0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (3)
  • R250 - R500 (18)
  • R500+ (4,516)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

Wireless and Satellite Systems - 7th International Conference, WiSATS 2015, Bradford, UK, July 6-7, 2015. Revised Selected... Wireless and Satellite Systems - 7th International Conference, WiSATS 2015, Bradford, UK, July 6-7, 2015. Revised Selected Papers (Paperback, 1st ed. 2015)
Prashant Pillai, Yim Fun Hu, Ifiok Otung, Giovanni Giambene
R2,800 Discovery Miles 28 000 Ships in 10 - 15 working days

This book constitutes the proceedings of the 7th International Conference on Wireless and Satellite Services, WiSATS 2015, held in Bradford, UK, in July 2015. The conference was formerly known as the International Conference on Personal Satellite Services (PSATS) mainly covering topics in the satellite domain. As the scope of the conference widened to include wireless systems, the conference was renamed to WiSATS. The 29 revised papers were presented at the conference in three technical sessions and one special session on "Network Coding for Satellites". WiSATS 2015 also hosted two workshops along with the main conference: The first workshop, Communication Applications in Smart Grid (CASG 2015), focused on the merging area of using communication technology within the electricity power grid for smart monitoring and control. The second workshop, Advanced Next-Generation Broadband Satellite Systems (BSS 2015), focused on the use of satellite systems for providing next-generation broadband services.

Web and Internet Economics - 11th International Conference, WINE 2015, Amsterdam, The Netherlands, December 9-12, 2015,... Web and Internet Economics - 11th International Conference, WINE 2015, Amsterdam, The Netherlands, December 9-12, 2015, Proceedings (Paperback, 1st ed. 2015)
Evangelos Markakis, Guido Schafer
R2,945 Discovery Miles 29 450 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed proceedings of the 11th International Conference on Web and Internet Economics, WINE 2015, held in Amsterdam, The Netherlands, in December 2015. The 30 regular papers presented together with 8 abstracts were carefully reviewed and selected from 142 submissions and cover results on incentives and computation in theoretical computer science, artificial intelligence, and microeconomics.

Future Access Enablers for Ubiquitous and Intelligent Infrastructures - First International Conference, FABULOUS 2015, Ohrid,... Future Access Enablers for Ubiquitous and Intelligent Infrastructures - First International Conference, FABULOUS 2015, Ohrid, Republic of Macedonia, September 23-25, 2015. Revised Selected Papers (Paperback, 1st ed. 2015)
Vladimir Atanasovski, Alberto Leon-Garcia
R2,534 Discovery Miles 25 340 Ships in 10 - 15 working days

This book constitutes the proceedings of the First International Conference on Future Access Enablers for Ubiquitous and Intelligent Infrastructures, FABULOUS 2015, held in Ohrid, Republic of Macedonia, in September 2015. The 39 revised papers cover the broad areas of future wireless networks, ambient and assisted living, smart infrastructures and security and reflect the fast developing and vibrant penetration of IoT technologies in diverse areas of human live.

Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications (Paperback, 1st ed. 2015): Zhou Lu,... Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications (Paperback, 1st ed. 2015)
Zhou Lu, Wenye Wang, Cliff Wang
R1,941 Discovery Miles 19 410 Ships in 10 - 15 working days

This SpringerBrief covers modeling and analysis of Denial-of-Service attacks in emerging wireless and mobile applications. It uses an application-specific methodology to model and evaluate denial-of-service attacks. Three emerging applications are explored: multi-modal CSMA/CA networks, time-critical networks for the smart grid, and smart phone applications. The authors define a new performance metric to quantify the benefits of backoff misbehavior and show the impacts of a wide range of backoff mishandling nodes on the network performance, and propose a scheme to minimize the delay of time-critical message delivery under jamming attacks in smart grid applications. An investigation on the resilience of mobile services against malware attacks is included to advance understanding of network vulnerabilities associated with emerging wireless networks and offers instrumental guidance into the security design for future wireless and mobile applications. This book is appropriate for students, faculty, engineers, and experts in the technical area of wireless communication, mobile networks and cyber security.

