![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet
This monograph covers different aspects of sensor network security including new emerging technologies. The authors present a mathematical approach to the topic and give numerous practical examples as well as case studies to illustrate the theory. The target audience primarily comprises experts and practitioners in the field of sensor network security, but the book may also be beneficial for researchers in academia as well as for graduate students.
Network Science is the emerging field concerned with the study of large, realistic networks. This interdisciplinary endeavor, focusing on the patterns of interactions that arise between individual components of natural and engineered systems, has been applied to data sets from activities as diverse as high-throughput biological experiments, online trading information, smart-meter utility supplies, and pervasive telecommunications and surveillance technologies. This unique text/reference provides a fascinating insight into the state of the art in network science, highlighting the commonality across very different areas of application and the ways in which each area can be advanced by injecting ideas and techniques from another. The book includes contributions from an international selection of experts, providing viewpoints from a broad range of disciplines. It emphasizes networks that arise in nature-such as food webs, protein interactions, gene expression, and neural connections-and in technology-such as finance, airline transport, urban development and global trade. Topics and Features: begins with a clear overview chapter to introduce this interdisciplinary field; discusses the classic network science of fixed connectivity structures, including empirical studies, mathematical models and computational algorithms; examines time-dependent processes that take place over networks, covering topics such as synchronisation, and message passing algorithms; investigates time-evolving networks, such as the World Wide Web and shifts in topological properties (connectivity, spectrum, percolation); explores applications of complex networks in the physical and engineering sciences, looking ahead to new developments in the field. Researchers and professionals from disciplines as varied as computer science, mathematics, engineering, physics, chemistry, biology, ecology, neuroscience, epidemiology, and the social sciences will all benefit from this topical and broad overview of current activities and grand challenges in the unfolding field of network science.
This book presents the first paradigm of social multimedia computing completely from the user perspective. Different from traditional multimedia and web multimedia computing which are content-centric, social multimedia computing rises under the participatory Web2.0 and is essentially user-centric. The goal of this book is to emphasize the user factor in facilitating effective solutions towards both multimedia content analysis, user modeling and customized user services. Advanced topics like cross-network social multimedia computing are also introduced as extensions and potential directions along this research line.
The Internet has become the major form of map delivery. The current presentation of maps is based on the use of online services. This session examines developments related to online methods of map delivery, particularly Application Programmer Interfaces (APIs) and MapServices in general, including Google Maps API and similar services. Map mashups have had a major impact on how spatial information is presented. The advantage of using a major online mapping site is that the maps represent a common and recognizable representation of the world. Overlaying features on top of these maps provides a frame of reference for the map user. A particular advantage for thematic mapping is the ability to spatially reference thematic data.
Violent behavior has become deeply integrated into modern society and it is an unavoidable aspect of human nature. Examining peacemaking strategies through a critical and academic perspective can assist in resolving violence in societies around the world. The Handbook of Research on Examining Global Peacemaking in the Digital Age is a pivotal reference source for the latest research findings on the utilization of peacemaking in media, leadership, and religion. Featuring extensive coverage on relevant areas such as human rights, spirituality, and the Summer of Peace, this publication is an ideal resource for policymakers, universities and colleges, graduate-level students, and organizations seeking current research on the application of conflict resolution and international negotiation.
This book presents a simple, yet complete, approach to the design and performance analysis of distributed processing algorithms and techniques suitable for IEEE 802.15.4 networks. In particular, the book focuses on the bottom two layers of the ISO/OSI stack (Physical and Medium Access Control), discussing also a few issue related to routing. The book is a the synergistic combination of signal processing aspects on the one hand and MAC and connectivity issues on the other hand. The goal of the book is to clearly link physical layer aspects with medium access and topology aspects, in order to provide the reader with a clear understanding of how to approach the design of proper distributed signal processing and medium access algorithms in this context.
Decentralized Control and Filtering provides a rigorous framework for examining the analysis, stability and control of large-scale systems, addressing the difficulties that arise because dimensionality, information structure constraints, parametric uncertainty and time-delays.This monograph serves three purposes: it reviews past methods and results from a contemporary perspective; it examines presents trends and approaches and to provide future possibilities; and it investigates robust, reliable and/or resilient decentralized design methods based on a framework of linear matrix inequalities. As well as providing an overview of large-scale systems theories from the past several decades, the author presents key modern concepts and efficient computational methods. Representative numerical examples, end-of-chapter problems, and typical system applications are included, and theoretical developments and practical applications of large-scale dynamical systems are discussed in depth.
