![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > General
This book highlights cutting-edge research in the field of network science, offering scientists, researchers, students and practitioners a unique update on the latest advances in theory, together with a wealth of applications. It presents the peer-reviewed proceedings of the VII International Conference on Complex Networks and their Applications (COMPLEX NETWORKS 2018), which was held in Cambridge on December 11-13, 2018. The carefully selected papers cover a wide range of theoretical topics such as network models and measures; community structure and network dynamics; diffusion, epidemics and spreading processes; and resilience and control; as well as all the main network applications, including social and political networks; networks in finance and economics; biological and neuroscience networks; and technological networks.
Computer vision is becoming increasingly important in several industrial applications such as automated inspection, robotic manipulations and autonomous vehicle guidance. These tasks are performed in a 3-D world and it is imperative to gather reliable information on the 3-D structure of the scene. This book is about passive techniques for depth recovery, where the scene is illuminated only by natural light as opposed to active methods where a special lighting device is used for scene illumination. Passive methods have a wider range of applicability and also correspond to the way humans infer 3-D structure from visual images.
Asynchronous Transfer Mode (ATM) networks are widely considered to be the new generation of high speed communication systems both for broadband public information highways and for local and wide area private networks. ATM is designed to integrate existing and future voice, audio, image and data services. Moreover, ATM aims to simplify the complexity of switching and buffer management, to optimise intermediate node processing and buffering and to limit transmission delays. However, to support such diverse services on one integrated communication network, it is most essential, through careful engineering, to achieve a fruitful balance amongst the conflicting requirements of different quality of service constraints ensuring that one service does not have adverse implications on another. Over recent years there has been a great deal of progress in research and development of ATM technology, but there are still many interesting and important problems to be resolved such as traffic characterisation and control, routing and optimisation, ATM switching techniques and the provision of quality of service. This book presents thirty-two research papers, both from industry and academia, reflecting latest original achievements in the theory and practice of performance modelling of ATM networks worldwide. These papers were selected, subject to peer review, from those submitted as extended and revised versions out of fifty-nine shorter papers presented at the Second IFIP Workshop on "Performance Modelling and Evaluation of ATM Networks" July 4-7, 1994, Bradford University. At least three referees from the scientific committee and externally were involved in the selection of each paper.
This book focuses on the design and testing of large-scale, distributed signal processing systems, with a special emphasis on systems architecture, tooling and best practices. Architecture modeling, model checking, model-based evaluation and model-based design optimization occupy central roles. Target systems with resource constraints on processing, communication or energy supply require non-trivial methodologies to model their non-functional requirements, such as timeliness, robustness, lifetime and "evolution" capacity. Besides the theoretical foundations of the methodology, an engineering process and toolchain are described. Real-world cases illustrate the theory and practice tested by the authors in the course of the European project ARTEMIS DEMANES. The book can be used as a "cookbook" for designers and practitioners working with complex embedded systems like sensor networks for the structural integrity monitoring of steel bridges, and distributed micro-climate control systems for greenhouses and smart homes.
Covers the basic materials and up-to-date information to understand IPv6, including site local address often overlooked by most other books about IPv6 do not reflect this important fact. Highlights Teredo, a transistion tool that permits web sites using two different protocols to interact, with complete-chapter coverage.. Since popular applications such as web service can not be operated without DNS. Chapter 9 covers modifications in DNS for IPv6 which other books rarely cover. Other topics covered that make it a most up-to-date and valuable resource: hierarchical mobility management, fast handoff, and security features such as VPN traversal and firewall traversal.
