0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (1)
  • R250 - R500 (15)
  • R500+ (4,483)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

Computer Applications for Graphics, Grid Computing, and Industrial Environment - International Conferences, GDC, IESH and CGAG... Computer Applications for Graphics, Grid Computing, and Industrial Environment - International Conferences, GDC, IESH and CGAG 2012, Held as Part of the Future Generation Information Technology Conference, FGIT 2012, Gangneug, Korea, December 16-19, 2012. Proceedings (Paperback, 2012 ed.)
Tai-Hoon Kim, Hyun-seob Cho, Osvaldo Gervasi, Stephen S. Yau
R1,426 Discovery Miles 14 260 Ships in 18 - 22 working days

This volume constitutes the refereed proceedings of the International Conferences, FGCN and DCA 2012, held as part of the Future Generation Information Technology Conference, FGIT 2012, Kangwondo, Korea, in December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of grid and distributed computing, industrial environment, safety and health, and computer graphics, animation and game.

Future Generation Information Technology - 4th International Conference, FGIT 2012, Gangneug, Korea, December 16-19, 2012.... Future Generation Information Technology - 4th International Conference, FGIT 2012, Gangneug, Korea, December 16-19, 2012. Proceedings (Paperback, 2012 ed.)
Tai-Hoon Kim, Young-Hoon Lee, Wai-Chi Fang
R1,409 Discovery Miles 14 090 Ships in 18 - 22 working days

This book comprises selected papers of the 4th International Conference on Future Generation Information Technology, FGIT 2012, held in Gangneug, Korea, in December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of advances in information technology. They were selected from the following 11 conferences: BSBT 2012, CGAG 2012, DCA 2012, DTA 2012, EL 2012, FGCN 2012, GDC 2012, IESH 2012, IUrC 2012, MulGraB 2012, and UNESST 2012.

Transactions on Petri Nets and Other Models of Concurrency VI (Paperback, 2012 ed.): Kurt Jensen Transactions on Petri Nets and Other Models of Concurrency VI (Paperback, 2012 ed.)
Kurt Jensen; Edited by Wil M.P. van der Aalst, Marco Ajmone Marsan, Giuliana Franceschinis, Jetty Kleijn, …
R1,433 Discovery Miles 14 330 Ships in 18 - 22 working days

These Transactions publish archival papers in the broad area of Petri nets and other models of concurrency, ranging from theoretical work to tool support and industrial applications. ToPNoC issues are published as LNCS volumes, and hence are widely distributed and indexed. This Journal has its own Editorial Board which selects papers based on a rigorous two-stage refereeing process. ToPNoC contains: - Revised versions of a selection of the best papers from workshops and tutorials at the annual Petri net conferences - Special sections/issues within particular subareas (similar to those published in the Advances in Petri Nets series) - Other papers invited for publication in ToPNoC - Papers submitted directly to ToPNoC by their authors.

The sixth volume of ToPNoCincludes revised versions of selected papers from workshops and tutorials held at the 32nd International Conference on Application and Theory of Petri Nets and Concurrency. It alsocontainsa special section on Networks, Protocols, and Services, as well asa contributed paper submitted through the regular submission track of ToPNoC. The 14 papers cover a diverse range of topics including model checking and system verification, synthesis, foundational work on specific classes of Petri nets, and innovative applications of Petri nets and other models of concurrency. Thus this volume gives a good view of ongoing concurrent systems and Petri nets research."

Broadband Satellite Communications for Internet Access (Paperback, Softcover reprint of the original 1st ed. 2004): Sastri L... Broadband Satellite Communications for Internet Access (Paperback, Softcover reprint of the original 1st ed. 2004)
Sastri L Kota, Kaveh Pahlavan, Pentti A. Leppanen
R4,055 Discovery Miles 40 550 Ships in 18 - 22 working days

Broadband Satellite Communications for Internet Access is a systems engineering methodology for satellite communication networks. It discusses the implementation of Internet applications that involve network design issues usually addressed in standard organizations. Various protocols for IP- and ATM-based networks are examined and a comparative performance evaluation of different alternatives is described. This methodology can be applied to similar evaluations over any other transport medium.

