0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (16)
  • R500+ (4,482)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

Data and Applications Security XVII - Status and Prospects (Paperback, Softcover reprint of the original 1st ed. 2004): Sabrina... Data and Applications Security XVII - Status and Prospects (Paperback, Softcover reprint of the original 1st ed. 2004)
Sabrina de Capitani di Vimercati, Ray Indrakshi, Indrajit Ray
R4,047 Discovery Miles 40 470 Ships in 18 - 22 working days

Security and privacy are paramount concerns in information processing systems, which are vital to business, government and military operations and, indeed, society itself. Meanwhile, the expansion of the Internet and its convergence with telecommunication networks are providing incredible connectivity, myriad applications and, of course, new threats. Data and Applications Security XVII: Status and Prospects describes original research results, practical experiences and innovative ideas, all focused on maintaining security and privacy in information processing systems and applications that pervade cyberspace. The areas of coverage include: -Information Warfare, -Information Assurance, -Security and Privacy, -Authorization and Access Control in Distributed Systems, -Security Technologies for the Internet, -Access Control Models and Technologies, -Digital Forensics. This book is the seventeenth volume in the series produced by the International Federation for Information Processing (IFIP) Working Group 11.3 on Data and Applications Security. It presents a selection of twenty-six updated and edited papers from the Seventeenth Annual IFIP TC11 / WG11.3 Working Conference on Data and Applications Security held at Estes Park, Colorado, USA in August 2003, together with a report on the conference keynote speech and a summary of the conference panel. The contents demonstrate the richness and vitality of the discipline, and other directions for future research in data and applications security. Data and Applications Security XVII: Status and Prospects is an invaluable resource for information assurance researchers, faculty members and graduate students, as well as for individuals engaged in research and development in the information technology sector.

Information Systems and Data Compression (Paperback, Softcover reprint of the original 1st ed. 1997): Jerzy A. Seidler Information Systems and Data Compression (Paperback, Softcover reprint of the original 1st ed. 1997)
Jerzy A. Seidler
R4,067 Discovery Miles 40 670 Ships in 18 - 22 working days

Information Systems and Data Compression presents a uniform approach and methodology for designing intelligent information systems. A framework for information concepts is introduced for various types of information systems such as communication systems, information storage systems and systems for simplifying structured information. The book introduces several new concepts and presents a novel interpretation of a wide range of topics in communications, information storage, and information compression. Numerous illustrations for designing information systems for compression of digital data and images are used throughout the book.

Deadline Scheduling for Real-Time Systems - EDF and Related Algorithms (Paperback, Softcover reprint of the original 1st ed.... Deadline Scheduling for Real-Time Systems - EDF and Related Algorithms (Paperback, Softcover reprint of the original 1st ed. 1998)
John A. Stankovic, Marco Spuri, Krithi Ramamritham, Giorgio C Buttazzo
R4,011 Discovery Miles 40 110 Ships in 18 - 22 working days

Many real-time systems rely on static scheduling algorithms. This includes cyclic scheduling, rate monotonic scheduling and fixed schedules created by off-line scheduling techniques such as dynamic programming, heuristic search, and simulated annealing. However, for many real-time systems, static scheduling algorithms are quite restrictive and inflexible. For example, highly automated agile manufacturing, command, control and communications, and distributed real-time multimedia applications all operate over long lifetimes and in highly non-deterministic environments. Dynamic real-time scheduling algorithms are more appropriate for these systems and are used in such systems. Many of these algorithms are based on earliest deadline first (EDF) policies. There exists a wealth of literature on EDF-based scheduling with many extensions to deal with sophisticated issues such as precedence constraints, resource requirements, system overload, multi-processors, and distributed systems.Deadline Scheduling for Real-Time Systems: EDF and Related Algorithms aims at collecting a significant body of knowledge on EDF scheduling for real-time systems, but it does not try to be all-inclusive (the literature is too extensive). The book primarily presents the algorithms and associated analysis, but guidelines, rules, and implementation considerations are also discussed, especially for the more complicated situations where mathematical analysis is difficult. In general, it is very difficult to codify and taxonomize scheduling knowledge because there are many performance metrics, task characteristics, and system configurations. Also, adding to the complexity is the fact that a variety of algorithms have been designed for different combinations of these considerations. In spite of the recent advances there are still gaps in the solution space and there is a need to integrate the available solutions.For example, a list of issues to consider includes: * preemptive versus non-preemptive tasks, * uni-processors versus multi-processors, * using EDF at dispatch time versus EDF-based planning, * precedence constraints among tasks, * resource constraints, * periodic versus aperiodic versus sporadic tasks, * scheduling during overload, * fault tolerance requirements, and * providing guarantees and levels of guarantees (meeting quality of service requirements). Deadline Scheduling for Real-Time Systems: EDF and Related Algorithms should be of interest to researchers, real-time system designers, and instructors and students, either as a focussed course on deadline-based scheduling for real-time systems, or, more likely, as part of a more general course on real-time computing. The book serves as an invaluable reference in this fast-moving field.

