![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > Network computers
This volume contains the post-proceedings of the 8th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science, MEMICS 2012, held in Znojmo, Czech Republic, in October, 2012. The 13 thoroughly revised papers were carefully selected out of 31 submissions and are presented together with 6 invited papers. The topics covered by the papers include: computer-aided analysis and verification, applications of game theory in computer science, networks and security, modern trends of graph theory in computer science, electronic systems design and testing, and quantum information processing.
'There is no doubt', dr. Kevin Nunley wrote, 'the Internet really is the biggest gold rush of our lifetime. It is unlikely you or I will get another chance as big as this one to earn huge profits anytime in the next 100 years. Someday people will look back and judge us as one of two groups: those who didn't recognize the Internet revolution and missed the greatest chance of our age, and those who smartly made a place for themselves in the new business model that will dominate the future. It is time to get on board. ' Ing. Adrian Mulder Content Editor Adrian Mulder is an Internet journalist who writes for major business computing magazines. He combines a technical background with a vast experience in the computer and business trade magazine industry The Ultimate Internet Advertising Guide Acknowledgements Many people and professionals have contributed directly or indirectly to this book. To name them all would be practically impossible, as there are many. Nevertheless the editors would like to mention a few of those who have made the production of this book possible. Executive Editor for SCN Education BV: Robert Pieter Schotema Publishing Manager: drs. Marieke Kok Marketing Coordinator: Martijn Robert Broersma Content Editor: ing. Adrian Mulder Editorial Support Dennis Gaasbeek, Rob Guijt, Richard van Winssen Interior Design: Paulien van Hemmen, Bach. Also, we would especially like to thank dr. Roland van Stigt for laying a solid foundation for the Hon Guide series to grow on.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Algorithms for Sensor Systems, Wireless Ad Hoc Networks, and Autonomous Mobile Entities, ALGOSENSORS 2012, held in Ljubljana, Slovenia, in September 2012. The 11 revised full papers presented together with two invited keynote talks and two brief announcements were carefully reviewed and selected from 24 submissions. The papers are organized in two tracks: sensor networks - covering topics such as barrier resilience, localization, connectivity with directional antennas, broadcast scheduling, and data aggregation; and ad hoc wireless and mobile systems - covering topics such as: SINR model; geometric routing; cognitive radio networks; video delivery; and mapping polygons.
This book constitutes the refereed proceedings of the Third International Conference on Advances in Computing, Communication and Control, ICAC3 2013, held in Mumbai, India, in January 2013. The 69 papers presented in this volume were carefully reviewed and selected for inclusion in the book. They deal with topics such as image processing, artificial intelligence, robotics, wireless communications; data warehousing and mining, and are organized in topical sections named: computing; communication; control; and others.
This work opens with an accessible introduction to computer networks, providing general definitions of commonly used terms in networking. This is followed by a detailed description of the OSI model, including the concepts of connection-oriented and connectionless communications. The text carefully elaborates the specific functions of each layer, along with what is expected of protocols operating at each layer. Next, the journey of a single packet, from source to destination, is described in detail. The final chapter is devoted to the TCP/IP model, beginning with a discussion of IP protocols and the supporting ARP, RARP and In ARP protocols. The work also discusses the TCP and UDP protocols operating at the transport layer and the application layer protocols HTTP, DNS, FTP, TFTP, SMTP, POP3 and Telnet. Important facts and definitions are highlighted in gray boxes found throughout the text.
