![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet
This book presents the design of delay-efficient packet schedulers for heterogeneous M2M uplink traffic classified into several classes, based on packet delay requirements, payload size, arrival process, etc. Specifically, the authors use tools from queuing theory to determine the delay-optimal scheduling policy. The proposed packet schedulers are designed for a generic M2M architecture and thus equally applicable to any M2M application. Additionally, due to their low implementation complexity and excellent delay-performance, they authors show how they are also well-suited for practical M2M systems. The book pertains primarily to real-time process scheduler experts in industry/academia and graduate students whose research deals with designing Quality-of-Service-aware packet schedulers for M2M packet schedulers over existing and future cellular infrastructure. Presents queuing theoretic analysis and optimization techniques used to design proposed packet scheduling strategies; Provides utility functions to precisely model diverse delay requirements, which lends itself to formulation of utility-maximization problems for determining the delay- or utility-optimal packet scheduler; Includes detail on low implementation complexity of the proposed scheduler by using iterative and distributed optimization techniques.
This book investigates and reviews recent advanced techniques and important applications in vehicular communications and networking (VCN) from a novel perspective of the combination and integration of VCN and connected vehicles, which provides a significant scientific and technical support for future 5G-based VCN. 5G-Enabled Vehicular Communications and Networking introduces vehicular channel characteristics, reviews current channel modeling approaches, and then provides a new generic geometry-based stochastic modeling approach for vehicle-to-everything (V2X) communications. The investigation of vehicular channel measurements and modeling provides fundamental supports for the VCN system design. Then, this book investigates VCN-vehicle combination from PHY and MAC layers, respectively. As for the PHY layer, many advanced techniques that can be effectively applied in VCN to counter the PHY challenges are introduced, including novel ICI cancellation methods, index modulated OFDM, differential spatial modulation, and energy harvesting relaying. As for the MAC layer, distributed and centralized MAC designs are analyzed and compared in terms of feasibility and availability. Specifically, distributed congestion control, D2D-enabled vehicular communications, and centralized data dissemination scheduling are elaborated, which can significantly improve the network performance in vehicular networks. Finally, considering VCN-vehicle integration, this book introduces several hot-topic applications in vehicular networks, including electric vehicles, distributed data storage, unmanned aerial vehicles, and security and privacy, which indicates the significance and development value of VCN-vehicle integration in future vehicular networks and our daily life. The primary audience for this book includes professionals and researchers working in the field of vehicular communications, intelligent transportation systems (ITS), and Internet of vehicles (IoV). Advanced level students studying electrical engineering will also find this book useful as a secondary textbook for related courses.
This book provides an overview of the problems involved in engineering scalable, elastic, and cost-efficient cloud computing services and describes the CloudScale method - a description of rescuing tools and the required steps to exploit these tools. It allows readers to analyze the scalability problem in detail and identify scalability anti-patterns and bottlenecks within an application. With the CloudScale method, software architects can analyze both existing and planned IT services. The method allows readers to answer questions like: * With an increasing number of users, can my service still deliver acceptable quality of service? * What if each user uses the service more intensively? Can my service still handle it with acceptable quality of service? * What if the number of users suddenly increases? Will my service still be able to handle it? * Will my service be cost-efficient? First the book addresses the importance of scalability, elasticity, and cost-efficiency as vital quality-related attributes of modern cloud computing applications. Following a brief overview of CloudScale, cloud computing applications are then introduced in detail and the aspects that need to be captured in models of such applications are discussed. In CloudScale, these aspects are captured in instances of the ScaleDL modeling language. Subsequently, the book describes the forward engineering part of CloudScale, which is applicable when developing a new service. It also outlines the reverse and reengineering parts of CloudScale, which come into play when an existing (legacy) service is modified. Lastly, the book directly focuses on the needs of both business-oriented and technical managers by providing guidance on all steps of implementing CloudScale as well as making decisions during that implementation. The demonstrators and reference projects described serve as a valuable starting point for learning from experience. This book is meant for all stakeholders interested in delivering scalable, elastic, and cost-efficient cloud computing applications: managers, product owners, software architects and developers alike. With this book, they can both see the overall picture as well as dive into issues of particular interest.
Social Media has transformed the ways in which individuals keep in touch with family and friends. Likewise, businesses have identified the profound opportunities present for customer engagement and understanding through the massive data available on social media channels, in addition to the customer reach of such sites. Social Media Listening and Monitoring for Business Applications explores research-based solutions for businesses of all types interested in an understanding of emerging concepts and technologies for engaging customers online. Providing insight into the currently available social media tools and practices for various business applications, this publication is an essential resource for business professionals, graduate-level students, technology developers, and researchers.
