![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > General
This book provides a Mathematical Theory of Distributed Sensor Networks. It introduces the Mathematical & Computational Structure by discussing what they are, their applications and how they differ from traditional systems. It also explains how mathematics are utilized to provide efficient techniques implementing effective coverage, deployment, transmission, data processing, signal processing, and data protection within distributed sensor networks. Finally, it discusses some important challenges facing mathematics to get more incite to the multidisciplinary area of distributed sensor networks. -This book will help design engineers to set up WSN-based applications providing better use of resources while optimizing processing costs. -This book is highly useful for graduate students starting their first steps in research to apprehend new approaches and understand the mathematics behind them and face promising challenges. -This book aims at presenting a formal framework allowing to show how mathematical theories can be used to provide distributed sensor modeling and to solve important problems such as coverage hole detection and repair. -This book aims at presenting the current state of the art in formal issues related to sensor networking. It can be used as a handbook for different classes at the graduate level and the undergraduate level. It is self contained and comprehensive, presenting a complete picture of the discipline of optical network engineering including modeling functions, controlling quality of service, allocation resources, monitoring traffic, protecting infrastructure, and conducting planning. This book addresses a large set of theoretical aspects. It is designed for specialists in ad hoc and wireless sensor networks and does not include discusses on very promising areas such as homotopy, computational geometry, and wavelet transforms.
Electronic mail and message handling is a rapidly expanding field which incorporates both telecommunications and computer technologies. It combines the old technologies of telex, telegram, and analog facsimile with the new systems of Teletex, digital facsimile, and computer-based messaging. This book answers the questions What is electronic mail? and Why is it important? The major systems, services, technology, and standardization issues are comprehensively surveyed.
This book presents cutting-edge work on real-time modelling and processing, a highly active research field in both the research and industrial domains. Going beyond conventional real-time systems, major efforts are required to develop accurate and computational efficient real-time modelling algorithms and design automation tools that reflect the technological advances in high-speed and ultra-low-power transceiver communication architectures based on nanoscale devices. The book addresses basic and more advanced topics, such as I/O buffer circuits for ensuring reliable chip-to-chip communication, I/O buffer behavioural modelling, multiport empirical models for memory interfaces, compact behavioural modelling for memristive devices, and resource reservation modelling for distributed embedded systems. The respective chapters detail new research findings, new models, algorithms, implementations and simulations of the above-mentioned topics. As such, the book will help both graduate students and researchers understand the latest research into real-time modelling and processing.
This book presents the proceedings of the 1st International Symposium on Intelligent and Distributed Computing, IDC 2007, held in Craiova, Romania, October 2007. Coverage includes: autonomous and adaptive computing; data mining and knowledge discovery; distributed problem solving and decision making; e-business, e-health and e-learning; genetic algorithms; image processing; information retrieval; intelligence in mobile and ubiquitous computing.
"Reconfigurable RF Power Amplifiers on Silicon for Wireless Handsets" is intended to designers and researchers who have to tackle the efficiency/linearity trade-off in modern RF transmitters so as to extend their battery lifetime. High data rate 3G/4G standards feature broad channel bandwidths, high dynamic range and critical envelope variations which generally forces the power amplifier (PA) to operate in a low efficiency "backed-off" regime. Classic efficiency enhancement techniques such as Envelope Elimination and Restoration reveal to be little compliant with handset-dedicated PA implementation due to their channel-bandwidth-limited behavior and their increased die area consumption and/or bill-of-material. The architectural advances that are proposed in this book circumvent these issues since they put the stress on low die-area /low power-consumption control circuitry. The advantages of silicon over III/V technologies are highlighted by several analogue signal processing techniques that can be implemented on-chip with a power amplifier. System-level and transistor-level simulations are combined to illustrate the principles of the proposed power adaptive solutions. Measurement on BICMOS demonstrators allows validating the functionality of dynamic linearity/efficiency management. In "Reconfigurable RF Power Amplifiers on Silicon for Wireless Handsets," PA designers will find a review of technologies, architectures and theoretical formalisms (Volterra series...) that are traditionally related to PA design. Specific issues that one encounters in power amplifiers (such as thermal / memory effects, stability, VSWR sensitivity...) and the way of overcoming them are also extensively considered throughout this book.