"Running Mainframe z on Distributed Platforms is particularly suitable for a more detailed discussion." Bill Ogden, IBM zPDT Redbook, April 2015 "The authors offer very well-reasoned solutions accompanied by case studies, which will be useful to specialists. The book is made even more useful as the System z mainframe-based solutions offer an advanced systems management environment for significant segments of data within large companies." Eugen Petac, Computing Reviews, Oct. 8, 2014 "Should you choose to implement zPDT, RDz UT, or RD&T in your team's arsenal, you will find Barrett and Norris's insights, genius, and hard work illuminating as to how to rationally and economically manage the environment." -Scott Fagen, Chief Architect-System z Business, CA Technologies "A must-read for anyone interested in successfully deploying cost-efficient zPDT environments with agility in an enterprise that requires simple or complex configurations. The case-study-based exposition of the content allows for its easy consumption and use. Excellent!" -Mahendra Durai, SVP & Information Technology Officer, CA Running Mainframe z on Distributed Platforms reveals alternative techniques not covered by IBM for creatively adapting and enhancing multi-user IBM zPDT environments so that they are more friendly, stable, and reusable than those envisaged by IBM. The enhancement processes and methodologies taught in this book yield multiple layers for system recovery, 24x7 availability, and superior ease of updating and upgrading operating systems and subsystems without having to rebuild environments from scratch. Most of the techniques and processes covered in this book are not new to either the mainframe or distributed platforms. What is new in this book are the authors' innovative methods for taking distributed environments running mainframe virtual machine (VM) and multiple virtual storage (MVS) and making them look and feel like other MVS systems.The authors' combined expertise involves every aspect of the implementation of IBM zPDT technology to create virtualized mainframe environments by which the mainframe operations on a z series server can be transitioned to distributed platforms. All of the enhancement methods consecutively laid out in this book have been architected and developed by the authors for the CA Technologies distributed platform. Barrett and Norris impart these techniques and processes to CIOs and CTOs across the mainframe and distributed fields, to zPDT and RDz UT implementers, and to IBM's independent software vendors and customers.
This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Selected Areas in Cryptography, SAC 2012, held in Windsor, Ontario, Canada, in August 2012. The 24 papers presented were carefully reviewed and selected from 87 submissions. They are organized in topical sections named: cryptanalysis, digital signatures, stream ciphers, implementations, block cipher cryptanalysis, lattices, hashfunctions, blockcipher constructions, and miscellaneous.
This work presents a study of cache replacement strategies designed for static web content. Proxy servers can improve performance by caching static web content such as cascading style sheets, java script source files, and large files such as images. This topic is particularly important in wireless ad hoc networks, in which mobile devices act as proxy servers for a group of other mobile devices. Opening chapters present an introduction to web requests and the characteristics of web objects, web proxy servers and Squid, and artificial neural networks. This is followed by a comprehensive review of cache replacement strategies simulated against different performance metrics. The work then describes a novel approach to web proxy cache replacement that uses neural networks for decision making, evaluates its performance and decision structures, and examines its implementation in a real environment, namely, in the Squid proxy server.
This book constitutes the refereed proceedings of the International Conference on Modern Probabilistic Methods for Analysis of Telecommunication Networks, Belarusian Winter Workshop in Queueing Theory, BWWQT 2013, held in Minsk, Belarus, in January 2013. The 23 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers present new results in study and optimization of information transmission models in telecommunication networks using different approaches, mainly based on theories of queueing systems and queueing networks.
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Colloquium on Structural Information and Communication Complexity, SIROCCO 2013, held in Ischia, Italy, in July 2013. The 28 revised full papers presented were carefully reviewed and selected from 67 submissions. SIROCCO is devoted to the study of communication and knowledge in distributed systems. Special emphasis is given to innovative approaches and fundamental understanding, in addition to efforts to optimize current designs. The typical areas include distributed computing, communication networks, game theory, parallel computing, social networks, mobile computing (including autonomous robots), peer to peer systems, communication complexity, fault tolerant graph theories and randomized/probabilistic issues in networks.
This book has evolved primarily from lecture notes for data communications courses taught at Georgia State University since 1969. Additional material was derived from seminar presentations that were made during this period as well as from consulting work. Teaching data communications in the College of Business Administration influenced the point of view of this material, giving it a semitechnical orientation. This point of view has been extended to the prepara tion of this book. Only those technical details were included which, it was felt, would lead the student to a better understanding of the subject. References are provided for those who desire further information in particular areas. The reader for whom this book is intended is the nontechnical person who has some knowledge of computer technology and who wishes to extend that knowledge to the field of data communications. The two key points stressed in this book are terminology and concepts. The objectives of this book are to enable the student: 1. To read articles in the field of data communications with an understand ing of their content. 2. To be able to engage in knowledgeable discussions with communica tions engineers on the subject of data communications. 3. To design and implement the hardware aspects of applications using data communications. The software that would be involved is beyond the scope of this book except where protocols are considered. v vi Preface 4. To effectively evaluate proposals for the implementation of data com munications systems."
