0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (1)
  • R250 - R500 (14)
  • R500+ (4,504)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

Information Technologies and Mathematical Modelling - Queueing Theory and Applications - 14th International Scientific... Information Technologies and Mathematical Modelling - Queueing Theory and Applications - 14th International Scientific Conference, ITMM 2015, named after A. F. Terpugov, Anzhero-Sudzhensk, Russia, November 18-22, 2015, Proceedings (Paperback, 1st ed. 2015)
Alexander Dudin, Anatoly Nazarov, Rafael Yakupov
R2,744 Discovery Miles 27 440 Ships in 10 - 15 working days

This book constitutes the refereed proceedings fo the 14th International Scientific Conference on Information Technologies and Mathematical Modeling, named after A. F. Terpugov, ITMM 2015, held in Anzhero-Sudzhensk, Russia, in November 2015. The 35 full papers included in this volume were carefully reviewed and selected from 89 submissions. They are devoted to new results in the queueing theory and its applications, addressing specialists in probability theory, random processes, mathematical modeling as well as engineers dealing with logical and technical design and operational management of telecommunication and computer networks.

Interference Coordination for 5G Cellular Networks (Paperback, 1st ed. 2015): Lu Yang, Wei Zhang Interference Coordination for 5G Cellular Networks (Paperback, 1st ed. 2015)
Lu Yang, Wei Zhang
R1,688 Discovery Miles 16 880 Ships in 10 - 15 working days

This SpringerBrief presents interference coordination techniques for future 5G cellular networks. Starting with an overview of existing interference management techniques, it focuses on practical interference coordination schemes based on beamforming and user scheduling. The proposed schemes aim to deal with the inter-cell interference in multi-cell MIMO networks, cross-tier interference in device-to-device communications underlaying cellular network, and inter-network interference in cognitive radio networks. The performances of the proposed schemes are evaluated both analytically and numerically in terms of several performance parameters, including the sum rate, multiplexing gain, and outage probability of the networks. The results show that the proposed schemes can significantly reduce the effect of interference and improve the quality of service of the networks. Interference Coordination for 5G Cellular Networks is suitable for researchers and advanced students interested in interference coordination or 5G cellular networks.

Resilient Wireless Sensor Networks - The Case of Network Coding (Paperback, 1st ed. 2015): Osameh Al-Kofahi, Ahmed E. Kamal Resilient Wireless Sensor Networks - The Case of Network Coding (Paperback, 1st ed. 2015)
Osameh Al-Kofahi, Ahmed E. Kamal
R1,699 Discovery Miles 16 990 Ships in 10 - 15 working days

This Springer Brief introduces wireless sensor networks (WSNs) and the need for resilient WSN operations in application domains. It presents traditional approaches of providing resilient operation of WSNs to ensure continuity of data delivery even when some network sensors fail. The pros and cons of each these approaches are discussed. Also included is an overview of network coding basics, and motivate the use of network coding-based protection in order to combine the advantages, but avoid the disadvantages of the traditional approaches. The authors cover the design and analysis of a centralized approach to network coding-based protection of WSNs. The coverage also includes practical and realistic network situations, and the coding strategies employed. Next discussed is how to recover from data losses using a distributed approach, which is more practical for large scale WSNs. Algorithms for scheduling of transmissions while implementing network coding-based in the two cases of using digital network coding, and analog network coding are covered. Resilient Wireless Sensor Networks includes a concise, but an in-depth coverage of the use of network coding to implement agile and resource efficient protection in WSNs. It will be of interest to professionals and researchers working in the areas of fault tolerance, network coding, and deployment of WSNs in harsh environment. Advanced-level students in electrical engineering and computer science will also find this research valuable as a reference.