Distribution and interoperability in heterogeneous computing environments are the key requirements for state-of-the-art information processing systems. Distributed applications are making a critical contribution in many application sectors, such as office automation, finance, manufacturing, telecommunications, aerospace, and transportation. Users demand support for the construction, integration and management of their application systems as well as for the interoperability of independent application components. DAIS '97 provides a forum for researchers, application designers and users to review, discuss and learn about new approaches and concepts in the fields of distributed applications. DAIS '97 will especially focus on the interoperability between different applications and services, different implementations of the same and of different distributed platforms.
Since the advent of optical communications, a greattechnological effort has been devoted to the exploitation of the huge bandwidth of optical fibers. Sta- ing from a few Mb/s single channel systems, a fast and constant technological development has led to the actual 10 Gb/s per channel dense wavelength - vision multiplexing (DWDM) systems, with dozens of channels on a single fiber. Transmitters and receivers are now ready for 40 Gb/s, whereas hundreds of channels can be simultaneously amplified by optical amplifiers. Nevertheless, despite such a pace in technological progress, optical c- munications are still in a primitive stage if compared, for instance, to radio communications: the widely spread on-off keying (OOK) modulation format is equivalent to the rough amplitude modulation (AM) format, whereas the DWDM technique is nothing more than the optical version of the frequency - vision multiplexing (FDM) technique. Moreover, adaptive equalization, ch- nel coding or maximum likelihood detection are still considered something "exotic" in the optical world. This is mainly due to the favourable char- teristics of the fiber optic channel (large bandwidth, low attenuation, channel stability, ...), which so far allowed us to use very simple transmission and detection techniques.
Development in information and communication technologies has led to the advancement of business and enabled enterprises to produce on a global scale. Productivity is a key function in maintaining a competitive advantage in today's market. The internet of things has rapidly become prevalent in the productivity efforts of businesses. Understanding these technologies and how to implement them into current business practices is vital for researchers and practitioners. Internet of Things (IoT) Applications for Enterprise Productivity is a collection of innovative research on the advancing methods productivity efforts of business through the implementation of the internet of things. While highlighting topics including employee motivation, enterprise productivity, and supply chain tracking, this book is ideally designed for manufacturing professionals, industrialists, engineers, managers, practitioners, academicians, and students seeking current research on enterprise production systems and its transformation using internet of things technologies.
Traditional computing concepts are maturing into a new generation of cloud computing systems with wide-spread global applications. However, even as these systems continue to expand, they are accompanied by overall performance degradation and wasted resources. Emerging Research in Cloud Distributed Computing Systems covers the latest innovations in resource management, control and monitoring applications, and security of cloud technology. Compiling and analyzing current trends, technological concepts, and future directions of computing systems, this publication is a timely resource for practicing engineers, technologists, researchers, and advanced students interested in the domain of cloud computing.
This book presents the leading edge in several related fields, specifically object orientated programming, open distributed systems and formal methods for object oriented systems. With increased support within industry regarding these areas, this book captures the most up-to-date information on the subject. Many topics are discussed, including the following important areas: object oriented design and programming; formal specification of distributed systems; open distributed platforms; types, interfaces and behaviour; formalisation of object oriented methods.
