![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet > Network computers
This book provides a hands-on approach to learning ARM assembly language with the use of a TI microcontroller. The book starts with an introduction to computer architecture and then discusses number systems and digital logic. The text covers ARM Assembly Language, ARM Cortex Architecture and its components, and Hardware Experiments using TILM3S1968. Written for those interested in learning embedded programming using an ARM Microcontroller.
This book presents a range of cloud computing platforms for data-intensive scientific applications. It covers systems that deliver infrastructure as a service, including: HPC as a service; virtual networks as a service; scalable and reliable storage; algorithms that manage vast cloud resources and applications runtime; and programming models that enable pragmatic programming and implementation toolkits for eScience applications. Many scientific applications in clouds are also introduced, such as bioinformatics, biology, weather forecasting and social networks. Most chapters include case studies. Cloud Computing for Data-Intensive Applications targets advanced-level students and researchers studying computer science and electrical engineering. Professionals working in cloud computing, networks, databases and more will also find this book useful as a reference.
This SpringerBrief offers two concrete design examples for traffic offloading. The first is an optimal resource allocation for small-cell based traffic offloading that aims at minimizing mobile users' data cost. The second is an optimal resource allocation for device-to-device assisted traffic offloading that also minimizes the total energy consumption and cellular link usage (while providing an overview of the challenging issues). Both examples illustrate the importance of proper resource allocation to the success of traffic offloading, show the consequent performance advantages of executing optimal resource allocation, and present the methodologies to achieve the corresponding optimal offloading solution for traffic offloading in heterogeneous cellular networks. The authors also include an overview of heterogeneous cellular networks and explain different traffic offloading paradigms ranging from uplink traffic offloading through small cells to downlink traffic offloading via mobile device-to-device cooperation. This brief is an excellent resource for postgraduate students studying advanced-level topics in wireless communications and networking. Researchers, engineers and professionals working in related fields will also find this brief a valuable resource tool.
The development of low-cost, compact digital storage, sensors and radio modules allows us to embed digital memories into products to record key events. Such computationally enhanced products can perceive and control their environment, analyze their observations, and communicate with other smart objects and human users. Digital product memories (DPMs) will play a key role in the upcoming fourth industrial revolution based on cyber-physical production systems, resulting in improvements in traceability and quality assurance, more efficient and flexible production, logistics, customization, and recycling, and better information for the consumer. SemProM was a major industrial and academic research project that examined all aspects of the design and implementation of semantic product memories, and this book is a comprehensive assessment of the results achieved. The introductory chapters explain the fundamental ideas and the organization of the related project, while the remaining parts explain how to build, model and process DPMs, multimodal interaction using them, and selected applications. This work is inherently multidisciplinary and the related ideas, technologies, and implementations draw on results in fields such as semantic technologies, machine-to-machine communication, intelligent sensor networks, instrumented environments, embedded systems, smart objects, RFID technology, security, and privacy. The contributing authors are leading scientists and engineers, representing key academic teams and companies. The book explains successful deployment in applications such as manufacturing, green logistics, retail, healthcare, and food distribution, and it will be of value to both researchers and practitioners.
This book provides a Mathematical Theory of Distributed Sensor Networks. It introduces the Mathematical & Computational Structure by discussing what they are, their applications and how they differ from traditional systems. It also explains how mathematics are utilized to provide efficient techniques implementing effective coverage, deployment, transmission, data processing, signal processing, and data protection within distributed sensor networks. Finally, it discusses some important challenges facing mathematics to get more incite to the multidisciplinary area of distributed sensor networks. -This book will help design engineers to set up WSN-based applications providing better use of resources while optimizing processing costs. -This book is highly useful for graduate students starting their first steps in research to apprehend new approaches and understand the mathematics behind them and face promising challenges. -This book aims at presenting a formal framework allowing to show how mathematical theories can be used to provide distributed sensor modeling and to solve important problems such as coverage hole detection and repair. -This book aims at presenting the current state of the art in formal issues related to sensor networking. It can be used as a handbook for different classes at the graduate level and the undergraduate level. It is self contained and comprehensive, presenting a complete picture of the discipline of optical network engineering including modeling functions, controlling quality of service, allocation resources, monitoring traffic, protecting infrastructure, and conducting planning. This book addresses a large set of theoretical aspects. It is designed for specialists in ad hoc and wireless sensor networks and does not include discusses on very promising areas such as homotopy, computational geometry, and wavelet transforms.
