0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (42)
  • R250 - R500 (214)
  • R500+ (7,939)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > General

Computational Social Network Analysis - Trends, Tools and Research Advances (Hardcover, 2010 ed.): Ajith Abraham, Aboul Ella... Computational Social Network Analysis - Trends, Tools and Research Advances (Hardcover, 2010 ed.)
Ajith Abraham, Aboul Ella Hassanien, Vaclav Snasel
R4,279 Discovery Miles 42 790 Ships in 18 - 22 working days

Social networks provide a powerful abstraction of the structure and dynamics of diverse kinds of people or people-to-technology interaction. Web 2.0 has enabled a new generation of web-based communities, social networks, and folksonomies to facilitate collaboration among different communities.

This unique text/reference compares and contrasts the ethological approach to social behavior in animals with web-based evidence of social interaction, perceptual learning, information granulation, the behavior of humans and affinities between web-based social networks. An international team of leading experts present the latest advances of various topics in intelligent-social-networks and illustrates how organizations can gain competitive advantages by applying the different emergent techniques in real-world scenarios. The work incorporates experience reports, survey articles, and intelligence techniques and theories with specific network technology problems.

Topics and Features: Provides an overview social network tools, and explores methods for discovering key players in social networks, designing self-organizing search systems, and clustering blog sites, surveys techniques for exploratory analysis and text mining of social networks, approaches to tracking online community interaction, and examines how the topological features of a system affects the flow of information, reviews the models of network evolution, covering scientific co-citation networks, nature-inspired frameworks, latent social networks in e-Learning systems, and compound communities, examines the relationship between the intent of web pages, their architecture and the communities who take part in their usage and creation, discusses team selection based on members' social context, presents social network applications, including music recommendation and face recognition in photographs, explores the use of social networks in web services that focus on the discovery stage in the life cycle of these web services.

This useful and comprehensive volume will be indispensible to senior undergraduate and postgraduate students taking courses in Social Intelligence, as well as to researchers, developers, and postgraduates interested in intelligent-social-networks research and related areas.

Personal Wireless Communications - IFIP TC6/WG6.8 Working Conference on Personal Wireless Communications (PWC'2000),... Personal Wireless Communications - IFIP TC6/WG6.8 Working Conference on Personal Wireless Communications (PWC'2000), September 14-15, 2000, Gdansk, Poland (Hardcover, 2000 ed.)
Jozef Wozniak, Jerzy Konorski
R4,163 Discovery Miles 41 630 Ships in 18 - 22 working days

There are numerous factors contributing to the dynamic growth of wireless communication systems we've been observing in the past 10 years, the most important being the increasing network user mobility and the technological advances in high-speed data transmission over radio channels. Research centres and standards-making institutions the world over conduct works on 3G integrated systems of person-to-person and person-to-computer communications, wireless counterparts of classical LAN, ATM and IP architectures, satellite and access networks as well as advanced service platforms like W AP and other concepts. Among the many commercial and non-profit organisations professionally involved in the development of the new information infrastructure, of particular influence is the International Federation for Information Processing. Within its Technical Committee TC-6, a working group WG 6.8 has been set up to co-ordinate IFIP activities in the area of wireless communications. It has done so, among others, by arranging regular meetings of academic and industrial researchers, known as IFIP TC-6 WG 6.8 Workshops on Personal Wireless Communications (pWC). Such workshops were held in recent years in Prague, Frankfurt/M, Tokyo and Copenhagen, and their success has resulted in the promotion of PWC to the status of IFIP Working Conference.

Telecommunications Network Modelling, Planning and Design (Hardcover, New): Sharon Evans Telecommunications Network Modelling, Planning and Design (Hardcover, New)
Sharon Evans
R2,633 Discovery Miles 26 330 Ships in 10 - 15 working days

Telecommunications Network Modelling, Planning and Design addresses sophisticated modelling techniques from the perspective of the communications industry and covers some of the major issues facing telecommunications network engineers and managers today. Topics covered include network planning for transmission systems, modelling of SDH transport network structures and telecommunications network design and performance modelling, as well as network costs, ROI modelling and QoS in 3G networks. This practical book will prove a valuable resource to network engineers and managers working in today's competitive telecommunications environment.