This textbook was inspired by an undergraduate elective course given on virtual organizations and technology. The instructor could not find a suitable text that covered both the organizational and technological aspects including examples based on today's industry. Other books were either too strategic or too technical for an audience of undergraduate business and technology students who were to use the book. But why was that the case? For the same reason that business and IT people in industry tended not to speak the same "language": indeed, the integration of technology into business strategy has been a recent occurrence, and traditional strategy issues have been decided too high in the organizational structure while technology was too detailed in tactical implementation. With the Internet and the advent of e-commerce, m-commerce, and c-commerce (and the other letters of the alphabet soon to follow), business and technology finally started to become closer, and the interest in technology as an enabler for strategic business decision-making evolved into a mainstream concept. How are we defining a virtual organization? Most definitions of the concept of virtual organizations start with stating that it is "a network between organisations or individuals . . . ". The Oxford Concise Dictionary defines 'virtual' as: "that is such/or practical purposes, though not in name or according to a strict definition. " An organization may be thought of as a number of individuals systematically united for some end or work.
This print textbook is available for students to rent for their classes. The Pearson print rental program provides students with affordable access to learning materials, so they come to class ready to succeed. A top-down, layered approach to computer networking. Unique among computer networking texts, the 8th Edition of the popular Computer Networking: A Top Down Approach builds on the authors' long tradition of teaching this complex subject through a layered approach in a "top-down manner." The text works its way from the application layer down toward the physical layer, motivating students by exposing them to important concepts early in their study of networking. Focusing on the Internet and the fundamentally important issues of networking, this text provides an excellent foundation for students in computer science and electrical engineering, without requiring extensive knowledge of programming or mathematics. The 8th Edition has been updated to reflect the most important and exciting recent advances in networking, including the importance of software-defined networking (SDN) and the rapid adoption of 4G/5G networks and the mobile applications they enable.
Software Networks describe new concepts for the Internet s next generation. This architecture is based on virtual networking using Cloud and datacenter facilities. The main problems to be dealt with are the placement of virtual resources for opening a new network on the fly, and the urbanization of virtual resources implemented on physical network equipment. The digital architecture also deals with mechanisms capable of automatically controlling the placement of all virtual resources within the physical network. This book describes how to create and delete virtual networks on the fly. Indeed, the system is able to create any new network with any kind of virtual resource (e.g. switches, routers, LSRs, optical paths, firewalls, SIP-based servers, devices, servers, access points, etc.). Software Networks shows how this architecture is compatible with new advances in SDN (Software Defined Networking), new high-speed transport protocols such as TRILL (Transparent Interconnection of Lots of Links) and LISP (Locator/Identifier Separation Protocol), NGN, IMS, new generation Wi-Fi, and 4G/5G networks. Finally, the author introduces Clouds of security and the virtualization of secure elements (smartcards) that could certainly transform how to secure the Internet. For this second edition, the author addresses in five new chapters the importance of open source software for networks, mobile edge computing, fog networking, tactile internet - a network environment allowing remote access, and security - the use of Cloud of security, secure elements and the emergence of the blockchain.
Welcome to IWQOS'97 in New York City! Over the past several years, there has been a considerable amount of research within the field of Quality of Service (QOS). Much of that work has taken place within the context of QOS support for distributed multimedia systems, operating systems, transport subsystems, networks, devices and formal languages. The objective of the Fifth International Workshop on Quality of Service (IWQOS) is to bring together researchers, developers and practitioners working in all facets of QOS research. While many workshops and conferences offer technical sessions on the topic QOS, none other than IWQOS, provide a single-track workshop dedicated to QOS research. The theme of IWQOS'97 is building QOS into distributed systems. Implicit in that theme is the notion that the QOS community should now focus on discussing results from actual implementations of their work. As QOS research moves from theory to practice, we are interested in gauging the impact of ideas discussed at previous workshops on development of actual systems. While we are interested in experimental results, IWQOS remains a forum for fresh and innovative ideas emerging in the field. As a result of this, authors were solicited to provide experimental research (long) papers and more speculative position (short) statements for consideration. We think we have a great invited and technical program lined up for you this year. The program reflects the Program Committees desire to hear about experiment results, controversial QOS subjects and retrospectives on where we are and where we are going.