This book both analyzes and synthesizes new cutting-edge theories and methods for future design implementations in smart cities through interdisciplinary synergizing of architecture, technology, and the Internet of Things (IoT). Implementation of IoT enables the collection and data exchange of objects embedded with electronics, software, sensors, and network connectivity. Recently IoT practices have moved into uniquely identifiable objects that are able to transfer data directly into networks. This book features new technologically advanced ideas, highlighting properties of smart future city networks. Chapter contributors include theorists, computer scientists, mathematicians, and interdisciplinary planners, who currently work on identifying theories, essential elements, and practices where the IoT can impact the formation of smart cities and sustainability via optimization, network analyses, data mining, mathematical modeling and engineering. Moreover, this book includes research-based theories and real world practices aimed toward graduate researchers, experts, practitioners and the general public interested in architecture, engineering, mathematical modeling, industrial design, computer science technologies, and related fields.
This book is an outcome of the second national conference on Communication, Cloud and Big Data (CCB) held during November 10-11, 2016 at Sikkim Manipal Institute of Technology. The nineteen chapters of the book are some of the accepted papers of CCB 2016. These chapters have undergone review process and then subsequent series of improvements. The book contains chapters on various aspects of communication, computation, cloud and big data. Routing in wireless sensor networks, modulation techniques, spectrum hole sensing in cognitive radio networks, antenna design, network security, Quality of Service issues in routing, medium access control protocol for Internet of Things, and TCP performance over different routing protocols used in mobile ad-hoc networks are some of the topics discussed in different chapters of this book which fall under the domain of communication. Moreover, there are chapters in this book discussing topics like applications of geographic information systems, use of radar for road safety, image segmentation and digital media processing, web content management system, human computer interaction, and natural language processing in the context of Bodo language. These chapters may fall under broader domain of computation. Issues like robot navigation exploring cloud technology, and application of big data analytics in higher education are also discussed in two different chapters. These chapters fall under the domains of cloud and big data, respectively.
This book provides a comprehensive coverage of the state-of-the-art in understanding media popularity and trends in online social networks through social multimedia signals. With insights from the study of popularity and sharing patterns of online media, trend spread in social media, social network analysis for multimedia and visualizing diffusion of media in online social networks. In particular, the book will address the following important issues: Understanding social network phenomena from a signal processing point of view; The existence and popularity of multimedia as shared and social media, how content or origin of sharing activity can affect its spread and popularity; The network-signal duality principle, i.e., how the signal tells us key properties of information diffusion in networks; The social signal penetration hypothesis, i.e., how the popularity of media in one domain can affect the popularity of media in another. The book will help researchers, developers and business (advertising/marketing) individuals to comprehend the potential in exploring social multimedia signals collected from social network data quantitatively from a signal processing perspective.
This updated and reorganized Fifth edition of Software Testing: A Craftsman's Approach continues to be a valuable reference for software testers, developers, and engineers, by applying the strong mathematics content of previous editions to a coherent treatment of software testing. Responding to instructor and student survey input, the authors have streamlined chapters and examples. The Fifth Edition: Has a new chapter on feature interaction testing that explores the feature interaction problem and explains how to reduce tests Uses Java instead of pseudo-code for all examples including structured and object-oriented ones Presents model-based development and provides an explanation of how to conduct testing within model-based development environments Explains testing in waterfall, iterative, and agile software development projects Explores test-driven development, reexamines all-pairs testing, and explains the four contexts of software testing Thoroughly revised and updated, Software Testing: A Craftsman's Approach, Fifth Edition is sure to become a standard reference for those who need to stay up to date with evolving technologies in software testing.
Telecommunication Network Intelligence is a state-of-the-art book that deals with issues related to the development, distribution, and management of intelligent capabilities and services in telecommunication networks. The book contains recent results of research and development in the following areas, among others: Platforms for Advanced Services; Active and Programmable Networks; Network Security, Intelligence, and Monitoring; Quality-of-Service Management; Mobile Agents; Dynamic Switching and Network Control; Services in Wireless Networks; Infrastructure for Flexible Services. Telecommunication Network Intelligence comprises the proceedings of SmartNet 2000, the Sixth International Conference on Intelligence in Networks, which was sponsored by the International Federation for Information Processing (IFIP) and held at the Vienna University of Technology, Vienna, Austria, in September 2000.