A Classical Introduction to Cryptography Exercise Book (Hardcover, 2006 ed.): Thomas Baigneres, Pascal Junod, Yi Lu, Jean... A Classical Introduction to Cryptography Exercise Book (Hardcover, 2006 ed.)
Thomas Baigneres, Pascal Junod, Yi Lu, Jean Monnerat, Serge Vaudenay
R1,395 Discovery Miles 13 950 Ships in 10 - 15 working days

TO CRYPTOGRAPHY EXERCISE BOOK Thomas Baignkres EPFL, Switzerland Pascal Junod EPFL, Switzerland Yi Lu EPFL, Switzerland Jean Monnerat EPFL, Switzerland Serge Vaudenay EPFL, Switzerland Springer - Thomas Baignbres Pascal Junod EPFL - I&C - LASEC Lausanne, Switzerland Lausanne, Switzerland Yi Lu Jean Monnerat EPFL - I&C - LASEC EPFL-I&C-LASEC Lausanne, Switzerland Lausanne, Switzerland Serge Vaudenay Lausanne, Switzerland Library of Congress Cataloging-in-Publication Data A C.I.P. Catalogue record for this book is available from the Library of Congress. A CLASSICAL INTRODUCTION TO CRYPTOGRAPHY EXERCISE BOOK by Thomas Baignkres, Palcal Junod, Yi Lu, Jean Monnerat and Serge Vaudenay ISBN- 10: 0-387-27934-2 e-ISBN-10: 0-387-28835-X ISBN- 13: 978-0-387-27934-3 e-ISBN- 13: 978-0-387-28835-2 Printed on acid-free paper. O 2006 Springer Science]Business Media, Inc. All rights reserved. This work may not be translated or copied in whole or in part without the written permission of the publisher (Springer Science+Business Media, Inc., 233 Spring Street, New York, NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now know or hereafter developed is forbidden. The use in this publication of trade names, trademarks, service marks and similar terms, even if the are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. Printed in the United States of America.

Multifunction Peripherals for PCs - Technology, Troubleshooting and Repair (Paperback): Marvin Hobbs Multifunction Peripherals for PCs - Technology, Troubleshooting and Repair (Paperback)
Marvin Hobbs
R1,961 Discovery Miles 19 610 Ships in 10 - 15 working days

Multifunction devices combine the essentials of a fax machine, printer, scanner, and copier into one peripheral for small and home offices. As the market for this equipment grows, the need for skilled repair and maintenance increases. Unfortunately the service documentation supplied by the manufacturers is completely inadequate making the repair jobs even harder and more expensive. Marvin Hobbs teaches you how multifunction peripherals work in theory and in practice with lots of hands-on examples and important troubleshooting and repair tips you don't want to miss.
This book fills a gap in the literature, and will be a welcome addition to the library of any technician or do-it-yourselfer.
Written by a knowledgeable practitioner with inside industry information
Fully covers the troubleshooting and repair of multifunction peripherals
A must-have instructional and reference title for anyone who works with computer peripherals

Business Resilience System (BRS): Driven Through Boolean, Fuzzy Logics and Cloud Computation - Real and Near Real Time Analysis... Business Resilience System (BRS): Driven Through Boolean, Fuzzy Logics and Cloud Computation - Real and Near Real Time Analysis and Decision Making System (Hardcover, 1st ed. 2017)
Bahman Zohuri, Masoud Moghaddam
R4,636 R3,565 Discovery Miles 35 650 Save R1,071 (23%) Ships in 10 - 15 working days