Queueing is an aspect of modern life that we encounter at every step in our daily activities. Whether it happens at the checkout counter in the supermarket or in accessing the Internet, the basic phenomenon of queueing arises whenever a shared facility needs to be accessed for service by a ]arge number of jobs or customers. The study of queueing is important as it gravides both a theoretical background to the kind of service that we may expect from such a facility and the way in which the facility itself may be designed to provide some specified grade of service to its customers. Our study of queueing was basically motivated by its use in the study of communication systems and computer networks. The various computers, routers and switches in such a network may be modelled as individual queues. The whole system may itself be modelled as a queueing network providing the required service to the messages, packets or cells that need to be carried. Application of queueing theory provides the theoretical framework for the design and study of such networks. The purpose of this book is to support a course on queueing systems at the senior undergraduate or graduate Ievels. Such a course would then provide the theoretical background on which a subsequent course on the performance modeHing and analysis of computer networks may be based.
It is important to understand what came before and how to meld new products with legacy systems. Network managers need to understand the context and origins of the systems they are using. Programmers need an understanding of the reasons behind the interfaces they must satisfy and the relationship of the software they build to the whole network. And finally, sales representatives need to see the context into which their products must fit.
Network calculus is a theory dealing with queuing systems found in computer networks. Its focus is on performance guarantees. Central to the theory is the use of alternate algebras such as the min-plus algebra to transform complex network systems into analytically tractable systems. To simplify the ana- sis, another idea is to characterize tra?c and service processes using various bounds. Since its introduction in the early 1990s, network calculus has dev- oped along two tracks-deterministic and stochastic. This book is devoted to summarizing results for stochastic network calculus that can be employed in the design of computer networks to provide stochastic service guarantees. Overview and Goal Like conventional queuing theory, stochastic network calculus is based on properly de?ned tra?c models and service models. However, while in c- ventional queuing theory an arrival process is typically characterized by the inter-arrival times of customers and a service process by the service times of customers, the arrival process and the service process are modeled in n- work calculus respectively by some arrival curve that (maybe probabilis- cally) upper-bounds the cumulative arrival and by some service curve that (maybe probabilistically) lower-bounds the cumulative service. The idea of usingboundstocharacterizetra?candservicewasinitiallyintroducedfor- terministic network calculus. It has also been extended to stochastic network calculus by exploiting the stochastic nature of arrival and service processes.
In recent years, wireless networks have become more ubiquitous and integrated into everyday life. As such, it is increasingly imperative to research new methods to boost cost-effectiveness for spectrum and energy efficiency. Interference Mitigation and Energy Management in 5G Heterogeneous Cellular Networks is a pivotal reference source for the latest research on emerging network architectures and mitigation technology to enhance cellular network performance and dependency. Featuring extensive coverage across a range of relevant perspectives and topics, such as interference alignment, resource allocation, and high-speed mobile environments, this book is ideally designed for engineers, professionals, practitioners, upper-level students, and academics seeking current research on interference and energy management for 5G heterogeneous cellular networks. Topics Covered: Cognitive Radio Game Theory Green Technologies High-Speed Mobile Environments
This text, intended for a first course in performance evaluation, provides a self-contained treatment of all aspects of queueing theory. It starts by introducing readers to the terminology and usefulness of queueing theory and continues by considering Markovian queues in equilibrium, Little's law, reversibility, transient analysis and computation, and the M/G/1 queueing system. Subsequent chapters treat the theory of networks of queues and computational algorithms for networks of queues. Stochastic Petri networks, including those whose solutions can be given in product form, are covered in detail. A chapter on discrete-time queueing systems, which are of recent interest, discusses arrival processes, Geom/Geom/m queueing models, and case studies of discrete-time queueing networks arising in industrial applications. This third edition includes a new chapter on current models of network traffic as well as sixteen new homework problems on discrete-time models and a revised and updated set of references. The discussion of network traffic models includes a survey of continuous and discrete time models, a detailed discussion of burstiness, a complete introduction to self-similar traffic and a presentation of solution techniques. Solutions for all of the homework problems in this text are available in a separate volume.
