![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet
This book is an attempt to bring closer the greater vision of the development of Social Informatics. Social Informatics can be de?ned as a discipline of informatics that studies how information systems can realize social goals, use social concepts, or become sources of information about social phenomena. All of these research directions are present in this book: fairness is a social goal; trust is a social concept; and much of this book bases on the study of traces of Internet auctions (used also to drive social simulations) that are a rich source of information about social phenomena. The book has been written for an audience of graduate students working in the area of informatics and the social sciences, in an attempt to bridge the gap between the two disciplines. Because of this, the book avoids the use of excessive mathematical formalism, especially in Chapter 2 that attempts to summarize the theoretical basis of the two disciplines of trust and fa- ness management. Readers are usually directed to quoted literature for the purpose of studying mathematical proofs of the cited theorems.
This book presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018), organized by SRM University, NCR Campus, New Delhi, India, February 16-18, 2018. The conference focuses on challenges with respect to the dependability of integrated applications and intelligence-driven security threats against the platforms supporting these applications. The WIDECOM 2018 proceedings features papers addressing issues related to the new dependability paradigms, design, control, and management of next generation networks, performance of dependable network computing and mobile systems, protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and Internet of Things (IoT) systems. The proceeding is a valuable reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners, in industry, in the aforementioned areas. The book's structure and content is organized in such a manner that makes it useful at a variety of learning levels. Presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018), organized by SRM University, NCR Campus, New Delhi, India, February 16-18, 2018; Includes an array of topics related to new dependability paradigms, design, control, and management of next generation networks, performance of dependable network computing and mobile systems, protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and Internet of Things (IoT) systems; Addresses issues related to the design and performance of dependable network computing and systems and to the security of these systems.
Both Java and .NET use the idea of a virtual machine (VM) rather than a true executable. While very useful for some purposes, VMs make your source code and hence your intellectual property (IP) inherently less secure because the process can be reversed or decompiled. This book is useful because you must understand how decompilation works in order to properly protect your IP. Anyone interested in protecting Java code from prying eyes will want to buy this one of a kind book as it separates fact from fiction about just how ineffective obfuscators are at protecting your corporate secrets.While it is very easy for anyone to decompile Java code and almost as easy to run it through an obfuscation protection tool, there is very little information on just what happens when you do this. How secure is your code after you run an obfuscator, for example? bytecodes and the Java Virtual Machine (JVM) than in any book yet published. This book redresses the imbalance by providing insights into the features and limitations of todays decompilers and obfuscators, as well as offering a detailed look at what JVMs actually do.Virtual machine is the computer science term used when (most often in an attempt to gain greater portability) you create an abstract virtual processor and write code for it instead of having your compiler generate actual machine language for a chip like the Pentium 4. want the code to run. This translates the virtual machine language to the real machine language of your processor. The intermediary code for the virtual machine is what can more easily be decompiled, although with a loss of security, since in order for the code to be converted to real machine language it must be relatively transparent and not just a sequence of 0s and 1s
1. This is the first book to examine cross-device search behavior. 2. This book will discuss a comprehensive range of behaviors in the context of cross-device search, which includes querying, gazing, clicking and touching. 3. The book will be of great interest to academics and students situated in the fields of library and information science, computer science, and management science. The book should also provide fascinating insights to practitioners, including those working for internet service providers.
Genetic algorithms provide a powerful range of methods for solving complex engineering search and optimization algorithms. Their power can also lead to difficulty for new researchers and students who wish to apply such evolution-based methods. "Applied Evolutionary Algorithms in Java" offers a practical, hands-on guide to applying such algorithms to engineering and scientific problems. The concepts are illustrated through clear examples, ranging from simple to more complex problems domains; all based on real-world industrial problems. Examples are taken from image processing, fuzzy-logic control systems, mobile robots, and telecommunication network optimization problems. The Java-based toolkit provides an easy-to-use and essential visual interface, with integrated graphing and analysis tools. Topics and features: *inclusion of a complete Java toolkit for exploring evolutionary algorithms *strong use of visualization techniques, to increase understanding *coverage of all major evolutionary algorithms in common usage *broad range of industrially based example applications *includes examples and an appendix based on fuzzy logic This book is intended for students, researchers, and professionals interested in using evolutionary algorithms in their work. No mathematics beyond basic algebra and Cartesian graphs methods are required, as the aim is to encourage applying the Java toolkit to develop the power of these techniques.
