![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet
This book brings together the diversified areas of contemporary computing frameworks in the field of Computer Science, Engineering and Electronic Science. It focuses on various techniques and applications pertaining to cloud overhead, cloud infrastructure, high speed VLSI circuits, virtual machines, wireless and sensor networks, clustering and extraction of information from images and analysis of e-mail texts. The state-of-the-art methodologies and techniques are addressed in chapters presenting various proposals for enhanced outcomes and performances. The techniques discussed are useful for young researchers, budding engineers and industry professionals for applications in their respective fields.
Wireless sensor Networks: Vehicle and Space Applications describes the practical perspectives in using wireless sensor networks (WSN) to develop real world applications that can be used for space exploration. These applications include sensor interfaces, remote wireless vehicles, space crew health monitoring and instrumentation. The material discusses how applications of WSN originally developed for space travel and exploration are being applied and used in multiple real world applications, allowing for the development of smart systems that have characteristics such as self healing, self diagnosis, and emergency healthcare notification.
This book presents a simple, yet complete, approach to the design and performance analysis of distributed processing algorithms and techniques suitable for IEEE 802.15.4 networks. In particular, the book focuses on the bottom two layers of the ISO/OSI stack (Physical and Medium Access Control), discussing also a few issue related to routing. The book is a the synergistic combination of signal processing aspects on the one hand and MAC and connectivity issues on the other hand. The goal of the book is to clearly link physical layer aspects with medium access and topology aspects, in order to provide the reader with a clear understanding of how to approach the design of proper distributed signal processing and medium access algorithms in this context.
Decentralized Control and Filtering provides a rigorous framework for examining the analysis, stability and control of large-scale systems, addressing the difficulties that arise because dimensionality, information structure constraints, parametric uncertainty and time-delays.This monograph serves three purposes: it reviews past methods and results from a contemporary perspective; it examines presents trends and approaches and to provide future possibilities; and it investigates robust, reliable and/or resilient decentralized design methods based on a framework of linear matrix inequalities. As well as providing an overview of large-scale systems theories from the past several decades, the author presents key modern concepts and efficient computational methods. Representative numerical examples, end-of-chapter problems, and typical system applications are included, and theoretical developments and practical applications of large-scale dynamical systems are discussed in depth.
Language teachers, social studies teachers, and school library media specialists will find this resource invaluable for providing lessons and activities in critical thinking for students in grades 7-12. It is filled with over 200 primary source Internet sites covering the Chinese, French, German, Spanish, Japanese, Russian, and Latin languages. Each Web site will help reinforce language skills while providing students with interactive lessons on the unique culture of the peoples who speak the language. The next best thing to visiting the country itself For each of the 56 primary Web sites, a site summary is given describing its contents and usefulness to teachers and school library media specialists. Site subjects may include: a country's radio or news program; the history of a country and its visual arts, including museums; foods eaten by the people who speak this language and recipes on how to prepare them; ceremonies, customs, and sports enjoyed; geography of the countries who speak this language; and sites to help practice the language itself. Following are a list of questions and activities which students can prepare orally or in written form, and at least four more related Web sites are provided for further study. Using this book will not only help students increase their language skills, but it will also open up the entire culture, to enable students to experience it just as if they were visiting
The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining expertise from the fields of economics, social science, business, law, policy and computer science. Prior workshops have explored the role of incentives between attackers and defenders, identified market failures dogging Internet security, and assessed investments in cyber-defense. Current contributions build on past efforts using empirical and analytic tools to not only understand threats, but also strengthen security through novel evaluations of available solutions. "Economics of Information Security and Privacy III" addresses the following questions: how should information risk be modeled given the constraints of rare incidence and high interdependence; how do individuals' and organizations' perceptions of privacy and security color their decision making; how can we move towards a more secure information infrastructure and code base while accounting for the incentives of stakeholders?
"Distributed Programming: Theory and Practice" presents a practical and rigorous method to develop distributed programs that correctly implement their specifications. The method also covers how to write specifications and how to use them. Numerous examples such as bounded buffers, distributed locks, message-passing services, and distributed termination detection illustrate the method. Larger examples include data transfer protocols, distributed shared memory, and TCP network sockets. "Distributed Programming: Theory and Practice" bridges the gap between books that focus on specific concurrent programming languages and books that focus on distributed algorithms. Programs are written in a "real-life" programming notation, along the lines of Java and Python with explicit instantiation of threads and programs.Students and programmers will see these as programs and not "merely" algorithms in pseudo-code. The programs implement interesting algorithms and solve problems that are large enough to serve as projects in programming classes and software engineering classes. Exercises and examples are included at the end of each chapter with on-line access to the solutions. "Distributed Programming: Theory and Practice "is designed as an advanced-level text book for students in computer science and electrical engineering. Programmers, software engineers and researchers working in this field will also find this book useful."