Algorithms and Architectures for Parallel Processing - 15th International Conference, ICA3PP 2015, Zhangjiajie, China, November... Algorithms and Architectures for Parallel Processing - 15th International Conference, ICA3PP 2015, Zhangjiajie, China, November 18-20, 2015, Proceedings, Part II (Paperback, 1st ed. 2015)
Guojun Wang, Albert Zomaya, Gregorio Martinez, Kenli Li
R1,667 Discovery Miles 16 670 Ships in 10 - 15 working days

This four volume set LNCS 9528, 9529, 9530 and 9531 constitutes the refereed proceedings of the 15th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015, held in Zhangjiajie, China, in November 2015. The 219 revised full papers presented together with 77 workshop papers in these four volumes were carefully reviewed and selected from 807 submissions (602 full papers and 205 workshop papers). The first volume comprises the following topics: parallel and distributed architectures; distributed and network-based computing and internet of things and cyber-physical-social computing. The second volume comprises topics such as big data and its applications and parallel and distributed algorithms. The topics of the third volume are: applications of parallel and distributed computing and service dependability and security in distributed and parallel systems. The covered topics of the fourth volume are: software systems and programming models and performance modeling and evaluation.

ARM Assembly Language with Hardware Experiments (Paperback, Softcover reprint of the original 1st ed. 2015): Ata Elahi, Trevor... ARM Assembly Language with Hardware Experiments (Paperback, Softcover reprint of the original 1st ed. 2015)
Ata Elahi, Trevor Arjeski
R2,628 Discovery Miles 26 280 Ships in 10 - 15 working days

This book provides a hands-on approach to learning ARM assembly language with the use of a TI microcontroller. The book starts with an introduction to computer architecture and then discusses number systems and digital logic. The text covers ARM Assembly Language, ARM Cortex Architecture and its components, and Hardware Experiments using TILM3S1968. Written for those interested in learning embedded programming using an ARM Microcontroller.

Cloud Computing for Data-Intensive Applications (Paperback, Softcover reprint of the original 1st ed. 2014): Xiaolin Li, Judy... Cloud Computing for Data-Intensive Applications (Paperback, Softcover reprint of the original 1st ed. 2014)
Xiaolin Li, Judy Qiu
R5,769 Discovery Miles 57 690 Ships in 10 - 15 working days

This book presents a range of cloud computing platforms for data-intensive scientific applications. It covers systems that deliver infrastructure as a service, including: HPC as a service; virtual networks as a service; scalable and reliable storage; algorithms that manage vast cloud resources and applications runtime; and programming models that enable pragmatic programming and implementation toolkits for eScience applications. Many scientific applications in clouds are also introduced, such as bioinformatics, biology, weather forecasting and social networks. Most chapters include case studies. Cloud Computing for Data-Intensive Applications targets advanced-level students and researchers studying computer science and electrical engineering. Professionals working in cloud computing, networks, databases and more will also find this book useful as a reference.

Mathematical Theories of Distributed Sensor Networks (Paperback, Softcover reprint of the original 1st ed. 2014): Sitharama S.... Mathematical Theories of Distributed Sensor Networks (Paperback, Softcover reprint of the original 1st ed. 2014)
Sitharama S. Iyengar, Kianoosh G. Boroojeni, N. Balakrishnan
R3,315 Discovery Miles 33 150 Ships in 10 - 15 working days

This book provides a Mathematical Theory of Distributed Sensor Networks. It introduces the Mathematical & Computational Structure by discussing what they are, their applications and how they differ from traditional systems. It also explains how mathematics are utilized to provide efficient techniques implementing effective coverage, deployment, transmission, data processing, signal processing, and data protection within distributed sensor networks. Finally, it discusses some important challenges facing mathematics to get more incite to the multidisciplinary area of distributed sensor networks. -This book will help design engineers to set up WSN-based applications providing better use of resources while optimizing processing costs. -This book is highly useful for graduate students starting their first steps in research to apprehend new approaches and understand the mathematics behind them and face promising challenges. -This book aims at presenting a formal framework allowing to show how mathematical theories can be used to provide distributed sensor modeling and to solve important problems such as coverage hole detection and repair. -This book aims at presenting the current state of the art in formal issues related to sensor networking. It can be used as a handbook for different classes at the graduate level and the undergraduate level. It is self contained and comprehensive, presenting a complete picture of the discipline of optical network engineering including modeling functions, controlling quality of service, allocation resources, monitoring traffic, protecting infrastructure, and conducting planning. This book addresses a large set of theoretical aspects. It is designed for specialists in ad hoc and wireless sensor networks and does not include discusses on very promising areas such as homotopy, computational geometry, and wavelet transforms.