This book provides a technical approach to a Business Resilience System with its Risk Atom and Processing Data Point based on fuzzy logic and cloud computation in real time. Its purpose and objectives define a clear set of expectations for Organizations and Enterprises so their network system and supply chain are totally resilient and protected against cyber-attacks, manmade threats, and natural disasters. These enterprises include financial, organizational, homeland security, and supply chain operations with multi-point manufacturing across the world. Market shares and marketing advantages are expected to result from the implementation of the system. The collected information and defined objectives form the basis to monitor and analyze the data through cloud computation, and will guarantee the success of their survivability's against any unexpected threats. This book will be useful for advanced undergraduate and graduate students in the field of computer engineering, engineers that work for manufacturing companies, business analysts in retail and e-Commerce, and those working in the defense industry, Information Security, and Information Technology.

AWS Command Line Interface User Guide (Hardcover): Documentation Team AWS Command Line Interface User Guide (Hardcover)
Documentation Team
R897 Discovery Miles 8 970 Ships in 18 - 22 working days
Guide to Big Data Applications (Hardcover, 1st ed. 2018): S. Srinivasan Guide to Big Data Applications (Hardcover, 1st ed. 2018)
S. Srinivasan
R4,844 Discovery Miles 48 440 Ships in 18 - 22 working days

This handbook brings together a variety of approaches to the uses of big data in multiple fields, primarily science, medicine, and business. This single resource features contributions from researchers around the world from a variety of fields, where they share their findings and experience. This book is intended to help spur further innovation in big data. The research is presented in a way that allows readers, regardless of their field of study, to learn from how applications have proven successful and how similar applications could be used in their own field. Contributions stem from researchers in fields such as physics, biology, energy, healthcare, and business. The contributors also discuss important topics such as fraud detection, privacy implications, legal perspectives, and ethical handling of big data.

Guide to Reliable Internet Services and Applications (Hardcover, 2010 Ed.): Charles R. Kalmanek, Sudip Misra, Yang (Richard)... Guide to Reliable Internet Services and Applications (Hardcover, 2010 Ed.)
Charles R. Kalmanek, Sudip Misra, Yang (Richard) Yang
R4,367 Discovery Miles 43 670 Ships in 18 - 22 working days

An oft-repeated adage among telecommunication providers goes, "There are ve things that matter: reliability, reliability, reliability, time to market, and cost. If you can't do all ve, at least do the rst three. " Yet, designing and operating reliable networks and services is a Herculean task. Building truly reliable components is unacceptably expensive, forcing us to c- struct reliable systems out of unreliable components. The resulting systems are inherently complex, consisting of many different kinds of components running a variety of different protocols that interact in subtle ways. Inter-networkssuch as the Internet span multiple regions of administrative control, from campus and cor- rate networks to Internet Service Providers, making good end-to-end performance a shared responsibility borne by sometimes uncooperative parties. Moreover, these networks consist not only of routers, but also lower-layer devices such as optical switches and higher-layer components such as rewalls and proxies. And, these components are highly con gurable, leaving ample room for operator error and buggy software. As if that were not dif cult enough, end users understandably care about the performance of their higher-level applications, which has a complicated relationship with the behavior of the underlying network. Despite these challenges, researchers and practitioners alike have made trem- dous strides in improving the reliability of modern networks and services.

Convergence Technologies for 3G Networks - IP, UMTS, EGPRS and ATM (Hardcover): J Bannister Convergence Technologies for 3G Networks - IP, UMTS, EGPRS and ATM (Hardcover)
J Bannister
R3,339 Discovery Miles 33 390 Ships in 10 - 15 working days

The merging of voice and data on a single network opens powerful new possibilities in communications. Only a fundamental understanding of both technologies will ensure you are equipped to maximise their full potential.

Convergence Technologies for 3G Networks describes the evolution from cellular to a converged network that integrates traditional telecommunications and the technology of the Internet. In particular, the authors address the application of both IP and ATM technologies to a cellular environment, including IP telephony protocols, the use of ATM/AAL2 and the new AAL2 signalling protocol for voice/multimedia and data transport as well as the future of the UMTS network in UMTS Release 5/6 All-IP architecture.

