![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > Network computers
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Energy Efficient Data Centers, E(2)DC 2013, held in Berkeley, CA, USA, in May 2013; co-located with SIGCOMM e-Energy 2013. The 8 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on energy and workload measurement; energy management; simulators and control.
Active networking is an exciting new paradigm in digital networking that has the potential to revolutionize the manner in which communication takes place. It is an emerging technology, one in which new ideas are constantly being formulated and new topics of research are springing up even as this book is being written. This technology is very likely to appeal to a broad spectrum of users from academia and industry. Therefore, this book was written in a way that enables all these groups to understand the impact of active networking in their sphere of interest. Information services managers, network administrators, and e-commerce developers would like to know the potential benefits of the new technology to their businesses, networks, and applications. The book introduces the basic active networking paradigm and its potential impacts on the future of information handling in general and on communications in particular. This is useful for forward-looking businesses that wish to actively participate in the development of active networks and ensure a head start in the integration of the technology in their future products, be they applications or networks. Areas in which active networking is likely to make significant impact are identified, and the reader is pointed to any related ongoing research efforts in the area. The book also provides a deeper insight into the active networking model for students and researchers, who seek challenging topics that define or extend frontiers of the technology. It describes basic components of the model, explains some of the terms used by the active networking community, and provides the reader with taxonomy of the research being conducted at the time this book was written. Current efforts are classified based on typical research areas such as mobility, security, and management. The intent is to introduce the serious reader to the background regarding some of the models adopted by the community, to outline outstanding issues concerning active networking, and to provide a snapshot of the fast-changing landscape in active networking research. Management is a very important issue in active networks because of its open nature. The latter half of the book explains the architectural concepts of a model for managing active networks and the motivation for a reference model that addresses limitations of the current network management framework by leveraging the powerful features of active networking to develop an integrated framework. It also describes a novel application enabled by active network technology called the Active Virtual Network Management Prediction (AVNMP) algorithm. AVNMP is a pro-active management system; in other words, it provides the ability to solve a potential problem before it impacts the system by modeling network devices within the network itself and running that model ahead of real time.
This book constitutes the thoroughly refereed post-worksop proceedings of the 8th International Workshop Radio Frequency Identification: Security and Privacy Issues, RFIDSec 2012, held in Nijmegen, The Netherlands, in July 2012. The 12 revised full papers presented were carefully reviewed and selected from 29 submissions for inclusion in the book. The papers focus on approaches to solve security and data protection issues in advanced contactless technologies.
Conflicts between agents acting in a multi-agent environment arise for different reasons, involve different concepts, and are dealt with in different ways, depending on the kind of agents and on the domain where they are considered. Agents may have conflicting beliefs, conflicting goals, or may have to share limited resources. Consequently, conflicts may be expressed as mere differences, or as contradictions, or even as social conflicts. They may be avoided, solved, kept, or even created deliberately. Conflicting Agents studies conflicts in the context of multi-agent systems, i.e. artificial societies modeled on the basis of autonomous, interacting agents. This book addresses questions about types of conflicts, conflict definitions and the use of conflicts as trigger functions for activities in multi-agent systems. The book is also dedicated to questions of conflict management, resolution and avoidance, i.e. the question of how agents cope with conflicts and conflicting situations.
Service and network providers must be able to satisfy the demands for new services, improve the quality of service, reduce the cost of network service operations and maintenance, control performance and adapt to user demands. These challenges are so important for the future of our communication environment that it is essential to investigate different approaches for controlling and optimizing network resources. Network Control and Engineering for QoS, Security and Mobility II addresses the problem of network control and engineering with a focus on control of quality of service, management of security, and supervision of mobility. New trends in these different fields are also investigated. This volume contains the proceedings of the Second International Conference on NETwork CONtrol and Engineering (NETCON) for Quality of Service, Security and Mobility, which convened in Oman in October 2003. The conference was sponsored by the International Federation for Information Processing (IFIP) and organized by IFIP's Working Groups 6.2 on Network and Internetwork Architecture, 6.6 on Network Management, and 6.7 on Smart Networks.