This book presents state-of-the-art research on robust resource allocation in current and future wireless networks. The authors describe the nominal resource allocation problems in wireless networks and explain why introducing robustness in such networks is desirable. Then, depending on the objectives of the problem, namely maximizing the social utility or the per-user utility, cooperative or competitive approaches are explained and their corresponding robust problems are considered in detail. For each approach, the costs and benefits of robust schemes are discussed and the algorithms for reducing their costs and improving their benefits are presented. Considering the fact that such problems are inherently non-convex and intractable, a taxonomy of different relaxation techniques is presented, and applications of such techniques are shown via several examples throughout the book. Finally, the authors argue that resource allocation continues to be an important issue in future wireless networks, and propose specific problems for future research.
The Internet has dramatically altered the landscape of crime and national security, creating new threats, such as identity theft, computer viruses, and cyberattacks. Moreover, because cybercrimes are often not limited to a single site or nation, crime scenes themselves have changed. Consequently, law enforcement must confront these new dangers and embrace novel methods of prevention, as well as produce new tools for digital surveillance-which can jeopardize privacy and civil liberties. Cybercrime brings together leading experts in law, criminal justice, and security studies to describe crime prevention and security protection in the electronic age. Ranging from new government requirements that facilitate spying to new methods of digital proof, the book is essential to understand how criminal law-and even crime itself-have been transformed in our networked world. Contributors: Jack M. Balkin, Susan W. Brenner, Daniel E. Geer, Jr., James Grimmelmann, Emily Hancock, Beryl A. Howell, Curtis E.A. Karnow, Eddan Katz, Orin S. Kerr, Nimrod Kozlovski, Helen Nissenbaum, Kim A. Taipale, Lee Tien, Shlomit Wagman, and Tal Zarsky. Jack M. Balkin is Knight Professor of Constitutional Law and the First Amendment at Yale Law School, and the Founder and Director of Yale's Information Society Project (ISP). He is the co-editor of The State of Play: Law, Games, and Virtual Worlds, also from NYU Press. James Grimmelmann, Nimrod Kozlovski, Shlomit Wagman, and Tal Zarsky are Fellows of the ISP. Eddan Katz is the Executive Director of the Information Society Project.
By joining bodies of research in media theory, cultural studies, and critical pedagogy, "Developing Media Literacy in Cyberspace" offers a vision of learning that values social empowerment over technical skills. An inquiry into the existence and range of models equipped to cultivate critical teaching and learning in the Internet-supported classroom, this new study argues that media literacy offers the best long-term training for today's youth to become experienced practitioners of 21st-century technology. Author Julie Frechette helps educators develop and provide concrete learning strategies that enable students to judge the validity and worth of what they see on the Internet as they strive to become critically autonomous in a technology-laden world. Part of this effort lies in developing a keen awareness of the institutional, political, and economic structure of the Internet as a means of communication that is increasingly marketing products and targeting advertisements toward youth. Values on the Internet are discussed constantly both by the major media and by the private sector, with little regard for the pervasive interests and authority of profitable industries staking out their territory in this new global village. Unlike other studies that provide a broad sociohistorical context for the development of theoretical uses of new technologies in the classroom, "Developing Media Literacy in Cyberspace" lays the groundwork for establishing critical thinking skills that will serve students' interests as they navigate this vast and complicated cyberterritory.
This work makes major contributions to the thriving area of social, communication, and distributed networks by introducing novel methodologies and tools toward the study of the evolutionary behaviors of these networks, as well as their computational complexity and rates of convergence. By departing from the classical approaches and results in the literature, this work shows that it is possible to handle more complex and realistic nonlinear models where either the traditional approaches fail or lead to weak results. The author also develops several easily implementable algorithms, delivering excellent performance guarantees while running faster than those that exist in the literature. The study undertaken and the approaches adopted enable the analysis of the evolution of several different types of social and distributed networks, with the potential to apply to and resolve several other outstanding issues in such networks.
