0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (47)
  • R250 - R500 (215)
  • R500+ (8,035)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > General

Complex Networks and Their Applications VII - Volume 1 Proceedings The 7th International Conference on Complex Networks and... Complex Networks and Their Applications VII - Volume 1 Proceedings The 7th International Conference on Complex Networks and Their Applications COMPLEX NETWORKS 2018 (Hardcover, 1st ed. 2019)
Luca Maria Aiello, Chantal Cherifi, Hocine Cherifi, Renaud Lambiotte, Pietro Lio, …
R5,340 Discovery Miles 53 400 Ships in 18 - 22 working days

This book highlights cutting-edge research in the field of network science, offering scientists, researchers, students and practitioners a unique update on the latest advances in theory, together with a wealth of applications. It presents the peer-reviewed proceedings of the VII International Conference on Complex Networks and their Applications (COMPLEX NETWORKS 2018), which was held in Cambridge on December 11-13, 2018. The carefully selected papers cover a wide range of theoretical topics such as network models and measures; community structure and network dynamics; diffusion, epidemics and spreading processes; and resilience and control; as well as all the main network applications, including social and political networks; networks in finance and economics; biological and neuroscience networks; and technological networks.

Depth From Defocus: A Real Aperture Imaging Approach (Hardcover, 1999 ed.): Subhasis Chaudhuri Depth From Defocus: A Real Aperture Imaging Approach (Hardcover, 1999 ed.)
Subhasis Chaudhuri; Foreword by A.P. Pentland; A.N. Rajagopalan
R2,752 Discovery Miles 27 520 Ships in 18 - 22 working days

Computer vision is becoming increasingly important in several industrial applications such as automated inspection, robotic manipulations and autonomous vehicle guidance. These tasks are performed in a 3-D world and it is imperative to gather reliable information on the 3-D structure of the scene. This book is about passive techniques for depth recovery, where the scene is illuminated only by natural light as opposed to active methods where a special lighting device is used for scene illumination. Passive methods have a wider range of applicability and also correspond to the way humans infer 3-D structure from visual images.

Performance Modelling and Evaluation of ATM Networks (Hardcover, 1995 ed.): Demetres D. Kouvatsos Performance Modelling and Evaluation of ATM Networks (Hardcover, 1995 ed.)
Demetres D. Kouvatsos
R7,979 Discovery Miles 79 790 Ships in 18 - 22 working days

Asynchronous Transfer Mode (ATM) networks are widely considered to be the new generation of high speed communication systems both for broadband public information highways and for local and wide area private networks. ATM is designed to integrate existing and future voice, audio, image and data services. Moreover, ATM aims to simplify the complexity of switching and buffer management, to optimise intermediate node processing and buffering and to limit transmission delays. However, to support such diverse services on one integrated communication network, it is most essential, through careful engineering, to achieve a fruitful balance amongst the conflicting requirements of different quality of service constraints ensuring that one service does not have adverse implications on another. Over recent years there has been a great deal of progress in research and development of ATM technology, but there are still many interesting and important problems to be resolved such as traffic characterisation and control, routing and optimisation, ATM switching techniques and the provision of quality of service. This book presents thirty-two research papers, both from industry and academia, reflecting latest original achievements in the theory and practice of performance modelling of ATM networks worldwide. These papers were selected, subject to peer review, from those submitted as extended and revised versions out of fifty-nine shorter papers presented at the Second IFIP Workshop on "Performance Modelling and Evaluation of ATM Networks" July 4-7, 1994, Bradford University. At least three referees from the scientific committee and externally were involved in the selection of each paper.

Runtime Reconfiguration in Networked Embedded Systems - Design and Testing Practices (Hardcover, 1st ed. 2016): Zoltan Papp,... Runtime Reconfiguration in Networked Embedded Systems - Design and Testing Practices (Hardcover, 1st ed. 2016)
Zoltan Papp, George Exarchakos
R3,290 Discovery Miles 32 900 Ships in 10 - 15 working days

This book focuses on the design and testing of large-scale, distributed signal processing systems, with a special emphasis on systems architecture, tooling and best practices. Architecture modeling, model checking, model-based evaluation and model-based design optimization occupy central roles. Target systems with resource constraints on processing, communication or energy supply require non-trivial methodologies to model their non-functional requirements, such as timeliness, robustness, lifetime and "evolution" capacity. Besides the theoretical foundations of the methodology, an engineering process and toolchain are described. Real-world cases illustrate the theory and practice tested by the authors in the course of the European project ARTEMIS DEMANES. The book can be used as a "cookbook" for designers and practitioners working with complex embedded systems like sensor networks for the structural integrity monitoring of steel bridges, and distributed micro-climate control systems for greenhouses and smart homes.