This SpringerBrief explores the opportunities and challenges posed by the smart grid. The evolution of the smart grid should allow consumers to directly communicate with their utility provider. However, complex issues such as architecture with legacy support, varying demand response and load management, varying price of power, and so forth can lead to various decision making challenges. It is essential to identify the scope and challenges of the smart grid in a comprehensive manner so as to ensure efficient delivery of sustainable, economic, and secure electricity supplies. This book provides an overview of the smart grid and its key advances in architecture, distribution management, demand-side response and load balancing, smart automation, electric storage, power loss minimization and security. Readers interested in a basic knowledge of electric grid and communication networks will find Evolution of Smart Grids useful. Readers who want more insight on smart grid research will also find this book a valuable resource.
This book constitutes the refereed proceedings of the First Workshop on Embracing Global Computing in Emerging Economies, EGC 2015, held in Almaty, Kazakhstan, in February 2015. The 13 revised full papers presented were carefully reviewed and selected from 28 submissions. The papers focus on the topic in two ways: one part is directly relevant to the problems of delivering cloud services in an emerging economy such as Kazakhstan, the other part represents ICT innovation by scientists of the region.
This important text addresses the latest issues in end-to-end resilient routing in communication networks. The work highlights the main causes of failures of network nodes and links, and presents an overview of resilient routing mechanisms, covering issues related to the Future Internet (FI), wireless mesh networks (WMNs), and vehicular ad-hoc networks (VANETs). Features: discusses FI architecture for network virtualization; introduces proposals for dedicated and shared protection in random failure scenarios and against malicious activities; describes measures for WMN survivability that allow for evaluation of performance under multiple failures; proposes a new scheme to enable proactive updates of WMN antenna alignment; includes a detailed analysis of the differentiated reliability requirements for VANET applications, with a focus on issues of multi-hop data delivery; reviews techniques for improving the stability of end-to-end VANET communication paths based on multipath routing and anycast forwarding.
In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Management presents a number of topics in the area of configuration automation. Early in the book, the chapter authors introduce modeling and validation of configurations based on high-level requirements and discuss how to manage the security risk as a result of configuration settings of network systems. Later chapters delve into the concept of configuration analysis and why it is important in ensuring the security and functionality of a properly configured system. The book concludes with ways to identify problems when things go wrong and more. A wide range of theoretical and practical content make this volume valuable for researchers and professionals who work with network systems.
This book provides a candid assessment and practical knowledge about the current technological advancements of the wireless healthcare system. This book presents the competencies of modeling e-health framework, medical wireless body sensor networks, communication technologies for mobile health, nanotechnology innovations in medicine, security issues for medical records, personalized services in healthcare applications, and Big Data for wireless health. This book covers multiple research perspectives in order to address the strong need for interdisciplinary research in the area of wireless health, such as the interactive research among biomedical sensor technology, intelligent textiles and advanced wireless network technology. The interactions involve experts from multidisciplinary fields including medical, information technology and computing fields. Designed as a study tool for graduate students, researchers, and medical professionals, this book is also valuable for business managers, entrepreneurs, and investors within the medical and healthcare industries. It is useful for anyone who cares about the future opportunities in healthcare systems.
This book constitutes the refereed proceedings of the International Summit on Applications for Future Internet, AFI 2016, held in Puebla, Mexico, in May 2016. The 21 papers presented were carefully selected from 29 submissions and focus on the usage of Future Internet in the biological and health sciences as well as the increased application of IoT devices in fields like smart cities, health and agriculture.