Convergence Technologies for 3G Networks:

  • Explains the operation and integration of GSM, GPRS, EDGE, UMTS, CDMA2000, IP, and ATM.
  • Provides practical examples of 3G connection scenarios.
  • Uses live captures from 3G networks.
  • Describes signalling flows and protocol stacks.
  • Covers IP and ATM as used in a 3G context.
  • Addresses issues of QoS and real-time application support.
  • Includes IP/SS7 internetworking and IP softswitching.
  • Discusses the use of Voice over IP and SIP in UMTS.
  • Outlines the architecture of the IP Multimedia Subsystem (IMS) for UMTS.

This highly accessible reference is suited for professionals from the telecommunications, data communications and computer networking industries.

Medical Data Mining and Knowledge Discovery (Hardcover, 2001 ed.): Krzysztof J. Cios Medical Data Mining and Knowledge Discovery (Hardcover, 2001 ed.)
Krzysztof J. Cios
R5,423 Discovery Miles 54 230 Ships in 18 - 22 working days

Modern medicine generates, almost daily, huge amounts of heterogeneous data. For example, medical data may contain SPECT images, signals lik e ECG, clinical information like temperature, cholesterol levels, etc., as well as the physician's interpretation. Those who deal with such data understand that there is a widening gap between data collection a nd data comprehension. Computerized techniques are needed to help huma ns address this problem. This volume is devoted to the relatively youn g and growing field of medical data mining and knowledge discovery. As more and more medical procedures employ imaging as a preferred diagno stic tool, there is a need to develop methods for efficient mining in databases of images. Other significant features are security and confi dentiality concerns. Moreover, the physician's interpretation of image s, signals, or other technical data, is written in unstructured Englis h which is very difficult to mine. This book addresses all these speci fic features.

Computational Intelligence for Cybersecurity Management and Applications (Hardcover): Yassine Maleh, Mamoun Alazab, Soufyane... Computational Intelligence for Cybersecurity Management and Applications (Hardcover)
Yassine Maleh, Mamoun Alazab, Soufyane Mounir
R3,430 Discovery Miles 34 300 Ships in 9 - 17 working days

1. Propose the latest discoveries in terms of machine intelligence techniques and methods for cybersecurity and privacy; 2. Propose many case studies and applications of machine intelligence in various cybersecurity fields (Smart City, IoT, Cyber Physical System, etc) 3. Combine theory and practice so that readers of the few books (beginners or experts) can find both a description of the concepts and context related to machine intelligence for cybersecurity.

Computer Science Unleashed - Harness the Power of Computational Systems (Hardcover): Wladston Ferreira Filho, Raimondo Pictet Computer Science Unleashed - Harness the Power of Computational Systems (Hardcover)
Wladston Ferreira Filho, Raimondo Pictet
R948 Discovery Miles 9 480 Ships in 18 - 22 working days
Distributed Video Sensor Networks (Hardcover, 2011 Ed.): Bir Bhanu, Chinya V. Ravishankar, Amit K. Roy-chowdhury, Hamid... Distributed Video Sensor Networks (Hardcover, 2011 Ed.)
Bir Bhanu, Chinya V. Ravishankar, Amit K. Roy-chowdhury, Hamid Aghajan, Demetri Terzopoulos
R4,112 Discovery Miles 41 120 Ships in 18 - 22 working days

Large-scale video networks are of increasing importance in a wide range of applications. However, the development of automated techniques for aggregating and interpreting information from multiple video streams in real-life scenarios is a challenging area of research.

Collecting the work of leading researchers from a broad range of disciplines, this timely text/reference offers an in-depth survey of the state of the art in distributed camera networks. The book addresses a broad spectrum of critical issues in this highly interdisciplinary field: current challenges and future directions; video processing and video understanding; simulation, graphics, cognition and video networks; wireless video sensor networks, communications and control; embedded cameras and real-time video analysis; applications of distributed video networks; and educational opportunities and curriculum-development.