This book can be presented in two different ways. Firstly, it introduces a particular methodology to build adaptive Web sites and secondly, it presents the main concepts behind Web mining and then applying them to adaptive Web sites. In this case, Adaptive Web Sites is the case study to exemplify the tools introduced in the text. The authors start by introducing the Web and motivating the need for adaptive Web sites. The second chapter introduces the main concepts behind a Web site: its operation, its associated data and structure, user sessions, etc. Chapter three explains the Web mining process and the tools to analyze Web data, mainly focused in machine learning. The fourth chapter looks at how to store and manage data. Chapter five looks at the three main and different mining tasks: content, links and usage. The following chapter covers Web personalization; a crucial topic if we want to adapt our site to specific groups of people. Chapter seven shows how to use information extraction techniques to find user behavior patterns. The subsequent chapter explains how to acquire and maintain knowledge extracted from the previous phase. Finally, chapter nine contains the case study where all the previous concepts are applied to present a framework to build adaptive Web sites. In other words, the authors have taken care of writing a self-contained book for people that want to learn and apply personalization and adaptation in Web sites. This is commendable considering the large and increasing bibliography in these and related topics. The writing is easy to follow and although the coverage is not exhaustive, the main concepts and topics are all covered.
DESCRIPTION Distributed systems are unpredictable, and it can be an enormous challenge to manage around potentially-crippling obstacles like hardware failures, unanticipated changes in load, and network issues. Amazon Web Services (AWS) is a platform for hosting distributed applications in a secure, flexible cloud environment. AWS provides a suite of services designed to keep the focus on what an application does instead of the infrastructure required to run it. Whether serving up blog pages, analyzing fast data in real-time, building software as a service, or implementing a massive e-commerce site, AWS provides both a stable platform and services that will scale with every application. Amazon Web Services in Action introduces readers to computing, storing, and networking in the AWS cloud. It starts with a broad overview of AWS, and shows how to spin up servers manually and from the command line. Then, it explores infrastructure automation with the AWS CloudFormation service, where readers can describe a blueprint of their infrastructure as code. Readers will learn how to isolate systems using private networks to increase security, how to use the most valuable AWS managed services available on AWS, and about the benefits of stateless servers. In the end, they'll look to the AWS model for high availability, scaling, decoupling with queues and load balancers, and fault tolerance. KEY SELLING POINTS Explains the key concepts of AWS Gives an overview of the most important services Allows readers to take full advantage of the AWS platform AUDIENCE Written for developers and DevOps engineers who are moving traditionally-deployed distributed applications to the AWS platform. No experience with AWS is required. ABOUT THE TECHNOLOGY Amazon Web Services is a platform of services in the Cloud to provide everything needed to run applications-from hosting a private blog, to running one of the biggest websites on earth, analyzing data for cancer research, or providing business applications.
Aims to strengthen the reader's knowledge of the fundamental concepts and technical details necessary to develop, implement, or debug e-mail software. The text explains the underlying technology and describes the key Internet e-mail protocols and extensions such as SMTP, POP3, IMAP, MIME and DSN. It aims to help the reader build a sound understanding of e-mail archtitecture, message flow and tracing protocols, and includes real-world examples of message exchanges with program code that they can refer to when developing or debugging their own systems. The reader should also gain valuable insight into various security topics, including public and secret key encryption, digital signatures and key management. Each chapter begins with a detailed definition list to help speed the reader's understanding of technical terms and acronyms. The CD-ROM contains a listing of related Internet RFCs, as well as RSA PKCS documents, Eudora 3.0 freeware client, and the free user version of Software.com.Post.Office Server for Windows NT 3.0.
