![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > General
A Vehicular Ad Hoc Network (VANET) is a non-infrastructure based network that does not rely on a central administration for communication between vehicles. The flexibility of VANETs opens the door to a myriad of applications; however, there are also a number of computer communication challenges that await researchers and engineers who are serious about their implementation and deployment. Advances in Vehicular Ad-Hoc Networks: Developments and Challenges tackles the prevalent research challenges that hinder a fully deployable vehicular network. This unique reference presents a unified treatment of the various aspects of VANETs and is essential for not only university professors, but also for researchers working in the automobile industry.
This well-conceived annotated bibliography of 497 items covers all areas of hypermedia and hypertext through the end of 1989. Though not meant to be exhaustive, it does a very good job of identifying many important books, articles, proceedings and ERIC documents pertaining to hypertext/hypermedia and related issues. . . . This bibliography is the most thorough compilation of works in the field of hypertext/hypermedia and it deserves a place on the reference shelves of any large academic or public libraries. Any individual interested in finding information on this fast growing field will find this book extremely helpful. Choice This is the only comprehensive annotated bibliography on hypertext/hypermedia. Hypertext refers to units of information interconnected with links. Hypermedia involves the extension of this concept to include information units in the form of graphics, music, animation, video, or any type of media that can be digitized. Hypertext/hypermedia systems allow users to access and interact with information. Listing nearly 500 citations, the bibliography represents the work of over 350 authors. Extremely up-to-date, the book is comprehensive through the first half of 1989. Hypertext/hypermedia applications in such areas as education, automobile diagnostic and repair systems, job training, medical diagnostic systems, electronic publishing, and job training are some of the ideas covered in this bibliography. The bibliography contains items in the following formats: books, book chapters, journal articles, conference proceedings, ERIC documents, government publications, and hypertext documents. Dissertations, technical reports, and items in languages other than English are not included. The bibliography is arranged alphabetically by author. Primary access is provided by subject and author indexes. Each entry includes sufficient bibliographic information to locate the item in a library, acquire it through interlibrary loan, or purchase it. The book is suitable for all libraries.
Communication systems are now ubiquitous and making them more intelligent remains very challenging. The IFIP International Conference on Intelligence in Communication Systems is an effort to bring together researchers and practitioners who represent the latest developments in this area. This volume contains selected papers from the conference in the following focus areas: ad hoc networks / hybrid networks / WLAN; security, privacy and consumer protection; adaptive architectures and protocols; flexible QoS and QoS management; flexible service specification, validation, searching and querying; service composition and Web services; personal, terminal and node mobility; programmable and active networks.
Optical WDM networking technology is spearheading a bandwidth revolution in the networking infrastructure being developed for the next generation Internet. Rapid advances in optical components have enabled the transition from point-to-point WDM links to all-optical networking. Optical WDM Networks: Principles and Practice presents some of the most important challenges facing the optical networking community, along with some suggested solutions. Earlier textbooks in optical networking have a narrower perspective, and rapidly advancing research has created the need for fresh and current information on problems and issues in the field. The volume editors and contributing authors have endeavoured to capture a substantial subset of the key problems and known solutions to these problems. All of the chapters are original contributions from leading international researchers. The chapters address a wide variety of topics, including the state of the art in WDM technology, physical components that make up WDM fiber-optic networks, medium access protocols, wavelength routed networks, optical access networks, network management, and performance evaluation of wavelength routing networks. The chapters also survey critical points in past research and tackle more recent problems. Practitioners and network product engineers interested in current state-of-the-art information beyond textbook-type coverage, and graduate students commencing research in this area, will appreciate the concise - and pertinent - information presented herein.
The potential of software applications to solve an array of office
and administrative problems is increasing faster than the ability
of users to exploit it. We need to make systems easier to learn and
more comfortable to use. This book reports a major advance in the
effort to accomplish both goals.