Topics and features: Presents an overview of research in areas of motion analysis, invariants, multiple cameras for detection, object tracking and recognition, and activities in video networks Provides real-world applications of distributed video networks, including force protection, wide area activities, port security, and recognition in night-time environments Describes the challenges in graphics and simulation, covering virtual vision, network security, human activities, cognitive architecture, and displays Examines issues of multimedia networks, registration, control of cameras (in simulations and real networks), localization and bounds on tracking Discusses system aspects of video networks, with chapters on providing testbed environments, data collection on activities, new integrated sensors for airborne sensors, face recognition, and building sentient spaces Investigates educational opportunities and curriculum development from the perspective of computer science and electrical engineering

This unique text will be of great interest to researchers and graduate students of computer vision and pattern recognition, computer graphics and simulation, image processing and embedded systems, and communications, networks and controls. The large number of example applications will also appeal to application engineers.

Performance Analysis of ATM Networks - IFIP TC6 WG6.3 / WG6.4 Fifth International Workshop on Performance Modelling and... Performance Analysis of ATM Networks - IFIP TC6 WG6.3 / WG6.4 Fifth International Workshop on Performance Modelling and Evaluation of ATM Networks July 21-23, 1997, Ilkley, UK (Hardcover, 2000 ed.)
Demetres D. Kouvatsos
R5,460 Discovery Miles 54 600 Ships in 18 - 22 working days

Over recent years, a considerable amount of effort has been devoted, both in industry and academia, towards the performance modelling, evaluation and prediction of Asynchronous Transfer Mode (ATM) networks. This book describes recent advances in ATM networks reflecting the state-of-the-art technology and research achievements worldwide. In addition, it provides a fundamental source of reference in the ATM field. Research topics discussed in detail include: Traffic Modelling and Characterisation; Routing; Switch and Multiplexer Models; Call Admission Control (CAC); Congestion Control; Resource Allocation; Quality of Service (QoS); Tools and Techniques. This volume contains recently extended refereed papers of the 5th International Workshop on Performance Modelling and Evaluation of ATM Networks, which was sponsored by the International Federation for Information Processing (IFIP) and held in Ilkley, UK in July 1997. Performance Analysis of ATM Networks continues the tradition established by the first three IFIP volumes on the subject, and it is ideal for personnel in computer/communication industries as well as academic and research staff in computer science and electrical engineering.

Cognitive Risk (Paperback): James Bone, Jessie H Lee Cognitive Risk (Paperback)
James Bone, Jessie H Lee
R1,110 Discovery Miles 11 100 Ships in 9 - 17 working days

Unique selling point: • This book combines risk management, cybersecurity and behavioral and decision science in one book with case studies, mitigation plans, and a new risk framework to address cognitive risks. Core audience: • Corporate and government risk, audit, IT security and compliance organisations Place in the market: • Cognitive Risks differs from competitive books by reframing the role of human behavior in risk.

Mobile Computing - Implementing Pervasive Information and Communications Technologies (Hardcover, 2002 ed.): Shambhu Upadhyaya,... Mobile Computing - Implementing Pervasive Information and Communications Technologies (Hardcover, 2002 ed.)
Shambhu Upadhyaya, Abhijit Chaudhury, Kevin Kwiat, Mark Weiser
R2,774 Discovery Miles 27 740 Ships in 18 - 22 working days

Mobil Computing: Implementing Pervasive Information and Communication Technologies is designed to address some of the business and technical challenges of pervasive computing that encompass current and emerging technology standards, infrastructures and architectures, and innovative and high impact applications of mobile technologies in virtual enterprises. The various articles examine a host of issues including: the challenges and current solutions in mobile connectivity and coordination; management infrastructures; innovative architectures for fourth generation wireless and Ad-hoc networks; error-free frequency assignments for wireless communication; cost-effective wavelength assignments in optical communication networks; data and transaction modeling in a mobile environment, and bandwidth issues and data routing in mobile Ad-hoc networks.