Information Technologies and Mathematical Modelling: Queueing Theory and Applications - 15th International Scientific... Information Technologies and Mathematical Modelling: Queueing Theory and Applications - 15th International Scientific Conference, ITMM 2016, named after A.F. Terpugov, Katun, Russia, September 12-16, 2016. Proceedings (Paperback, 1st ed. 2016)
Alexander Dudin, Alexander Gortsev, Anatoly Nazarov, Rafael Yakupov
R2,652 Discovery Miles 26 520 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 15th International Scientific Conference on Information Technologies and Mathematical Modeling, named after A. F. Terpugov, ITMM 2016, held in Katun, Russia, in September 2016. The 33 full papers presented together with 4 short papers were carefully reviewed and selected from 96 submissions. They are devoted to new results in the queueing theory and its applications, addressing specialists in probability theory, random processes, mathematical modeling as well as engineers dealing with logical and technical design and operational management of telecommunication and computer networks.

Embracing Global Computing in Emerging Economies - First Workshop, EGC 2015, Almaty, Kazakhstan, February 26-28, 2015.... Embracing Global Computing in Emerging Economies - First Workshop, EGC 2015, Almaty, Kazakhstan, February 26-28, 2015. Proceedings (Paperback, 1st ed. 2015)
Ross Horne
R1,929 Discovery Miles 19 290 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the First Workshop on Embracing Global Computing in Emerging Economies, EGC 2015, held in Almaty, Kazakhstan, in February 2015. The 13 revised full papers presented were carefully reviewed and selected from 28 submissions. The papers focus on the topic in two ways: one part is directly relevant to the problems of delivering cloud services in an emerging economy such as Kazakhstan, the other part represents ICT innovation by scientists of the region.

Resilient Routing in Communication Networks (Paperback, Softcover reprint of the original 1st ed. 2015): Jacek Rak Resilient Routing in Communication Networks (Paperback, Softcover reprint of the original 1st ed. 2015)
Jacek Rak
R1,516 Discovery Miles 15 160 Ships in 10 - 15 working days

This important text addresses the latest issues in end-to-end resilient routing in communication networks. The work highlights the main causes of failures of network nodes and links, and presents an overview of resilient routing mechanisms, covering issues related to the Future Internet (FI), wireless mesh networks (WMNs), and vehicular ad-hoc networks (VANETs). Features: discusses FI architecture for network virtualization; introduces proposals for dedicated and shared protection in random failure scenarios and against malicious activities; describes measures for WMN survivability that allow for evaluation of performance under multiple failures; proposes a new scheme to enable proactive updates of WMN antenna alignment; includes a detailed analysis of the differentiated reliability requirements for VANET applications, with a focus on issues of multi-hop data delivery; reviews techniques for improving the stability of end-to-end VANET communication paths based on multipath routing and anycast forwarding.

Automated Security Management (Paperback, Softcover reprint of the original 1st ed. 2013): Ehab Al-Shaer, Xinming Ou, Geoffrey... Automated Security Management (Paperback, Softcover reprint of the original 1st ed. 2013)
Ehab Al-Shaer, Xinming Ou, Geoffrey Xie
R2,032 Discovery Miles 20 320 Ships in 10 - 15 working days

In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Management presents a number of topics in the area of configuration automation. Early in the book, the chapter authors introduce modeling and validation of configurations based on high-level requirements and discuss how to manage the security risk as a result of configuration settings of network systems. Later chapters delve into the concept of configuration analysis and why it is important in ensuring the security and functionality of a properly configured system. The book concludes with ways to identify problems when things go wrong and more. A wide range of theoretical and practical content make this volume valuable for researchers and professionals who work with network systems.

