![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > Network computers
The GSM system is undoubtedly the most successful second-generation digital mobile radio system. One of the key factors for this exceptional performance is the constant evolution of the GSM system and its derivatives. GSM: Evolution towards 3rd generation systems addresses new concepts in the GSM system, dealing both with standardized features as well as with theoretically and technologically feasible improvements which contribute to evolutionary changes in general. Ongoing efforts in GSM standardization are focused on Phase 2+ with gradual additions for a fast and modular evolution. Speech remains the prime service of cellular systems, with ongoing work on spectral efficiency taking into account the tradeoff between cost of the system and transmission quality. Most of the notable results from novel speech service implementations are addressed herein such as new EFR speech codec and Advanced Speech Cell Items (ASCI). Data capability in Phase 2+ has been covered under General Packet Radio Service (GPRS) and High-Speed Circuit Switched Data (HCSD) work items. Initiatives under CAMEL cover intelligent networking (IN) within the GSM framework.Dual mode operation in GSM includes not only dual-band solutions but also inter-networking with other systems like DECT or satellite systems. Numerous specific wireless applications such as inbuilding communications, WLL, etc., have also been developed based on GSM. To support the required changes a number of issues have to be solved in the radio part of the system. Deployment of adaptive antenna arrays for enhanced quality, interference suppression techniques and slow frequency hopping are among the techniques presented in the GSM framework. Dynamic evolution of GSM presents a platform for the introduction of UMTS. Presently, efforts are directed towards the standardization of the UMTS air interface in ETSI. Major trends in progress towards new radio interfaces are outlined including contributions from pan-European projects such as ATDMA, which was carried out under the RACE II framework, and the ACTS project AC090 FRAMES. GSM: Evolution towards 3rd generation systems comprises a collection of specially written contributions from GSM specialists.The information presented is essential reading for all researchers, engineers and managers working on GSM and third generation wireless systems. This book covers the most important advances in GSM that will have lasting impact on the system influencing third generation wireless systems.
Following an exchange of correspondence, I met Ross in Adelaide in June 1988. I was approached by the University of Adelaide about being an external examiner for this dissertation and willingly agreed. Upon receiving a copy of this work, what struck me most was the scholarship with which Ross approaches and advances this relatively new field of adaptive data compression. This scholarship, coupled with the ability to express himself clearly using figures, tables, and incisive prose, demanded that Ross's dissertation be given a wider audience. And so this thesis was brought to the attention of Kluwer. The modern data compression paradigm furthered by this work is based upon the separation of adaptive context modelling, adaptive statistics, and arithmetic coding. This work offers the most complete bibliography on this subject I am aware of. It provides an excellent and lucid review of the field, and should be equally as beneficial to newcomers as to those of us already in the field.
The huge bandwidth of optical fiber was recognized back in the 1970s during the early development of fiber optic technology. For the last two decades, the capacity of experimental and deployed systems has been increasing at a rate of 100-fold each decade-a rate exceeding the increase of integrated circuit speeds. Today, optical communication in the public communication networks has developed from the status of a curiosity into being the dominant technology. Various great challenges arising from the deployment of the wavelength division multiplexing (WDM) have attracted a lot of efforts from many researchers. Indeed, the optical networking has been a fertile ground for both theoretical researches and experimental studies. This monograph presents the contribution from my past and ongoing research in the optical networking area. The works presented in this book focus more on graph-theoretical and algorithmic aspects of optical networks. Although this book is limited to the works by myself and my coauthors, there are many outstanding achievements made by other individuals, which will be cited in many places in this book. Without the inspiration from their efforts, this book would have never been possible. This monograph is divided into four parts: * Multichannel Optical Networking Architectures, * Broadcast-and-Select Passive Optical Networks, * Wavelength-Switched Optical Networks, * SONET/WDM Optical Networks. The first part consists of the first three chapters. Chapter 1 pro vides a brief survey on the networking architectures of optical trans- XVll xvm MULTICHANNEL OPTICAL NETWORKS port networks, optical access networks and optical premise networks.