The author's aim in this textbook is to provide students with a clear understanding of the relationship between the principles of object-oriented programming and software engineering. Professor Zeigler takes an approach based on state representation to formal specification. Consequently, this book is unique through its - emphasis on formulating primitives from which all other functionality can be built; - integral use of a semi-formal behaviour specification language based on state transition concepts; -differentiation between behaviour and implementation; -a reusable heterogeneous container class library; -ability to show the elegance and power of ensemble methods with non-trivial examples. As a result, students studying software engineering will find this a distinctive and valuable approach to programming and systems engineering.
This book presents reinforcement learning (RL) based solutions for user-centric online network selection optimization. The main content can be divided into three parts. The first part (chapter 2 and 3) focuses on how to learning the best network when QoE is revealed beyond QoS under the framework of multi-armed bandit (MAB). The second part (chapter 4 and 5) focuses on how to meet dynamic user demand in complex and uncertain heterogeneous wireless networks under the framework of markov decision process (MDP). The third part (chapter 6 and 7) focuses on how to meet heterogeneous user demand for multiple users inlarge-scale networks under the framework of game theory. Efficient RL algorithms with practical constraints and considerations are proposed to optimize QoE for realizing intelligent online network selection for future mobile networks. This book is intended as a reference resource for researchers and designers in resource management of 5G networks and beyond.
The Mobile Ad Hoc Network (MANET) has emerged as the next frontier for wireless communications networking in both the military and commercial arena. "Handbook of Mobile Ad Hoc Networks for Mobility Models" introduces 40 different major mobility models along with numerous associate mobility models to be used in a variety of MANET networking environments in the ground, air, space, and/or under water mobile vehicles and/or handheld devices. These vehicles include cars, armors, ships, under-sea vehicles, manned and unmanned airborne vehicles, spacecrafts and more. This handbook also describes how each mobility pattern affects the MANET performance from physical to application layer; such as throughput capacity, delay, jitter, packet loss and packet delivery ratio, longevity of route, route overhead, reliability, and survivability. Case studies, examples, and exercises are provided throughout the book. "Handbook of Mobile Ad Hoc Networks for Mobility Models" is for advanced-level students and researchers concentrating on electrical engineering and computer science within wireless technology. Industry professionals working in the areas of mobile ad hoc networks, communications engineering, military establishments engaged in communications engineering, equipment manufacturers who are designing radios, mobile wireless routers, wireless local area networks, and mobile ad hoc network equipment will find this book useful as well.
Using database-driven web pages or web content management (WCM) systems to manage increasingly diverse web content and to streamline workflows is a commonly practiced solution recognized in libraries to-day. However, limited library web content management models and funding constraints prevent many libraries from purchasing commercially available WCM systems. And, the lack of much needed technical expertise in building in-house WCM systems presents a great challenge for libraries of all types. Content and Workflow Management for Library Websites: Case Studies provides practical and applicable web content management solutions through case studies. It contains successful database-to-web applications as employed in a variety of academic libraries. The applications vary in scope and cover a range of practical how-to-do-it examples from database-driven web development, locally created web content management systems, systems for distributing content management responsibilities, dynamic content delivery, to open source tools, such as MySQL and PHP to manage the content. Issues and challenges associated with the development process are discussed. Authors will also discuss detours, sand traps, and missteps necessary to a real learning process.
Compression and Coding Algorithms describes in detail the coding
mechanisms that are available for use in data compression systems.
The well known Huffman coding technique is one mechanism, but there
have been many others developed over the past few decades, and this
book describes, explains and assesses them. People undertaking
research of software development in the areas of compression and
coding algorithms will find this book an indispensable reference.