Understanding IPv6 (Hardcover, 2005 ed.): Youngsong Mun, Hyewon Keren Lee Understanding IPv6 (Hardcover, 2005 ed.)
Youngsong Mun, Hyewon Keren Lee
R2,682 Discovery Miles 26 820 Ships in 18 - 22 working days

Covers the basic materials and up-to-date information to understand IPv6, including site local address often overlooked by most other books about IPv6 do not reflect this important fact.

Highlights Teredo, a transistion tool that permits web sites using two different protocols to interact, with complete-chapter coverage..

Since popular applications such as web service can not be operated without DNS. Chapter 9 covers modifications in DNS for IPv6 which other books rarely cover.

Other topics covered that make it a most up-to-date and valuable resource: hierarchical mobility management, fast handoff, and security features such as VPN traversal and firewall traversal.

Smart City Networks - Through the Internet of Things (Hardcover, 1st ed. 2017): Stamatina Th. Rassia, Panos M. Pardalos Smart City Networks - Through the Internet of Things (Hardcover, 1st ed. 2017)
Stamatina Th. Rassia, Panos M. Pardalos
R3,982 Discovery Miles 39 820 Ships in 10 - 15 working days

This book both analyzes and synthesizes new cutting-edge theories and methods for future design implementations in smart cities through interdisciplinary synergizing of architecture, technology, and the Internet of Things (IoT). Implementation of IoT enables the collection and data exchange of objects embedded with electronics, software, sensors, and network connectivity. Recently IoT practices have moved into uniquely identifiable objects that are able to transfer data directly into networks. This book features new technologically advanced ideas, highlighting properties of smart future city networks. Chapter contributors include theorists, computer scientists, mathematicians, and interdisciplinary planners, who currently work on identifying theories, essential elements, and practices where the IoT can impact the formation of smart cities and sustainability via optimization, network analyses, data mining, mathematical modeling and engineering. Moreover, this book includes research-based theories and real world practices aimed toward graduate researchers, experts, practitioners and the general public interested in architecture, engineering, mathematical modeling, industrial design, computer science technologies, and related fields.

Advances in Communication, Cloud, and Big Data - Proceedings of 2nd National Conference on CCB 2016 (Hardcover, 1st ed. 2019):... Advances in Communication, Cloud, and Big Data - Proceedings of 2nd National Conference on CCB 2016 (Hardcover, 1st ed. 2019)
Hiren Kumar Deva Sarma, Samarjeet Borah, Nitul Dutta
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book is an outcome of the second national conference on Communication, Cloud and Big Data (CCB) held during November 10-11, 2016 at Sikkim Manipal Institute of Technology. The nineteen chapters of the book are some of the accepted papers of CCB 2016. These chapters have undergone review process and then subsequent series of improvements. The book contains chapters on various aspects of communication, computation, cloud and big data. Routing in wireless sensor networks, modulation techniques, spectrum hole sensing in cognitive radio networks, antenna design, network security, Quality of Service issues in routing, medium access control protocol for Internet of Things, and TCP performance over different routing protocols used in mobile ad-hoc networks are some of the topics discussed in different chapters of this book which fall under the domain of communication. Moreover, there are chapters in this book discussing topics like applications of geographic information systems, use of radar for road safety, image segmentation and digital media processing, web content management system, human computer interaction, and natural language processing in the context of Bodo language. These chapters may fall under broader domain of computation. Issues like robot navigation exploring cloud technology, and application of big data analytics in higher education are also discussed in two different chapters. These chapters fall under the domains of cloud and big data, respectively.