High Performance Networks - Technology and Protocols (Paperback, Softcover reprint of the original 1st ed. 1994): Ahmed N.... High Performance Networks - Technology and Protocols (Paperback, Softcover reprint of the original 1st ed. 1994)
Ahmed N. Tantawy
R3,999 Discovery Miles 39 990 Ships in 18 - 22 working days

In the last few years, the world of information networks has undergone significant changes that will revolutionize the future of communications. Data rates have reached the gigabit per second range. Optical fibers have become the transmission medium of choice. Standardization activities have very aggressively produced a set of well established standard for future LANs, MANs and WANs. It has become very difficult for computer and communications professionals to follow these rapidly evolving technologies and standards. High Performance Networks: Technology and Protocols provides a timely technical overview of the start-of-the-art in high performance networking. Chapters cover lightweight protocols, high performance protocol implementation techniques, high speed MAC protocols, optical networks, as well as emerging standards, including ATM, SMDS, B-ISDN, SONET, FCS and HIPPI. Professionals, engineers, and researchers in communications and computers, who need to understand the underlying technologies of high performance (gigabit) networks, will find this volume to be an invaluable reference. The book is also suitable for use as a text for advanced courses on the subject.

Image and Text Compression (Paperback, Softcover reprint of the original 1st ed. 1992): James A. Storer Image and Text Compression (Paperback, Softcover reprint of the original 1st ed. 1992)
James A. Storer
R4,031 Discovery Miles 40 310 Ships in 18 - 22 working days

This book presents exciting recent research on the compression of images and text. Part 1 presents the (lossy) image compression techniques of vector quantization, iterated transforms (fractal compression), and techniques that employ optical hardware. Part 2 presents the (lossless) text compression techniques of arithmetic coding, context modeling, and dictionary methods (LZ methods); this part of the book also addresses practical massively parallel architectures for text compression. Part 3 presents theoretical work in coding theory that has applications to both text and image compression. The book ends with an extensive bibliography of data compression papers and books which can serve as a valuable aid to researchers in the field. Points of Interest: * Data compression is becoming a key factor in the digital storage of text, speech graphics, images, and video, digital communications, data bases, and supercomputing. * The book addresses 'hot' data compression topics such as vector quantization, fractal compression, optical data compression hardware, massively parallel hardware, LZ methods, arithmetic coding. * Contributors are all accomplished researchers.* Extensive bibliography to aid researchers in the field.

Security, Privacy, and Applied Cryptography Engineering - Second International Conference, SPACE 2012, Chennai, India, November... Security, Privacy, and Applied Cryptography Engineering - Second International Conference, SPACE 2012, Chennai, India, November 3-4, 2012, Proceedings (Paperback, 2012 ed.)
Andrey Bogdanov, Somitra Sanadhya
R1,793 Discovery Miles 17 930 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second International Conference on Security, Privacy and Applied Cryptography Engineering held in Chennai, India, in November 2012.

The 11 papers presented were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections on symmetric-key algorithms and cryptanalysis, cryptographic implementations, side channel analysis and countermeasures, fault tolerance of cryptosystems, physically unclonable functions, public-key schemes and cryptanalysis, analysis and design of security protocol, security of systems and applications, high-performance computing in cryptology and cryptography in ubiquitous devices.

Wireless Communications Systems and Networks (Paperback, 2004 ed.): Mohsen Guizani Wireless Communications Systems and Networks (Paperback, 2004 ed.)
Mohsen Guizani
R1,518 Discovery Miles 15 180 Ships in 18 - 22 working days

Since the early 1990s, the wireless communications field has witnessed explosive growth. The wide range of applications and existing new technologies nowadays stimulated this enormous growth and encouraged wireless applications. The new wireless networks will support heterogeneous traffic, consisting of voice, video, and data (multimedia). This necessitated looking at new wireless generation technologies and enhance its capabilities. This includes new standards, new levels of Quality of Service (QoS), new sets of protocols and architectures, noise reduction, power control, performance enhancement, link and mobility management, nomadic and wireless networks security, and ad-hoc architectures. Many of these topics are covered in this textbook. The aim of this book is research and development in the area of broadband wireless communications and sensor networks. It is intended for researchers that need to learn more and do research on these topics. But, it is assumed that the reader has some background about wireless communications and networking. In addition to background in each of the chapters, an in-depth analysis is presented to help our readers gain more R&D insights in any of these areas. The book is comprised of 22 chapters, written by a group of well-known experts in their respective fields. Many of them have great industrial experience mixed with proper academic background.

Passive and Active Measurement - 15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedings... Passive and Active Measurement - 15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedings (Paperback, 2014)
Michalis Faloutsos, Aleksandar Kuzmanovic
R2,143 Discovery Miles 21 430 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 15th International Conference on Passive and Active Measurement, PAM 2014, held in Los Angeles, CA, USA, in 2014. The 24 revised full papers presented were carefully reviewed and selected from 76 submissions. The papers have been organized in the following topical sections: internet wireless and mobility; measurement design, experience and analysis; performance measurement; protocol and application behavior; characterization of network behavior; and network security and privacy. In addition 7 poster papers have been included.