ATM Network Performance describes a unified approach to ATM network management. The focus is on satisfying quality-of-service requirements for individual B-ISDN connections. For an ATM network of output-buffer switches, the author describes how the basic network resources (switch buffer memory and link transmission bandwidth) should be allocated to achieve the required quality-of-service connections. The performance of proposed bandwidth scheduling policies is evaluated. Both single node and end-to-end performance results are given. In particular, these results are applied to resource provisioning problems for prerecorded (stored) video and video teleconferencing. The flow control problem for available bit rate traffic is also described. This book is intended for a one-term course in performance of Broadband Integrated-Services Digital Networks (B-ISDNs) based on a type of packet-switched communication network called Asynchronous Transfer Mode (ATM). The level of presentation is at the first year of graduate studies and for professionals working in the field, but it may be accessible to senior undergraduates as well. Some familiarity with ATM standards is assumed as such standards are only briefly outlined. All of the required background in discrete-time queueing theory is supplied. Exercises are given at the end of chapters. Solutions and/or hints to selected exercises are given in an Appendix.
"Propagation, which looks at spreading in complex networks, can be seen from many viewpoints; it is undesirable, or desirable, controllable, the mechanisms generating that propagation can be the topic of interest, but in the end all depends on the setting. This book covers leading research on a wide spectrum of propagation phenomenon and the techniques currently used in its modelling, prediction, analysis and control. Fourteen papers range over topics including epidemic models, models for trust inference, coverage strategies for networks, vehicle flow propagation, bio-inspired routing algorithms, P2P botnet attacks and defences, fault propagation in gene-cellular networks, malware propagation for mobile networks, information propagation in crisis situations, financial contagion in interbank networks, and finally how to maximize the spread of influence in social networks. The compendium will be of interest to researchers, those working in social networking, communications and finance and is aimed at providing a base point for further studies on current research. Above all, by bringing together research from such diverse fields, the book seeks to cross-pollinate ideas, and give the reader a glimpse of the breath of current research."
This thesis presents a significant contribution to decentralized resource allocation problems with strategic agents. The study focused on three classes of problems arising in communication networks. (C1). Unicast service provisioning in wired networks. (C2). Multi-rate multicast service provisioning in wired networks. (C3). Power allocation and spectrum sharing in multi-user multi-channel wireless communication systems. Problems in (C1) are market problems; problems in (C2) are a combination of markets and public goods; problems in (C3) are public goods. Dr. Kakhbod developed game forms/mechanisms for unicast and multi-rate multicast service provisioning that possess specific properties. First, the allocations corresponding to all Nash equilibria (NE) of the games induced by the mechanisms are optimal solutions of the corresponding centralized allocation problems, where the objective is the maximization of the sum of the agents' utilities. Second, the strategic agents voluntarily participate in the allocation process. Third, the budget is balanced at the allocations corresponding to all NE of the game induced by the mechanism as well as at all other feasible allocations. For the power allocation and spectrum sharing problem, he developed a game form that possesses the second and third properties as detailed above along with a fourth property: the allocations corresponding to all NE of the game induced by the mechanism are Pareto optimal. The thesis contributes to the state of the art of mechanism design theory. In particular, designing efficient mechanisms for the class of problems that are a combination of markets and public goods, for the first time, have been addressed in this thesis. The exposition, although highly rigorous and technical, is elegant and insightful which makes this thesis work easily accessible to those just entering this field and will also be much appreciated by experts in the field.
Storage Management in Data Centers helps administrators tackle the complexity of data center mass storage. It shows how to exploit the potential of Veritas Storage Foundation by conveying information about the design concepts of the software as well as its architectural background. Rather than merely showing how to use Storage Foundation, it explains why to use it in a particular way, along with what goes on inside. Chapters are split into three sections: An introductory part for the novice user, a full-featured part for the experienced, and a technical deep dive for the seasoned expert. An extensive troubleshooting section shows how to fix problems with volumes, plexes, disks and disk groups. A snapshot chapter gives detailed instructions on how to use the most advanced point-in-time copies. A tuning chapter will help you speed up and benchmark your volumes. And a special chapter on split data centers discusses latency issues as well as remote mirroring mechanisms and cross-site volume maintenance. All topics are covered with the technical know how gathered from an aggregate thirty years of experience in consulting and training in data centers all over the world.