Distributed Medium Access Control in Wireless Networks (Paperback, 2013 ed.): Ping Wang, Weihua Zhuang Distributed Medium Access Control in Wireless Networks (Paperback, 2013 ed.)
Ping Wang, Weihua Zhuang
R1,363 Discovery Miles 13 630 Ships in 18 - 22 working days

This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network service provider for service class management. Also proposed is a novel busy-tone based distributed MAC scheme for wireless ad hoc networks and a collision-free MAC scheme for wireless mesh networks, respectively, taking the different network characteristics into consideration. The proposed schemes enhance the QoS provisioning capability to real-time traffic and, at the same time, significantly improve the system throughput and fairness performance for data traffic, as compared with the most popular IEEE 802.11 MAC scheme.

Managing Business and Service Networks (Paperback, Softcover reprint of the original 1st ed. 2001): Lundy Lewis Managing Business and Service Networks (Paperback, Softcover reprint of the original 1st ed. 2001)
Lundy Lewis
R4,036 Discovery Miles 40 360 Ships in 18 - 22 working days

Most everything in our experience requires management in some form or other: our gardens, our automobiles, our minds, our bodies, our love lives, our businesses, our forests, our countries, etc. Sometimes we don't call it "management" per se. We seldom talk about managing our minds or automobiles. But if we think of management in terms of monitoring, maintaining, and cultivating with respect to some goal, then it makes sense. We certainly monitor an automobile, albeit unconsciously, to make sure that it doesn't exhibit signs of trouble. And we certainly try to cultivate our minds. This book is about managing networks. That itself is not a new concept. We've been managing the networks that support our telephones for about 100 years, and we've been managing the networks that support our computers for about 20 years. What is new (and what motivated me to write this book) is the following: (i) the enormous advancements in networking technology as we transition th st from the 20 century to the 21 century, (ii) the increasing dependence of human activities on networking technology, and (iii) the commercialization of services that depend on networking technology (e.g., email and electronic commerce).

Performance Evaluation and Applications of ATM Networks (Paperback, Softcover reprint of the original 1st ed. 2000): Demetres... Performance Evaluation and Applications of ATM Networks (Paperback, Softcover reprint of the original 1st ed. 2000)
Demetres D. Kouvatsos
R5,192 Discovery Miles 51 920 Ships in 18 - 22 working days

Information Highways are widely considered as the next generation of high speed communication systems. These highways will be based on emerging Broadband Integrated Services Digital Networks (B-ISDN), which - at least in principle - are envisioned to support not only all the kinds of networking applications known today but also future applications which are not as yet understood fully or even anticipated. Thus, B-ISDNs release networking processes from the limitations which the communications medium has imposed historically. The operational generality stems from the versatility of Asynchronous Transfer Mode (ATM) which is the transfer mode adopted by ITU-T for broadband public ISDN as well as wide area private ISDN. A transfer mode which provides the transmission, multiplexing and switching core that lies at the foundations of a communication network. ATM is designed to integrate existing and future voice, audio, image and data services. Moreover, ATM aims to minimise the complexity of switching and buffer management, to optimise intermediate node processing and buffering and to bound transmission delays. These design objectives are met at high transmission speeds by keeping the basic unit of ATM transmission - the ATM cell - short and of fixed length.