In particular, the careful and detailed description of algorithms
and their implementation, plus accompanying pseudo-code that can be
readily implemented on computer, make this book a definitive
reference in an area currently without one.
The connected dominating set has been a classic subject studied in graph theory since 1975. Since the 1990s, it has been found to have important applications in communication networks, especially in wireless networks, as a virtual backbone. Motivated from those applications, many papers have been published in the literature during last 15 years. Now, the connected dominating set has become a hot research topic in computer science. In this book, we are going to collect recent developments on the connected dominating set, which presents the state of the art in the study of connected dominating sets. The book consists of 16 chapters. Except the 1st one, each chapter is devoted to one problem, and consists of three parts, motivation and overview, problem complexity analysis, and approximation algorithm designs, which will lead the reader to see clearly about the background, formulation, existing important research results, and open problems. Therefore, this would be a very valuable reference book for researchers in computer science and operations research, especially in areas of theoretical computer science, computer communication networks, combinatorial optimization, and discrete mathematics.
This book deals with Web applications in product design and manufacture, thus filling an information gap in digital manufacturing in the Internet era. It helps both developers and users to appreciate the potentials, as well as difficulties, in developing and adopting Web applications. The objective is to equip potential users and practitioners of Web applications with a better appreciation of the technology. In addition, Web application developers and new researchers in this field will gain a clearer understanding of the selection of system architecture and design, development and implementation techniques, and deployment strategies. The book is divided into two main parts. The first part gives an overview of Web and Internet and the second explains eight typical Web applications.
The advent of the Internet and other new digital technologies means that companies—be they virtual or traditional bricks-and-mortar—must develop a successful strategy for presenting compelling brands in the virtual world. Drawing on their experience with Interbrand, the world's largest branding consultancy, and including chapters by branding experts from such companies as Pepsi-Cola, Procter & Gamble, and Hewlett Packard, the authors focus on the strategic role of e-branding. Practical, tested, and designed for companies in any industry, this book presents a lively look at creating and sustaining e-brands beyond the current dot-com fizzle.
An examination of the social impact of the Internet, this volume explores political, social, technical, legal, and economic controversies in a manner accessible to the general reader. Today more than one billion people worldwide use the Internet for communication, shopping, business, and research. But in the last five years they have lost over $10 billion to malicious computer attacks alone. Is there a way to keep the benefits and avoid the problems? The Internet and Society: A Reference Handbook explores both the positive aspects of the Internet and its darker side. Topically organized, it chronicles the background and history of the Internet, with a focus on the 1960s and beyond. Through analysis of the latest research in sociology, political science, economics, law, and computer science, it examines problems, varieties of cybercrime, controversies, and solutions related to the Internet's phenomenal growth. It also illuminates the likely directions of the Internet's future and the ongoing challenges it presents to societies around the globe. A glossary of key terms, such as algorithm, ARPAnet, Hyper Text Markup Language, identity theft, Internet protocol, malicious mode, and Moore's law, helps readers find their bearings in the high-tech world of the Internet Bibliographical sketches of 20 key personalities-both positive and negative-in Internet history bring this high-tech story to life
Much of the world's advanced data processing applications are now dependant on eXtensible Markup Language (XML), from publishing to medical information storage. Therefore, XML has become a de facto standard for data exchange and representation on the World Wide Web and in daily life. Applications and Structures in XML Processing: Label Streams, Semantics Utilization and Data Query Technologies reflects the significant research results and latest findings of scholars' worldwide, working to explore and expand the role of XML. This collection represents an understanding of XML processing technologies in connection with both advanced applications and the latest XML processing technologies that is of primary importance. It provides the opportunity to understand topics in detail and discover XML research at a comprehensive level.