In this book, speech transmission quality is modeled on the basis
of perceptual dimensions. The author identifies those dimensions
that are relevant for today's public-switched and packet-based
telecommunication systems, regarding the complete transmission path
from the mouth of the speaker to the ear of the listener. Both
narrowband (300-3400 Hz) as well as wideband (50-7000 Hz) speech
transmission is taken into account. A new analytical assessment
method is presented that allows the dimensions to be rated by
non-expert listeners in a direct way. Due to the efficiency of the
test method, a relatively large number of stimuli can be assessed
in auditory tests. The test method is applied in two auditory
experiments. The book gives the evidence that this test method
provides meaningful and reliable results. The resulting dimension
scores together with respective overall quality ratings form the
basis for a new parametric model for the quality estimation of
transmitted speech based on the perceptual dimensions. In a
two-step model approach, instrumental dimension models estimate
dimension impairment factors in a first step. The resulting
dimension estimates are combined by a Euclidean integration
function in a second step in order to provide an estimate of the
total impairment.
1.1 Introduction Each year corporations spend millions of dollars training and educating their - ployees. On average, these corporations spend approximately one thousand dollars 1 per employee each year. As businesses struggle to stay on the cutting-edge and to keep their employees educated and up-to-speed with professional trends as well as ever-changing information needs, it is easy to see why corporations are investing more time and money than ever in their efforts to support their employees' prof- sional development. During the Industrial Age, companies strove to control natural resources. The more resources they controlled, the greater their competitive edge in the mark- place. Senge (1993) refers to this kind of organization as resource-based. In the Information Age, companies must create, disseminate, and effectively use kno- edge within their organization in order to maintain their market share. Senge - scribes this kind of organization as knowledge-based. Given that knowledge-based organizations willcontinuetobeadrivingforcebehindtheeconomy, itisimperative that corporations support the knowledge and information needs of their workers.
Ethics and Human Behaviour in ICT Development discusses ethics in a professional context and encourages readers to self-assessment of their own behaviour. It provides thought-provoking accounts of the little-known early history of technological development in information and communication technology (ICT) and the automation industry in Poland, with a focus on Wroclaw. The book provides a framework for understanding the relationship between ethics and behaviour, and analyses critically ethical and behavioural issues in challenging workplaces and social contexts. It includes: case studies from around the world, especially Poland, which illustrate the relationships between human behaviour and ethics; biographies of successful Polish ICT and automation leading designers; analysis of case studies of human behaviour and ethics in challenging industrial development and other environments; and illustrative practical applications alongside the theory of human behaviour and ethics. The authors demonstrate the ingenuity of the early Polish designers, programmers and other specialists in overcoming the shortage of components caused by import embargoes to enable Poland to develop its own computer industry. An example of this is Elwro, formerly the largest manufacturer of computers in Poland. The discussion of its growth illustrates the potential of human creativity to overcome problems. The discussion of its fall highlights the importance of ethical approaches to technology transfer and the dangers of a colonialist mentality. The book is designed for engineers, computer scientists, researchers and professionals alike, as well as being of interest for those broadly concerned with ethics and human behaviour.
