![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet
The book is compilation of technical papers presented at International Research Symposium on Computing and Network Sustainability (IRSCNS 2016) held in Goa, India on 1st and 2nd July 2016. The areas covered in the book are sustainable computing and security, sustainable systems and technologies, sustainable methodologies and applications, sustainable networks applications and solutions, user-centered services and systems and mobile data management. The novel and recent technologies presented in the book are going to be helpful for researchers and industries in their advanced works.
Cyberspace in increasingly important to people in their everyday lives for purchasing goods on the Internet, to energy supply increasingly managed remotely using Internet protocols. Unfortunately, this dependence makes us susceptible to attacks from nation states, terrorists, criminals and hactivists. Therefore, we need a better understanding of cyberspace, for which patterns, which are predictable regularities, may help to detect, understand and respond to incidents better. The inspiration for the workshop came from the existing work on formalising design patterns applied to cybersecurity, but we also need to understand the many other types of patterns that arise in cyberspace.
This book constitutes the refereed proceedings of the 15th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2014, held in Amsterdam, The Netherlands, in October 2014. The 73 revised papers were carefully selected from 190 submissions. They provide a comprehensive overview of identified challenges and recent advances in various collaborative network (CN) domains and their applications, with a particular focus on the following areas in support of smart networked environments: behavior and coordination; product-service systems; service orientation in collaborative networks; engineering and implementation of collaborative networks; cyber-physical systems; business strategies alignment; innovation networks; sustainability and trust; reference and conceptual models; collaboration platforms; virtual reality and simulation; interoperability and integration; performance management frameworks; performance management systems; risk analysis; optimization in collaborative networks; knowledge management in networks; health and care networks; and mobility and logistics.
The book gathers the best research papers presented at the International Conference on Recent Trends in Communication and Intelligent Systems (ICRTCIS 2019), organized by Rajasthan Technical University Kota, and Arya College of Engineering and IT, Jaipur, on 8-9 June 2019. It discusses the latest technologies in communication and intelligent systems, covering various areas of communication engineering, such as signal processing, VLSI design, embedded systems, wireless communications, and electronics and communications in general. Featuring work by leading researchers and technocrats, the book serves as a valuable reference resource for young researchers and academics as well as practitioners in industry.
This book covers in a great depth the fast growing topic of tools, techniques and applications of soft computing (e.g., fuzzy logic, genetic algorithms, neural networks, rough sets, Bayesian networks, and other probabilistic techniques) in the ontologies and the Semantic Web. The author shows how components of the Semantic Web (like the RDF, Description Logics, ontologies) can be covered with a soft computing methodology.
Advances in computing, communications, and control have bridged the physical components of reality and cyberspace leading to the smart internet of things (IoT). The notion of IoT has extraordinary significance for the future of several industrial domains. Hence, it is expected that the complexity in the design of IoT applications will continue to increase due to the integration of several cyber components with physical and industrial systems. As a result, several smart protocols and algorithms are needed to communicate and exchange data between IoT devices. Smart Devices, Applications, and Protocols for the IoT is a collection of innovative research that explores new methods and techniques for achieving reliable and efficient communication in recent applications including machine learning, network optimization, adaptive methods, and smart algorithms and protocols. While highlighting topics including artificial intelligence, sensor networks, and mobile network architectures, this book is ideally designed for IT specialists and consultants, software engineers, technology developers, academicians, researchers, and students seeking current research on up-to-date technologies in smart communications, protocols, and algorithms in IoT.
Big data technologies are used to achieve any type of analytics in a fast and predictable way, thus enabling better human and machine level decision making. Principles of distributed computing are the keys to big data technologies and analytics. The mechanisms related to data storage, data access, data transfer, visualization and predictive modeling using distributed processing in multiple low cost machines are the key considerations that make big data analytics possible within stipulated cost and time practical for consumption by human and machines. However, the current literature available in big data analytics needs a holistic perspective to highlight the relation between big data analytics and distributed processing for ease of understanding and practitioner use. This book fills the literature gap by addressing key aspects of distributed processing in big data analytics. The chapters tackle the essential concepts and patterns of distributed computing widely used in big data analytics. This book discusses also covers the main technologies which support distributed processing. Finally, this book provides insight into applications of big data analytics, highlighting how principles of distributed computing are used in those situations. Practitioners and researchers alike will find this book a valuable tool for their work, helping them to select the appropriate technologies, while understanding the inherent strengths and drawbacks of those technologies.