Ad Hoc Networks - 7th International Conference, AdHocHets 2015, San Remo, Italy, September 1-2, 2015. Proceedings (Paperback,... Ad Hoc Networks - 7th International Conference, AdHocHets 2015, San Remo, Italy, September 1-2, 2015. Proceedings (Paperback, 1st ed. 2015)
Nathalie Mitton, Melike Erol Kantarci, Antoine Gallais, Symeon Papavassiliou
R2,262 Discovery Miles 22 620 Ships in 10 - 15 working days

This book constitutes the proceedings of the International Conference on Ad Hoc Networks, ADHOCNETS 2015, held in September 2015 in Italy. The 17 regular and 3 invited papers presented were carefully reviewed and selected from numerous submissions. The papers cover topics such as physical layer; MAC and routing; mobility in networks; self-organization, virtualization and localization; cloud, virtualization and prototypage; security and fault tolerance in wireless mobile networks.

Dynamic Secrets in Communication Security (Paperback, Softcover reprint of the original 1st ed. 2014): Sheng Xiao, Weibo Gong,... Dynamic Secrets in Communication Security (Paperback, Softcover reprint of the original 1st ed. 2014)
Sheng Xiao, Weibo Gong, Don Towsley
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in Communication Security" presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic secret based security scheme guarantees impersonation attacks are detected even if an adversary steals a user's password or their key is lost. Practitioners and researchers working in network security or wireless communications will find this book a must-have reference. "Dynamic Secrets in Communication Security" is also a valuable secondary text for advanced-level students in computer science and electrical engineering.

Intelligent Systems Technologies and Applications - Volume 2 (Paperback, 1st ed. 2016): Stefano Berretti, Sabu M. Thampi, Soura... Intelligent Systems Technologies and Applications - Volume 2 (Paperback, 1st ed. 2016)
Stefano Berretti, Sabu M. Thampi, Soura Dasgupta
R4,211 Discovery Miles 42 110 Ships in 10 - 15 working days

This book contains a selection of refereed and revised papers from three special tracks: Ad-hoc and Wireless Sensor Networks, Intelligent Distributed Computing and, Business Intelligence and Big Data Analytics originally presented at the International Symposium on Intelligent Systems Technologies and Applications (ISTA), August 10-13, 2015, Kochi, India.

Security-Aware Device-to-Device Communications Underlaying Cellular Networks (Paperback, 1st ed. 2016): Aiqing Zhang, Liang... Security-Aware Device-to-Device Communications Underlaying Cellular Networks (Paperback, 1st ed. 2016)
Aiqing Zhang, Liang Zhou, Lei Wang
R1,711 Discovery Miles 17 110 Ships in 10 - 15 working days

The objective of this SpringerBrief is to present security architectures and incentive mechanisms to realize system availability for D2D communications. D2D communications enable devices to communicate directly, improving resource utilization, enhancing user's throughput, extending battery lifetime, etc. However, due to the open nature of D2D communications, there are two substantial technical challenges when applied to large-scale applications, that is, security and availability which is demonstrated in this book. This SpringerBrief proposes a secure data sharing protocol, which merges the advantages of public key cryptography and symmetric encryption, to achieve data security in D2D communications. Furthermore, a joint framework involving both the physical and application layer security technologies is proposed for multimedia service over D2D communications thus the scalable security service can be achieved without changing the current communication framework. Additionally, as the system availability largely depends on the cooperation degree of the users, a graph-theory based cooperative content dissemination scheme is proposed to achieve maximal Quality of Experience (QoE) with fairness and efficiency. This SpringerBrief will be a valuable resource for advanced-level students and researchers who want to learn more about cellular networks.