This book constitutes the refereed proceedings of the 6th International Symposium on Engineering Secure Software and Systems, ESSoS 2014, held in Munich, Germany, in February 2014. The 11 full papers presented together with 4 idea papers were carefully reviewed and selected from 55 submissions. The symposium features the following topics: model-based security, formal methods, web and mobile security and applications.
Johannes Buchmann is internationally recognized as one of the leading figures in areas of computational number theory, cryptography and information security. He has published numerous scientific papers and books spanning a very wide spectrum of interests; besides R&D he also fulfilled lots of administrative tasks for instance building up and directing his research group CDC at Darmstadt, but he also served as the Dean of the Department of Computer Science at TU Darmstadt and then went on to become Vice President of the university for six years (2001-2007). This festschrift, published in honor of Johannes Buchmann on the occasion of his 60th birthday, contains contributions by some of his colleagues, former students and friends. The papers give an overview of Johannes Buchmann's research interests, ranging from computational number theory and the hardness of cryptographic assumptions to more application-oriented topics such as privacy and hardware security. With this book we celebrate Johannes Buchmann's vision and achievements.
Many challenges lie ahead in the development of a global information society. Culture and democracy are two areas which may be under particular threat. The book reflects on today's complex and uncertain cultural and democratic developments arising as a result of an increasingly global, technologically-connected world. In particular it focuses on the Internet, examining new metaphors for communication, defining the issues at stake and proposing options, actions and solutions. Among the issues discussed were: multi-cultural developments; cultural sensitivities and the involvement of cultural minorities; generation gaps; gender issues; technology access for the elderly and the disabled; technology transfer.
The focus of this brief is to identify what unifies and what distinguishes the routing functions in four wireless multi-hop network paradigms. The brief introduces a generic routing model that can be used as a foundation of wireless multi-hop routing protocol analysis and design. It demonstrates that such model can be adopted by any wireless multi-hop routing protocol. Also presented is a glimpse of the ideal wireless multi-hop routing protocol along with several open issues.
Recent advances in technology and new software applications are steadily transforming human civilization into what is called the Information Society. This is manifested by the new terminology appearing in our daily activities. E-Business, E-Government, E-Learning, E-Contracting, and E-Voting are just a few of the ever-growing list of new terms that are shaping the Information Society. Nonetheless, as Information gains more prominence in our society, the task of securing it against all forms of threats becomes a vital and crucial undertaking.Addressing the various security issues confronting our new Information Society, this volume is divided into 13 parts covering the following topics: * Information Security Management; * Standards of Information Security; * Threats and Attacks to Information; * Education and Curriculum for Information Security; * Social and Ethical Aspects of Information Security; * Information Security Services; * Multilateral Security; * Applications of Information Security; * Infrastructure for Information Security * Advanced Topics in Security; * Legislation for Information Security; * Modeling and Analysis for Information Security; * Tools for Information Security. Security in the Information Society: Visions and Perspectives comprises the proceedings of the 17th International Conference on Information Security (SEC2002), which was sponsored by the International Federation for Information Processing (IFIP), and jointly organized by IFIP Technical Committee 11 and the Department of Electronics and Electrical Communications of Cairo University. The conference was held in May 2002 in Cairo, Egypt.
This book comprises the refereed proceedings of the International Conference, AIM/CCPE 2012, held in Bangalore, India, in April 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of research and development activities in computer science, information technology, computational engineering, mobile communication, control and instrumentation, communication system, power electronics and power engineering.