Each consumer now has the power to be a journalist, reviewer, and whistle blower. The prevalence of social media has made it possible to alter a brand's reputation with a single viral post, or spark a political movement with a hashtag. This new landscape requires a strategic plasticity and careful consideration of how the public will react to an organization's actions. Participation in social media is mandatory for a brand's success in this highly competitive online era. Managing Public Relations and Brand Image through Social Media provides the latest research and theoretical framework necessary to find ease in the shifting public relations and reputation management worlds. It provides an overview of the tools and skills necessary to deftly sidestep public affronts and to effectively use online outlets to enhance an organization's visibility and reputation. This publication targets policy makers, website developers, students and educators of public relations, PR and advertising professionals, and organizations who wish to better understand the effects of social media.
This book introduces the reader to the optical switching technology for its application to data centers. In addition, it takes a picture of the status of the technology and system architecture evolution and of the research in the area of optical switching in data center. The book is organized in four parts: the first part is focused on the system aspects of optical switching in intra-data center networking, the second part is dedicated to describing the recently demonstrated optical switching networks, the third part deals with the latest technologies developed to enable optical switching and, finally, the fourth part of the book outlines the future prospects and trends.
Machine learning boosts the capabilities of security solutions in the modern cyber environment. However, there are also security concerns associated with machine learning models and approaches: the vulnerability of machine learning models to adversarial attacks is a fatal flaw in the artificial intelligence technologies, and the privacy of the data used in the training and testing periods is also causing increasing concern among users. This book reviews the latest research in the area, including effective applications of machine learning methods in cybersecurity solutions and the urgent security risks related to the machine learning models. The book is divided into three parts: Cyber Security Based on Machine Learning; Security in Machine Learning Methods and Systems; and Security and Privacy in Outsourced Machine Learning. Addressing hot topics in cybersecurity and written by leading researchers in the field, the book features self-contained chapters to allow readers to select topics that are relevant to their needs. It is a valuable resource for all those interested in cybersecurity and robust machine learning, including graduate students and academic and industrial researchers, wanting to gain insights into cutting-edge research topics, as well as related tools and inspiring innovations.
Social networks and online communities are reshaping the way people communicate, both in their personal and professional lives. What makes some succeed and others fail? What draws a user in? What makes them join? What keeps them coming back? Entrepreneurs and businesses are turning to user experience practitioners to figure this out. Though they are well-equipped to evaluate and create a variety of interfaces, social networks require a different set of design principles and ways of thinking about the user in order to be successful. Design to Thrive presents tried and tested design methodologies,
based on the author s decades of research, to ensure successful and
sustainable online communities -- whether a wiki for employees to
share procedures and best practices or for the next Facebook. The
book describes four criteria, called"RIBS," which are necessary to
the design of a successful and sustainable online community. These
concepts provide designers with the tools they need to generate
informed creative and productive design ideas, to think proactively
about the communities they are building or maintaining, and to
design communities that encourage users to actively
contribute. Contains real world stories from popular, well known communities to illustrate how the concepts work Features a companion online network that employs the techniques outlined in the book "
This book presents the proceedings of the 1st EAI International Conference on Technology, Innovation, Entrepreneurship and Education (TIE 2017), which took place at Canterbury Christ Church University on September 11-12, 2017. The central theme of the conference is creativity and innovation, especially in relation to technology, business, education, social and political needs that make modern society flourish. The proceedings feature papers from a cross-disciplinary audience that explore the process of creativity and innovation. The goal is that the various disciplines can learn from each other and see how they might benefit from the cross-fertilization of practices.
Web information systems engineering resolves the multifaceted issues of Web-based systems development; however, as part of an emergent yet prolific industry, Web site quality assurance is a continually adaptive process needing a comprehensive reference tool to merge all cutting-edge research and innovations. ""Handbook of Research on Web Information Systems Quality"" integrates invaluable research on the models, measures, and methodologies of Web information systems, software quality, and Web engineering into one practical guide to Web information systems quality, making this handbook of research an essential addition to all library collections.