This book focuses on the development and implementation of cloud-based, complex software that allows parallelism, fast processing, and real-time connectivity. Software engineering (SE) is the design, development, testing, and implementation of software applications, and this discipline is as well developed as the practice is well established whereas the Cloud Software Engineering (CSE) is the design, development, testing, and continuous delivery of service-oriented software systems and applications (Software as a Service Paradigm). However, with the emergence of the highly attractive cloud computing (CC) paradigm, the tools and techniques for SE are changing. CC provides the latest software development environments and the necessary platforms relatively easily and inexpensively. It also allows the provision of software applications equally easily and on a pay-as-you-go basis. Business requirements for the use of software are also changing and there is a need for applications in big data analytics, parallel computing, AI, natural language processing, and biometrics, etc. These require huge amounts of computing power and sophisticated data management mechanisms, as well as device connectivity for Internet of Things (IoT) environments. In terms of hardware, software, communication, and storage, CC is highly attractive for developing complex software that is rapidly becoming essential for all sectors of life, including commerce, health, education, and transportation. The book fills a gap in the SE literature by providing scientific contributions from researchers and practitioners, focusing on frameworks, methodologies, applications, benefits and inherent challenges/barriers to engineering software using the CC paradigm.
The Semantic Web, which is intended to establish a machine-understandable Web, is currently changing from being an emerging trend to a technology used in complex real-world applications. A number of standards and techniques have been developed by the World Wide Web Consortium (W3C), e.g., the Resource Description Framework (RDF), which provides a general method for conceptual descriptions for Web resources, and SPARQL, an RDF querying language. Recent examples of large RDF data with billions of facts include the UniProt comprehensive catalog of protein sequence, function and annotation data, the RDF data extracted from Wikipedia, and Princeton University's WordNet. Clearly, querying performance has become a key issue for Semantic Web applications. In his book, Groppe details various aspects of high-performance Semantic Web data management and query processing. His presentation fills the gap between Semantic Web and database books, which either fail to take into account the performance issues of large-scale data management or fail to exploit the special properties of Semantic Web data models and queries. After a general introduction to the relevant Semantic Web standards, he presents specialized indexing and sorting algorithms, adapted approaches for logical and physical query optimization, optimization possibilities when using the parallel database technologies of today's multicore processors, and visual and embedded query languages. Groppe primarily targets researchers, students, and developers of large-scale Semantic Web applications. On the complementary book webpage readers will find additional material, such as an online demonstration of a query engine, and exercises, and their solutions, that challenge their comprehension of the topics presented.
This book reviews existing operational software failure analysis techniques and proposes near-miss analysis as a novel, and new technique for investigating and preventing software failures. The authors provide details on how near-miss analysis techniques focus on the time-window before the software failure actually unfolds, so as to detect the high-risk conditions that can lead to a major failure. They detail how by alerting system users of an upcoming software failure, the detection of near misses provides an opportunity to collect at runtime failure-related data that is complete and relevant. They present a near-miss management systems (NMS) for detecting upcoming software failures, which can contribute significantly to the improvement of the accuracy of the software failure analysis. A prototype of the NMS is implemented and is discussed in the book. The authors give a practical hands-on approach towards doing software failure investigations by means of near-miss analysis that is of use to industry and academia
This research book presents some specific multimedia systems that have been developed and applied in practice. More specifically, it consists of an editorial, an introductory chapter and six chapters as below. * Use of Multi-attribute Decision Making for Combining Audio-Lingual and Visual-Facial Modalities in Emotion Recognition. . Cooperative Learning assisted by Automatic Classification within Social Networking Services. . Improving Peer-to-Peer Communication in e-Learning by Development of an Advanced Messaging System. * Fuzzy-based Digital Video Stabilization in Static Scenes. * Development of Architecture, Information Archive and Multimedia Formats for Digital e-Libraries. * Layered Ontological Image for Intelligent Interaction to extend User Capabilities on Multimedia Systems in a Folksonomy Driven Environment.