Content-Centric Networks - An Overview, Applications and Research Challenges (Paperback, 1st ed. 2016): Syed Hassan Ahmed,... Content-Centric Networks - An Overview, Applications and Research Challenges (Paperback, 1st ed. 2016)
Syed Hassan Ahmed, Safdar Hussain Bouk, Dongkyun Kim
R1,779 Discovery Miles 17 790 Ships in 10 - 15 working days

This book introduces Content-Centric Networking (CCN), a networking paradigm that provides a simple and effective solution to the challenging demands of future wired and wireless communications. It provides an overview of the recent developments in the area of future internet technologies, bringing together the advancements that have been made in Information-Centric Networking (ICN) in general, with a focus on CCN. It begins with an introduction to the basics of CCN is followed by an overview of the current internet paradigm and its challenges. Next, an application perspective has been included, where the authors encompass the selected applications for CCN with recent refereed research and developments. These applications include Internet of Things (IoT), Smart Grid, Vehicular Ad hoc Networks (VANETs), and Wireless Sensor Networks (WSNs). The book is a useful reference source for practising researchers, and can be used as supporting material for undergraduate and graduate level courses in computer science and electrical engineering.

Security in Computing and Communications - Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015.... Security in Computing and Communications - Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings (Paperback, 1st ed. 2015)
Jemal H. Abawajy, Sougata Mukherjea, Sabu M. Thampi, Antonio Ruiz-Martinez
R1,602 Discovery Miles 16 020 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2015, held in Kochi, India, in August 2015. The 36 revised full papers presented together with 13 short papers were carefully reviewed and selected from 157 submissions. The papers are organized in topical sections on security in cloud computing; authentication and access control systems; cryptography and steganography; system and network security; application security.

Spatial Network Data - Concepts and Techniques for Summarization (Paperback, 1st ed. 2016): Dev Oliver Spatial Network Data - Concepts and Techniques for Summarization (Paperback, 1st ed. 2016)
Dev Oliver
R1,653 Discovery Miles 16 530 Ships in 10 - 15 working days

This brief explores two of the main challenges of spatial network data analysis: the many connected components in the spatial network and the many candidates that have to be processed. Within this book, these challenges are conceptualized, well-defined problems are explored, and critical techniques are discussed.The process of summarizing spatial network data entails finding a compact description or representation of observations or activities on large spatial or spatiotemporal networks. However, summarizing spatial network data can be computationally challenging for various reasons, depending on the domain. The content has applications for professionals, organizations, and researchers in transportation safety, public safety, public health, disaster response, and related fields.

Cooperative Vehicular Communications in the Drive-thru Internet (Paperback, 1st ed. 2015): Haibo Zhou, Lin Gui, Quan Yu, Xuemin... Cooperative Vehicular Communications in the Drive-thru Internet (Paperback, 1st ed. 2015)
Haibo Zhou, Lin Gui, Quan Yu, Xuemin (Sherman) Shen
R1,722 Discovery Miles 17 220 Ships in 10 - 15 working days

This brief presents a unified analytical framework for the evaluation of drive-thru Internet performance and accordingly proposes an optimal spatial access control management approach. A comprehensive overview and in-depth discussion of the research literature is included. It summarizes the main concepts and methods, and highlights future research directions. The brief also introduces a novel cooperative vehicular communication framework together with a delicate linear cluster formation scheme and low-delay content forwarding approach to provide a flexible and efficient vehicular content distribution in the drive-thru Internet. The presented medium access control and vehicular content distribution related research results in this brief provide useful insights for the design approach of Wi-Fi enabled vehicular communications and it motivates a new line of thinking for the performance enhancements of future vehicular networking. Advanced-level students, researchers and professionals interested in vehicular networks or coordinated network sharing will find Cooperative Vehicular Communications in the Drive-thru Internet a valuable reference.