This proceedings presents the papers of the 3rd EAI International Conference on Robotic Sensor Networks (ROSENET 2019). The conference explores the integration of networks and robotic technologies, which has become a topic of increasing interest for both researchers and developers from academic fields and industries worldwide. The authors posit that big networks will be the main approach to the next generation of robotic research, The book discusses how the explosive number of network models and increasing computational power of computers significantly extends the number of potential applications for robotic technologies while also bringing new challenges to each network's community. The conference provided a platform for researchers to share up-to-date scientific achievements in this field. The conference took place August 17, 2019, Kitakyushu, Japan. Presents the proceedings of the 3rd EAI International Conference on Robotic Sensor Networks (ROSENET 2019), August 17, 2019, Kitakyushu, Japan Features papers on robotic technologies for healthcare, medicine, military and more Includes perspectives from a multi-disciplinary selection of global researchers, academics, and professionals
Design Methods for Reactive Systems describes methods and
techniques for the design of software systems particularly reactive
software systems that engage in stimulus-response behavior. Such
systems, which include information systems, workflow management
systems, systems for e-commerce, production control systems, and
embedded software, increasingly embody design aspects previously
considered alone such as complex information processing,
non-trivial behavior, and communication between different
components aspects traditionally treated separately by classic
software design methodologies. But, as this book illustrates, the
software designer is better served by the ability to intelligently
pick and choose from among a variety of techniques according to the
particular demands and properties of the system under development.
The increasing complexity of telecommunication networks requires us to develop adequate mathematical models. We must find their characteristics, optimize them subject to chosen criteria, and develop the corresponding control algorithms. Multidimensional queueing models are used to design and optimize modern and next-generation networks (NGN). The central problem of the related mathematical theory is to apply multidimensional and large-size queueing models to improve efficiency. In this book new methods are successively developed and applied to solve related problems. The book is recommended for researchers engaged with the mathematical theory of telecommunications traffic.
Convergence proposes the enhancement of the Internet with a novel, content-centric, publish-subscribe service model based on the versatile digital item (VDI): a common container for all kinds of digital content, including digital representations of real-world resources. VDIs will serve the needs of the future Internet, providing a homogeneous method for handling structured information, incorporating security and privacy mechanisms. CONVERGENCE subsumes the following areas of research: * definition of the VDI as a new fundamental unit of distribution and transaction; * content-centric networking functionality to complement or replace IP-address-based routing; * security and privacy protection mechanisms; * open-source middleware, including a community dictionary service to enable rich semantic searches; * applications, tested under real-life conditions. This book shows how CONVERGENCE allows publishing, searching and subscribing to any content. Creators can publish their content by wrapping it and its descriptions into a VDI, setting rights for other users to access this content, monitor its use, and communicate with people using it; they may even update or revoke content previously published. Access to content is more efficient, as search engines exploit VDI metadata for indexing, and the network uses the content name to ensure users always access the copy closest to them. Every node in the network is a content cache; handover is easy; multicast is natural; peer-to-peer is built-in; time/space-decoupling is possible. Application developers can exploit CONVERGENCE's middleware and network without having to resort to proprietary/ad hoc solutions for common/supporting functionality. Operators can use the network more efficiently, better controlling information transfer and related revenues flows. Network design, operation and management are simplified by integrating diverse functions and avoiding patches and stopgap solutions. Whether as a text for graduate students working on the future of the Internet, or a resource for practitioners providing e-commerce or multimedia services, or scientists defining new technologies, CONVERGENCE will make a valuable contribution to the future shape of the Internet.