Anti-Jamming Transmissions in Cognitive Radio Networks (Paperback, 1st ed. 2015): Liang Xiao Anti-Jamming Transmissions in Cognitive Radio Networks (Paperback, 1st ed. 2015)
Liang Xiao
R1,796 Discovery Miles 17 960 Ships in 10 - 15 working days

This SpringerBrief examines anti-jamming transmissions in cognitive radio networks (CRNs), including several recent related research topics within this field. The author introduces the transmissions based on uncoordinated spread spectrum to address smart jammers in CRNs. The author applies game theory to investigate the interactions between secondary users and jammers while providing game theoretic solutions to suppress jamming incentives in CRNs. Later chapters evaluate the Nash equilibrium and Stackelberg equilibrium of the jamming games under various network scenarios. Professionals and researchers working in networks, wireless communications and information technology will find Anti-Jamming Transmissions in Cognitive Radio Networks valuable material as a reference. Advanced-level students studying electrical engineering and computer science will also find this brief a useful tool.

Cyber Security and Privacy - 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium... Cyber Security and Privacy - 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium April 28-29, 2015, Revised Selected Papers (Paperback, 1st ed. 2015)
Frances Cleary, Massimo Felici
R2,050 Discovery Miles 20 500 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed selected papers on the 4th Cyber Security and Privacy Innovation Forum, CSP Forum 2015, held in Brussels, Belgium, in April 2015. The 12 revised full papers presented were carefully reviewed and selected from various submissions. The papers are organized in topical sections such as security and privacy in the cloud; security and privacy technologies; risk and trust; research and innovation in cyber security and privacy.

Ad Hoc Networks - 7th International Conference, AdHocHets 2015, San Remo, Italy, September 1-2, 2015. Proceedings (Paperback,... Ad Hoc Networks - 7th International Conference, AdHocHets 2015, San Remo, Italy, September 1-2, 2015. Proceedings (Paperback, 1st ed. 2015)
Nathalie Mitton, Melike Erol Kantarci, Antoine Gallais, Symeon Papavassiliou
R2,376 Discovery Miles 23 760 Ships in 10 - 15 working days

This book constitutes the proceedings of the International Conference on Ad Hoc Networks, ADHOCNETS 2015, held in September 2015 in Italy. The 17 regular and 3 invited papers presented were carefully reviewed and selected from numerous submissions. The papers cover topics such as physical layer; MAC and routing; mobility in networks; self-organization, virtualization and localization; cloud, virtualization and prototypage; security and fault tolerance in wireless mobile networks.

Information Technologies and Mathematical Modelling - Queueing Theory and Applications - 14th International Scientific... Information Technologies and Mathematical Modelling - Queueing Theory and Applications - 14th International Scientific Conference, ITMM 2015, named after A. F. Terpugov, Anzhero-Sudzhensk, Russia, November 18-22, 2015, Proceedings (Paperback, 1st ed. 2015)
Alexander Dudin, Anatoly Nazarov, Rafael Yakupov
R2,884 Discovery Miles 28 840 Ships in 10 - 15 working days

This book constitutes the refereed proceedings fo the 14th International Scientific Conference on Information Technologies and Mathematical Modeling, named after A. F. Terpugov, ITMM 2015, held in Anzhero-Sudzhensk, Russia, in November 2015. The 35 full papers included in this volume were carefully reviewed and selected from 89 submissions. They are devoted to new results in the queueing theory and its applications, addressing specialists in probability theory, random processes, mathematical modeling as well as engineers dealing with logical and technical design and operational management of telecommunication and computer networks.