Cyber-Physical Attack Recovery Procedures - A Step-by-Step Preparation and Response Guide (Paperback, 1st ed.): Luis Ayala Cyber-Physical Attack Recovery Procedures - A Step-by-Step Preparation and Response Guide (Paperback, 1st ed.)
Luis Ayala
R2,488 Discovery Miles 24 880 Ships in 10 - 15 working days

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those things at the same time-even from the other side of the planet. Not every equipment failure or power outage is a cyber-physical attack. When your building is attacked, you probably won't suspect it was a hacker-until you see a pattern. The building control system (BCS) will act "squirrelly" and you will know-it really is a cyber-physical attack. Once a cyber-physical attack occurs, it can mean years of court cases, job losses, higher insurance rates, and maybe even criminal litigation. It also takes years to overcome the loss of safety credibility to your employees and the local community. Cyber-Physical Attack Recovery Procedures provides a detailed guide to taking the right steps ahead of time, and equipping your facility and employees with the training, knowledge, and tools they need and may save lives. The book contains: A one-of-a-kind action plan describing how hackers attack building equipment, the extent of damage possible, and how to respond when a cyber-physical attack occurs. Detailed descriptions of cyber-physical attacks directed against SCADA systems or building controls, as well as cyber booby traps Invaluable appendices, including: Emergency Procedures, Team Staffing and Tasking, Alternate Site Procedures, a Documentation List, Software and Hardware Inventories, Vendor Contact Lists, External Support Agreements, and much more. What you'll learn Possible ways hackers can cause building equipment to fail. How to quickly assess the threat to his facilities in real time, how to stop a cyber-physical attack. How to restore equipment operation without doing any more damage. Who This Book Is For Architects, Engineers, Building Managers, Students, Researchers and Consultants interested in cybersecurity-attacks against facilities in the real world. Also for IT professionals getting involved in cybersecurity responsibilities.

Software Defined Networking Applications in Distributed Datacenters (Paperback, 1st ed. 2016): Heng Qi, Keqiu Li Software Defined Networking Applications in Distributed Datacenters (Paperback, 1st ed. 2016)
Heng Qi, Keqiu Li
R1,688 Discovery Miles 16 880 Ships in 10 - 15 working days

This SpringerBrief provides essential insights on the SDN application designing and deployment in distributed datacenters. In this book, three key problems are discussed: SDN application designing, SDN deployment and SDN management. This book demonstrates how to design the SDN-based request allocation application in distributed datacenters. It also presents solutions for SDN controller placement to deploy SDN in distributed datacenters. Finally, an SDN management system is proposed to guarantee the performance of datacenter networks which are covered and controlled by many heterogeneous controllers. Researchers and practitioners alike will find this book a valuable resource for further study on Software Defined Networking.

Parallel Programming - for Multicore and Cluster Systems (Paperback, 2nd ed. 2013): Thomas Rauber, Gudula Runger Parallel Programming - for Multicore and Cluster Systems (Paperback, 2nd ed. 2013)
Thomas Rauber, Gudula Runger
R3,365 Discovery Miles 33 650 Ships in 10 - 15 working days

Innovations in hardware architecture, like hyper-threading or multicore processors, mean that parallel computing resources are available for inexpensive desktop computers. In only a few years, many standard software products will be based on concepts of parallel programming implemented on such hardware, and the range of applications will be much broader than that of scientific computing, up to now the main application area for parallel computing. Rauber and Runger take up these recent developments in processor architecture by giving detailed descriptions of parallel programming techniques that are necessary for developing efficient programs for multicore processors as well as for parallel cluster systems and supercomputers. Their book is structured in three main parts, covering all areas of parallel computing: the architecture of parallel systems, parallel programming models and environments, and the implementation of efficient application algorithms. The emphasis lies on parallel programming techniques needed for different architectures. For this second edition, all chapters have been carefully revised. The chapter on architecture of parallel systems has been updated considerably, with a greater emphasis on the architecture of multicore systems and adding new material on the latest developments in computer architecture. Lastly, a completely new chapter on general-purpose GPUs and the corresponding programming techniques has been added. The main goal of the book is to present parallel programming techniques that can be used in many situations for a broad range of application areas and which enable the reader to develop correct and efficient parallel programs. Many examples and exercises are provided to show how to apply the techniques. The book can be used as both a textbook for students and a reference book for professionals. The material presented has been used for courses in parallel programming at different universities for many years.

