Distributed Computing Systems covers the latest innovations in resource management, control and monitoring applications, and security of cloud technology. Compiling and analyzing current trends, technological concepts, and future directions of computing systems, this publication is a timely resource for practicing engineers, technologists, researchers, and advanced students interested in the domain of cloud computing.

The Practice of Corporate Governance (Paperback): Bob Tricker The Practice of Corporate Governance (Paperback)
Bob Tricker
R981 Discovery Miles 9 810 Ships in 9 - 17 working days

This book offers a straight-forward guide to the fundamental work of governing bodies and the people who serve on them. The aim is of the book is to help every member serving on a governing body understand and improve their contribution to the entity and governing body they serve. The book is rooted in research, including five years' work by the author as a Research Fellow of Nuffield College, Oxford.

Understanding IPv6 (Hardcover, 2005 ed.): Youngsong Mun, Hyewon Keren Lee Understanding IPv6 (Hardcover, 2005 ed.)
Youngsong Mun, Hyewon Keren Lee
R2,682 Discovery Miles 26 820 Ships in 18 - 22 working days

Covers the basic materials and up-to-date information to understand IPv6, including site local address often overlooked by most other books about IPv6 do not reflect this important fact.

Highlights Teredo, a transistion tool that permits web sites using two different protocols to interact, with complete-chapter coverage..

Since popular applications such as web service can not be operated without DNS. Chapter 9 covers modifications in DNS for IPv6 which other books rarely cover.

Other topics covered that make it a most up-to-date and valuable resource: hierarchical mobility management, fast handoff, and security features such as VPN traversal and firewall traversal.

Depth From Defocus: A Real Aperture Imaging Approach (Hardcover, 1999 ed.): Subhasis Chaudhuri Depth From Defocus: A Real Aperture Imaging Approach (Hardcover, 1999 ed.)
Subhasis Chaudhuri; Foreword by A.P. Pentland; A.N. Rajagopalan
R2,752 Discovery Miles 27 520 Ships in 18 - 22 working days

Computer vision is becoming increasingly important in several industrial applications such as automated inspection, robotic manipulations and autonomous vehicle guidance. These tasks are performed in a 3-D world and it is imperative to gather reliable information on the 3-D structure of the scene. This book is about passive techniques for depth recovery, where the scene is illuminated only by natural light as opposed to active methods where a special lighting device is used for scene illumination. Passive methods have a wider range of applicability and also correspond to the way humans infer 3-D structure from visual images.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Optimization of Manufacturing Systems…
Yingfeng Zhang, Fei Tao Paperback R3,249 R2,814 Discovery Miles 28 140
Tactile Internet - with…
Frank H. P. Fitzek, Shu-Chen Li, … Paperback R2,596 Discovery Miles 25 960
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,318 Discovery Miles 13 180
Intelligent Image and Video Compression…
David R. Bull, Fan Zhang Paperback R2,606 Discovery Miles 26 060
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, … Paperback R1,452 Discovery Miles 14 520
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,452 Discovery Miles 14 520
Introduction to Copper Cabling…
John Crisp Paperback R967 Discovery Miles 9 670
Digital Signal Processing and…
Dag Stranneby Paperback R1,371 Discovery Miles 13 710
Trustworthy Autonomic Computing
Thaddeus Eze Hardcover R2,997 R2,712 Discovery Miles 27 120
PC Interfacing
Pei An Paperback R1,213 Discovery Miles 12 130

 

Partners