Interference Coordination for 5G Cellular Networks (Paperback, 1st ed. 2015): Lu Yang, Wei Zhang Interference Coordination for 5G Cellular Networks (Paperback, 1st ed. 2015)
Lu Yang, Wei Zhang
R1,772 Discovery Miles 17 720 Ships in 10 - 15 working days

This SpringerBrief presents interference coordination techniques for future 5G cellular networks. Starting with an overview of existing interference management techniques, it focuses on practical interference coordination schemes based on beamforming and user scheduling. The proposed schemes aim to deal with the inter-cell interference in multi-cell MIMO networks, cross-tier interference in device-to-device communications underlaying cellular network, and inter-network interference in cognitive radio networks. The performances of the proposed schemes are evaluated both analytically and numerically in terms of several performance parameters, including the sum rate, multiplexing gain, and outage probability of the networks. The results show that the proposed schemes can significantly reduce the effect of interference and improve the quality of service of the networks. Interference Coordination for 5G Cellular Networks is suitable for researchers and advanced students interested in interference coordination or 5G cellular networks.

Resilient Wireless Sensor Networks - The Case of Network Coding (Paperback, 1st ed. 2015): Osameh Al-Kofahi, Ahmed E. Kamal Resilient Wireless Sensor Networks - The Case of Network Coding (Paperback, 1st ed. 2015)
Osameh Al-Kofahi, Ahmed E. Kamal
R1,784 Discovery Miles 17 840 Ships in 10 - 15 working days

This Springer Brief introduces wireless sensor networks (WSNs) and the need for resilient WSN operations in application domains. It presents traditional approaches of providing resilient operation of WSNs to ensure continuity of data delivery even when some network sensors fail. The pros and cons of each these approaches are discussed. Also included is an overview of network coding basics, and motivate the use of network coding-based protection in order to combine the advantages, but avoid the disadvantages of the traditional approaches. The authors cover the design and analysis of a centralized approach to network coding-based protection of WSNs. The coverage also includes practical and realistic network situations, and the coding strategies employed. Next discussed is how to recover from data losses using a distributed approach, which is more practical for large scale WSNs. Algorithms for scheduling of transmissions while implementing network coding-based in the two cases of using digital network coding, and analog network coding are covered. Resilient Wireless Sensor Networks includes a concise, but an in-depth coverage of the use of network coding to implement agile and resource efficient protection in WSNs. It will be of interest to professionals and researchers working in the areas of fault tolerance, network coding, and deployment of WSNs in harsh environment. Advanced-level students in electrical engineering and computer science will also find this research valuable as a reference.

Algorithms and Architectures for Parallel Processing - 15th International Conference, ICA3PP 2015, Zhangjiajie, China, November... Algorithms and Architectures for Parallel Processing - 15th International Conference, ICA3PP 2015, Zhangjiajie, China, November 18-20, 2015, Proceedings, Part II (Paperback, 1st ed. 2015)
Guojun Wang, Albert Zomaya, Gregorio Martinez, Kenli Li
R1,750 Discovery Miles 17 500 Ships in 10 - 15 working days

This four volume set LNCS 9528, 9529, 9530 and 9531 constitutes the refereed proceedings of the 15th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015, held in Zhangjiajie, China, in November 2015. The 219 revised full papers presented together with 77 workshop papers in these four volumes were carefully reviewed and selected from 807 submissions (602 full papers and 205 workshop papers). The first volume comprises the following topics: parallel and distributed architectures; distributed and network-based computing and internet of things and cyber-physical-social computing. The second volume comprises topics such as big data and its applications and parallel and distributed algorithms. The topics of the third volume are: applications of parallel and distributed computing and service dependability and security in distributed and parallel systems. The covered topics of the fourth volume are: software systems and programming models and performance modeling and evaluation.