Load Balancing in Parallel Computers - Theory and Practice (Paperback, Softcover reprint of the original 1st ed. 1997):... Load Balancing in Parallel Computers - Theory and Practice (Paperback, Softcover reprint of the original 1st ed. 1997)
Chenzhong Xu, Francis C.M. Lau
R5,806 Discovery Miles 58 060 Ships in 18 - 22 working days

Load Balancing in Parallel Computers: Theory and Practice is about the essential software technique of load balancing in distributed memory message-passing parallel computers, also called multicomputers. Each processor has its own address space and has to communicate with other processors by message passing. In general, a direct, point-to-point interconnection network is used for the communications. Many commercial parallel computers are of this class, including the Intel Paragon, the Thinking Machine CM-5, and the IBM SP2. Load Balancing in Parallel Computers: Theory and Practice presents a comprehensive treatment of the subject using rigorous mathematical analyses and practical implementations. The focus is on nearest-neighbor load balancing methods in which every processor at every step is restricted to balancing its workload with its direct neighbours only. Nearest-neighbor methods are iterative in nature because a global balanced state can be reached through processors' successive local operations. Since nearest-neighbor methods have a relatively relaxed requirement for the spread of local load information across the system, they are flexible in terms of allowing one to control the balancing quality, effective for preserving communication locality, and can be easily scaled in parallel computers with a direct communication network. Load Balancing in Parallel Computers: Theory and Practice serves as an excellent reference source and may be used as a text for advanced courses on the subject.

Job Scheduling Strategies for Parallel Processing - 17th International Workshop, JSSPP 2013, Boston, MA, USA, May 24, 2013... Job Scheduling Strategies for Parallel Processing - 17th International Workshop, JSSPP 2013, Boston, MA, USA, May 24, 2013 Revised Selected Papers (Paperback, 2014 ed.)
Narayan Desai, Walfredo Cirne
R1,910 Discovery Miles 19 100 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Workshop on Job Scheduling Strategies for Parallel Processing, JSSPP 2013, held Boston, MA, USA, in May 2013. The 10 revised papers presented were carefully reviewed and selected from 20 submissions. The papers cover the following topics parallel scheduling for commercial environments, scientific computing, supercomputing and cluster platforms.

Software Architecture - 8th European Conference, ECSA 2014, Vienna, Austria, August 25-29, 2014, Proceedings (Paperback, 2014... Software Architecture - 8th European Conference, ECSA 2014, Vienna, Austria, August 25-29, 2014, Proceedings (Paperback, 2014 ed.)
Paris Avgeriou, Uwe Zdun
R1,442 Discovery Miles 14 420 Ships in 18 - 22 working days

This book constitutes the proceedings of the 8th European Conference on Software Architecture, ECSA 2014, held in Vienna, Austria, in August 2014. The 16 full papers and 18 short papers presented in this volume were carefully reviewed and selected from 91 submissions. They are organized in topical sections named: architecture decisions and knowledge; architecture patterns and anti-patterns; reference architectures and metamodels; architecture description languages; enterprise architecture, SOA and cloud computing; components and connectors; quality attributes; and architecture analysis and verification.

Transactions on Large-Scale Data- and Knowledge-Centered Systems X - Special Issue on Database- and Expert-Systems Applications... Transactions on Large-Scale Data- and Knowledge-Centered Systems X - Special Issue on Database- and Expert-Systems Applications (Paperback, 2013 ed.)
Abdelkader Hameurlain, Josef Kung, Roland Wagner, Stephen W. Liddle, Klaus-Dieter Schewe, …
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge processing, which are core and hot topics in computer science. Since the 1990s, the Internet has become the main driving force behind application development in all domains. An increase in the demand for resource sharing across different sites connected through networks has led to an evolution of data- and knowledge-management systems from centralized systems to decentralized systems enabling large-scale distributed applications providing high scalability. Current decentralized systems still focus on data and knowledge as their main resource. Feasibility of these systems relies basically on P2P (peer-to-peer) techniques and the support of agent systems with scaling and decentralized control. Synergy between grids, P2P systems, and agent technologies is the key to data-and knowledge-centered systems in large-scale environments. This, the 10th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains seven full papers chosen following two additional rounds of reviewing from revised and extended versions of a selection of papers presented at DEXA 2012. Topics covered include formal modelling and verification of web services, incremental computation of skyline queries, the implication problem for XML keys, lossless data compression, declarative view selection methods, time awareness in recommender systems, and network data mining."