"Distributed Programming: Theory and Practice" presents a practical and rigorous method to develop distributed programs that correctly implement their specifications. The method also covers how to write specifications and how to use them. Numerous examples such as bounded buffers, distributed locks, message-passing services, and distributed termination detection illustrate the method. Larger examples include data transfer protocols, distributed shared memory, and TCP network sockets. "Distributed Programming: Theory and Practice" bridges the gap between books that focus on specific concurrent programming languages and books that focus on distributed algorithms. Programs are written in a "real-life" programming notation, along the lines of Java and Python with explicit instantiation of threads and programs.Students and programmers will see these as programs and not "merely" algorithms in pseudo-code. The programs implement interesting algorithms and solve problems that are large enough to serve as projects in programming classes and software engineering classes. Exercises and examples are included at the end of each chapter with on-line access to the solutions. "Distributed Programming: Theory and Practice "is designed as an advanced-level text book for students in computer science and electrical engineering. Programmers, software engineers and researchers working in this field will also find this book useful."
Fifty years ago, the political whistle-stop tour was thus named because trains blew their whistles twice when making unscheduled stops in backwater towns. Like its distant cousin, the "electronic" whistle-stop brings the candidate's message directly to the people, but with one outstanding difference: the new whistle-stop offers politicians an accuracy, efficiency, and success at voter persuasian unimaginable to by earlier whistle-stoppers such as Harry Truman. As Selnow shows, American political campaigns have an extraordinary affinity for electronic devices. They have seized upon electronic bulletin boards, home pages, and electronic libraries. Since political campaigns are communication campaigns, Selnow concludes that candidates who successfully inform, persuade, enlighten, and even confuse voters will win votes. Selnow also examines the debate between those who argue that new technologies have improved efficiency and those who believe that the innovations have affected society in other ways. Scholars and students of American political communication must read this book; the lively style will also make it exciting reading for anyone interested in this new political tool.
The implementation of virtual environments in education has been rapidly increasing in frequency after the COVID-19 pandemic. As these technologies rise in popularity, it is essential to understand the roles digital technologies play in fostering connections and learning, the affordances of digital texts and spaces for virtual classroom experiences, the difficulties educators have faced and how these practices have been crafted to meet these challenges, and more. Innovations in Digital Instruction Through Virtual Environments advances knowledge about the pedagogical decisions and lived experiences of researchers and educators both before and after the COVID-19 pandemic. It features research from those who have worked to sustain and develop digital/media pedagogical practices. Covering topics such as active learning environments, emotional labor, and textual engagements, this premier reference source is an excellent resource for educators and administrators of both K-12 and higher education, pre-service teachers, teacher educators, librarians, researchers, and academicians.
Cooperative and relay communications have recently become the most widely explored topics in communications, whereby users cooperate in transmitting their messages to the destination, instead of conventional networks which operate independently and compete among each other for channel resources. As the field has progressed, cooperative communications have become a design concept rather than a specific transmission technology. This concept has revolutionized the design of wireless networks, allowing increased coverage, throughput, and transmission reliability even as conventional transmission techniques gradually reach their limits. Cooperative and relay technologies have also made their way toward next generation wireless standards, such as IEEE802.16 (WiMAX) or LTE, and have been incorporated into many modern wireless applications, such as cognitive radio and secret communications. "Cooperative Communications and Networking: Technologies and System Design" provides a systematic introduction to the fundamental concepts of cooperative communications and relays technology to enable engineers, researchers or graduate students to conduct advanced research and development in this area. "Cooperative Communications and Networking: Technologies and System Design" provides researchers, graduate students, and practical engineers with sufficient knowledge of both the background of cooperative communications and networking, and potential research directions.
Grids, P2P and Services Computing, the 12th volume of the CoreGRID series, is based on the CoreGrid ERCIM Working Group Workshop on Grids, P2P and Service Computing in Conjunction with EuroPar 2009. The workshop will take place August 24th, 2009 in Delft, The Netherlands. Grids, P2P and Services Computing, an edited volume contributed by well-established researchers worldwide, will focus on solving research challenges for Grid and P2P technologies. Topics of interest include: Service Level Agreement, Data & Knowledge Management, Scheduling, Trust and Security, Network Monitoring and more. Grids are a crucial enabling technology for scientific and industrial development. This book also includes new challenges related to service-oriented infrastructures. Grids, P2P and Services Computing is designed for a professional audience composed of researchers and practitioners within the Grid community industry. This volume is also suitable for advanced-level students in computer science.