SemProM - Foundations of Semantic Product Memories for the Internet of Things (Paperback, Softcover reprint of the original 1st... SemProM - Foundations of Semantic Product Memories for the Internet of Things (Paperback, Softcover reprint of the original 1st ed. 2013)
Wolfgang Wahlster
R4,223 Discovery Miles 42 230 Ships in 10 - 15 working days

The development of low-cost, compact digital storage, sensors and radio modules allows us to embed digital memories into products to record key events. Such computationally enhanced products can perceive and control their environment, analyze their observations, and communicate with other smart objects and human users. Digital product memories (DPMs) will play a key role in the upcoming fourth industrial revolution based on cyber-physical production systems, resulting in improvements in traceability and quality assurance, more efficient and flexible production, logistics, customization, and recycling, and better information for the consumer. SemProM was a major industrial and academic research project that examined all aspects of the design and implementation of semantic product memories, and this book is a comprehensive assessment of the results achieved. The introductory chapters explain the fundamental ideas and the organization of the related project, while the remaining parts explain how to build, model and process DPMs, multimodal interaction using them, and selected applications. This work is inherently multidisciplinary and the related ideas, technologies, and implementations draw on results in fields such as semantic technologies, machine-to-machine communication, intelligent sensor networks, instrumented environments, embedded systems, smart objects, RFID technology, security, and privacy. The contributing authors are leading scientists and engineers, representing key academic teams and companies. The book explains successful deployment in applications such as manufacturing, green logistics, retail, healthcare, and food distribution, and it will be of value to both researchers and practitioners.

Evolution of Smart Grids (Paperback, 1st ed. 2015): Zubair Md. Fadlullah, Nei Kato Evolution of Smart Grids (Paperback, 1st ed. 2015)
Zubair Md. Fadlullah, Nei Kato
R1,869 Discovery Miles 18 690 Ships in 10 - 15 working days

This SpringerBrief explores the opportunities and challenges posed by the smart grid. The evolution of the smart grid should allow consumers to directly communicate with their utility provider. However, complex issues such as architecture with legacy support, varying demand response and load management, varying price of power, and so forth can lead to various decision making challenges. It is essential to identify the scope and challenges of the smart grid in a comprehensive manner so as to ensure efficient delivery of sustainable, economic, and secure electricity supplies. This book provides an overview of the smart grid and its key advances in architecture, distribution management, demand-side response and load balancing, smart automation, electric storage, power loss minimization and security. Readers interested in a basic knowledge of electric grid and communication networks will find Evolution of Smart Grids useful. Readers who want more insight on smart grid research will also find this book a valuable resource.

QoE Management in Wireless Networks (Paperback, 1st ed. 2017): Ying Wang, Wen'an Zhou, Ping Zhang QoE Management in Wireless Networks (Paperback, 1st ed. 2017)
Ying Wang, Wen'an Zhou, Ping Zhang
R1,760 Discovery Miles 17 600 Ships in 10 - 15 working days

This SpringerBrief presents research results on QoE management schemes for mobile services, including user services, and resource allocation. Along with a review of the research literature, it offers a data-driven architecture for personalized QoE management in wireless networks. The primary focus is on introducing efficient personalized character extraction mechanisms, e.g., context-aware Bayesian graph model, and cooperative QoE management mechanisms. Moreover, in order to demonstrate in the effectiveness of the QoE model, a QoE measurement platform is described and its collected data examined. The brief concludes with a discussion of future research directions. The example mechanisms and the data-driven architecture provide useful insights into the designs of QoE management, and motivate a new line of thinking for users' satisfaction in future wireless networks.

Embracing Global Computing in Emerging Economies - First Workshop, EGC 2015, Almaty, Kazakhstan, February 26-28, 2015.... Embracing Global Computing in Emerging Economies - First Workshop, EGC 2015, Almaty, Kazakhstan, February 26-28, 2015. Proceedings (Paperback, 1st ed. 2015)
Ross Horne
R2,026 Discovery Miles 20 260 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the First Workshop on Embracing Global Computing in Emerging Economies, EGC 2015, held in Almaty, Kazakhstan, in February 2015. The 13 revised full papers presented were carefully reviewed and selected from 28 submissions. The papers focus on the topic in two ways: one part is directly relevant to the problems of delivering cloud services in an emerging economy such as Kazakhstan, the other part represents ICT innovation by scientists of the region.