This BASICS series text, updated to include the latest information on JavaScript and HTML, provides an easy-to-follow, step-by-step introduction to all aspects of HTML and JavaScript programming. Topics covered in the book include HTML organization techniques, HTML power techniques, using images with JavaScript, and using forms with JavaScript.
Over the last few years, Web technology has grown so rapidly that
it is hard for interested readers to learn and keep up with the
techniques. It would be extremely useful to have a single book that
collectively describes not only the underlying areas from which
internet technology derives its solutions, but also details the
specific solutions to important applications on the World Wide Web.
Foundations of Web Technology covers the basics of Web technology
while being specialized enough to add value to experienced
professionals working in this field. Most books on the Web focus on
programmatic aspects of languages such as Java, JavaScript, or
description of standards such as Hypertext Markup Language (HTML)
or Wireless Markup Language (WML). A book that covers the concepts
behind the infrastructure of the Web would be indispensable to a
wide range of audiences interested in learning how the Web works,
how techniques in Web technology can be applied to their own
problem, and what the emergent technological trends in these areas
are.
A decade ago Tim Berners-Lee proposed an extraordinary vision: despite the p- nomenal success of the Web, it would not, and could not, reach its full potential unless it became a place where automated processes could participate as well as people. This meant the publication of documents and data to the web in such a way that they could be interpreted, integrated, aggregated and queried to reveal new connections and answer questions, rather than just browsed and searched. Many scoffed at this idea, interpreting the early emphasis on language design and reas- ing as AI in new clothes. This missed the point. The Grand Challenge of the Semantic Web is one that needs not only the information structure of ontologies, metadata, and data, but also the computational infrastructure of Web Services, P2P and Grid distributed computing and workflows. Consequently, it is a truly who- system and multi-disciplinary effort. This is also an initiative that has to be put into practice. That means a pragmatic approach to standards, tools, mechanisms and methodologies, and real, challenging examples. It would seem self-evident that the Semantic Web should be able to make a major contribution to clinical information discovery. Scientific commu- ties are ideal incubators: knowledge-driven, fragmented, diverse, a range of str- tured and unstructured resources with many disconnected suppliers and consumers of knowledge. Moreover, the clinicians and biosciences have embraced the notions of annotation and classification using ontologies for centuries, and have dema- ing requirements for trust, security, fidelity and expressivity.
The new edition of this popular book has been transformed into a hands-on textbook, focusing on the principles of wireless sensor networks (WSNs), their applications, their protocols and standards, and their analysis and test tools; a meticulous care has been accorded to the definitions and terminology. To make WSNs felt and seen, the adopted technologies as well as their manufacturers are presented in detail. In introductory computer networking books, chapters sequencing follows the bottom up or top down architecture of the seven layers protocol. This book starts some steps later, with chapters ordered based on a topic's significance to the elaboration of wireless sensor networks (WSNs) concepts and issues. With such a depth, this book is intended for a wide audience, it is meant to be a helper and motivator, for both the senior undergraduates, postgraduates, researchers, and practitioners; concepts and WSNs related applications are laid out, research and practical issues are backed by appropriate literature, and new trends are put under focus. For senior undergraduate students, it familiarizes readers with conceptual foundations, applications, and practical project implementations. For graduate students and researchers, transport layer protocols and cross-layering protocols are presented and testbeds and simulators provide a must follow emphasis on the analysis methods and tools for WSNs. For practitioners, besides applications and deployment, the manufacturers and components of WSNs at several platforms and testbeds are fully explored. |
![]() ![]() You may like...
News Search, Blogs and Feeds - A Toolkit
Lars Vage, Lars Iselid
Paperback
R1,366
Discovery Miles 13 660
Towards A Semantic Web - Connecting…
Bill Cope, Mary Kalantzis, …
Paperback
Indexing - From Thesauri to the Semantic…
Piet de Keyser
Paperback
Tweeting to Power - The Social Media…
Jason Gainous, Kevin M. Wagner
Hardcover
R3,881
Discovery Miles 38 810
|