Since the publication of the first edition of Fundamentals of Digital Switching in 1983, there has been substantial improvement in digital switching technology and in digital networks. Packet switching has advanced from a low-speed data-oriented switching approach into a robust broadband technology which supports services ranging from low-speed data to video. This technology has eclipsed the flexibility of circuit switching. Fiber optic cable has advanced since the first edition and has substantially changed the technology of transmission. to research in optical devices to find a still better means of This success has led switching. Digital switching systems continue to benefit from the 100-fold improvement in the capabilities of semiconductor devices which has occurred during the past decade. The chip industry forecasts a similar escalation in complexity during the next 10 years. Networks of switching systems have changed due to regulatory policy reform in many nations, including the breakup of the Bell System in the United States, the introduction of new types of carriers in Japan, competition in the United Kingdom, and a reexamination of public policy in virtually all nations. Standards bodies have been productive in specifying new capabilities for future networks involving interactive and distributive services through STM and A TM technologies.
The NSF Center for Intelligent Information Retrieval (CIIR) was formed in the Computer Science Department of the University of Massachusetts, Amherst, in 1992. Through its efforts in basic research, applied research, and technology transfer, the CIIR has become known internationally as one of the leading research groups in the area of information retrieval. The CIIR focuses on research that results in more effective and efficient access and discovery in large, heterogeneous, distributed text and multimedia databases. The scope of the work that is done in the CIIR is broad and goes significantly beyond 'traditional' areas of information retrieval such as retrieval models, cross-lingual search, and automatic query expansion. The research includes both low-level systems issues such as the design of protocols and architectures for distributed search, as well as more human-centered topics such as user interface design, visualization and data mining with text, and multimedia retrieval.Advances in Information Retrieval: Recent Research from the Center for Intelligent Information Retrieval is a collection of papers that covers a wide variety of topics in the general area of information retrieval. Together, they represent a snapshot of the state of the art in information retrieval at the turn of the century and at the end of a decade that has seen the advent of the World-Wide Web. The papers provide overviews and in-depth analysis of theory and experimental results. This book can be used as source material for graduate courses in information retrieval, and as a reference for researchers and practitioners in industry.
This volume is a monograph on parallel optical interconnects. It presents not only the state of-the-art in this domain but also the necessary physical and chemical background. It also provides a discussion of the potential for future devices. Both experts and newcomers to the area will appreciate the authors' proficiency in providing the complete picture of this rapidly growing field. Optical interconnects are already established in telecommunications and should eventually find their way being applied to chip and even gate level connections in integrated systems. The inspiring environment of the Basic Research Working Group on Optical Information Technology WOIT (3199), together with the excellent and complementary skills of its participants, make this contribution highly worthwhile. G. Metakides Table of contents 1 Perspectives for parallel optical interconnects: introduction . . . . . . . . . . . . . . . . . . . . . . . . . l Pierre Chavel and Philippe lAlanne 1. 1 Optical Interconnects and ESPRIT BRA WOIT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1. 2 What are optical interconnects? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1. 3 Optical interconnects: how ? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1. 3. 1 Passive devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1. 3. 2 Active devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1. 3. 3 Schemes for parallel optical interconnects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 1. 3. 4 Limits of optical interconnects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 1. 4 Optical interconnects: why ? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Acknowledgetnents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 First Section: Components Part 1. 1 Passive interconnect components 2 Free space interconnects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Philippe Lalanne and Pierre ChaveZ 2. 1 Introduction: 3D optical interconnects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 2. 2 Optical free space channels and their implementations . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 2. 2. 1 Diffraction and degrees of freedom . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 2. 2. 2 Two Qasic interconnect setups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ."
This book constitutes the refereed proceedings of the 10th European Conference on Wireless Sensor Networks, EWSN 2013, held in Ghent, Belgium, in February 2013. The 12 revised full papers presented were carefully reviewed and selected from 51 submissions. The papers cover a wide range of topics in the following areas: experimentation and data access; data management; network algorithms and protocols; and physical layer and hardware aspects.