Dynamic Secrets in Communication Security (Paperback, Softcover reprint of the original 1st ed. 2014): Sheng Xiao, Weibo Gong,... Dynamic Secrets in Communication Security (Paperback, Softcover reprint of the original 1st ed. 2014)
Sheng Xiao, Weibo Gong, Don Towsley
R1,597 Discovery Miles 15 970 Ships in 10 - 15 working days

Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in Communication Security" presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic secret based security scheme guarantees impersonation attacks are detected even if an adversary steals a user's password or their key is lost. Practitioners and researchers working in network security or wireless communications will find this book a must-have reference. "Dynamic Secrets in Communication Security" is also a valuable secondary text for advanced-level students in computer science and electrical engineering.

Modelling Foundations and Applications - 12th European Conference, ECMFA 2016, Held as Part of STAF 2016, Vienna, Austria, July... Modelling Foundations and Applications - 12th European Conference, ECMFA 2016, Held as Part of STAF 2016, Vienna, Austria, July 6-7, 2016, Proceedings (Paperback, 1st ed. 2016)
Andrzej Wasowski, Henrik Loenn
R2,401 Discovery Miles 24 010 Ships in 10 - 15 working days

This book constitutes the proceedings of the 12th European Conference on Modelling Foundations and Applications, ECMFA 2016, held as part of STAF 2016, in Vienna, Austria, in July 2016. The 16 papers presented in this volume were carefully reviewed and selected from 47 submissions. The committee decided to accept 16 papers, 12 papers for the Foundations Track and 4 papers for the Applications Track. Papers on a wide range of MBE aspects were accepted, including topics such as multi- and many models, language engineering, UML and meta-modeling, experience reports and case studies, and variability and uncertainty.

Intelligent Systems Technologies and Applications - Volume 2 (Paperback, 1st ed. 2016): Stefano Berretti, Sabu M. Thampi, Soura... Intelligent Systems Technologies and Applications - Volume 2 (Paperback, 1st ed. 2016)
Stefano Berretti, Sabu M. Thampi, Soura Dasgupta
R4,428 Discovery Miles 44 280 Ships in 10 - 15 working days

This book contains a selection of refereed and revised papers from three special tracks: Ad-hoc and Wireless Sensor Networks, Intelligent Distributed Computing and, Business Intelligence and Big Data Analytics originally presented at the International Symposium on Intelligent Systems Technologies and Applications (ISTA), August 10-13, 2015, Kochi, India.

Security in Computing and Communications - Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015.... Security in Computing and Communications - Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings (Paperback, 1st ed. 2015)
Jemal H. Abawajy, Sougata Mukherjea, Sabu M. Thampi, Antonio Ruiz-Martinez
R1,682 Discovery Miles 16 820 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2015, held in Kochi, India, in August 2015. The 36 revised full papers presented together with 13 short papers were carefully reviewed and selected from 157 submissions. The papers are organized in topical sections on security in cloud computing; authentication and access control systems; cryptography and steganography; system and network security; application security.

Advanced Network Programming - Principles and Techniques - Network Application Programming with Java (Paperback, Softcover... Advanced Network Programming - Principles and Techniques - Network Application Programming with Java (Paperback, Softcover reprint of the original 1st ed. 2013)
Bogdan Ciubotaru, Gabriel-Miro Muntean
R2,352 Discovery Miles 23 520 Ships in 10 - 15 working days

Answering the need for an accessible overview of the field, this text/reference presents a manageable introduction to both the theoretical and practical aspects of computer networks and network programming. Clearly structured and easy to follow, the book describes cutting-edge developments in network architectures, communication protocols, and programming techniques and models, supported by code examples for hands-on practice with creating network-based applications. Features: presents detailed coverage of network architectures; gently introduces the reader to the basic ideas underpinning computer networking, before gradually building up to more advanced concepts; provides numerous step-by-step descriptions of practical examples; examines a range of network programming techniques; reviews network-based data storage and multimedia transfer; includes an extensive set of practical code examples, together with detailed comments and explanations.