This book provides graduate students and practitioners with knowledge of the CORBA standard and practical experience of implementing distributed systems with CORBA's Java mapping. With tested code examples that will run immediately!
Design is an art form in which the designer selects from a myriad of alternatives to bring an "optimum" choice to a user. In many complex of "optimum" is difficult to define. Indeed, the users systems the notion themselves will not agree, so the "best" system is simply the one in which the designer and the user have a congruent viewpoint. Compounding the design problem are tradeoffs that span a variety of technologies and user requirements. The electronic business system is a classically complex system whose tradeoff criteria and user views are constantly changing with rapidly developing underlying technology. Professor Milutinovic has chosen this area for his capstone contribution to the computer systems design. This book completes his trilogy on design issue in computer systems. His first work, "Surviving the Design of a 200 MHz RISC Microprocessor" (1997) focused on the tradeoffs and design issues within a processor. His second work, "Surviving the Design of Microprocessor and Multiprocessor Systems" (2000) considers the design issues involved with assembling a number of processors into a coherent system. Finally, this book generalizes the system design problem to electronic commerce on the Internet, a global system of immense consequence.
This book introduces wireless personal communications from the point of view of wireless communication system researchers. Existing sources on wireless communications put more emphasis on simulation and fundamental principles of how to build a study model. In this volume, the aim is to pass on to readers as much knowledge as is essential for completing model building of wireless communications, focusing on wireless personal area networks (WPANs). This book is the first of its kind that gives step-by-step details on how to build the WPANs simulation model. It is most helpful for readers to get a clear picture of the whole wireless simulation model by being presented with many study models. The book is also the first treatise on wireless communication that gives a comprehensive introduction to data-length complexity and the computational complexity of the processed data and the error control schemes. This volume is useful for all academic and technical staff in the fields of telecommunications and wireless communications, as it presents many scenarios for enhancing techniques for weak error control performance and other scenarios for complexity reduction of the wireless data and image transmission. Many examples are given to help readers to understand the material covered in the book. Additional resources such as the MATLAB codes for some of the examples also are presented.
Mobile Intention Recognition addresses problems of practical relevance for mobile system engineers: how can we make mobile assistance systems more intelligent? How can we model and recognize patterns of human behavior which span more than a limited spatial context? This text provides an overview on plan and intention recognition, ranging from the late 1970s to very recent approaches. This overview is unique as it discusses approaches with respect to the specificities of mobile intention recognition. This book covers problems from research on mobile assistance systems using methods from artificial intelligence and natural language processing. It thus addresses an extraordinary interdisciplinary audience.
Enterprise IT infrastructure is getting increasingly complex. With the increase in complexity has arisen the need to manage it. Management in general can be seen as the process of assuring that a managed entity meets its expectations in a controlled and predictable manner. Examples of managed entities are not only components, entire systems, processes, but also people such as employees, developers, or operators, and entire organizations. Traditional management has addressed some of these issues in varied manner. The emergence of Web services has added a new complexity to the management problem and poses a new set of problems. But it also adds to the mix a set of technologies that will make the task of management simpler. Management of Web services will be critical as businesses come to rely on them as a substantial source of their revenue. The book tries to cover the broad area of web services, the concepts, implications for the enterprise, issues involved in their management and how they are being used for management themselves. The book is intended as a reference for current practice and future directions for web services and their management. The book is directed at: * Computing professionals, academicians and students to learn about the important concepts behind the web services paradigm and how it impacts the enterprise in general and how it affects traditional application, network and system management.