This authoritative text/reference describes the state of the art in requirements engineering for software systems for distributed computing. A particular focus is placed on integrated solutions, which take into account the requirements of scalability, flexibility, sustainability and operability for distributed environments. Topics and features: discusses the latest developments, tools, technologies and trends in software requirements engineering; reviews the relevant theoretical frameworks, practical approaches and methodologies for service requirements; examines the three key components of the requirements engineering process, namely requirements elicitation, requirements specification, and requirements validation and evaluation; presents detailed contributions from an international selection of highly reputed experts in the field; offers guidance on best practices, and suggests directions for further research in the area.
Routing in Opportunistic Networks focuses on the basics of opportunistic networks, modeling and communication in opportunistic networks, routing in opportunistic networks, and collaboration and cooperation in opportunistic networks. The editors will cover such topics as mobility characterization and discovery in opportunistic networks, scheduling and medium access control in opportunistic networks as well as testbed, tools, and measurements for opportunistic networks.
This book addresses propagation phenomena in satellite, radar, broadcasting, short range , trans-horizon and several recent modes of communications in radio links. Also, it includes some topics on antennas , radio noises and improvement techniques. The book provides the necessary basic matters, as well as experimental results and calculation procedures for radio link design.
The controller area network (CAN) microcontroller communication protocol is now ubiquitous in a staggeringly wide range of transportation and industrial control applications. This fully revised and updated new edition addresses the various challenges and open questions relating to CAN communication networks. Opening with a short introduction into the fundamentals of CAN, the book then examines the problems and solutions for the physical layout of networks, including EMC issues and topology layout. Additionally, a discussion of quality issues with a particular focus on test techniques is presented. Each chapter features a collection of illuminating insights and detailed technical information supplied by a selection of internationally-regarded experts from industry and academia. Topics and features: presents thorough coverage of architectures, implementations and application of CAN transceiver, data link layer and so-called higher layer software; explains CAN EMC characteristics and countermeasures, as well as how to design CAN networks; demonstrates how to practically apply and test CAN systems; includes examples of real networks from diverse applications in automotive engineering, avionics, and home heating technology; includes a glossary of abbreviations, and a useful bibliography. This comprehensive text will be an invaluable guide/reference for electronic engineers working with industrial control systems.
This book is the first systematic exposition on the emerging domain of wireless power transfer in ad hoc communication networks. It selectively spans a coherent, large spectrum of fundamental aspects of wireless power transfer, such as mobility management in the network, combined wireless power and information transfer, energy flow among network devices, joint activities with wireless power transfer (routing, data gathering and solar energy harvesting), and safety provisioning through electromagnetic radiation control, as well as fundamental and novel circuits and technologies enabling the wide application of wireless powering. Comprising a total of 27 chapters, contributed by leading experts, the content is organized into six thematic sections: technologies, communication, mobility, energy flow, joint operations, and electromagnetic radiation awareness. It will be valuable for researchers, engineers, educators, and students, and it may also be used as a supplement to academic courses on algorithmic applications, wireless protocols, distributed computing, and networking.
Scientific Workflow has seen massive growth in recent years as science becomes increasingly reliant on the analysis of massive data sets and the use of distributed resources. The workflow programming paradigm is seen as a means of managing the complexity in defining the analysis, executing the necessary computations on distributed resources, collecting information about the analysis results, and providing means to record and reproduce the scientific analysis. Workflows for e-Science presents an overview of the current state of the art in the field. It brings together research from many of leading computer scientists in the workflow area and provides real world examples from domain scientists actively involved in e-Science. The computer science topics addressed in the book provide a broad overview of active research focusing on the areas of workflow representations and process models, component and service-based workflows, standardization efforts, workflow frameworks and tools, and problem solving environments and portals. The topics covered represent a broad range of scientific workflow and will be of interest to a wide range of computer science researchers, domain scientists interested in applying workflow technologies in their work, and engineers wanting to develop workflow systems and tools. As such Workflows for e-Science is an invaluable resource for potential or existing users of workflow technologies and a benchmark for developers and researchers. Ian Taylor is Lecturer in Computer Science at Cardiff University, and coordinator of Triana activities at Cardiff. He is the author of "From P2P to Web Services and Grids," also published by Springer. Ewa Deelmanis a Research Assistant Professor at the USC Computer Science Department and a Research Team Leader at the Center for Grid Technologies at the USC Information Sciences Institute. Dennis Gannon is a professor of Computer Science in the School of Informatics at Indiana University. He is also Science Director for the Indiana Pervasive Technology Labs.. Dr Shields is a research associate at Cardiff and one of two lead developers for the Triana project.