Service and network providers must be able to satisfy the demands for new services; improve the quality of service; reduce the cost of network service operations and maintenance; control performance; and adapt to user demands. It is essential to investigate different approaches for performing such tasks. One of these approaches is based on policies and the capability of the network to adapt itself to current conditions. With a focus on policy-based networking, this volume addresses the problem of network control and the introduction of policies such as the control of the Quality of Service, security, mobility, performance, mobile and intelligent agents, and traffic engineering. The area of control in networks through policies promises to provide stimulating challenges for years to come. This book is an attempt to answer questions and provide some direction about the best approaches to be followed. This volume contains the proceedings of the first International Conference on NETwork CONtrol and Engineering (NETCON) for Quality of Service, Security and Mobility, which was sponsored by the International Federation for Information Processing (IFIP), and organized by IFIP TC6 Working Group 6.7 (Smart Networks). The conference convened in Paris, France in October 2002.
Mobil Computing: Implementing Pervasive Information and Communication Technologies is designed to address some of the business and technical challenges of pervasive computing that encompass current and emerging technology standards, infrastructures and architectures, and innovative and high impact applications of mobile technologies in virtual enterprises. The various articles examine a host of issues including: the challenges and current solutions in mobile connectivity and coordination; management infrastructures; innovative architectures for fourth generation wireless and Ad-hoc networks; error-free frequency assignments for wireless communication; cost-effective wavelength assignments in optical communication networks; data and transaction modeling in a mobile environment, and bandwidth issues and data routing in mobile Ad-hoc networks.
This book constitutes the refereed proceedings of the 21st International Colloquium on Structural Information and Communication Complexity, SIROCCO 2014, held in Takayama, Japan, in July 2014. The 24 full papers presented together with 5 invited talks were carefully reviewed and selected from 51 submissions. The focus of the colloquium is on following subjects Shared Memory and Multiparty Communication, Network Optimization, CONGEST Algorithms and Lower Bounds, Wireless networks, Aggregation and Creation Games in Networks, Patrolling and Barrier Coverage, Exploration, Rendevous and Mobile Agents.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Computers and Games, CG 2013, held in Yokohama, Japan, in August 2013, in conjunction with the 17th Computer and Games Tournament and the 20th World Computer-Chess Championship. The 21 papers presented were carefully reviewed and selected for inclusion in this book. They cover a wide range of topics which are grouped into five classes: Monte Carlo Tree Search and its enhancements; solving and searching; analysis of game characteristic; new approaches; and serious games.
Since the publication of the first edition of Fundamentals of Digital Switching in 1983, there has been substantial improvement in digital switching technology and in digital networks. Packet switching has advanced from a low-speed data-oriented switching approach into a robust broadband technology which supports services ranging from low-speed data to video. This technology has eclipsed the flexibility of circuit switching. Fiber optic cable has advanced since the first edition and has substantially changed the technology of transmission. to research in optical devices to find a still better means of This success has led switching. Digital switching systems continue to benefit from the 100-fold improvement in the capabilities of semiconductor devices which has occurred during the past decade. The chip industry forecasts a similar escalation in complexity during the next 10 years. Networks of switching systems have changed due to regulatory policy reform in many nations, including the breakup of the Bell System in the United States, the introduction of new types of carriers in Japan, competition in the United Kingdom, and a reexamination of public policy in virtually all nations. Standards bodies have been productive in specifying new capabilities for future networks involving interactive and distributive services through STM and A TM technologies.
Many emerging technologies such as video conferencing, video-on-demand, and digital libraries require the efficient delivery of compressed video streams. For applications that require the delivery of compressed stored multimedia streams, the a priori knowledge available about these compressed streams can aid in the allocation of server and network resources. By using a client-side buffer, the resource requirements from the server and network can be minimized. Buffering Techniques for Delivery of Compressed Video in Video-on-Demand Systems presents a comprehensive description of buffering techniques for the delivery of compressed, prerecorded multimedia data. While these techniques can be applied to any compressed data streams, this book focusses primarily on the delivery of video streams because of the large resource requirements that they can consume. The book first describes buffering techniques for the continuous playback of stored video sources. In particular, several bandwidth smoothing (or buffering) algorithms that are provably optimal under certain conditions are presented. To provide a well-rounded discussion, the book then describes extensions that aid in the ability to provide interactive delivery of video across networks. Specifically, reservation techniques that take into account interactive functions such as fast-forward and rewind are described. In addition, extensions to the bandwidth smoothing algorithms presented in the first few chapters are described. These algorithms are designed with interactive, continuous playback of stored video in mind and are also provably optimal under certain constraints. Buffering Techniques for Delivery of Compressed Video in Video-on-Demand Systems serves as an excellent resource for multimedia systems, networking and video-on-demand designers, and may be used as a text for advanced courses on the topic.