1 This year marks the l0 h anniversary of the IFIP International Workshop on Protocols for High-Speed Networks (PfHSN). It began in May 1989, on a hillside overlooking Lake Zurich in Switzerland, and arrives now in Salem Massachusetts 6,000 kilometers away and 10 years later, in its sixth incarnation, but still with a waterfront view (the Atlantic Ocean). In between, it has visited some picturesque views of other lakes and bays of the world: Palo Alto (1990 - San Francisco Bay), Stockholm (1993 - Baltic Sea), Vancouver (1994- the Strait of Georgia and the Pacific Ocean), and Sophia Antipolis I Nice (1996- the Mediterranean Sea). PfHSN is a workshop providing an international forum for the exchange of information on high-speed networks. It is a relatively small workshop, limited to 80 participants or less, to encourage lively discussion and the active participation of all attendees. A significant component of the workshop is interactive in nature, with a long history of significant time reserved for discussions. This was enhanced in 1996 by Christophe Diot and W allid Dabbous with the institution of Working Sessions chaired by an "animator," who is a distinguished researcher focusing on topical issues of the day. These sessions are an audience participation event, and are one of the things that makes PfHSN a true "working conference.
This SpringerBrief presents key enabling technologies and state-of-the-art research on delivering efficient content distribution services to fast moving vehicles. It describes recent research developments and proposals towards the efficient, resilient and scalable content distribution to vehicles through both infrastructure-based and infrastructure-less vehicular networks. The authors focus on the rich multimedia services provided by vehicular environment content distribution including vehicular communications and media playback, giving passengers many infotainment applications. Common problems of vehicular network research are addressed, including network design and optimization, standardization, and the adaptive playout from a user's perspective.
This book constitutes the refereed proceedings of the Second IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-Eur Asia 2014, with the collocation of Asia ARES 2014 as a special track on Availability, Reliability and Security, held in Bali, Indonesia, in April 2014. The 70 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers have been organized in the following topical sections: applied modeling and simulation; mobile computing; advanced urban-scale ICT applications; semantic web and knowledge management; cloud computing; image processing; software engineering; collaboration technologies and systems; e-learning; data warehousing and data mining; e-government and e-health; biometric and bioinformatics systems; network security; dependable systems and applications; privacy and trust management; cryptography; multimedia security and dependable systems and applications.
This book constitutes the refereed conference proceedings of the 13th International Symposium, W2GIS 2014, held in Seoul, South Korea, in May 2014. The 12 revised full papers presented were carefully selected from numerous submissions. The program covers a wide range of topics including Communication and Parallel Processing for Geospatial Data, Geo-Social Net, Crowdsourcing, and Trajectory, Geo-Sensor Network, Applications of W2GIS, Indoor GIS.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Energy Efficient Data Centers, E(2)DC 2013, held in Berkeley, CA, USA, in May 2013; co-located with SIGCOMM e-Energy 2013. The 8 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on energy and workload measurement; energy management; simulators and control.
This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software and Systems, ESSoS 2013, held in Paris, France, in February/March 2013. The 13 revised full papers presented together with two idea papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on secure programming, policies, proving, formal methods, and analyzing.
This book constitutes thoroughly refereed revised selected papers from the BPM 2012 Joint Workshop on Process-Oriented Information Systems and Knowledge Representation in Health Care, ProHealth 2012/KR4HC 2012, held in Tallinn, Estonia, in September 2012. The 9 papers presented were carefully reviewed and selected from 19 submissions. In addition the book contains 1 keynote paper and 2 invited contributions. The papers are organized in topical sections named: guidelines and summarization; archetypes and cooperation; and process mining and temporal analysis.
Welcome to IM'97! We hope you had the opportunity to attend the Conference in beautiful San Diego. If that was the case, you will want to get back to these proceedings for further read ings and reflections. You'll find e-mail addresses of the main author of each paper, and you are surely encouraged to get in touch for further discussions. You can also take advantage of the CNOM (Committee on Network Operation and Management) web site where a virtual discus sion agora has been set up for IM'97 (URL: http://www.cselt.stet.it/CNOMWWWIIM97.html). At this site you will find a brief summary of discussions that took place in the various panels, and slides that accompanied some of the presentations--all courtesy of the participants. If you have not been to the Conference, leafing through these proceedings may give you food for thought. Hopefully, you will also be joining the virtual world on the web for discussions with authors and others who were at the Conference. At IM'97 the two worlds of computer networks and telecommunications systems came to gether, each proposing a view to management that stems from their own paradigms. Each world made clear the need for end-to-end management and, therefore, each one stepped into the oth er's field. We feel that there is no winner but a mutual enrichment. The time is ripe for integra tion and it is likely that the next Conference will bear its fruit.