How do we design a self-organizing system? Is it possible to validate and control non-deterministic dynamics? What is the right balance between the emergent patterns that bring robustness, adaptability and scalability, and the traditional need for verification and validation of the outcomes? The last several decades have seen much progress from original ideas of "emergent functionality" and "design for emergence", to sophisticated mathematical formalisms of "guided self-organization". And yet the main challenge remains, attracting the best scientific and engineering expertise to this elusive problem. This book presents state-of-the-practice of successfully engineered self-organizing systems, and examines ways to balance design and self-organization in the context of applications. As demonstrated in this second edition of Advances in Applied Self-Organizing Systems, finding this balance helps to deal with practical challenges as diverse as navigation of microscopic robots within blood vessels, self-monitoring aerospace vehicles, collective and modular robotics adapted for autonomous reconnaissance and surveillance, self-managing grids and multiprocessor scheduling, data visualization and self-modifying digital and analog circuitry, intrusion detection in computer networks, reconstruction of hydro-physical fields, traffic management, immunocomputing and nature-inspired computation. Many algorithms proposed and discussed in this volume are biologically inspired, and the reader will also gain an insight into cellular automata, genetic algorithms, artificial immune systems, snake-like locomotion, ant foraging, birds flocking, neuromorphic circuits, amongst others. Demonstrating the practical relevance and applicability of self-organization, Advances in Applied Self-Organizing Systems will be an invaluable tool for advanced students and researchers in a wide range of fields.
Adoption, Usage, and Global Impact of Broadband Technologies: Diffusion, Practice and Policy contains a masterful synthesis of literature intended to enhance knowledge of broadband deployment, diffusion, adoption, usage and impact from the global perspective. Including chapters from researchers with varied geographical, educational and cultural backgrounds, this book helps the reader to understand the differences in the adoption of broadband in different countries and examine comparative policy issues at national and international levels.
Leyton's Process Grammar has been applied by scientists and engineers in many disciplines including medical diagnosis, geology, computer-aided design, meteorology, biological anatomy, neuroscience, chemical engineering, etc. This book demonstrates the following: The Process Grammar invents several entirely new concepts in biological morphology and manufacturing design, and shows that these concepts are fundamentally important. The Process Grammar has process-inference rules that give, to morphological transitions, powerful new "causal explanations." Remarkably, the book gives a profound "unification" of "biological morphology" and "vehicle design." The book invents over 30 new CAD operations that realize fundamentally important functions of a product. A crucial fact is that the Process Grammar is an example of the laws in Leyton's Generative Theory of Shape which give the ability to recover the "design intents "for which the shape features of a CAD model were created. The book demonstrates that the Process Grammar recovers important design intents in biological morphology and manufacturing design. In large-scale manufacturing systems, the recovery of design intents is important for solving the interoperability problem and product lifecycle management. This book is one of a series of books in Springer that elaborates Leyton's Generative Theory of Shape.
This book constitutes the refereed proceedings of the 15th IFIP TC 9 International Conference on Human Choice and Computers, HCC15 2022, in Tokyo, Japan, in September 2022. The 17 full papers presented were carefully reviewed and selected from 32 submissions. Summaries of 2 keynote presentations are also included. The papers deal with the constantly evolving intimate relationship between humans and technology.