Technological advances in the field of IT lead to the creation of new programs intended to merge the advantages of desktop-based programs with the advantages of Web-based programs in order to increase user accessibility and provide effective computer performance. Frameworks, Methodologies, and Tools for Developing Rich Internet Applications presents current research and analysis on the use of JavaScript and software development to establish new programs intended for the Web. With an in-depth look at computer and Web programming, this publication emphasizes the benefits and dynamic qualities of these emerging technologies. This book is an essential reference source for academicians, researchers, students, practitioners, and professionals interested in understanding and applying the advances in the combined fields of Web engineering and desktop programming in order to increase computer users' visual experience and interactivity.
The main objective of this book is to provide a multidisciplinary overview of methodological approaches, architectures, platforms, and algorithms for the realization of an Internet of Things (IoT)-based Smart Urban Ecosystem (SUE). Moreover, the book details a set of real-world applications and case studies related to specific smart infrastructures and smart cities, including structural health monitoring, smart urban drainage networks, smart grids, power efficiency, healthcare, city security, and emergency management. A Smart Urban Ecosystem (SUE) is a people-centric system of systems that involves smart city environments, applications, and infrastructures. SUEs require the close integration of cyber and physical components for monitoring, understanding and controlling the urban environment. In this context, the Internet of Things (IoT) offers a valuable enabling technology, as it bridges the gap between physical things and software components, and empowers cooperation between distributed, pervasive, and heterogeneous entities.
Social networks and online communities are reshaping the way people communicate, both in their personal and professional lives. What makes some succeed and others fail? What draws a user in? What makes them join? What keeps them coming back? Entrepreneurs and businesses are turning to user experience practitioners to figure this out. Though they are well-equipped to evaluate and create a variety of interfaces, social networks require a different set of design principles and ways of thinking about the user in order to be successful. Design to Thrive presents tried and tested design methodologies,
based on the author s decades of research, to ensure successful and
sustainable online communities -- whether a wiki for employees to
share procedures and best practices or for the next Facebook. The
book describes four criteria, called"RIBS," which are necessary to
the design of a successful and sustainable online community. These
concepts provide designers with the tools they need to generate
informed creative and productive design ideas, to think proactively
about the communities they are building or maintaining, and to
design communities that encourage users to actively
contribute. Contains real world stories from popular, well known communities to illustrate how the concepts work Features a companion online network that employs the techniques outlined in the book "
The prominence of social media, especially in the lives of teenagers and young adults, has long been regarded as a significant distraction from studies. However, the integration of these forms of media into the teaching experience can improve the engagement of students. Global Perspectives on Social Media in Tertiary Learning and Teaching: Emerging Research and Opportunities is an essential scholarly publication that embeds innovative, current pedagogical practices into new and redeveloped courses and introduces digital and online learning tools to best support teaching practices. Featuring coverage on a wide range of topics including collaborative learning, innovative learning environments, and blended teaching, this book provides essential research for educators, educational administrators, education stakeholders, academicians, researchers, and professionals within the realm of higher education.
Accessing remote instrumentation worldwide is one of the goals of e-Science. The task of enabling the execution of complex experiments that involve the use of distributed scientific instruments must be supported by a number of different architectural domains, which inter-work in a coordinated fashion to provide the necessary functionality. These domains embrace the physical instruments, the communication network interconnecting the distributed systems, the service oriented abstractions and their middleware. The Grid paradigm (or, more generally, the Service Oriented Architecture -- SOA), viewed as a tool for the integration of distributed resources, plays a significant role, not only to manage computational aspects, but increasingly as an aggregator of measurement instrumentation and pervasive large-scale data acquisition platforms. In this context, the functionality of a SOA allows managing, maintaining and exploiting heterogeneous instrumentation and acquisition devices in a unified way, by providing standardized interfaces and common working environments to their users, but the peculiar aspects of dealing with real instruments of widely different categories may add new functional requirements to this scenario. On the other hand, the growing transport capacity of core and access networks allows data transfer at unprecedented speed, but new challenges arise from wireless access, wireless sensor networks, and the traversal of heterogeneous network domains. The book focuses on all aspects related to the effective exploitation of remote instrumentation and to the building complex virtual laboratories on top of real devices and infrastructures. These include SOA and related middleware, high-speed networking in support of Grid applications, wireless Grids for acquisition devices and sensor networks, Quality of Service (QoS) provisioning for real-time control, measurement instrumentation and methodology, as well as metrology issues in distributed systems.