'I loved her then, I love her now. Annie's back and she's better than ever! Fun, feel good and feisty - Annie Valentine is the woman you want to share a cocktail with!' Portia MacIntosh Can she get her life back online?Tired of being underestimated, Annie Valentine is determined to prove to everyone that she can make her life a success. Her job as a personal shopper is brilliant, but she's now intent on setting up a shoe and handbag empire of her own. To get there, she'll do anything and go anywhere - the handbag factories of Italy are calling! But what started out as a fun after hours project is getting slightly out of hand. Because Annie is working around the clock to bag the perfect bargain, and her family life and relationship with adorable Ed is feeling the strain. Annie knows she is getting in too deep, but the more she tries to pull back, the more risks she takes. Soon, everything Annie loves is on the line and perhaps the only way to have it all is to step into the real world again.... Fans of Sophie Kinsella, Lindsey Kelk and Paige Toon will love this laugh-out-loud romantic comedy from bestselling author Carmen Reid. What readers are saying! "If you love shopping as much as you love a great read, try this. Wonderful." Bestselling author, Katie Fforde "Annie Valentine is a wonderful character - I want her to burst into my life and sort out my wardrobe for me!" Bestselling author, Jill Mansell "You will enjoy getting to know Annie Valentine; laughing with her and crying with her. You may even fall in love with her . . . I have! A fantastic read!" Reader review "Fantastic read, couldn't put it down" Reader review "Can't wait to read the next one!" Reader review
"Both newbies (newcomers to the Internet) and Netizens (old-timers)
will find challenges and rewards in this witty, knowledgeable, and
timely report from the electronic front." "Vividly describes the virtual realm as a place of
interconnecting communities every bitas complicated, exciting, and
dangerous as any city." "A pleasant antidote to the breathless rhetoric one finds in
many books and magazines devoted to computer culture." "Grossman brings a wealth of professional and personal
experience to the material-and a clarity of style and analysis that
is a welcome relief from both the hyperbolic prose of many Net
boosters and the overwrought jeremiads of cyberphobes." "There is a lot to like about this survey, especially the
diligent research and reading the author has invested in it. The
endnotes are vast and informative..."From Anarchy to Power" gathers
strengh as it goes along." "An informative exploration into many of the issues and problems
that plague the Net today...From Anarchy to Power is a must
read." companion website: http: //www.nyupress.org/fap Yesterday's battles over internet turf were fought on the net itself: today's battles are fought in government committees, in Congress, on the stock exchange, and in the marketplace. What was once an experimental ground for electronic commerce is now the hottest part of our economic infrastructure. In From Anarchy to Power, Wendy Grossman explores the new dispensation on the net and tackles the questions that trouble every online user: How vulnerable are the internet andworld wide web to malicious cyber hackers? What are the limits of privacy online? How real is internet addiction and to what extent is the news media responsible for this phenomenon? Are women and minorities at a disadvantage in cyberspace? How is the increasing power of big business changing internet culture? We learn about the political economy of the internet including issues of copyright law, corporate control and cryptography legislation. Throughout the book the emphasis is on the international dimensions of the net, focusing on privacy and censorship in the United States, Europe and Canada and the hitherto ignored contributions of other countries in the development of the net. Entertaining and informative From Anarchy to Power is required reading for anyone who wants to know where the new digital economy is heading. |
![]() ![]() You may like...
The Best Damn Cybercrime and Digital…
Jack Wiles, Anthony Reyes
Paperback
R1,345
Discovery Miles 13 450
The Asian Aspiration - Why And How…
Greg Mills, Olusegun Obasanjo, …
Paperback
Cybersecurity Issues, Challenges, and…
Suhasini Verma, Vidhisha Vyas, …
Hardcover
R7,155
Discovery Miles 71 550
Kirstenbosch - A Visitor's Guide
Colin Paterson-Jones, John Winter
Paperback
Physical-Layer Security for Cooperative…
Yulong Zou, Jia Zhu
Hardcover
R2,873
Discovery Miles 28 730
|