The book provides complete coverage of fundamental IP networking in Java. It introduces the concepts behind TCP/IP and UDP and their intended use and purpose; gives complete coverage of Java networking APIs, includes an extended discussion of advanced server design, so that the various design principles and tradeoffs concerned are discussed and equips the reader with analytic queuing-theory tools to evaluate design alternatives; covers UDP multicasting, and covers multi-homed hosts, leading the reader to understand the extra programming steps and design considerations required in such environments. After reading this book the reader will have an advanced knowledge of fundamental network design and programming concepts in the Java language, enabling them to design and implement distributed applications with advanced features and to predict their performance. Special emphasis is given to the scalable I/O facilities of Java 1.4 as well as complete treatments of multi-homing and UDP both unicast and multicast.
Practically every crime now involves some aspect of digital evidence. This is the most recent volume in the Advances in Digital Forensics series. It describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. This book contains a selection of twenty-eight edited papers from the Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, held at Kyoto University, Kyoto, Japan in the spring of 2008.
The present textbook contains the recordsof a two-semester course on que- ing theory, including an introduction to matrix-analytic methods. This course comprises four hours oflectures and two hours of exercises per week andhas been taughtattheUniversity of Trier, Germany, for about ten years in - quence. The course is directed to last year undergraduate and?rst year gr- uate students of applied probability and computer science, who have already completed an introduction to probability theory. Its purpose is to present - terial that is close enough to concrete queueing models and their applications, while providing a sound mathematical foundation for the analysis of these. Thus the goal of the present book is two-fold. On the one hand, students who are mainly interested in applications easily feel bored by elaborate mathematical questions in the theory of stochastic processes. The presentation of the mathematical foundations in our courses is chosen to cover only the necessary results, which are needed for a solid foundation of the methods of queueing analysis. Further, students oriented - wards applications expect to have a justi?cation for their mathematical efforts in terms of immediate use in queueing analysis. This is the main reason why we have decided to introduce new mathematical concepts only when they will be used in the immediate sequel. On the other hand, students of applied probability do not want any heur- tic derivations just for the sake of yielding fast results for the model at hand.
Current middleware solutions, e.g., application servers and Web services, are very complex software products that are hard to tame because of intricacies of distributed systems. Their functionalities have mostly been developed and managed with the help of administration tools and corresponding configuration files, recently in XML. Though this constitutes flexibility for developing and administrating a distributed application, the conceptual model underlying the different configurations is only implicit. To remedy such problems, Semantic Management of Middleware contributes an ontology-based approach to support the development and administration of middleware-based applications. The ontology is an explicit conceptual model with formal logic-based semantics. Its descriptions may therefore be queried, may foresight required actions, or may be checked to avoid inconsistent system configurations. This book builds a rigorous approach towards giving the declarative descriptions of components and services a well-defined meaning by specifying ontological foundations and by showing how such foundations may be realized in practical, up-and-running systems.
This book focuses on the theory and application of interdependent networks. The contributors consider the influential networks including power and energy networks, transportation networks, and social networks. The first part of the book provides the next generation sustainability framework as well as a comprehensive introduction of smart cities with special emphasis on energy, communication, data analytics and transportation. The second part offers solutions to performance and security challenges of developing interdependent networks in terms of networked control systems, scalable computation platforms, and dynamic social networks. The third part examines the role of electric vehicles in the future of sustainable interdependent networks. The fourth and last part of this volume addresses the promises of control and management techniques for the future power grids.
This book provides a novel method for topic detection and classification in social networks. The book addresses several research and technical challenges that are currently being investigated by the research community, from the analysis of relations and communications between members of a community, to quality, authority, relevance and timeliness of the content, traffic prediction based on media consumption, spam detection, to security, privacy and protection of personal information. Furthermore, the book discusses innovative techniques to address those challenges and provides novel solutions based on information theory, sequence analysis and combinatorics, which are applied on real data obtained from Twitter. |
You may like...
Hammerhead Six - How Green Berets Waged…
Ronald Fry, Tad Tuleja
Paperback
R401
Discovery Miles 4 010
|