Personal Satellite Services - 5th International ICST Conference, PSATS 2013, Toulouse, France, June 27-28, 2013, Revised... Personal Satellite Services - 5th International ICST Conference, PSATS 2013, Toulouse, France, June 27-28, 2013, Revised Selected Papers (Paperback, 2013 ed.)
Riadh Dhaou, Andre-Luc Beylot, Marie-Jose Montpetit, Daniel Lucani, Lorenzo Mucchi
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 5th International ICST Conference on Personal Satellite Services, PSATS 2013, held in Toulouse, France, in June 2013. The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. They are grouped in the following topical sections: satellite for emergency and aero communication, satellite for networking, resource management, and air interface.

Mobile Computing - Implementing Pervasive Information and Communications Technologies (Paperback, Softcover reprint of the... Mobile Computing - Implementing Pervasive Information and Communications Technologies (Paperback, Softcover reprint of the original 1st ed. 2002)
Shambhu Upadhyaya, Abhijit Chaudhury, Kevin Kwiat, Mark Weiser
R2,637 Discovery Miles 26 370 Ships in 18 - 22 working days

Mobil Computing: Implementing Pervasive Information and Communication Technologies is designed to address some of the business and technical challenges of pervasive computing that encompass current and emerging technology standards, infrastructures and architectures, and innovative and high impact applications of mobile technologies in virtual enterprises. The various articles examine a host of issues including: the challenges and current solutions in mobile connectivity and coordination; management infrastructures; innovative architectures for fourth generation wireless and Ad-hoc networks; error-free frequency assignments for wireless communication; cost-effective wavelength assignments in optical communication networks; data and transaction modeling in a mobile environment, and bandwidth issues and data routing in mobile Ad-hoc networks.

Active Networks and Active Network Management - A Proactive Management Framework (Paperback, Softcover reprint of the original... Active Networks and Active Network Management - A Proactive Management Framework (Paperback, Softcover reprint of the original 1st ed. 2002)
Stephen F. Bush, Amit B. Kulkarni
R2,632 Discovery Miles 26 320 Ships in 18 - 22 working days

Active networking is an exciting new paradigm in digital networking that has the potential to revolutionize the manner in which communication takes place. It is an emerging technology, one in which new ideas are constantly being formulated and new topics of research are springing up even as this book is being written. This technology is very likely to appeal to a broad spectrum of users from academia and industry. Therefore, this book was written in a way that enables all these groups to understand the impact of active networking in their sphere of interest. Information services managers, network administrators, and e-commerce developers would like to know the potential benefits of the new technology to their businesses, networks, and applications. The book introduces the basic active networking paradigm and its potential impacts on the future of information handling in general and on communications in particular. This is useful for forward-looking businesses that wish to actively participate in the development of active networks and ensure a head start in the integration of the technology in their future products, be they applications or networks. Areas in which active networking is likely to make significant impact are identified, and the reader is pointed to any related ongoing research efforts in the area. The book also provides a deeper insight into the active networking model for students and researchers, who seek challenging topics that define or extend frontiers of the technology. It describes basic components of the model, explains some of the terms used by the active networking community, and provides the reader with taxonomy of the research being conducted at the time this book was written. Current efforts are classified based on typical research areas such as mobility, security, and management. The intent is to introduce the serious reader to the background regarding some of the models adopted by the community, to outline outstanding issues concerning active networking, and to provide a snapshot of the fast-changing landscape in active networking research. Management is a very important issue in active networks because of its open nature. The latter half of the book explains the architectural concepts of a model for managing active networks and the motivation for a reference model that addresses limitations of the current network management framework by leveraging the powerful features of active networking to develop an integrated framework. It also describes a novel application enabled by active network technology called the Active Virtual Network Management Prediction (AVNMP) algorithm. AVNMP is a pro-active management system; in other words, it provides the ability to solve a potential problem before it impacts the system by modeling network devices within the network itself and running that model ahead of real time.