This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Distributed Computing and Services, ISCTCS 2012, held in Beijing, China, in May/June 2012. The 92 revised full papers presented were carefully reviewed and selected from 278 papers. The topics covered are architecture for trusted computing systems, trusted computing platform, trusted systems build, network and protocol security, mobile network security, network survivability and other critical theories and standard systems, credible assessment, credible measurement and metrics, trusted systems, trusted networks, trusted mobile network, trusted routing, trusted software, trusted operating systems, trusted storage, fault-tolerant computing and other key technologies, trusted e-commerce and e-government, trusted logistics, trusted internet of things, trusted cloud and other trusted services and applications.
This book constitutes the thoroughly refereed post-proceedings of the 17th International Workshop on Security Protocols, SP 2009, held in Cambridge, UK, in April 2009. The 17 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have gone through multiple rounds of reviewing, revision, and selection. The theme of this workshop was "Brief Encounters". In the old days, security protocols were typically run first as preliminaries to, and later to maintain, relatively stable continuing relationships between relatively unchanging individual entities. Pervasive computing, e-bay and second life have shifted the ground: we now frequently desire a secure commitment to a particular community of entities, but relatively transient relationships with individual members of it, and we are often more interested in validating attributes than identity. The papers and discussions in this volume examine the theme from the standpoint of various different applications and adversaries.
For some years, specification of software and hardware systems has been influenced not only by algebraic methods but also by new developments in logic. These new developments in logic are partly based on the use of algorithmic techniques in deduction and proving methods, but are alsodue to new theoretical advances, to a great extent stimulated by computer science, which have led to new types of logic and new logical calculi. The new techniques, methods and tools from logic, combined with algebra-based ones, offer very powerful and useful tools for the computer scientist, which may soon become practical for commercial use, where, in particular, more powerful specification tools are needed for concurrent and distributed systems. This volume contains papers based on lectures by leading researchers which were originally given at an international summer school held in Marktoberdorf in 1991. The papers aim to give a foundation for combining logic and algebra for the purposes of specification under the aspects of automated deduction, proving techniques, concurrency and logic, abstract data types and operational semantics, and constructive methods.
This book constitutes the refereed proceedings of the ACM/IFIP/USENIX 13th International Middleware Conference, held in Montreal, Canada, in December 2012. The 24 revised full papers presented were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on mobile middleware; tracing and diagnosis; architecture and performance; publish/subscribe middleware; and big-data and cloud computing; availability, security and privacy.
This volume constitutes the refereed proceedings of the International Conferences, BSBT, MulGraB and IUrC 2012, held as part of the Future Generation Information Technology Conference, FGIT 2012, Gangneung, Korea, in December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of multimedia, computer graphics and broadcasting, bio-science and bio-technology, and intelligent urban computing.
This book constitutes the refereed proceedings of the 8th International Workshop on Security, IWSEC 2013, held in Okinawa, Japan, in November 2013. The 20 revised selected papers presented in this volume were carefully reviewed and selected from 63 submissions. They are organized in topical sections named: software and system security, cryptanalysis, privacy and cloud computing, public key cryptosystems, and security protocols.
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers are grouped into topical sections covering: side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and identity-based encryption.
This book constitutes the thoroughly refereed proceedings of the 16th International Workshop on Job Scheduling Strategies for Parallel Processing, JSSPP 2012, which was held in Shanghai, China, in May 2012. The 14 revised papers presented were carefully reviewed and selected from 24 submissions. The papers cover the following topics: parallel batch scheduling; workload analysis and modeling; resource management system software studies; and Web scheduling. |
You may like...
Handbook of Computer Networks and Cyber…
Brij B. Gupta, Gregorio Martinez Perez, …
Hardcover
R7,167
Discovery Miles 71 670
When Compressive Sensing Meets Mobile…
Linghe Kong, Bowen Wang, …
Hardcover
R2,653
Discovery Miles 26 530
Frontier and Innovation in Future…
James J (Jong Hyuk) Park, Albert Zomaya, …
Hardcover
R7,867
Discovery Miles 78 670
Design and Implementation of Practical…
Akshay Kumar, Ahmed Abdelhadi, …
Hardcover
R2,663
Discovery Miles 26 630
Learning from Imbalanced Data Sets
Alberto Fernandez, Salvador Garcia, …
Hardcover
R4,006
Discovery Miles 40 060
|