Proceedings of the Third European Conference on Computer-Supported Cooperative Work 13-17 September 1993, Milan, Italy ECSCW... Proceedings of the Third European Conference on Computer-Supported Cooperative Work 13-17 September 1993, Milan, Italy ECSCW '93 (Hardcover, 1993 ed.)
Giorgio De Michelis, Carla Simone, K. Schmidt
R5,346 Discovery Miles 53 460 Ships in 18 - 22 working days

Computer-Supported Cooperative Work (CSCW) is an interdisicplinary research area devoted to exploring the issues of designing computer-based systems that enhance the abilities of cooperating workers to coordinate and integrate their activities in an efficient, effective, and flexible manner. This rigorously selected volume represents both practical and theoretical approaches from many of the leading researchers in the field. As an interdisciplinary area of research, CSCW is characterized by bringing together widely disparate research traditions and perspectives into an arena of collaboration and contention. The selected papers reflect the diverse approaches and cultures of this multi-disciplinary field. This collection will be of interest to a wide audience - because of the huge practical import of the issues and because of the interdisciplinary nature of the problems and the solutions proposed. In particular, the volume will be of interest to researchers and professionals in computing, sociology, cognitive science, and human factors.

5G Cyber Risks and Mitigation (Hardcover): Sabhyata Soni 5G Cyber Risks and Mitigation (Hardcover)
Sabhyata Soni
R3,443 Discovery Miles 34 430 Ships in 9 - 17 working days

• Technical language made simple • Researched matter • Maximum illustrations • To the point matter • Authored by a qualified person who is teaching in this field for the last 25 years

The Design of Rijndael - AES - The Advanced Encryption Standard (Hardcover, 2002 ed.): Joan Daemen, Vincent Rijmen The Design of Rijndael - AES - The Advanced Encryption Standard (Hardcover, 2002 ed.)
Joan Daemen, Vincent Rijmen 1
R2,702 Discovery Miles 27 020 Ships in 10 - 15 working days

In October 2000, the US National Institute of Standards and Technology selected the block cipher Rijndael as the Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book by the designers of the block cipher presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented. This book is THE authoritative guide to the Rijndael algorithm and AES. Professionals, researchers, and students active or interested in data encryption will find it a valuable source of information and reference.

Ontologies-Based Business Integration (Hardcover, 2008 ed.): Michael Rebstock Ontologies-Based Business Integration (Hardcover, 2008 ed.)
Michael Rebstock; Contributions by K.-D. Naujok; Fengel Janina; Contributions by C. Huemer; Heiko Paulheim; Contributions by …
R1,433 Discovery Miles 14 330 Ships in 18 - 22 working days

The globalization of everyday business and increasing international trade lead to a growing need to improve national and international business collaborations and transactions. Upcoming new technologies for e-business transactions allow for new ways of process, information and application integration. But business partners almost always have different ways to systemize the information needed to run the business, in terms of information structure, syntax and semantics. Consequences are mismatch and misunderstanding in electronic transactions. This book shows what ontology management can do for process, information and application integration under dynamic e-business conditions. We not only discuss research results and develop novel methods and frameworks, but also apply them to build business use application components that are deployed as web services.

Tourism Informatics - Visual Travel Recommender Systems, Social Communities, and User Interface Design (Hardcover, New): Nalin... Tourism Informatics - Visual Travel Recommender Systems, Social Communities, and User Interface Design (Hardcover, New)
Nalin Sharda
R4,594 Discovery Miles 45 940 Ships in 18 - 22 working days

Tourism is a multi-billion dollar international industry and also one of the biggest users of Web technologies, constantly adopting innovative ideas to enhance its market penetration. ""Tourism Informatics: Visual Travel Recommender Systems, Social Communities and User Interface Design"" provides cohesive coverage of cutting-edge e-tourism systems and directions for future research and development. A defining body of research, this innovative collection provides academicians, researchers, and practitioners with a better understanding of this expanding industry.