Social Multimedia Signals - A Signal Processing Approach to Social Network Phenomena (Hardcover, 2015 ed.): Suman Deb Roy,... Social Multimedia Signals - A Signal Processing Approach to Social Network Phenomena (Hardcover, 2015 ed.)
Suman Deb Roy, Wenjun Zeng
R3,812 R3,281 Discovery Miles 32 810 Save R531 (14%) Ships in 10 - 15 working days

This book provides a comprehensive coverage of the state-of-the-art in understanding media popularity and trends in online social networks through social multimedia signals. With insights from the study of popularity and sharing patterns of online media, trend spread in social media, social network analysis for multimedia and visualizing diffusion of media in online social networks. In particular, the book will address the following important issues: Understanding social network phenomena from a signal processing point of view; The existence and popularity of multimedia as shared and social media, how content or origin of sharing activity can affect its spread and popularity; The network-signal duality principle, i.e., how the signal tells us key properties of information diffusion in networks; The social signal penetration hypothesis, i.e., how the popularity of media in one domain can affect the popularity of media in another. The book will help researchers, developers and business (advertising/marketing) individuals to comprehend the potential in exploring social multimedia signals collected from social network data quantitatively from a signal processing perspective.

Telegeoinformatics - Location-Based Computing and Services (Hardcover): Hassan A. Karimi Telegeoinformatics - Location-Based Computing and Services (Hardcover)
Hassan A. Karimi
R5,226 Discovery Miles 52 260 Ships in 10 - 15 working days


Author Biography:
Dr. Hassan A. Karimi is Assistant Professor and Director of Geoinformatics Program in the Department of Information Science and Telecommunications at the University of Pittsburgh. His main research interests include geospatial information systems (GISs), Global Positioning System (GPS), remote sensing, location-based computing and services, mobile computing, spatial databases, spatial algorithms, computational geometry, parallel/distributed computing, and spatial uncertainty measurement and modelling.

Dr. Amin Hammad is a Visiting Scholar at Carnegie Mellon University and University of Pittsburgh. Prior to his current position, he was Assistant Professor in the Department of Civil Engineering of Nagoya University, Japan, for six years. His main research interest is the application of geomatics and mobile computing in civil engineering and urban planning.

Both editors have strong background in the theme of the proposed book. They have been actively engaged in research and teaching related to the subjects in the book.

Elastic Load Balancing Application Load Balancers (Hardcover): Documentation Team Elastic Load Balancing Application Load Balancers (Hardcover)
Documentation Team
R889 Discovery Miles 8 890 Ships in 18 - 22 working days
Software Testing - A Craftsman's Approach, Fifth Edition (Paperback, 5th edition): Paul C. Jorgensen, Byron DeVries Software Testing - A Craftsman's Approach, Fifth Edition (Paperback, 5th edition)
Paul C. Jorgensen, Byron DeVries
R1,317 Discovery Miles 13 170 Ships in 9 - 17 working days

This updated and reorganized Fifth edition of Software Testing: A Craftsman's Approach continues to be a valuable reference for software testers, developers, and engineers, by applying the strong mathematics content of previous editions to a coherent treatment of software testing. Responding to instructor and student survey input, the authors have streamlined chapters and examples. The Fifth Edition: Has a new chapter on feature interaction testing that explores the feature interaction problem and explains how to reduce tests Uses Java instead of pseudo-code for all examples including structured and object-oriented ones Presents model-based development and provides an explanation of how to conduct testing within model-based development environments Explains testing in waterfall, iterative, and agile software development projects Explores test-driven development, reexamines all-pairs testing, and explains the four contexts of software testing Thoroughly revised and updated, Software Testing: A Craftsman's Approach, Fifth Edition is sure to become a standard reference for those who need to stay up to date with evolving technologies in software testing.

Telecommunication Network Intelligence - IFIP TC6/WG6.7 Sixth International Conference on Intelligence in Networks (SmartNet... Telecommunication Network Intelligence - IFIP TC6/WG6.7 Sixth International Conference on Intelligence in Networks (SmartNet 2000), September 18-22, 2000, Vienna, Austria (Hardcover, 1997 ed.)
Harmen R.Van As
R5,490 Discovery Miles 54 900 Ships in 18 - 22 working days

Telecommunication Network Intelligence is a state-of-the-art book that deals with issues related to the development, distribution, and management of intelligent capabilities and services in telecommunication networks. The book contains recent results of research and development in the following areas, among others: Platforms for Advanced Services; Active and Programmable Networks; Network Security, Intelligence, and Monitoring; Quality-of-Service Management; Mobile Agents; Dynamic Switching and Network Control; Services in Wireless Networks; Infrastructure for Flexible Services. Telecommunication Network Intelligence comprises the proceedings of SmartNet 2000, the Sixth International Conference on Intelligence in Networks, which was sponsored by the International Federation for Information Processing (IFIP) and held at the Vienna University of Technology, Vienna, Austria, in September 2000.