This book constitutes the refereed proceedings of the 6th International Conference on Game Theory for Networks, GameNets 2016, held in Kelowna, Canada, in May 2016. The 13 papers were carefully selected from 26 submissions and cover topics such as algorithmic game theory, game models and theories, game theories in wireless networks, design and analysis of economic games.
Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in Communication Security" presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic secret based security scheme guarantees impersonation attacks are detected even if an adversary steals a user's password or their key is lost. Practitioners and researchers working in network security or wireless communications will find this book a must-have reference. "Dynamic Secrets in Communication Security" is also a valuable secondary text for advanced-level students in computer science and electrical engineering.
This brief offers a valuable resource on principles of quality-of-service (QoS) provisioning and the related link-layer resource management techniques for high data-rate wireless networks. The primary emphasis is on protocol modeling and analysis. It introduces media access control (MAC) protocols, standards of wireless local area networks (WLANs), wireless personal area networks (WPANs), and wireless body area networks (WBANs), discussing their key technologies, applications, and deployment scenarios. The main analytical approaches and models for performance analysis of the fundamental resource scheduling mechanisms, including the contention-based, reservation-based, and hybrid MAC, are presented. To help readers understand and evaluate system performance, the brief contains a range of simulation results. In addition, a thorough bibliography provides an additional tool. This brief is an essential resource for engineers, researchers, students, and users of wireless networks.
This book constitutes the post-conference proceedings of the First International Conference on Smart Grid Inspired Future Technologies, SmartGIFT 2016, held in May 2016 in Liverpool, UK. Smart grid is the next generation electric grid that enables efficient, intelligent, and economical power generation, transmission, and distribution. The 25 revised full papers presented were reviewed and selected from 36 submissions. The papers cover technical topics such as high-level ideology and methodology, concrete smart grid inspired data sensing, processing, and networking technologies, smart grid system architecture, Quality of Service (QoS), energy efficiency, security in smart grid systems, management of smart grid systems, service engineering and algorithm design, and real-world deployment experiences.
This book constitutes the proceedings of the 12th European Conference on Modelling Foundations and Applications, ECMFA 2016, held as part of STAF 2016, in Vienna, Austria, in July 2016. The 16 papers presented in this volume were carefully reviewed and selected from 47 submissions. The committee decided to accept 16 papers, 12 papers for the Foundations Track and 4 papers for the Applications Track. Papers on a wide range of MBE aspects were accepted, including topics such as multi- and many models, language engineering, UML and meta-modeling, experience reports and case studies, and variability and uncertainty.
This book contains a selection of refereed and revised papers from three special tracks: Ad-hoc and Wireless Sensor Networks, Intelligent Distributed Computing and, Business Intelligence and Big Data Analytics originally presented at the International Symposium on Intelligent Systems Technologies and Applications (ISTA), August 10-13, 2015, Kochi, India.
This SpringerBrief focuses on the coexistence concerns emerging in LTE networks using unlicensed frequency bands. It provides a comprehensive review on LTE networks and their unavoidable need for enhanced capacity to meet the demands for future applications, including a need for low-cost options. LTE using unlicensed frequency (U-LTE) is then introduced as the most promising solution, and discussed from various perspectives to unveil its benefits, challenges, and requirements for coexistence with the widely-deployed IEEE 802.11/Wi-Fi technology. Meeting these coexistence requirements is the most important factor for the acceptance of U-LTE, and the majority of this brief explores the big picture concerns and existing solutions related to coexistence-aware medium access protocols for background knowledge. A proposed network-aware adaptive listen-before-talk protocol is presented and evaluated. Finally, the authors identify a number of open technical questions and potential research issues in U-LTE. This SpringerBrief is suitable for telecom engineers, researchers, and academic professionals with valuable knowledge and potential working or research directions when designing and developing medium access protocols for next generation wireless access networks.