Mutimedia Networking-Technology Management and Applications (Paperback): Rahman Mutimedia Networking-Technology Management and Applications (Paperback)
Rahman
R2,414 Discovery Miles 24 140 Ships in 18 - 22 working days

In recent years rapid Internet growth has pushed the development of new multimedia applications in all aspects of life such as entertainment, communication, collaborative work and electronic commerce. Future applications will make use of different technologies like voice, data and video, but in order to make such a wide variety of multimedia applications successful, a number of technology and management issues must be addressed. Multimedia Networking: Technology, Management and Applications addresses the dynamic and efficient uses of resources a fundamental aspect of multimedia networks. Geared toward professionals, educators and students alike, this exciting new book will detail current research and the future direction of multimedia networking.

Mathematical Theories of Distributed Sensor Networks (Hardcover, 2014 ed.): Sitharama S. Iyengar, Kianoosh G. Boroojeni, N.... Mathematical Theories of Distributed Sensor Networks (Hardcover, 2014 ed.)
Sitharama S. Iyengar, Kianoosh G. Boroojeni, N. Balakrishnan
R3,264 Discovery Miles 32 640 Ships in 10 - 15 working days

This book provides a Mathematical Theory of Distributed Sensor Networks. It introduces the Mathematical & Computational Structure by discussing what they are, their applications and how they differ from traditional systems. It also explains how mathematics are utilized to provide efficient techniques implementing effective coverage, deployment, transmission, data processing, signal processing, and data protection within distributed sensor networks. Finally, it discusses some important challenges facing mathematics to get more incite to the multidisciplinary area of distributed sensor networks. -This book will help design engineers to set up WSN-based applications providing better use of resources while optimizing processing costs. -This book is highly useful for graduate students starting their first steps in research to apprehend new approaches and understand the mathematics behind them and face promising challenges. -This book aims at presenting a formal framework allowing to show how mathematical theories can be used to provide distributed sensor modeling and to solve important problems such as coverage hole detection and repair. -This book aims at presenting the current state of the art in formal issues related to sensor networking. It can be used as a handbook for different classes at the graduate level and the undergraduate level. It is self contained and comprehensive, presenting a complete picture of the discipline of optical network engineering including modeling functions, controlling quality of service, allocation resources, monitoring traffic, protecting infrastructure, and conducting planning. This book addresses a large set of theoretical aspects. It is designed for specialists in ad hoc and wireless sensor networks and does not include discusses on very promising areas such as homotopy, computational geometry, and wavelet transforms.

Electronic Mail and Message Handling (Hardcover): Peter H.M. Vervest Electronic Mail and Message Handling (Hardcover)
Peter H.M. Vervest
R2,805 R2,539 Discovery Miles 25 390 Save R266 (9%) Ships in 10 - 15 working days

Electronic mail and message handling is a rapidly expanding field which incorporates both telecommunications and computer technologies. It combines the old technologies of telex, telegram, and analog facsimile with the new systems of Teletex, digital facsimile, and computer-based messaging. This book answers the questions What is electronic mail? and Why is it important? The major systems, services, technology, and standardization issues are comprehensively surveyed.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Guide to Networking Essentials
Greg Tomsho Paperback R1,548 R1,299 Discovery Miles 12 990
Introduction to Copper Cabling…
John Crisp Paperback R967 Discovery Miles 9 670
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,452 Discovery Miles 14 520
Cable Engineering for Local Area…
B.J. Elliott Hardcover R3,208 Discovery Miles 32 080
Digital Signal Processing and…
Dag Stranneby Paperback R1,371 Discovery Miles 13 710
Cybersecurity in Smart Homes…
Khatoun Hardcover R3,483 Discovery Miles 34 830
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R2,877 Discovery Miles 28 770
Network Science - Analysis and…
CAR Pinheiro Hardcover R2,245 Discovery Miles 22 450
Network Routing, Volume 8
M.O. Ball, T.L. Magnanti, … Hardcover R1,550 Discovery Miles 15 500
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690

 

Partners