Reservation procedures constitute the core of many popular data transmission protocols. They consist of two steps: A request phase in which a station reserves the communication channel and a transmission phase in which the actual data transmission takes place. Such procedures are often applied in communication networks that are characterised by a shared communication channel with large round-trip times. In this book, we propose queuing models for situations that require a reservation procedure and validate their applicability in the context of cable networks. We offer various mathematical models to better understand the performance of these reservation procedures. The book covers four key performance models, and modifications to these: Contention trees, the repairman model, the bulk service queue, and tandem queues. The relevance of this book is not limited to reservation procedures and cable networks, and performance analysts from a variety of areas may benefit, as all models have found application in other fields as well.
For the first time in history, the International Federation for Information Processing (IFIP) and the International Medical Informatics Association (IMIA) held the joint "E-Health" Symposium as part of "Treat IT" stream of the IFIP World Congress 2010 at Brisbane, Australia during September 22-23, 2010. IMIA is an independent organization established under Swiss law in 1989. The organization originated in 1967 from Technical Committee 4 of IFIP that is a n- governmental, non-profit umbrella organization for national societies working in the field of information processing. It was established in 1960 under the auspices of UNESCO following the First World Computer Congress held in Paris in 1959. Today, IFIP has several types of members and maintains friendly connections to specialized agencies of the UN system and non-governmental organizations. Technical work, which is the heart of IFIP's activity, is managed by a series of Technical Committees. Due to strong needs for promoting informatics in healthcare and the rapid progress of information and communication technology, IMIA President Reinhold Haux p- posed to strengthen the collaboration with IFIP. The IMIA General Assembly (GA) approved the move and an IMIA Vice President (VP) for special services (Hiroshi Takeda) was assigned as a liaison to IFIP at Brisbane during MEDINFO2007 where th the 40 birthday of IMIA was celebrated.
This book investigates how various scientific communities - e.g. legal scientists, political scientists, sociologists, mathematicians, and computer scientists - study law and public policies, which are portrayed here as complex systems. Today, research on law and public policies is rapidly developing at the international level, relying heavily on modeling that employs innovative methods for concrete implementation. Among the subject matter discussed, law as a network of evolving and interactive norms is now a prominent sphere of study. Similarly, public policies are now a topic in their own right, as policy can no longer be examined as a linear process; rather, its study should reflect the complexity of the networks of actors, norms and resources involved, as well as the uncertainty or weak predictability of their direct or indirect impacts. The book is divided into three maain parts: complexity faced by jurists, complexity in action and public policies, and complexity and networks. The main themes examined concern codification, governance, climate change, normative networks, health, water management, use-related conflicts, legal regime conflicts, and the use of indicators.
Comprehensive textbook resource on distributed systems--integrates foundational topics with advanced topics of contemporary importance within the field Distributed Computing: Theory and Applications is organized around three aspects of distributed systems: networks, middleware tools, and applications. It presents architectural uniform methods to implement a distributed shared memory system for realization data consistency models suited to distributed applications' requirements. To aid in understanding how these concepts apply to real-world situations, the work illustrates topics with practical applications and includes references for further reading. Downloadable lecture slides are also included to help professors and instructors convey key concepts to their students. Additional topics discussed in Distributed Computing: Theory and Applications include: The abstractions and the implementations of several middleware for distributed computing, which constitute the bulk of core foundational topics Network issues and high-level connection tools Distributed knowledge management and distributed multi-agent systems Gossip Protocol, peer-to-peer systems and block-chain technology, and techniques for unstructured data management P2P, coordinated architectures, and advanced middleware for building large modern distributed applications Researchers, industry professionals, and students in the fields of science, technology, and medicine will be able to use Distributed Computing: Theory and Applications as a comprehensive textbook resource for understanding distributed systems, the specifics behind the modern elements which relate to them, and their practical applications.