This book presents the combined proceedings of the 10th International Conference on Computer Science and its Applications (CSA 2018) and the 13th KIPS International Conference on Ubiquitous Information Technologies and Applications (CUTE 2018), both held in Kuala Lumpur, Malaysia, Dec 17 - 19, 2018. The aim of these two meetings was to promote discussion and interaction among academics, researchers and professionals in the field of ubiquitous computing technologies. These proceedings reflect the state of the art in the development of computational methods, involving theory, algorithms, numerical simulation, error and uncertainty analysis and novel applications of new processing techniques in engineering, science, and other disciplines related to ubiquitous computing.
The Handbook on Socially Interactive Agents provides a comprehensive overview of the research fields of Embodied Conversational Agents, Intelligent Virtual Agents, and Social Robotics. Socially Interactive Agents (SIAs), whether virtually or physically embodied, are autonomous agents that are able to perceive an environment including people or other agents, reason, decide how to interact, and express attitudes such as emotions, engagement, or empathy. They are capable of interacting with people and one another in a socially intelligent manner using multimodal communicative behaviors, with the goal to support humans in various domains. Written by international experts in their respective fields, the book summarizes research in the many important research communities pertinent for SIAs, while discussing current challenges and future directions. The handbook provides easy access to modeling and studying SIAs for researchers and students, and aims at further bridging the gap between the research communities involved. In two volumes, the book clearly structures the vast body of research. The first volume starts by introducing what is involved in SIAs research, in particular research methodologies and ethical implications of developing SIAs. It further examines research on appearance and behavior, focusing on multimodality. Finally, social cognition for SIAs is investigated using different theoretical models and phenomena such as theory of mind or pro-sociality. The second volume starts with perspectives on interaction, examined from different angles such as interaction in social space, group interaction, or long-term interaction. It also includes an extensive overview summarizing research and systems of human-agent platforms and of some of the major application areas of SIAs such as education, aging support, autism, and games.
The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining expertise from the fields of economics, social science, business, law, policy and computer science. Prior workshops have explored the role of incentives between attackers and defenders, identified market failures dogging Internet security, and assessed investments in cyber-defense. Current contributions build on past efforts using empirical and analytic tools to not only understand threats, but also strengthen security through novel evaluations of available solutions. "Economics of Information Security and Privacy III" addresses the following questions: how should information risk be modeled given the constraints of rare incidence and high interdependence; how do individuals' and organizations' perceptions of privacy and security color their decision making; how can we move towards a more secure information infrastructure and code base while accounting for the incentives of stakeholders?
Good user interface design isn t just about aesthetics or using
the latest technology. Designers also need to ensure their product
is offering an optimal user experience. This requires user needs
analysis, usability testing, persona creation, prototyping, design
sketching, and evaluation through-out the design and development
process. "User Experience Re-Mastered" takes tried and tested
material from best-selling books in Morgan Kaufmann s Series in
Interactive Technologies and presents it in typical project
framework. Chauncey Wilson guides the reader through each chapter,
introducing each stage, explaining its context, and emphasizing its
significance in the user experience lifecycle. This gives readers
practical and easily applicable direction for creating web sites
and web applications that ensure the ultimate experience. A must
read for students, those new to the field, and anyone designing
interfaces for people *A guided, hands-on tour through the process of creating the ultimate user experience - from testing, to prototyping, to design, to evaluation *Provides tried and tested material from best sellers in Morgan Kaufmann s Series in Interactive Technologies, including leaders in the field such as Bill Buxton and Jakob Nielsen *Features never before seen material from Chauncey Wilson s forthcoming, and highly anticipated Handbook for User Centered Design"
This title explores research on new techniques for the virtual enterprise operation, and has opened up new ideas on the design principles and operation approaches in order to maximize benefits and overcome limitations. |
You may like...
|