Network Control and Engineering for QoS, Security and Mobility II - IFIP TC6 / WG6.2 & WG6.7 Second International Conference on... Network Control and Engineering for QoS, Security and Mobility II - IFIP TC6 / WG6.2 & WG6.7 Second International Conference on Network Control and Engineering for QoS, Security and Mobility (Net-Con 2003) October 13-15, 2003, Muscat, Oman (Paperback, Softcover reprint of the original 1st ed. 2003)
Dominique Gaiti, Guy Pujolle, Ahmed M. Al-Naamany, Hadj Bourdoucen, Lazhar Khriji
R2,650 Discovery Miles 26 500 Ships in 18 - 22 working days

Service and network providers must be able to satisfy the demands for new services, improve the quality of service, reduce the cost of network service operations and maintenance, control performance and adapt to user demands. These challenges are so important for the future of our communication environment that it is essential to investigate different approaches for controlling and optimizing network resources. Network Control and Engineering for QoS, Security and Mobility II addresses the problem of network control and engineering with a focus on control of quality of service, management of security, and supervision of mobility. New trends in these different fields are also investigated. This volume contains the proceedings of the Second International Conference on NETwork CONtrol and Engineering (NETCON) for Quality of Service, Security and Mobility, which convened in Oman in October 2003. The conference was sponsored by the International Federation for Information Processing (IFIP) and organized by IFIP's Working Groups 6.2 on Network and Internetwork Architecture, 6.6 on Network Management, and 6.7 on Smart Networks.

Phase-Locked Loops for Wireless Communications - Digital, Analog and Optical Implementations (Paperback, 2nd ed. 2002.... Phase-Locked Loops for Wireless Communications - Digital, Analog and Optical Implementations (Paperback, 2nd ed. 2002. Softcover reprint of the original 2nd ed. 2002)
Donald R. Stephens
R4,049 Discovery Miles 40 490 Ships in 18 - 22 working days

Phase-Locked Loops for Wireless Communications: Digitial, Analog and Optical Implementations, Second Edition presents a complete tutorial of phase-locked loops from analog implementations to digital and optical designs. The text establishes a thorough foundation of continuous-time analysis techniques and maintains a consistent notation as discrete-time and non-uniform sampling are presented. New to this edition is a complete treatment of charge pumps and the complementary sequential phase detector. Another important change is the increased use of MATLAB(R), implemented to provide more familiar graphics and reader-derived phase-locked loop simulation. Frequency synthesizers and digital divider analysis/techniques have been added to this second edition. Perhaps most distinctive is the chapter on optical phase-locked loops that begins with sections discussing components such as lasers and photodetectors and finishing with homodyne and heterodyne loops.Starting with a historical overview, presenting analog, digital, and optical PLLs, discussing phase noise analysis, and including circuits/algorithms for data synchronization, this volume contains new techniques being used in this field. Highlights of the Second Edition: * Development of phase-locked loops from analog to digital and optical, with consistent notation throughout; * Expanded coverage of the loop filters used to design second and third order PLLs; * Design examples on delay-locked loops used to synchronize circuits on CPUs and ASICS; * New material on digital dividers that dominate a frequency synthesizer's noise floor. Techniques to analytically estimate the phase noise of a divider; * Presentation of optical phase-locked loops with primers on the optical components and fundamentals of optical mixing; * Section on automatic frequency control to provide frequency-locking of the lasers instead of phase-locking; * Presentation of charge pumps, counters, and delay-locked loops. The Second Edition includes the essential topics needed by wireless, optics, and the traditional phase-locked loop specialists to design circuits and software algorithms.All of the material has been updated throughout the book.