Distributed Computer and Communication Networks - 18th International Conference, DCCN 2015, Moscow, Russia, October 19-22,... Distributed Computer and Communication Networks - 18th International Conference, DCCN 2015, Moscow, Russia, October 19-22, 2015, Revised Selected Papers (Paperback, 1st ed. 2016)
Vladimir Vishnevsky, Dmitry Kozyrev
R2,727 Discovery Miles 27 270 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 18th International Conference on Distributed and Computer and Communication Networks, DCCN 2015, held in Moscow, Russia, in October 2015. The 38 revised full papers presented were carefully reviewed and selected from 94 submissions. The papers cover the following topics: computer and communication networks architecture optimization; control in computer and communication networks; performance and QoS evaluation in wireless networks; modeling and simulation of network protocols; queuing and reliability theory; wireless IEEE 802.11, IEEE 802.15, IEEE 802.16, and UMTS (LTE) networks; FRID technology and its application in intellectual transportation networks; protocols design (MAC, Routing) for centimeter and millimeter wave mesh networks; internet and web applications and services; application integration in distributed information systems; big data in communication networks.

Cooperative Vehicular Communications in the Drive-thru Internet (Paperback, 1st ed. 2015): Haibo Zhou, Lin Gui, Quan Yu, Xuemin... Cooperative Vehicular Communications in the Drive-thru Internet (Paperback, 1st ed. 2015)
Haibo Zhou, Lin Gui, Quan Yu, Xuemin (Sherman) Shen
R1,808 Discovery Miles 18 080 Ships in 10 - 15 working days

This brief presents a unified analytical framework for the evaluation of drive-thru Internet performance and accordingly proposes an optimal spatial access control management approach. A comprehensive overview and in-depth discussion of the research literature is included. It summarizes the main concepts and methods, and highlights future research directions. The brief also introduces a novel cooperative vehicular communication framework together with a delicate linear cluster formation scheme and low-delay content forwarding approach to provide a flexible and efficient vehicular content distribution in the drive-thru Internet. The presented medium access control and vehicular content distribution related research results in this brief provide useful insights for the design approach of Wi-Fi enabled vehicular communications and it motivates a new line of thinking for the performance enhancements of future vehicular networking. Advanced-level students, researchers and professionals interested in vehicular networks or coordinated network sharing will find Cooperative Vehicular Communications in the Drive-thru Internet a valuable reference.

Parallel Programming - for Multicore and Cluster Systems (Paperback, 2nd ed. 2013): Thomas Rauber, Gudula Runger Parallel Programming - for Multicore and Cluster Systems (Paperback, 2nd ed. 2013)
Thomas Rauber, Gudula Runger
R3,538 Discovery Miles 35 380 Ships in 10 - 15 working days

Innovations in hardware architecture, like hyper-threading or multicore processors, mean that parallel computing resources are available for inexpensive desktop computers. In only a few years, many standard software products will be based on concepts of parallel programming implemented on such hardware, and the range of applications will be much broader than that of scientific computing, up to now the main application area for parallel computing. Rauber and Runger take up these recent developments in processor architecture by giving detailed descriptions of parallel programming techniques that are necessary for developing efficient programs for multicore processors as well as for parallel cluster systems and supercomputers. Their book is structured in three main parts, covering all areas of parallel computing: the architecture of parallel systems, parallel programming models and environments, and the implementation of efficient application algorithms. The emphasis lies on parallel programming techniques needed for different architectures. For this second edition, all chapters have been carefully revised. The chapter on architecture of parallel systems has been updated considerably, with a greater emphasis on the architecture of multicore systems and adding new material on the latest developments in computer architecture. Lastly, a completely new chapter on general-purpose GPUs and the corresponding programming techniques has been added. The main goal of the book is to present parallel programming techniques that can be used in many situations for a broad range of application areas and which enable the reader to develop correct and efficient parallel programs. Many examples and exercises are provided to show how to apply the techniques. The book can be used as both a textbook for students and a reference book for professionals. The material presented has been used for courses in parallel programming at different universities for many years.