Human-Centered Software Engineering - 4th International Conference, HCSE 2012, Toulouse, France, October 29-31, 2012,... Human-Centered Software Engineering - 4th International Conference, HCSE 2012, Toulouse, France, October 29-31, 2012, Proceedings (Paperback, 2012 ed.)
Marco Winckler, Peter Forbrig, Regina Bernhaupt
R1,432 Discovery Miles 14 320 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 4th International Conference on Human-Centered Software Engineering, HCSE 2012, held in Toulouse, France, in October 2012.

The twelve full papers and fourteen short papers presented were carefully reviewed and selected from various submissions. The papers cover the following topics: user interface design, examining the relationship between software engineering and human-computer interaction and on how to strengthen user-centered design as an essential part of software engineering process.

Data Communications Principles (Paperback, Softcover reprint of the original 1st ed. 1992): Richard D. Gitlin, Jeremiah F.... Data Communications Principles (Paperback, Softcover reprint of the original 1st ed. 1992)
Richard D. Gitlin, Jeremiah F. Hayes, Stephen B Weinstein
R5,267 Discovery Miles 52 670 Ships in 18 - 22 working days

This unique text, for both the first year graduate student and the newcomer to the field, provides in-depth coverage of the basic principles of data communications and covers material which is not treated in other texts, including phase and timing recovery and echo cancellation. Throughout the book, exercises and applications illustrate the material while up-to-date references round out the work.

System Simulation and Scientific Computing, Part II - International Conference, ICSC 2012, Shanghai, China, October 27-30,... System Simulation and Scientific Computing, Part II - International Conference, ICSC 2012, Shanghai, China, October 27-30, 2012. Proceedings, Part II (Paperback, 2012 ed.)
Tianyuan Xiao, Lin Zhang, Shiwei Ma
R1,454 Discovery Miles 14 540 Ships in 18 - 22 working days

The Three-Volume-Set CCIS 323, 324, 325 (AsiaSim 2012) together with the Two-Volume-Set CCIS 326, 327 (ICSC 2012) constitutes the refereed proceedings of the Asia Simulation Conference, AsiaSim 2012, and the International Conference on System Simulation, ICSC 2012, held in Shanghai, China, in October 2012. The 267 revised full papers presented were carefully reviewed and selected from 906 submissions. The papers are organized in topical sections on modeling theory and technology; modeling and simulation technology on synthesized environment and virtual reality environment; pervasive computing and simulation technology; embedded computing and simulation technology; verification, validation and accreditation technology; networked modeling and simulation technology; modeling and simulation technology of continuous system, discrete system, hybrid system, and intelligent system; high performance computing and simulation technology; cloud simulation technology; modeling and simulation technology of complex system and open, complex, huge system; simulation based acquisition and virtual prototyping engineering technology; simulator; simulation language and intelligent simulation system; parallel and distributed software; CAD, CAE, CAM, CIMS, VP, VM, and VR; visualization; computing and simulation applications in science and engineering; computing and simulation applications in management, society and economics; computing and simulation applications in life and biomedical engineering; computing and simulation applications in energy and environment; computing and simulation applications in education; computing and simulation applications in military field; computing and simulation applications in medical field.

Advances in Computer Entertainment - 9th International Conference, ACE 2012, Kathmandu, Nepal, November 3-5, 2012, Proceedings... Advances in Computer Entertainment - 9th International Conference, ACE 2012, Kathmandu, Nepal, November 3-5, 2012, Proceedings (Paperback, 2012)
Anton Nijholt, Teresa Romao, Dennis Reidsma
R1,496 Discovery Miles 14 960 Ships in 18 - 22 working days

This book constitutes the refereed conference proceedings of the 9th International Conference on Advances in Computer Entertainment, ACE 2012, held in Kathmandu, Nepal, in November 2012. The 10 full paper and 19 short papers presented together with 5 papers from the special track Arts and Culture and 35 extended abstracts were carefully reviewed and selected from a total of 140 submissions in all categories. The papers cover topics across a wide spectrum of disciplines including computer science, design, arts, sociology, anthropology, psychology, and marketing. Focusing on all areas related to interactive entertainment they aim at stimulating discussion in the development of new and compelling entertainment computing and interactive art concepts and applications.