ATM Network Performance (Hardcover, 1996 ed.): George Kesidis ATM Network Performance (Hardcover, 1996 ed.)
George Kesidis
R2,737 Discovery Miles 27 370 Ships in 18 - 22 working days

ATM Network Performance describes a unified approach to ATM network management. The focus is on satisfying quality-of-service requirements for individual B-ISDN connections. For an ATM network of output-buffer switches, the author describes how the basic network resources (switch buffer memory and link transmission bandwidth) should be allocated to achieve the required quality-of-service connections. The performance of proposed bandwidth scheduling policies is evaluated. Both single node and end-to-end performance results are given. In particular, these results are applied to resource provisioning problems for prerecorded (stored) video and video teleconferencing. The flow control problem for available bit rate traffic is also described. This book is intended for a one-term course in performance of Broadband Integrated-Services Digital Networks (B-ISDNs) based on a type of packet-switched communication network called Asynchronous Transfer Mode (ATM). The level of presentation is at the first year of graduate studies and for professionals working in the field, but it may be accessible to senior undergraduates as well. Some familiarity with ATM standards is assumed as such standards are only briefly outlined. All of the required background in discrete-time queueing theory is supplied. Exercises are given at the end of chapters. Solutions and/or hints to selected exercises are given in an Appendix.

Propagation Phenomena in Real World Networks (Hardcover, 2015 ed.): Dariusz Krol, Damien Fay, Bogdan Gabrys Propagation Phenomena in Real World Networks (Hardcover, 2015 ed.)
Dariusz Krol, Damien Fay, Bogdan Gabrys
R4,293 R3,492 Discovery Miles 34 920 Save R801 (19%) Ships in 10 - 15 working days

"Propagation, which looks at spreading in complex networks, can be seen from many viewpoints; it is undesirable, or desirable, controllable, the mechanisms generating that propagation can be the topic of interest, but in the end all depends on the setting. This book covers leading research on a wide spectrum of propagation phenomenon and the techniques currently used in its modelling, prediction, analysis and control. Fourteen papers range over topics including epidemic models, models for trust inference, coverage strategies for networks, vehicle flow propagation, bio-inspired routing algorithms, P2P botnet attacks and defences, fault propagation in gene-cellular networks, malware propagation for mobile networks, information propagation in crisis situations, financial contagion in interbank networks, and finally how to maximize the spread of influence in social networks. The compendium will be of interest to researchers, those working in social networking, communications and finance and is aimed at providing a base point for further studies on current research. Above all, by bringing together research from such diverse fields, the book seeks to cross-pollinate ideas, and give the reader a glimpse of the breath of current research."

Resource Allocation in Decentralized Systems with Strategic Agents - An Implementation Theory Approach (Hardcover, 2013 ed.):... Resource Allocation in Decentralized Systems with Strategic Agents - An Implementation Theory Approach (Hardcover, 2013 ed.)
Ali Kakhbod
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This thesis presents a significant contribution to decentralized resource allocation problems with strategic agents. The study focused on three classes of problems arising in communication networks. (C1). Unicast service provisioning in wired networks. (C2). Multi-rate multicast service provisioning in wired networks. (C3). Power allocation and spectrum sharing in multi-user multi-channel wireless communication systems. Problems in (C1) are market problems; problems in (C2) are a combination of markets and public goods; problems in (C3) are public goods. Dr. Kakhbod developed game forms/mechanisms for unicast and multi-rate multicast service provisioning that possess specific properties. First, the allocations corresponding to all Nash equilibria (NE) of the games induced by the mechanisms are optimal solutions of the corresponding centralized allocation problems, where the objective is the maximization of the sum of the agents' utilities. Second, the strategic agents voluntarily participate in the allocation process. Third, the budget is balanced at the allocations corresponding to all NE of the game induced by the mechanism as well as at all other feasible allocations. For the power allocation and spectrum sharing problem, he developed a game form that possesses the second and third properties as detailed above along with a fourth property: the allocations corresponding to all NE of the game induced by the mechanism are Pareto optimal. The thesis contributes to the state of the art of mechanism design theory. In particular, designing efficient mechanisms for the class of problems that are a combination of markets and public goods, for the first time, have been addressed in this thesis. The exposition, although highly rigorous and technical, is elegant and insightful which makes this thesis work easily accessible to those just entering this field and will also be much appreciated by experts in the field.