Wireless Vehicular Networks for Car Collision Avoidance (Paperback, 2013 ed.): Rola Naja Wireless Vehicular Networks for Car Collision Avoidance (Paperback, 2013 ed.)
Rola Naja
R5,401 Discovery Miles 54 010 Ships in 10 - 15 working days

Wireless Vehicular Networks for Car Collision Avoidance focuses on the development of the ITS (Intelligent Transportation Systems) in order to minimize vehicular accidents. The book presents and analyses a range of concrete accident scenarios while examining the causes of vehicular collision and proposing countermeasures based on wireless vehicular networks.The book also describes the vehicular network standards and quality of service mechanisms focusing on improving critical dissemination of safety information. With recommendations on techniques and protocols to consider when improving road safety policies in order to minimize crashes and collision risks.

Next-Generation Wireless Technologies - 4G and Beyond (Paperback, 2013 ed.): Naveen Chilamkurti, Sherali Zeadally, Hakima... Next-Generation Wireless Technologies - 4G and Beyond (Paperback, 2013 ed.)
Naveen Chilamkurti, Sherali Zeadally, Hakima Chaouchi
R3,860 Discovery Miles 38 600 Ships in 10 - 15 working days

This comprehensive text/reference examines the various challenges to secure, efficient and cost-effective next-generation wireless networking. Topics and features: presents the latest advances, standards and technical challenges in a broad range of emerging wireless technologies; discusses cooperative and mesh networks, delay tolerant networks, and other next-generation networks such as LTE; examines real-world applications of vehicular communications, broadband wireless technologies, RFID technology, and energy-efficient wireless communications; introduces developments towards the 'Internet of Things' from both a communications and a service perspective; discusses the machine-to-machine communication model, important applications of wireless technologies in healthcare, and security issues in state-of-the-art networks.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Head and Neck Injuries in Young Athletes
Michael O'Brien, William P. Meehan Iii Hardcover R3,057 Discovery Miles 30 570
Social Networks Science: Design…
Nilanjan Dey, Rosalina Babo, … Hardcover R3,279 Discovery Miles 32 790
PHTLS: Akut Prehospitalt Omhandertagande…
National Association of Emergency Medical Technicians Hardcover R3,037 Discovery Miles 30 370
TASER (R) Conducted Electrical Weapons…
Mark W. Kroll, Jeffrey D. Ho Hardcover R3,125 Discovery Miles 31 250
Imaging Trauma and Polytrauma in…
Vittorio Miele, Margherita Trinci Hardcover R4,179 R3,596 Discovery Miles 35 960
Vasovagal Syncope
Paolo Alboni, Raffaello Furlan Hardcover R4,362 R3,780 Discovery Miles 37 800
Emergency Medicine - Surviving the Chaos
Dale M. Bayliss Hardcover R1,165 R992 Discovery Miles 9 920
Disaster Risk Reduction in Mexico…
Diana Sanchez-Partida, Jose-Luis Martinez-Flores, … Hardcover R1,659 Discovery Miles 16 590
Hot Topics in Burn Injuries
Selda Pelin Kartal, Dilek Bayramgurler Hardcover R3,484 Discovery Miles 34 840
Survival Medical Handbook 2022-2023…
Small Footprint Press Hardcover R1,944 R1,325 Discovery Miles 13 250

 

Partners