Welcome to the third International Conference on Management of Multimedia Networks and Services (MMNS'2000) in Fortaleza (Brazil)! The first MMNS was held in Montreal ( Canada) in july 1997 and the second MMNS was held in Versailles (France) in November 1998. The MMNS conference takes place every year and a half and is aimed to be a truly international event by bringing together researchers and practitioners from all around the world and by organising the conference each time in a different continent/country. Over the past several years, there has been a considerable amount of research within the fields of multimedia networking and network management. Much of that work has taken place within the context of managing Quality-of Service in broadband integrated services digital networks such as the A TM, and more recently in IP-based networks, to respond to the requirements of emerging multimedia applications. A TM networks were designed to support multimedia traffic with diverse characteristics and can be used as the transfer mode for both wired and wireless networks. A new set of Internet protocols is being developed to provide better quality of service, which is a prerequisite for supporting multimedia applications. Multimedia applications have a different set of requirements, which impacts the design of the underlying communication network as well as its management. Several QoS management mechanisms intervening at different layers of the communication network are required including QoS-routing, QoS-based transport, QoS negotiation, QoS adaptation, FCAPS management, and mobility management.
Testing of Communicating Systems XIV presents the latest international results in both the theory and industrial practice of the testing of communicating systems, ranging from tools and techniques for testing to test standards, frameworks, notations, algorithms, fundamentals of testing, and industrial experiences and issues. The tools and techniques discussed apply to conformance testing, interoperability testing, performance testing, Internet protocols and applications, and multimedia and distributed systems in general.
The growth of telecommunications has been largely based on mobile and data services in the past 10 years and this growth will continue. For instance, it is forecasted that after 2005 the mobile traffic turnover in Europe will exceed that of fixed telephone traffic, and the penetration of Internet access through mobile will exceed that of fixed access. It is expected that new value-added services will be Internet-based and that IP traffic will outweigh the amount of traditional ISDN based telephone traffic. The transition from existing telecommunications services to mobile and Internet-based services will change the service infrastructure as well as the customer and service management structures. This volume comprises the proceedings of the Working Conference on Personal Wireless Communications (PWC'2001), which was sponsored by the International Federation for Information Processing (IFIP) and organized by IFIP Working Group 6.8. It was held in Lappeenranta, Finland in August 2001. The PWC'2001 conference is a forum for tutorials, discussions and presentations of new developments in mobile and wireless research.The contributions to this volume have been divided into six categories that vary from voice over IP implementations to quality of service issues; from service aspects to performance and modelling issues; from modern cellular networks to future wireless systems. This volume will be essential reading for IT students and researchers as well as for theoreticians interested in the current state of the telecommunication systems.
Security and Privacy in the Age of Uncertainty covers issues related to security and privacy of information in a wide range of applications including: *Secure Networks and Distributed Systems; *Secure Multicast Communication and Secure Mobile Networks; *Intrusion Prevention and Detection; *Access Control Policies and Models; *Security Protocols; *Security and Control of IT in Society. This volume contains the papers selected for presentation at the 18th International Conference on Information Security (SEC2003) and at the associated workshops. The conference and workshops were sponsored by the International Federation for Information Processing (IFIP) and held in Athens, Greece in May 2003.
This book constitutes the refereed proceedings of the 26th International Conference on Architecture of Computing Systems, ARCS 2013, held in Prague, Czech Republic, in February 2013. The 29 papers presented were carefully reviewed and selected from 73 submissions. The topics covered are computer architecture topics such as multi-cores, memory systems, and parallel computing, adaptive system architectures such as reconfigurable systems in hardware and software, customization and application specific accelerators in heterogeneous architectures, organic and autonomic computing including both theoretical and practical results on self-organization, self-configuration, self-optimization, self-healing, and self-protection techniques, operating systems including but not limited to scheduling, memory management, power management, RTOS, energy-awareness, and green computing.
This book constitutes the refereed proceedings of the 8th International Workshop on Databases in Networked Information Systems, DNIS 2013, held in Aizu-Wakamatsu, Japan in March 2013. The 22 revised full papers presented were carefully reviewed and selected for inclusion in the book. The workshop generally puts the main focus on data semantics and infrastructure for information management and interchange. The papers are organized in topical sections on cloud-based database systems; information and knowledge management; information extraction from data resources; bio-medical information management; and networked information systems: infrastructure.