Set up Skype on Windows, Mac OSŪ X, or PocketPC See how to use Skype for secure chats and to connect using SkypeIn and SkypeOut Here's the "fun and easy way" to understand all the hype about Skype and make this cool alternative communication system work for you! You'll get great advice about hardware, directions for downloading and installing Skype, ideas for using Skype in your business, and the lowdown on making Skype calls to people with old-fashioned phones. Discover how to Install Skype and start making calls Create a contacts list Set up voicemail and call forwarding Use Skype for worldwide conference calls and Skypecasting Enhance Skype with Bluetooth, Wi-Fi wireless, and video
In today's rapidly changing global work environment, all workers directly experience increased organizational complexity. Companies are functionally distributed, many across the globe. Intense competition for markets and margins makes adaptiveness and innovation imperative. Information and communication technologies (ICT) are pervasive and fundamental infrastructures, their use deeply integrated into work processes. Workers collaborate electronically with co-workers they may never meet face-to-face or with employees of other companies. New boundaries of time, space, business unit, culture, company partnerships, and software tools are driving the adoption of a variety of novel organizational forms. On a macro level, these changes have started to reshape society, leading some to speak of the "Network Society" and "The Information Age." This book begins with consideration of possible frameworks for understanding virtuality and virtualization. It includes papers that consider ways of analyzing virtual work in terms of work processes. Following that, the book takes a look at group processes within virtual teams, focusing in particular on leadership and group identity. The book goes on to consider the role of knowledge in virtual settings and other implications of the role of fiction in structuring virtuality.
The advent of the World Wide Web has changed the perspectives of groupware systems. The interest and deployment of Internet and intranet groupware solutions is growing rapidly, not just in academic circles but also in the commercial arena. The first generation of Web-based groupware tools has already started to emerge, and leading groupware vendors are urgently adapting their products for compatibility and integration with Web technologies. The focus of Groupware and the World Wide Web is to explore the potential for Web-based groupware. This book includes an analysis of the key characteristics of the Web, presenting reasons for its success, and describes developments of a diverse range of Web-based groupware systems. An emphasis on the technical obstacles and challenges is implemented by more analytical discussions and perspectives, including that of Information Technology managers looking to deploy groupware solutions within their organizations. Written by experts from different backgrounds - academic and commercial, technical and organizational - this book provides a unique overview of and insight into current issues and future possibilities concerning extension of the World Wide Web for group working.
"In today's networked societies, a key factor of the social and economic success is the capability to exchange, transfer, and share knowledge. In the wide-ranging area of knowledge management, the issue of knowledge exchange in networked environments emerges in several application fields, and is treated with different approaches. Building the Knowledge Society on the Internet: Sharing and Exchanging Knowledge in Networked Environments proposes a vast panorama of research on the topic while presenting a variety of viewpoints, approaches, and indications of the shared elements intended as the foundations of an emerging and fascinating multidisciplinary field."
The increasing demand for sophisticated network applications, allied to the growth of the Internet traffic, has lead to great efforts in the search of improvements in data transmission technologies with the intention of satisfying the increasing demand for bandwidth. So far as optical networking is concerned, WDM (Wavelength Division Multiplexing) appears as the main advance in the transmission area, because it allows transmission rates near to the theoretical limit of optical fibers, of the order of dozens of terabits a second [1]. An essential issue in optical network design is defining how the network will be controlled, that is, what type of signalling will be responsible for resource reservation, route determination and fault handling, among other functions that constitute the control plane. Label switching, which in IP networks is exemplified by MPLS (Multiprotocol Label Switching) [2], was extended through GMPLS (Generalized Multiprotocol Label Switching) [3] to operate with several different network technologies, where the label can be represented in other ways, for example, as time-slots in TDM networks, as physical switch ports and as wavelengths (lambdas) in WDM networks.
A major, comprehensive professional text/reference for designing and maintaining security and reliability. |
You may like...
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, …
Paperback
R1,452
Discovery Miles 14 520
Research Anthology on Architectures…
Information R Management Association
Hardcover
R12,620
Discovery Miles 126 200
Research Anthology on Architectures…
Information R Management Association
Hardcover
R12,630
Discovery Miles 126 300
The Host in the Machine - Examining the…
Angela Thomas-Jones
Paperback
R1,318
Discovery Miles 13 180
|