Pervasive Computing and the Networked World - Joint International Conference, ICPCA-SWS 2012, Istanbul, Turkey, November 28-30,... Pervasive Computing and the Networked World - Joint International Conference, ICPCA-SWS 2012, Istanbul, Turkey, November 28-30, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Qiaohong Zu, Bo Hu, Atilla Elci
R2,828 Discovery Miles 28 280 Ships in 18 - 22 working days

This book constitutes the refereed post-proceedings of the Joint International Conference on Pervasive Computing and the Networked World, ICPCA-SWS 2012, held in Istanbul, Turkey, in November 2012. This conference is a merger of the 7th International Conference on Pervasive Computing and Applications (ICPCA) and the 4th Symposium on Web Society (SWS). The 53 revised full papers and 26 short papers presented were carefully reviewed and selected from 143 submissions. The papers cover a wide range of topics from different research communities such as computer science, sociology and psychology and explore both theoretical and practical issues in and around the emerging computing paradigms, e.g., pervasive collaboration, collaborative business, and networked societies. They highlight the unique characteristics of the "everywhere" computing paradigm and promote the awareness of its potential social and psychological consequences.

Network Control and Engineering for QoS, Security and Mobility - IFIP TC6 / WG6.2 & WG6.7 Conference on Network Control and... Network Control and Engineering for QoS, Security and Mobility - IFIP TC6 / WG6.2 & WG6.7 Conference on Network Control and Engineering for QoS, Security and Mobility (Net-Con 2002) October 23-25, 2002, Paris, France (Paperback, Softcover reprint of the original 1st ed. 2003)
Dominique Gaiti, Nadia Boukhatem
R2,790 Discovery Miles 27 900 Ships in 18 - 22 working days

Service and network providers must be able to satisfy the demands for new services; improve the quality of service; reduce the cost of network service operations and maintenance; control performance; and adapt to user demands. It is essential to investigate different approaches for performing such tasks. One of these approaches is based on policies and the capability of the network to adapt itself to current conditions. With a focus on policy-based networking, this volume addresses the problem of network control and the introduction of policies such as the control of the Quality of Service, security, mobility, performance, mobile and intelligent agents, and traffic engineering. The area of control in networks through policies promises to provide stimulating challenges for years to come. This book is an attempt to answer questions and provide some direction about the best approaches to be followed. This volume contains the proceedings of the first International Conference on NETwork CONtrol and Engineering (NETCON) for Quality of Service, Security and Mobility, which was sponsored by the International Federation for Information Processing (IFIP), and organized by IFIP TC6 Working Group 6.7 (Smart Networks). The conference convened in Paris, France in October 2002.

Computers and Games - 8th International Conference, CG 2013, Yokohama, Japan, August 13-15, 2013, Revised Selected Papers... Computers and Games - 8th International Conference, CG 2013, Yokohama, Japan, August 13-15, 2013, Revised Selected Papers (Paperback, 2014 ed.)
H. Jaap van den Herik, Hiroyuki Iida, Aske Plaat
R2,100 Discovery Miles 21 000 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Computers and Games, CG 2013, held in Yokohama, Japan, in August 2013, in conjunction with the 17th Computer and Games Tournament and the 20th World Computer-Chess Championship. The 21 papers presented were carefully reviewed and selected for inclusion in this book. They cover a wide range of topics which are grouped into five classes: Monte Carlo Tree Search and its enhancements; solving and searching; analysis of game characteristic; new approaches; and serious games.

Structural Information and Communication Complexity - 21st International Colloquium, SIROCCO 2014, Takayama, Japan, July 23-25,... Structural Information and Communication Complexity - 21st International Colloquium, SIROCCO 2014, Takayama, Japan, July 23-25, 2014, Proceedings (Paperback, 2014 ed.)
Magnus M. Halldorsson
R2,396 Discovery Miles 23 960 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 21st International Colloquium on Structural Information and Communication Complexity, SIROCCO 2014, held in Takayama, Japan, in July 2014. The 24 full papers presented together with 5 invited talks were carefully reviewed and selected from 51 submissions. The focus of the colloquium is on following subjects Shared Memory and Multiparty Communication, Network Optimization, CONGEST Algorithms and Lower Bounds, Wireless networks, Aggregation and Creation Games in Networks, Patrolling and Barrier Coverage, Exploration, Rendevous and Mobile Agents.