Storage Management in Data Centers - Understanding, Exploiting, Tuning, and Troubleshooting Veritas Storage Foundation... Storage Management in Data Centers - Understanding, Exploiting, Tuning, and Troubleshooting Veritas Storage Foundation (Hardcover, 2009 ed.)
Volker Herminghaus, Albrecht Scriba
R2,298 R1,682 Discovery Miles 16 820 Save R616 (27%) Ships in 10 - 15 working days

Storage Management in Data Centers helps administrators tackle the complexity of data center mass storage. It shows how to exploit the potential of Veritas Storage Foundation by conveying information about the design concepts of the software as well as its architectural background. Rather than merely showing how to use Storage Foundation, it explains why to use it in a particular way, along with what goes on inside. Chapters are split into three sections: An introductory part for the novice user, a full-featured part for the experienced, and a technical deep dive for the seasoned expert. An extensive troubleshooting section shows how to fix problems with volumes, plexes, disks and disk groups. A snapshot chapter gives detailed instructions on how to use the most advanced point-in-time copies. A tuning chapter will help you speed up and benchmark your volumes. And a special chapter on split data centers discusses latency issues as well as remote mirroring mechanisms and cross-site volume maintenance. All topics are covered with the technical know how gathered from an aggregate thirty years of experience in consulting and training in data centers all over the world.

Dimension-based Quality Modeling of Transmitted Speech (Hardcover, 2013 ed.): Marcel Waltermann Dimension-based Quality Modeling of Transmitted Speech (Hardcover, 2013 ed.)
Marcel Waltermann
R4,112 R3,311 Discovery Miles 33 110 Save R801 (19%) Ships in 10 - 15 working days

In this book, speech transmission quality is modeled on the basis of perceptual dimensions. The author identifies those dimensions that are relevant for today's public-switched and packet-based telecommunication systems, regarding the complete transmission path from the mouth of the speaker to the ear of the listener. Both narrowband (300-3400 Hz) as well as wideband (50-7000 Hz) speech transmission is taken into account. A new analytical assessment method is presented that allows the dimensions to be rated by non-expert listeners in a direct way. Due to the efficiency of the test method, a relatively large number of stimuli can be assessed in auditory tests. The test method is applied in two auditory experiments. The book gives the evidence that this test method provides meaningful and reliable results. The resulting dimension scores together with respective overall quality ratings form the basis for a new parametric model for the quality estimation of transmitted speech based on the perceptual dimensions. In a two-step model approach, instrumental dimension models estimate dimension impairment factors in a first step. The resulting dimension estimates are combined by a Euclidean integration function in a second step in order to provide an estimate of the total impairment.

Communities of Practice - Fostering Peer-to-Peer Learning and Informal Knowledge Sharing in the Work Place (Hardcover, 2009... Communities of Practice - Fostering Peer-to-Peer Learning and Informal Knowledge Sharing in the Work Place (Hardcover, 2009 ed.)
Noriko Hara
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

1.1 Introduction Each year corporations spend millions of dollars training and educating their - ployees. On average, these corporations spend approximately one thousand dollars 1 per employee each year. As businesses struggle to stay on the cutting-edge and to keep their employees educated and up-to-speed with professional trends as well as ever-changing information needs, it is easy to see why corporations are investing more time and money than ever in their efforts to support their employees' prof- sional development. During the Industrial Age, companies strove to control natural resources. The more resources they controlled, the greater their competitive edge in the mark- place. Senge (1993) refers to this kind of organization as resource-based. In the Information Age, companies must create, disseminate, and effectively use kno- edge within their organization in order to maintain their market share. Senge - scribes this kind of organization as knowledge-based. Given that knowledge-based organizations willcontinuetobeadrivingforcebehindtheeconomy, itisimperative that corporations support the knowledge and information needs of their workers.