Advances in information technology (IT) have influenced how organizations do business. With IT playing such a pivotal role in the operations and success of an organization, it is imperative that it be used strategically. As a repository of cases, Cases on E-Readiness and Information Systems Management in Organizations: Tools for Maximizing Strategic Alignment contains research that readers can use to assess the e-readiness of their own organizations. This book presents principles, tools, and techniques about e-readiness, while also offering in-depth perspectives on applying the e-readiness model for the purpose of aligning IT with organizational strategies.
This book brings together papers presented at the 2021 International Conference on Communications, Signal Processing, and Systems, which provides a venue to disseminate the latest developments and to discuss the interactions and links between these multidisciplinary fields. Spanning topics ranging from communications, signal processing and systems, this book is aimed at undergraduate and graduate students in Electrical Engineering, Computer Science and Mathematics, researchers and engineers from academia and industry as well as government employees (such as NSF, DOD and DOE).
Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairings on elliptic curves. Asymmetric Cryptography starts by presenting encryption and signatures, the basic primitives in public-key cryptography. It goes on to explain the notion of provable security, which formally defines what "secure" means in terms of a cryptographic scheme. A selection of famous families of protocols are then described, including zero-knowledge proofs, multi-party computation and key exchange. After a general introduction to pairing-based cryptography, this book presents advanced cryptographic schemes for confidentiality and authentication with additional properties such as anonymous signatures and multi-recipient encryption schemes. Finally, it details the more recent topic of verifiable computation.
Higher transmission speeds, larger traffic volumes and the unpredictable characteristics of new applications, coupled with new end-user functions and features and variability of bandwidth, demand new networking methods, technologies and algorithms. These new directions are explored in Control and Performance in Packet, Circuit, and ATM Networks, which includes discussions of static flow, fluid flow, dynamic flow, learning automata, neural networks, fuzzy logic and much more. These techniques are used in performance evaluation, control and optimization of communications networks. Each of the methods achieves a different goal, and understanding them helps in the evaluation of different aspects of control and performance in communication networks. The book combines queuing theory with static-flow models and static optimization methods in order to analyze the behavior of communication networks. In addition, it reviews queuing theory and static optimization methods for the study of control problems in telecommunication networks. A valuable reference that can also be used as a text for an advanced course on the subject.
Grid Computing: International Symposium on Grid Computing (ISGC) 2007 is one of the most important annual events in Asia that brings together scientific contributions by world class researchers and scientists working in the Grid Computing field to exchange ideas, to present challenges, solutions and future development. The objective of this Symposium is to facilitate the information exchange as well as to explore the global collaboration and interoperation among various Grid projects. Based on the ISGC 2007, held in Taipei, Taiwan in March of 2007, this edited volume presents the latest grid solutions and research results in grid operations, grid middleware, biomedical operations, e-science applications and more. Grid Computing: International Symposium on Grid Computing (ISGC) 2007 is designed for a professional audience, composed of researchers and practitioners in academia and industry. This book is also suitable for graduate-level students in computer science. It is also one of the most important sources of Grid Computing and e-Science development in the Asia Pacific region.
"Service Level Agreements for Cloud Computing" provides a unique combination of business-driven application scenarios and advanced research in the area of service-level agreements for Clouds and service-oriented infrastructures. Current state-of-the-art research findings are presented in this book, as well as business-ready solutions applicable to Cloud infrastructures or ERP (Enterprise Resource Planning) environments. "Service Level Agreements for Cloud Computing" contributes to the various levels of service-level management from the infrastructure over the software to the business layer, including horizontal aspects like service monitoring. This book provides readers with essential information on how to deploy and manage Cloud infrastructures. Case studies are presented at the end of most chapters. "Service Level Agreements for Cloud Computing" is designed as a reference book for high-end practitioners working in cloud computing, distributed systems and IT services. Advanced-level students focused on computer science will also find this book valuable as a secondary text book or reference. |
You may like...
1 Recce: Volume 3 - Onsigbaarheid Is Ons…
Alexander Strachan
Paperback
Better Choices - Ensuring South Africa's…
Greg Mills, Mcebisi Jonas, …
Paperback
|