This book constitutes the refereed proceedings of the 18th International Conference on Distributed and Computer and Communication Networks, DCCN 2015, held in Moscow, Russia, in October 2015. The 38 revised full papers presented were carefully reviewed and selected from 94 submissions. The papers cover the following topics: computer and communication networks architecture optimization; control in computer and communication networks; performance and QoS evaluation in wireless networks; modeling and simulation of network protocols; queuing and reliability theory; wireless IEEE 802.11, IEEE 802.15, IEEE 802.16, and UMTS (LTE) networks; FRID technology and its application in intellectual transportation networks; protocols design (MAC, Routing) for centimeter and millimeter wave mesh networks; internet and web applications and services; application integration in distributed information systems; big data in communication networks.
This book constitutes the thoroughly refereed proceedings of the 7th International Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2015, held in Cotonou, Benin, in December 2015. The 25 papers were carefully selected from 51 submissions and cover topics such as communication infrastructure, access to information, green IT applications and security, health.
This book constitutes the refereed proceedings of the 18th International Conference on Formal Engineering Methods, ICFEM 2016, held in Tokyo, Japan, in November 2016. The 27 revised full papers presented together with three invited talks were carefully reviewed and selected from 64 submissions. The conference focuses in all areas related to formal engineering meth-ods, such as verification and validation, software engineering, formal specification and modeling, software security, and software reliability.
This brief presents a unified analytical framework for the evaluation of drive-thru Internet performance and accordingly proposes an optimal spatial access control management approach. A comprehensive overview and in-depth discussion of the research literature is included. It summarizes the main concepts and methods, and highlights future research directions. The brief also introduces a novel cooperative vehicular communication framework together with a delicate linear cluster formation scheme and low-delay content forwarding approach to provide a flexible and efficient vehicular content distribution in the drive-thru Internet. The presented medium access control and vehicular content distribution related research results in this brief provide useful insights for the design approach of Wi-Fi enabled vehicular communications and it motivates a new line of thinking for the performance enhancements of future vehicular networking. Advanced-level students, researchers and professionals interested in vehicular networks or coordinated network sharing will find Cooperative Vehicular Communications in the Drive-thru Internet a valuable reference.
This SpringerBrief provides essential insights on the SDN application designing and deployment in distributed datacenters. In this book, three key problems are discussed: SDN application designing, SDN deployment and SDN management. This book demonstrates how to design the SDN-based request allocation application in distributed datacenters. It also presents solutions for SDN controller placement to deploy SDN in distributed datacenters. Finally, an SDN management system is proposed to guarantee the performance of datacenter networks which are covered and controlled by many heterogeneous controllers. Researchers and practitioners alike will find this book a valuable resource for further study on Software Defined Networking.
This book constitutes the refereed proceedings of the 31st International Symposium on Computer and Information Sciences, ISCIS 2016, held in Krakow, Poland, in October 2016. The 29 revised full papers presented were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on smart algorithms; data classification and processing; stochastic modelling; performance evaluation; queuing systems; wireless networks and security; image processing and computer vision.
This SpringerBrief presents the fundamental concepts of a specialized class of data stream, spatio-temporal data streams, and demonstrates their distributed processing using Big Data frameworks and platforms. It explores a consistent framework which facilitates a thorough understanding of all different facets of the technology, from basic definitions to state-of-the-art techniques. Key topics include spatio-temporal continuous queries, distributed stream processing, SQL-like language embedding, and trajectory stream clustering. Over the course of the book, the reader will become familiar with spatio-temporal data streams management and data flow processing, which enables the analysis of huge volumes of location-aware continuous data streams. Applications range from mobile object tracking and real-time intelligent transportation systems to traffic monitoring and complex event processing. Spatio-Temporal Data Streams is a valuable resource for researchers studying spatio-temporal data streams and Big Data analytics, as well as data engineers and data scientists solving data management and analytics problems associated with this class of data. |
![]() ![]() You may like...
Optimal Coverage in Wireless Sensor…
Weili Wu, Zhao Zhang, …
Hardcover
R3,646
Discovery Miles 36 460
SHRM-CP/SHRM-SCP Certification…
Beverly Dance, Dory Willer, …
Paperback
R1,186
Discovery Miles 11 860
|