Ethics and Human Behaviour in ICT Development - International Case Studies with a Focus on Poland (Hardcover, 1st ed. 2023):... Ethics and Human Behaviour in ICT Development - International Case Studies with a Focus on Poland (Hardcover, 1st ed. 2023)
Marion Hersh, JÃģzef B. Lewoc
R3,659 Discovery Miles 36 590 Ships in 10 - 15 working days

Ethics and Human Behaviour in ICT Development discusses ethics in a professional context and encourages readers to self-assessment of their own behaviour. It provides thought-provoking accounts of the little-known early history of technological development in information and communication technology (ICT) and the automation industry in Poland, with a focus on Wroclaw. The book provides a framework for understanding the relationship between ethics and behaviour, and analyses critically ethical and behavioural issues in challenging workplaces and social contexts. It includes: case studies from around the world, especially Poland, which illustrate the relationships between human behaviour and ethics; biographies of successful Polish ICT and automation leading designers; analysis of case studies of human behaviour and ethics in challenging industrial development and other environments; and illustrative practical applications alongside the theory of human behaviour and ethics. The authors demonstrate the ingenuity of the early Polish designers, programmers and other specialists in overcoming the shortage of components caused by import embargoes to enable Poland to develop its own computer industry. An example of this is Elwro, formerly the largest manufacturer of computers in Poland. The discussion of its growth illustrates the potential of human creativity to overcome problems. The discussion of its fall highlights the importance of ethical approaches to technology transfer and the dangers of a colonialist mentality. The book is designed for engineers, computer scientists, researchers and professionals alike, as well as being of interest for those broadly concerned with ethics and human behaviour.

Skype For Dummies (Paperback): L. Abdulezer Skype For Dummies (Paperback)
L. Abdulezer
R661 R555 Discovery Miles 5 550 Save R106 (16%) Ships in 10 - 15 working days

Set up Skype on Windows, Mac OSŪ X, or PocketPC

See how to use Skype for secure chats and to connect using SkypeIn and SkypeOut

Here's the "fun and easy way" to understand all the hype about Skype and make this cool alternative communication system work for you! You'll get great advice about hardware, directions for downloading and installing Skype, ideas for using Skype in your business, and the lowdown on making Skype calls to people with old-fashioned phones.

Discover how to Install Skype and start making calls Create a contacts list Set up voicemail and call forwarding Use Skype for worldwide conference calls and Skypecasting Enhance Skype with Bluetooth, Wi-Fi wireless, and video

Virtuality and Virtualization - Proceedings of the International Federation of Information Processing Working Groups 8.2 on... Virtuality and Virtualization - Proceedings of the International Federation of Information Processing Working Groups 8.2 on Information Systems and Organizations and 9.5 on Virtuality and Society, July 29-31, 2007, Portland, Oregon, USA (Hardcover, 2007 ed.)
Kevin Crowston, Sandra Sieber, Eleanor Wynn
R2,712 Discovery Miles 27 120 Ships in 18 - 22 working days

In today's rapidly changing global work environment, all workers directly experience increased organizational complexity. Companies are functionally distributed, many across the globe. Intense competition for markets and margins makes adaptiveness and innovation imperative. Information and communication technologies (ICT) are pervasive and fundamental infrastructures, their use deeply integrated into work processes. Workers collaborate electronically with co-workers they may never meet face-to-face or with employees of other companies. New boundaries of time, space, business unit, culture, company partnerships, and software tools are driving the adoption of a variety of novel organizational forms. On a macro level, these changes have started to reshape society, leading some to speak of the "Network Society" and "The Information Age."

This book begins with consideration of possible frameworks for understanding virtuality and virtualization. It includes papers that consider ways of analyzing virtual work in terms of work processes. Following that, the book takes a look at group processes within virtual teams, focusing in particular on leadership and group identity. The book goes on to consider the role of knowledge in virtual settings and other implications of the role of fiction in structuring virtuality.

Groupware and the World Wide Web (Hardcover, Reprinted from COMPUTER SUPPORTED COOPERATIVE WORK, 6, 1997): Richard Bentley, Uwe... Groupware and the World Wide Web (Hardcover, Reprinted from COMPUTER SUPPORTED COOPERATIVE WORK, 6, 1997)
Richard Bentley, Uwe Busbach, David Kerr, Klaas Sikkel
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

The advent of the World Wide Web has changed the perspectives of groupware systems. The interest and deployment of Internet and intranet groupware solutions is growing rapidly, not just in academic circles but also in the commercial arena. The first generation of Web-based groupware tools has already started to emerge, and leading groupware vendors are urgently adapting their products for compatibility and integration with Web technologies. The focus of Groupware and the World Wide Web is to explore the potential for Web-based groupware. This book includes an analysis of the key characteristics of the Web, presenting reasons for its success, and describes developments of a diverse range of Web-based groupware systems. An emphasis on the technical obstacles and challenges is implemented by more analytical discussions and perspectives, including that of Information Technology managers looking to deploy groupware solutions within their organizations. Written by experts from different backgrounds - academic and commercial, technical and organizational - this book provides a unique overview of and insight into current issues and future possibilities concerning extension of the World Wide Web for group working.