High Performance Networking is a state-of-the-art book that deals with issues relating to the fast-paced evolution of public, corporate and residential networks. It focuses on the practical and experimental aspects of high performance networks and introduces novel approaches and concepts aimed at improving the performance, usability, interoperability and scalability of such systems. Among others, the topics covered include: * Java applets and applications; * distributed virtual environments; * new internet streaming protocols; * web telecollaboration tools; * Internet, Intranet; * real-time services like multimedia; * quality of service; * mobility. High Performance Networking comprises the proceedings of the Eighth International Conference on High Performance Networking, sponsored by the International Federation for Information Processing (IFIP), and was held at Vienna Univrsity of Technology, Vienna, Austria, in September 1998. High Performance Networking is suitable as a secondary text for a graduate level course on high performance networking, and as a reference for researchers and practitioners in industry.
Many real-time systems rely on static scheduling algorithms. This includes cyclic scheduling, rate monotonic scheduling and fixed schedules created by off-line scheduling techniques such as dynamic programming, heuristic search, and simulated annealing. However, for many real-time systems, static scheduling algorithms are quite restrictive and inflexible. For example, highly automated agile manufacturing, command, control and communications, and distributed real-time multimedia applications all operate over long lifetimes and in highly non-deterministic environments. Dynamic real-time scheduling algorithms are more appropriate for these systems and are used in such systems. Many of these algorithms are based on earliest deadline first (EDF) policies. There exists a wealth of literature on EDF-based scheduling with many extensions to deal with sophisticated issues such as precedence constraints, resource requirements, system overload, multi-processors, and distributed systems.Deadline Scheduling for Real-Time Systems: EDF and Related Algorithms aims at collecting a significant body of knowledge on EDF scheduling for real-time systems, but it does not try to be all-inclusive (the literature is too extensive). The book primarily presents the algorithms and associated analysis, but guidelines, rules, and implementation considerations are also discussed, especially for the more complicated situations where mathematical analysis is difficult. In general, it is very difficult to codify and taxonomize scheduling knowledge because there are many performance metrics, task characteristics, and system configurations. Also, adding to the complexity is the fact that a variety of algorithms have been designed for different combinations of these considerations. In spite of the recent advances there are still gaps in the solution space and there is a need to integrate the available solutions.For example, a list of issues to consider includes: * preemptive versus non-preemptive tasks, * uni-processors versus multi-processors, * using EDF at dispatch time versus EDF-based planning, * precedence constraints among tasks, * resource constraints, * periodic versus aperiodic versus sporadic tasks, * scheduling during overload, * fault tolerance requirements, and * providing guarantees and levels of guarantees (meeting quality of service requirements). Deadline Scheduling for Real-Time Systems: EDF and Related Algorithms should be of interest to researchers, real-time system designers, and instructors and students, either as a focussed course on deadline-based scheduling for real-time systems, or, more likely, as part of a more general course on real-time computing. The book serves as an invaluable reference in this fast-moving field.
Mobile communications havepermeated the globe in both business and social cultures. In only af ew short years, Japan aloneh ash ad more than ten million subscribers enter the mobilem arket. Such explosive popularity is an indication ofa strong commercial demand for communications in both the tethered and tetherless environments. Accompanying the vibrant growth in mobile communications is the growth in multimedia communications, includingthe Internet. Mobile and multime dia communications technologies are merging, making mobile computing ak ey phrasei n the coming advanced information communication era. Thegrowth i n these dynamic industries shows that achange in our chosen method of commu nications is already well advanced. Reading e mail and connecting to various information feeds have already become a part ofdaily business activities. We are trying to grasp theo verall picture of mobile computing. Its shape and form are just starting to appear as personal digital assistants (PDA), handheld personal computers (HPC), wireless data communication services, and com mercial software designed for mobile environments. We are at the cusp of vast popularization of "computers on the go. " "Any time Anywhere Computing" provides the reader with an understand able explanationo ft he current developments and commercialization of mobile computing. Thec oret ec hnologies and applications needed to un derstand the industry are comprehensively addressed. Thebook emphasizes three infrastruc tures: (1) wireless communication network infrastructure, (2) terminal devices (or "computers on the go"), and (3) software middleware and architectures that support wireless and mobile computing.