This book presents a design methodology that is practically applicable to the architectural design of a broad range of systems. It is based on fundamental design concepts to conceive and specify the required functional properties of a system, while abstracting from the specific implementation functions and technologies that can be chosen to build the system. Abstraction and precision are indispensable when it comes to understanding complex systems and precisely creating and representing them at a high functional level. Once understood, these concepts appear natural, self-evident and extremely powerful, since they can directly, precisely and concisely reflect what is considered essential for the functional behavior of a system. The first two chapters present the global views on how to design systems and how to interpret terms and meta-concepts. This informal introduction provides the general context for the remainder of the book. On a more formal level, Chapters 3 through 6 present the main basic design concepts, illustrating them with examples. Language notations are introduced along with the basic design concepts. Lastly, Chapters 7 to 12 discuss the more intricate basic design concepts of interactive systems by focusing on their common functional goal. These chapters are recommended to readers who have a particular interest in the design of protocols and interfaces for various systems. The didactic approach makes it suitable for graduate students who want to develop insights into and skills in developing complex systems, as well as practitioners in industry and large organizations who are responsible for the design and development of large and complex systems. It includes numerous tangible examples from various fields, and several appealing exercises with their solutions.
Web technologies have become a vital element within educational, professional, and social settings as they have the potential to improve performance and productivity across organizations. Artificial Intelligence Technologies and the Evolution of Web 3.0 brings together emergent research and best practices surrounding the effective usage of Web 3.0 technologies in a variety of environments. Featuring the latest technologies and applications across industries, this publication is a vital reference source for academics, researchers, students, and professionals who are interested in new ways to use intelligent web technologies within various settings.
This book throws new light on the way in which the Internet impacts on democracy. Based on Jurgen Habermas' discourse-theoretical reconstruction of democracy, it examines one of the world's largest, most diverse but also most unequal democracies, Brazil, in terms of the broad social and legal effects the internet has had. Focusing on the Brazilian constitutional evolution, the book examines how the Internet might impact on the legitimacy of a democratic order and if, and how, it might yield opportunities for democratic empowerment. The book also assesses the ways in which law, as an institution and a system, reacts to the changes and challenges brought about by the Internet: the ways in which law may retain its strength as an integrative force, avoiding a 'virtual' legitimacy crisis.
This book introduces a number of recent developments on connectivity of communication networks, ranging from connectivity of large static networks and connectivity of highly dynamic networks to connectivity of small to medium sized networks. This book also introduces some applications of connectivity studies in network optimization, in network localization, and in estimating distances between nodes. The book starts with an overview of the fundamental concepts, models, tools, and methodologies used for connectivity studies. The rest of the chapters are divided into four parts: connectivity of large static networks, connectivity of highly dynamic networks, connectivity of small to medium sized networks, and applications of connectivity studies.
Internet use for business-to-business e-commerce is expected to grow at spectacular rates. Many experts feel that perceived lack of trust in e-commerce transactions on the Internet has contributed to the slow adoption of e-commerce in the recent past. This book provides an avenue for managers and researchers to explore, examine and describe interorganizaitonal trust relationships in e-commerce participation. With the identification of trust behaviours in business relationships this will increase the awareness of e-commerce participants, who can then examine their own and their trading partners' trust behaviours.
This timely text/reference presents a comprehensive review of the workflow scheduling algorithms and approaches that are rapidly becoming essential for a range of software applications, due to their ability to efficiently leverage diverse and distributed cloud resources. Particular emphasis is placed on how workflow-based automation in software-defined cloud centers and hybrid IT systems can significantly enhance resource utilization and optimize energy efficiency. Topics and features: describes dynamic workflow and task scheduling techniques that work across multiple (on-premise and off-premise) clouds; presents simulation-based case studies, and details of real-time test bed-based implementations; offers analyses and comparisons of a broad selection of static and dynamic workflow algorithms; examines the considerations for the main parameters in projects limited by budget and time constraints; covers workflow management systems, workflow modeling and simulation techniques, and machine learning approaches for predictive workflow analytics. This must-read work provides invaluable practical insights from three subject matter experts in the cloud paradigm, which will empower IT practitioners and industry professionals in their daily assignments. Researchers and students interested in next-generation software-defined cloud environments will also greatly benefit from the material in the book.
This textbook addresses the conceptual and practical aspects of the various phases of the lifecycle of service systems, ranging from service ideation, design, implementation, analysis, improvement and trading associated with service systems engineering. Written by leading experts in the field, this indispensable textbook will enable a new wave of future professionals to think in a service-focused way with the right balance of competencies in computer science, engineering, and management. Fundamentals of Service Systems is a centerpiece for a course syllabus on service systems. Each chapter includes a summary, a list of learning objectives, an opening case, and a review section with questions, a project description, a list of key terms, and a list of further reading bibliography. All these elements enable students to learn at a faster and more comfortable peace. For researchers, teachers, and students who want to learn about this new emerging science, Fundamentals of Service Systems provides an overview of the core disciplines underlying the study of service systems. It is aimed at students of information systems, information technology, and business and economics. It also targets business and IT practitioners, especially those who are looking for better ways of innovating, designing, modeling, analyzing, and optimizing service systems.