Cooperative Cognitive Radio Networking - System Model, Enabling Techniques, and Performance (Paperback, 1st ed. 2016): Bin Cao,... Cooperative Cognitive Radio Networking - System Model, Enabling Techniques, and Performance (Paperback, 1st ed. 2016)
Bin Cao, Qinyu Zhang, Jon W. Mark
R1,779 Discovery Miles 17 790 Ships in 10 - 15 working days

This SpringerBrief examines the active cooperation between users of Cooperative Cognitive Radio Networking (CCRN), exploring the system model, enabling techniques, and performance. The brief provides a systematic study on active cooperation between primary users and secondary users, i.e., (CCRN), followed by the discussions on research issues and challenges in designing spectrum-energy efficient CCRN. As an effort to shed light on the design of spectrum-energy efficient CCRN, they model the CCRN based on orthogonal modulation and orthogonally dual-polarized antenna (ODPA). The resource allocation issues are detailed with respect to both models, in terms of problem formulation, solution approach, and numerical results. Finally, the optimal communication strategies for both primary and secondary users to achieve spectrum-energy efficient CCRN are analyzed.

Managing and Mining Sensor Data (Paperback, 2013 ed.): Charu C. Aggarwal Managing and Mining Sensor Data (Paperback, 2013 ed.)
Charu C. Aggarwal
R3,003 Discovery Miles 30 030 Ships in 10 - 15 working days

Advances in hardware technology have lead to an ability to collect data with the use of a variety of sensor technologies. In particular sensor notes have become cheaper and more efficient, and have even been integrated into day-to-day devices of use, such as mobile phones. This has lead to a much larger scale of applicability and mining of sensor data sets. The human-centric aspect of sensor data has created tremendous opportunities in integrating social aspects of sensor data collection into the mining process. Managing and Mining Sensor Data is a contributed volume by prominent leaders in this field, targeting advanced-level students in computer science as a secondary text book or reference. Practitioners and researchers working in this field will also find this book useful.

Embedded System Technology - 13th National Conference, ESTC 2015, Beijing, China, October 10-11, 2015, Revised Selected Papers... Embedded System Technology - 13th National Conference, ESTC 2015, Beijing, China, October 10-11, 2015, Revised Selected Papers (Paperback, 1st ed. 2015)
Xing Zhang, Zhonghai Wu, Xingmian Sha
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 13th National Conference on Embedded System Technology, ESTC 2015, held in Beijing, China, in October 2015. The 18 revised full papers presented were carefully reviewed and selected from 63 papers. The topics cover a broad range of fields focusing on research about embedded system technologies, such as smart hardware, system and network, applications and algorithm.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cyber-Physical Systems - Foundations…
Houbing Song, Danda B. Rawat, … Paperback R2,667 R2,514 Discovery Miles 25 140
Handbook of Integration of Cloud…
Rajiv Ranjan, Karan Mitra, … Hardcover R6,309 Discovery Miles 63 090
Research Trends in Graph Theory and…
Daniela Ferrero, Leslie Hogben, … Hardcover R3,543 Discovery Miles 35 430
Algorithms for Data and Computation…
Alex X. Liu, Rui Li Hardcover R3,916 Discovery Miles 39 160
5G and Beyond - Fundamentals and…
Xingqin Lin, Namyoon Lee Hardcover R4,960 Discovery Miles 49 600
Model and Design of Improved Current…
Kirti Gupta, Neeta Pandey, … Hardcover R2,873 Discovery Miles 28 730
Advances in Computing and Network…
Sabu M. Thampi, Erol Gelenbe, … Hardcover R8,756 Discovery Miles 87 560
Computer Networking - The Complete…
Benjamin Walker Hardcover R619 R562 Discovery Miles 5 620
Digital Transformation of Collaboration…
Aleksandra Przegalinska, Francesca Grippa, … Hardcover R3,158 Discovery Miles 31 580
Privacy-Preserving in Edge Computing
Longxiang Gao, Tom H. Luan, … Hardcover R4,233 Discovery Miles 42 330

 

Partners