Frontiers in Internet Technologies - Second CCF Internet Conference of China, ICoC 2013, Zhangjiajie, China. Revised Selected... Frontiers in Internet Technologies - Second CCF Internet Conference of China, ICoC 2013, Zhangjiajie, China. Revised Selected Papers (Paperback, 2013 ed.)
Jinshu Su, Zhigang Sun, Baokang Zhao, Xiaofeng Wang, Fei Wang
R2,132 Discovery Miles 21 320 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second CCF Internet Conference of China, ICoC 2013, held in Zhangjiajie, China, in July 2013. The 24 revised full papers presented were carefully reviewed and selected from 63 submissions. The papers address issues such as future Internet architecture, Internet routing, network security, network management, data center networks, green networks, wireless networks, P2P networks, mobile Internet and the Internet of Things.

Buffering Techniques for Delivery of Compressed Video in Video-on-Demand Systems (Paperback, Softcover reprint of the original... Buffering Techniques for Delivery of Compressed Video in Video-on-Demand Systems (Paperback, Softcover reprint of the original 1st ed. 1997)
Wu-Chi Feng
R3,974 Discovery Miles 39 740 Ships in 18 - 22 working days

Many emerging technologies such as video conferencing, video-on-demand, and digital libraries require the efficient delivery of compressed video streams. For applications that require the delivery of compressed stored multimedia streams, the a priori knowledge available about these compressed streams can aid in the allocation of server and network resources. By using a client-side buffer, the resource requirements from the server and network can be minimized. Buffering Techniques for Delivery of Compressed Video in Video-on-Demand Systems presents a comprehensive description of buffering techniques for the delivery of compressed, prerecorded multimedia data. While these techniques can be applied to any compressed data streams, this book focusses primarily on the delivery of video streams because of the large resource requirements that they can consume. The book first describes buffering techniques for the continuous playback of stored video sources. In particular, several bandwidth smoothing (or buffering) algorithms that are provably optimal under certain conditions are presented. To provide a well-rounded discussion, the book then describes extensions that aid in the ability to provide interactive delivery of video across networks. Specifically, reservation techniques that take into account interactive functions such as fast-forward and rewind are described. In addition, extensions to the bandwidth smoothing algorithms presented in the first few chapters are described. These algorithms are designed with interactive, continuous playback of stored video in mind and are also provably optimal under certain constraints. Buffering Techniques for Delivery of Compressed Video in Video-on-Demand Systems serves as an excellent resource for multimedia systems, networking and video-on-demand designers, and may be used as a text for advanced courses on the topic.

Managing QoS in Multimedia Networks and Services - IEEE / IFIP TC6 - WG6.4 & WG6.6 Third International Conference on Management... Managing QoS in Multimedia Networks and Services - IEEE / IFIP TC6 - WG6.4 & WG6.6 Third International Conference on Management of Multimedia Networks and Services (MMNS'2000) September 25-28, 2000, Fortaleza, Ceara, Brazil (Paperback, Softcover reprint of the original 1st ed. 2000)
Jose Neuman De Souza, Raouf Boutaba
R5,148 Discovery Miles 51 480 Ships in 18 - 22 working days

Welcome to the third International Conference on Management of Multimedia Networks and Services (MMNS'2000) in Fortaleza (Brazil)! The first MMNS was held in Montreal ( Canada) in july 1997 and the second MMNS was held in Versailles (France) in November 1998. The MMNS conference takes place every year and a half and is aimed to be a truly international event by bringing together researchers and practitioners from all around the world and by organising the conference each time in a different continent/country. Over the past several years, there has been a considerable amount of research within the fields of multimedia networking and network management. Much of that work has taken place within the context of managing Quality-of Service in broadband integrated services digital networks such as the A TM, and more recently in IP-based networks, to respond to the requirements of emerging multimedia applications. A TM networks were designed to support multimedia traffic with diverse characteristics and can be used as the transfer mode for both wired and wireless networks. A new set of Internet protocols is being developed to provide better quality of service, which is a prerequisite for supporting multimedia applications. Multimedia applications have a different set of requirements, which impacts the design of the underlying communication network as well as its management. Several QoS management mechanisms intervening at different layers of the communication network are required including QoS-routing, QoS-based transport, QoS negotiation, QoS adaptation, FCAPS management, and mobility management.