Design and Analysis of Distributed Embedded Systems is organized similar to the conference. Chapters 1 and 2 deal with specification methods and their analysis while Chapter 6 concentrates on timing and performance analysis. Chapter 3 describes approaches to system verification at different levels of abstraction. Chapter 4 deals with fault tolerance and detection. Middleware and software reuse aspects are treated in Chapter 5. Chapters 7 and 8 concentrate on the distribution related topics such as partitioning, scheduling and communication. The book closes with a chapter on design methods and frameworks.
This book constitutes the revised selected papers of the workshops of the 10th International Conference on Mobile Web Information, MobiWIS 2013, held in Paphos, Cyprus, in August 2013. The conference hosted two workshops: the First International Workshop on Future Internet of Things and Cloud, FICloud 2013, focusing on the Internet of Things and its relation with cloud computing and the Fourth International Workshop on Service Discovery and Composition in Ubiquitous and Pervasive Environments, SUPE 2013, addressing the issues that characterize automatic service composition in ubiquitous and pervasive computing. The 14 papers presented were carefully reviewed and selected from various submissions.
Substantial new breakthroughs are happening in telecommunications technology. This volume presents a state-of-the-art review of the current research activities in intelligent network technology. It contains the proceedings of a workshop on intelligent networks organized by the International Federation of Information Processsing and held as part of the Third Summer School on Telecommunications in Lappeenranta, Finland, August 1994.
Security and Privacy in the Age of Uncertainty covers issues related to security and privacy of information in a wide range of applications including: *Secure Networks and Distributed Systems; *Secure Multicast Communication and Secure Mobile Networks; *Intrusion Prevention and Detection; *Access Control Policies and Models; *Security Protocols; *Security and Control of IT in Society. This volume contains the papers selected for presentation at the 18th International Conference on Information Security (SEC2003) and at the associated workshops. The conference and workshops were sponsored by the International Federation for Information Processing (IFIP) and held in Athens, Greece in May 2003.
This two-volume-set (LNCS 8384 and 8385) constitutes the refereed proceedings of the 10th International Conference of Parallel Processing and Applied Mathematics, PPAM 2013, held in Warsaw, Poland, in September 2013. The 143 revised full papers presented in both volumes were carefully reviewed and selected from numerous submissions. The papers cover important fields of parallel/distributed/cloud computing and applied mathematics, such as numerical algorithms and parallel scientific computing; parallel non-numerical algorithms; tools and environments for parallel/distributed/cloud computing; applications of parallel computing; applied mathematics, evolutionary computing and metaheuristics.
This book constitutes the refereed proceedings of the 9th International Conference on Wireless Algorithms, Systems and Applications, WASA 2014, held in Harbin, China, in June 2014. The 41 revised full papers presented together with 30 invited papers were carefully reviewed and selected from 134 submissions. The papers cover a wide range of topics including cognitive radio networks, wireless sensor networks, cyber-physical systems, distributed and localized algorithm design and analysis, information and coding theory for wireless networks, localization, mobile cloud computing, topology control and coverage, security and privacy, underwater and underground networks, vehicular networks, information processing and data management, programmable service interfaces, energy-efficient algorithms, system and protocol design, operating system and middle-ware support and experimental test-beds and models.