Building the Knowledge Society on the Internet - Sharing and Exchanging Knowledge in Networked Environments (Hardcover): Ettore... Building the Knowledge Society on the Internet - Sharing and Exchanging Knowledge in Networked Environments (Hardcover)
Ettore Bolisani
R4,618 Discovery Miles 46 180 Ships in 18 - 22 working days

"In today's networked societies, a key factor of the social and economic success is the capability to exchange, transfer, and share knowledge. In the wide-ranging area of knowledge management, the issue of knowledge exchange in networked environments emerges in several application fields, and is treated with different approaches. Building the Knowledge Society on the Internet: Sharing and Exchanging Knowledge in Networked Environments proposes a vast panorama of research on the topic while presenting a variety of viewpoints, approaches, and indications of the shared elements intended as the foundations of an emerging and fascinating multidisciplinary field."

Network Control and Engineering for QoS, Security and Mobility, V - IFIP 19th World Computer Congress,TC-6, 5th IFIP... Network Control and Engineering for QoS, Security and Mobility, V - IFIP 19th World Computer Congress,TC-6, 5th IFIP International Conference on Network Control and Engineering for QoS, Security, and Mobility, August 20-25, 2006, Santiago, Chile (Hardcover, 2006 ed.)
Dominique Gaiti
R2,779 Discovery Miles 27 790 Ships in 18 - 22 working days

The increasing demand for sophisticated network applications, allied to the growth of the Internet traffic, has lead to great efforts in the search of improvements in data transmission technologies with the intention of satisfying the increasing demand for bandwidth. So far as optical networking is concerned, WDM (Wavelength Division Multiplexing) appears as the main advance in the transmission area, because it allows transmission rates near to the theoretical limit of optical fibers, of the order of dozens of terabits a second [1]. An essential issue in optical network design is defining how the network will be controlled, that is, what type of signalling will be responsible for resource reservation, route determination and fault handling, among other functions that constitute the control plane. Label switching, which in IP networks is exemplified by MPLS (Multiprotocol Label Switching) [2], was extended through GMPLS (Generalized Multiprotocol Label Switching) [3] to operate with several different network technologies, where the label can be represented in other ways, for example, as time-slots in TDM networks, as physical switch ports and as wavelengths (lambdas) in WDM networks.

Guide to Wireless Network Security (Hardcover, 2006 ed.): John R Vacca Guide to Wireless Network Security (Hardcover, 2006 ed.)
John R Vacca
R4,870 R4,549 Discovery Miles 45 490 Save R321 (7%) Ships in 10 - 15 working days

A major, comprehensive professional text/reference for designing and maintaining security and reliability.
From basic concepts to designing principles to deployment, all critical concepts and phases are clearly explained and presented. Includes coverage of wireless security testing techniques and prevention techniques for intrusion (attacks). An essential resource for wireless network administrators and developers.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690
PC Interfacing
Pei An Paperback R1,213 Discovery Miles 12 130
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, … Paperback R1,452 Discovery Miles 14 520
Network Routing, Volume 8
M.O. Ball, T.L. Magnanti, … Hardcover R1,550 Discovery Miles 15 500
Introduction to Copper Cabling…
John Crisp Paperback R967 Discovery Miles 9 670
Research Anthology on Architectures…
Information R Management Association Hardcover R12,620 Discovery Miles 126 200
Trustworthy Autonomic Computing
Thaddeus Eze Hardcover R2,997 R2,712 Discovery Miles 27 120
Research Anthology on Architectures…
Information R Management Association Hardcover R12,630 Discovery Miles 126 300
The Gathering Cloud
J. R. Carpenter Paperback R396 Discovery Miles 3 960
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,318 Discovery Miles 13 180

 

Partners