Testing of Communicating Systems XIV - Application to Internet Technologies and Services (Paperback, Softcover reprint of the... Testing of Communicating Systems XIV - Application to Internet Technologies and Services (Paperback, Softcover reprint of the original 1st ed. 2002)
Ina Schieferdecker, Hartmut Koenig, Adam Wolisz
R4,058 Discovery Miles 40 580 Ships in 18 - 22 working days

Testing of Communicating Systems XIV presents the latest international results in both the theory and industrial practice of the testing of communicating systems, ranging from tools and techniques for testing to test standards, frameworks, notations, algorithms, fundamentals of testing, and industrial experiences and issues. The tools and techniques discussed apply to conformance testing, interoperability testing, performance testing, Internet protocols and applications, and multimedia and distributed systems in general.

Pervasive Wireless Environments: Detecting and Localizing User Spoofing (Paperback, 2014 ed.): Jie Yang, Yingying Chen, Wade... Pervasive Wireless Environments: Detecting and Localizing User Spoofing (Paperback, 2014 ed.)
Jie Yang, Yingying Chen, Wade Trappe, Jerry Cheng
R1,571 Discovery Miles 15 710 Ships in 18 - 22 working days

This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power that cannot be deployed consistently. The authors present the new approach by offering a summary of the recent research and exploring the benefits and potential challenges of this method. This brief discusses the feasibility of launching user spoofing attacks and their impact on the wireless and sensor networks. Readers are equipped to understand several system models. One attack detection model exploits the spatial correlation of received signal strength (RSS) inherited from wireless devices as a foundation. Through experiments in practical environments, the authors evaluate the performance of the spoofing attack detection model. The brief also introduces the DEMOTE system, which exploits the correlation within the RSS trace based on each device s identity to detect mobile attackers. A final chapter covers future directions of this field. By presenting complex technical information in a concise format, this brief is a valuable resource for researchers, professionals, and advanced-level students focused on wireless network security."

Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences... Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013, Proceedings (Paperback, 2013 ed.)
David Basin, John C. Mitchell
R1,411 Discovery Miles 14 110 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second International Conference on Principles of Security and Trust, POST 2013, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2013, in Rome, Italy, in March 2013. The 14 papers included in this volume were carefully reviewed and selected from 59 submissions. They deal with the theoretical and foundational aspects of security and trust such as new theoretical results, practical applications of existing foundational ideas, and innovative theoretical approaches stimulated by pressing practical problems.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Computer-aided Engineering Design With…
Godfrey C. Onwubolu Hardcover R2,452 Discovery Miles 24 520
Designs 2002 - Further Computational and…
W.D. Wallis Hardcover R1,615 Discovery Miles 16 150
Creo Parametric 9.0 Black Book (Colored)
Gaurav Verma, Matt Weber Hardcover R2,149 Discovery Miles 21 490
ISO 9001 for all New and Used Car…
Jahangir Asadi Hardcover R850 Discovery Miles 8 500
Up and Running with AutoCAD 2022 - 2D…
Elliot J. Gindis, Robert C. Kaebisch Paperback R2,087 Discovery Miles 20 870
Introduction to Microlithography
Larry F. Thompson, C. Grant Willson, … Hardcover R4,772 Discovery Miles 47 720
Computational Geometry For Ships
Horst Nowacki, M.I.G. Bloor, … Paperback R1,234 Discovery Miles 12 340
Lean Mastery - 8 Books in 1 - Master…
Greg Caldwell Hardcover R1,203 Discovery Miles 12 030
Business Logistics Management
Wessel Pienaar, John Vogt Paperback R599 R539 Discovery Miles 5 390
Business Security Procedures to Protect…
Bizmanualz Hardcover R1,587 Discovery Miles 15 870

 

Partners