The field of network programming is so large, and developing so rapidly, that it can appear almost overwhelming to those new to the discipline. Answering the need for an accessible overview of the field, this text/reference presents a manageable introduction to both the theoretical and practical aspects of computer networks and network programming. Clearly structured and easy to follow, the book describes cutting-edge developments in network architectures, communication protocols, and programming techniques and models, supported by code examples for hands-on practice with creating network-based applications. Topics and features: presents detailed coverage of network architectures, including the latest wireless heterogeneous networks, communication protocols, and support for communication-based services; gently introduces the reader to the basic ideas underpinning computer networking, before gradually building up to more advanced concepts; provides numerous step-by-step descriptions of practical examples in tandem with the theoretical discussions; examines a range of network programming techniques, from server-side and client-side solutions to advanced client-server communication models; reviews network-based data storage and multimedia transfer; includes an extensive set of practical code examples, together with detailed comments and explanations. This comprehensive and authoritative guide is an invaluable asset for all researchers interested in computer networking, whether they wish to understand the underlying architectures and paradigms, or to obtain useful advice on building communication-based programs. Advanced undergraduate and postgraduate students will also find the book to be an excellent supplementary textbook for modules on network programming.
'There is no doubt', dr. Kevin Nunley wrote, 'the Internet really is the biggest gold rush of our lifetime. It is unlikely you or I will get another chance as big as this one to earn huge profits anytime in the next 100 years. Someday people will look back and judge us as one of two groups: those who didn't recognize the Internet revolution and missed the greatest chance of our age, and those who smartly made a place for themselves in the new business model that will dominate the future. It is time to get on board. ' Ing. Adrian Mulder Content Editor Adrian Mulder is an Internet journalist who writes for major business computing magazines. He combines a technical background with a vast experience in the computer and business trade magazine industry The Ultimate Internet Advertising Guide Acknowledgements Many people and professionals have contributed directly or indirectly to this book. To name them all would be practically impossible, as there are many. Nevertheless the editors would like to mention a few of those who have made the production of this book possible. Executive Editor for SCN Education BV: Robert Pieter Schotema Publishing Manager: drs. Marieke Kok Marketing Coordinator: Martijn Robert Broersma Content Editor: ing. Adrian Mulder Editorial Support Dennis Gaasbeek, Rob Guijt, Richard van Winssen Interior Design: Paulien van Hemmen, Bach. Also, we would especially like to thank dr. Roland van Stigt for laying a solid foundation for the Hon Guide series to grow on.
This book constitutes the refereed proceedings of the Third International Conference on Advances in Computing, Communication and Control, ICAC3 2013, held in Mumbai, India, in January 2013. The 69 papers presented in this volume were carefully reviewed and selected for inclusion in the book. They deal with topics such as image processing, artificial intelligence, robotics, wireless communications; data warehousing and mining, and are organized in topical sections named: computing; communication; control; and others.
This book constitutes the thoroughly refereed post-proceedings of the 17th International Workshop on Security Protocols, SP 2009, held in Cambridge, UK, in April 2009. The 17 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have gone through multiple rounds of reviewing, revision, and selection. The theme of this workshop was "Brief Encounters". In the old days, security protocols were typically run first as preliminaries to, and later to maintain, relatively stable continuing relationships between relatively unchanging individual entities. Pervasive computing, e-bay and second life have shifted the ground: we now frequently desire a secure commitment to a particular community of entities, but relatively transient relationships with individual members of it, and we are often more interested in validating attributes than identity. The papers and discussions in this volume examine the theme from the standpoint of various different applications and adversaries. |
You may like...
Architectural Design - Conception and…
Chris A. Vissers, Luis Ferreira Pires, …
Hardcover
Malicious Attack Propagation and Source…
Jiaojiao Jiang, Sheng Wen, …
Hardcover
R3,336
Discovery Miles 33 360
5G-Enabled Vehicular Communications and…
Xiang Cheng, Rongqing Zhang, …
Hardcover
R3,106
Discovery Miles 31 060
Cyber-Physical Systems - Foundations…
Houbing Song, Danda B. Rawat, …
Paperback
Design and Implementation of Practical…
Akshay Kumar, Ahmed Abdelhadi, …
Hardcover
R2,663
Discovery Miles 26 630
Handbook of Multimedia Information…
Amit Kumar Singh, Anand Mohan
Hardcover
R6,633
Discovery Miles 66 330
|