Good user interface design isn t just about aesthetics or using
the latest technology. Designers also need to ensure their product
is offering an optimal user experience. This requires user needs
analysis, usability testing, persona creation, prototyping, design
sketching, and evaluation through-out the design and development
process. "User Experience Re-Mastered" takes tried and tested
material from best-selling books in Morgan Kaufmann s Series in
Interactive Technologies and presents it in typical project
framework. Chauncey Wilson guides the reader through each chapter,
introducing each stage, explaining its context, and emphasizing its
significance in the user experience lifecycle. This gives readers
practical and easily applicable direction for creating web sites
and web applications that ensure the ultimate experience. A must
read for students, those new to the field, and anyone designing
interfaces for people *A guided, hands-on tour through the process of creating the ultimate user experience - from testing, to prototyping, to design, to evaluation *Provides tried and tested material from best sellers in Morgan Kaufmann s Series in Interactive Technologies, including leaders in the field such as Bill Buxton and Jakob Nielsen *Features never before seen material from Chauncey Wilson s forthcoming, and highly anticipated Handbook for User Centered Design"
This book gives a wide-ranging description of the many facets of complex dynamic networks and systems within an infrastructure provided by integrated control and supervision: envisioning, design, experimental exploration, and implementation. The theoretical contributions and the case studies presented can reach control goals beyond those of stabilization and output regulation or even of adaptive control. Reporting on work of the Control of Complex Systems (COSY) research program, Complex Systems follows from and expands upon an earlier collection: Control of Complex Systems by introducing novel theoretical techniques for hard-to-control networks and systems. The major common feature of all the superficially diverse contributions encompassed by this book is that of spotting and exploiting possible areas of mutual reinforcement between control, computing and communications. These help readers to achieve not only robust stable plant system operation but also properties such as collective adaptivity, integrity and survivability at the same time retaining desired performance quality. Applications in the individual chapters are drawn from: * the general implementation of model-based diagnosis and systems engineering in medical technology, in communication, and in power and airport networks; * the creation of biologically inspired control brains and safety-critical human-machine systems, * process-industrial uses; * biped robots; * large space structures and unmanned aerial vehicles; and * precision servomechanisms and other advanced technologies. Complex Systems provides researchers from engineering, applied mathematics and computer science backgrounds with innovative theoretical and practical insights into the state-of-the-art of complex networks and systems research. It employs physical implementations and extensive computer simulations. Graduate students specializing in complex-systems
This title explores research on new techniques for the virtual enterprise operation, and has opened up new ideas on the design principles and operation approaches in order to maximize benefits and overcome limitations.
Businesses constantly face online hacking threats or security breaches in their online mainframe that expose sensitive information to the wrong audience. Companies look to store their data in a separate location, distancing the availability of the information and reducing the risk of data breaches. Modern organizations need to remain vigilant against insider attacks, cloud computing risks, and security flaws within their mainframe. Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities is an essential reference source that discusses maintaining a secure management of sensitive data, and intellectual property and provides a robust security algorithm on consumer data. Featuring research on topics such as public cryptography, security principles, and trustworthy computing, this book is ideally designed for IT professionals, business managers, researchers, students, and professionals seeking coverage on preventing and detecting the insider attacks using trusted cloud computing techniques.
The prominence of social media, especially in the lives of teenagers and young adults, has long been regarded as a significant distraction from studies. However, the integration of these forms of media into the teaching experience can improve the engagement of students. Global Perspectives on Social Media in Tertiary Learning and Teaching: Emerging Research and Opportunities is an essential scholarly publication that embeds innovative, current pedagogical practices into new and redeveloped courses and introduces digital and online learning tools to best support teaching practices. Featuring coverage on a wide range of topics including collaborative learning, innovative learning environments, and blended teaching, this book provides essential research for educators, educational administrators, education stakeholders, academicians, researchers, and professionals within the realm of higher education.
"Satellite Data Compression" covers recent progress in compression techniques for multispectral, hyperspectral and ultra spectral data. A survey of recent advances in the fields of satellite communications, remote sensing and geographical information systems is included. "Satellite Data Compression," contributed by leaders in this field, is the first book available on satellite data compression. It covers onboard compression methodology and hardware developments in several space agencies. Case studies are presented on recent advances in satellite data compression techniques via various prediction-based, lookup-table-based, transform-based, clustering-based, and projection-based approaches. This book provides valuable information on state-of-the-art satellite data compression technologies for professionals and students who are interested in this topic. "Satellite Data Compression" is designed for a professional audience comprised of computer scientists working in satellite communications, sensor system design, remote sensing, data receiving, airborne imaging and geographical information systems (GIS). Advanced-level students and academic researchers will also benefit from this book. |
![]() ![]() You may like...
An Introduction to XML and Web…
Anders Moller, Michael Schwartzbach
Paperback
R2,527
Discovery Miles 25 270
Social Reading - Platforms…
Jose Antonio Cordon Garcia, Julio Alonso Arevalo, …
Paperback
R1,551
Discovery Miles 15 510
Towards A Semantic Web - Connecting…
Bill Cope, Mary Kalantzis, …
Paperback
|