This book demonstrates to managers the strategic significance of intra-organizational social networks. It argues that strategic management is embedded in the complexity of social relations that shape the strategic direction of a company. Currently there are few tools available to systematically collect information about the social functioning of an organization. This book fills this gap by shifting attention to the social relations that contribute to strategic advantage and that build on relationships that provide unique resources and create value for the business. It considers three perspectives on how social networks have a strategic function: first, social networks constitute everyday strategic action; second, social networks convey cultural meanings; and third, how social networks depict social processes that continually illustrate what the organization is and what it can become. The book shows top and upper-middle management how cultivating an understanding of intra-firm social relations can help them to build unique strategic advantage and make use of the day-to-day knowledge that emerges in the social connections and interactions within an organization.
Cloud service benchmarking can provide important, sometimes surprising insights into the quality of services and leads to a more quality-driven design and engineering of complex software architectures that use such services. Starting with a broad introduction to the field, this book guides readers step-by-step through the process of designing, implementing and executing a cloud service benchmark, as well as understanding and dealing with its results. It covers all aspects of cloud service benchmarking, i.e., both benchmarking the cloud and benchmarking in the cloud, at a basic level. The book is divided into five parts: Part I discusses what cloud benchmarking is, provides an overview of cloud services and their key properties, and describes the notion of a cloud system and cloud-service quality. It also addresses the benchmarking lifecycle and the motivations behind running benchmarks in particular phases of an application lifecycle. Part II then focuses on benchmark design by discussing key objectives (e.g., repeatability, fairness, or understandability) and defining metrics and measurement methods, and by giving advice on developing own measurement methods and metrics. Next, Part III explores benchmark execution and implementation challenges and objectives as well as aspects like runtime monitoring and result collection. Subsequently, Part IV addresses benchmark results, covering topics such as an abstract process for turning data into insights, data preprocessing, and basic data analysis methods. Lastly, Part V concludes the book with a summary, suggestions for further reading and pointers to benchmarking tools available on the Web. The book is intended for researchers and graduate students of computer science and related subjects looking for an introduction to benchmarking cloud services, but also for industry practitioners who are interested in evaluating the quality of cloud services or who want to assess key qualities of their own implementations through cloud-based experiments.
This proceeding features papers discussing big data innovation for sustainable cognitive computing. The papers feature detail on cognitive computing and its self-learning systems that use data mining, pattern recognition and natural language processing (NLP) to mirror the way the human brain works. This international conference focuses on cognitive computing technologies, from knowledge representation techniques and natural language processing algorithms to dynamic learning approaches. Topics covered include Data Science for Cognitive Analysis, Real-Time Ubiquitous Data Science, Platform for Privacy Preserving Data Science, and Internet-Based Cognitive Platform. The EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing (BDCC 2018), took place on 13 - 15 December 2018 in Coimbatore, India.
The widespread use of XML in business and scientific databases has prompted the development of methodologies, techniques, and systems for effectively managing and analyzing XML data. This has increasingly attracted the attention of different research communities, including database, information retrieval, pattern recognition, and machine learning, from which several proposals have been offered to address problems in XML data management and knowledge discovery. XML Data Mining: Models, Methods, and Applications aims to collect knowledge from experts of database, information retrieval, machine learning, and knowledge management communities in developing models, methods, and systems for XML data mining. This book addresses key issues and challenges in XML data mining, offering insights into the various existing solutions and best practices for modeling, processing, analyzing XML data, and for evaluating performance of XML data mining algorithms and systems.
This book reports on a novel concept of mechanism transitions for the design of highly scalable and adaptive publish/subscribe systems. First, it introduces relevant mechanisms for location-based filtering and locality-aware dissemination of events based on a thorough review of the state-of-the-art. This is followed by a detailed description of the design of a transition-enabled publish/subscribe system that enables seamless switching between mechanisms during runtime. Lastly, the proposed concepts are evaluated within the challenging context of location-based mobile applications. The book assesses in depth the performance and cost of transition execution, highlighting the impact of the proposed state transfer mechanism and the potential of coexisting transition-enabled mechanisms. |
You may like...
Gemini Owners' Workshop Manual - An…
David Woods, David M. Harland
Hardcover
(1)
Doomsday Asteroid - Can We Survive?
Donald W. Cox, James H. Chestek
Paperback
R561
Discovery Miles 5 610
The Utilization of the World's Air Space…
Chia-Jui Cheng, Doo Hwan Kim
Hardcover
R5,145
Discovery Miles 51 450
|