The desire and the necessity for accessing and processing information stored in computer networks anytime and anywhere' has been the impetus for the growing interest in mobile computing research. Wired computing networks and end devices such as PCs and workstations have effectively extended the data-only networking capability of a few years ago to sophisticated multimedia networking. The cost of such transformation to the end user turns out to be very nominal. Undoubtedly the wireless access technology has given a big boost to mobile cellular telephony and data networking. Processing general purpose multimedia information requires, besides higher bandwidth, means for controlling the available bandwidth and caring for quality of service issues. This problem is accentuated by the need for providing such service in the presence of wireless physical layer and host mobility. Thus, tetherless and ubiquitous mobile and wireless computing systems should carefully combine advances in computer networking and wireless communication. While several experimental mobile computing platforms have sprung up, much research is needed to overcome technological obstacles in low power system design, sustainable battery life, unreliability and limited bandwidth of the wireless channel. Mobile Computing addresses some aspects of this new but rapidly growing field of research. A total of eight papers span the areas of protocols, network architecture, and performance issues. All of the papers deal with the complexities of host mobility in a wireless setting. They expose several challenges that affect system design of mobile computing networks at various levels. By addressing these challenges in an efficient and cost-effective manner, it is hoped that user-friendly, seamless and faster networks will emerge to serve the sophisticated and demanding applications of mobile users. Mobile Computing serves as an excellent reference, providing insights into some of the most important issues in mobile and wireless computing.
This book constitutes the refereed proceedings of the 11th International Symposium on Automated Technology for Verification and Analysis, ATVA 2013, held at Hanoi, Vietnam, in October 2013. The 27 regular papers, 3 short papers and 12 tool papers presented together with 3 invited talks were carefully selected from73 submissions. The papers are organized in topical, sections on analysis and verification of hardware circuits, systems-on-chip and embedded systems, analysis of real-time, hybrid, priced/weighted and probabilistic systems, deductive, algorithmic, compositional, and abstraction/refinement techniques for analysis and verification, analytical techniques for safety, security, and dependability, testing and runtime analysis based on verification technology, analysis and verification of parallel and concurrent hardware/software systems, verification in industrial practice, and applications and case studies.
This book constitutes the refereed proceedings of the Second International Conference on Principles of Security and Trust, POST 2013, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2013, in Rome, Italy, in March 2013. The 14 papers included in this volume were carefully reviewed and selected from 59 submissions. They deal with the theoretical and foundational aspects of security and trust such as new theoretical results, practical applications of existing foundational ideas, and innovative theoretical approaches stimulated by pressing practical problems.
This book surveys the outstanding work of physical-layer (PHY) security, including the recent achievements of confidentiality and authentication for wireless communication systems by channel identification. A practical approach to building unconditional confidentiality for Wireless Communication security by feedback and error correcting code is introduced and a framework of PHY security based on space time block code (STBC) MIMO system is demonstrated. Also discussed is a scheme which combines cryptographic techniques implemented in the higher layer with the physical layer security approach using redundant antennas of MIMO systems to provide stronger security for wireless networks. The channel responses between communication peers have been explored as a form of fingerprint with spatial and temporal uniqueness. Finally, the book develops a new lightweight method of channel identification for Sybil attack and node clone detection in wireless sensor networks (WSNs).
This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the collocation of AsiaARES 2013 as a special track on Availability, Reliability, and Security, held in Yogyakarta, Indonesia, in March 2013. The 62 revised full papers presented were carefully reviewed and selected from a numerous submissions. The papers are organized in topical sections on e-society, software engineering, security and privacy, cloud and internet computing, knowledge management, dependable systems and applications, cryptography, privacy and trust management, network analysis and security, and multimedia security. |
You may like...
Fault Tolerant Architectures for…
Sikhar Patranabis, Debdeep Mukhopadhyay
Hardcover
R3,802
Discovery Miles 38 020
Full-Duplex Wireless Communications…
Tho Le-Ngoc, Ahmed Masmoudi
Hardcover
R3,731
Discovery Miles 37 310
Handbook of Computer Networks and Cyber…
Brij B. Gupta, Gregorio Martinez Perez, …
Hardcover
R7,167
Discovery Miles 71 670
Engineering Scalable, Elastic, and…
Steffen Becker, Gunnar Brataas, …
Hardcover
R2,017
Discovery Miles 20 170
Cyber-Physical Systems - Foundations…
Houbing Song, Danda B. Rawat, …
Paperback
5G-Enabled Vehicular Communications and…
Xiang Cheng, Rongqing Zhang, …
Hardcover
R3,106
Discovery Miles 31 060
|