Advances in Information Technology - 6th International Conference, IAIT 2013, Bangkok, Thailand, December 12-13, 2013.... Advances in Information Technology - 6th International Conference, IAIT 2013, Bangkok, Thailand, December 12-13, 2013. Proceedings (Paperback, 2013)
Borworn Papasratorn, Nipon Charoenkitkarn, Vajirasak Vanijja, Vithida Chongsuphajaisiddhi
R2,100 Discovery Miles 21 000 Ships in 18 - 22 working days

This book constitutes the proceedings of the 6th International Conference on Advances in Information Technology, IAIT 2013, held in Bangkok, Thailand, in December 2013. The 23 revised papers presented in this volume were carefully reviewed and selected from numerous submissions. They deal with all areas related to applied information technology.

Distributed Computing and Networking - 15th International Conference, ICDCN 2014, Coimbatore, India, January 4-7, 2014,... Distributed Computing and Networking - 15th International Conference, ICDCN 2014, Coimbatore, India, January 4-7, 2014, Proceedings (Paperback, 2013)
Mainak Chatterjee, Jiannong Cao, Kishore Kothapalli, Sergio Rajsbaum
R1,482 Discovery Miles 14 820 Ships in 18 - 22 working days

This book constitutes the proceedings of the 15th International Conference on Distributed Computing and Networking, ICDCN 2014, held in Coimbatore, India, in January 2014. The 32 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 110 submissions. They are organized in topical sections named: mutual exclusion, agreement and consensus; parallel and multi-core computing; distributed algorithms; transactional memory; P2P and distributed networks; resource sharing and scheduling; cellular and cognitive radio networks and backbone networks.

Security-aware Cooperation in Cognitive Radio Networks (Paperback, 2014 ed.): Ning Zhang, Jon W. Mark Security-aware Cooperation in Cognitive Radio Networks (Paperback, 2014 ed.)
Ning Zhang, Jon W. Mark
R1,592 Discovery Miles 15 920 Ships in 18 - 22 working days

This brief investigates spectrum efficient and energy efficient strategies, known as cognitive radio networks (CRNs), to ensure secure cooperation between licensed and unlicensed users. The authors address issues of spectrum scarcity, spectrum sensing, transmission performance, trust-aware cooperation, and secure communications. Two security-aware cooperation based spectrum access schemes are presented. The first is a trust-aware cooperative framework for CRNs to improve the throughput or energy efficiency of licensed users and offer transmission opportunities to unlicensed users, taking into consideration the trustworthiness of unlicensed users. The second scheme is a cooperative framework to enhance secure communications of licensed users. An introduction to CRNs and literature survey enhance the discussion while numerical results are provided to demonstrate the viability of the proposed schemes. The brief is designed for researchers and professionals working with cognitive radio networks or interested in cooperation based access. Advanced-level students studying computer communication networks and communications engineering will also find this brief useful.

Large-Scale Complex IT Systems. Development, Operation and Management - 17th Monterey Workshop 2012, Oxford, UK, March 19-21,... Large-Scale Complex IT Systems. Development, Operation and Management - 17th Monterey Workshop 2012, Oxford, UK, March 19-21, 2012, Revised Selected Papers (Paperback, 2012)
Radu Calinescu, David Garlan
R1,445 Discovery Miles 14 450 Ships in 18 - 22 working days

This book presents the thoroughly refereed and revised post-workshop proceedings of the 17th Monterey Workshop, held in Oxford, UK, in March 2012. The workshop explored the challenges associated with the Development, Operation and Management of Large-Scale complex IT Systems. The 21 revised full papers presented were significantly extended and improved by the insights gained from the productive and lively discussions at the workshop, and the feedback from the post-workshop peer reviews.

Information and Communications Security - 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012,... Information and Communications Security - 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012, Proceedings (Paperback, 2012 ed.)
Tat Wing Chim, Tsz Hon Yuen
R1,469 Discovery Miles 14 690 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012. The 23 regular papers and 26 short papers were carefully reviewed and selected from 101 submissions. The papers cover many important areas in information security such as privacy, security in mobile systems, software and network security, cryptanalysis, applied cryptography as well as GPU-enabled computation.

Service-Oriented Computing - 10th International Conference, ICSOC 2012, Shanghai, China, November 12-15, 2012, Proceedings... Service-Oriented Computing - 10th International Conference, ICSOC 2012, Shanghai, China, November 12-15, 2012, Proceedings (Paperback, 2012 ed.)
Chengfei Liu, Heiko Ludwig, Farouk Toumani, Qi Yu
R1,548 Discovery Miles 15 480 Ships in 18 - 22 working days

This book constitutes the conference proceedings of the 10th International Conference on Service-Oriented Computing, ICSOC 2012, held in Shanghai, China in November 2012. The 32 full papers and 21 short papers presented were carefully reviewed and selected from 185 submissions. The papers are organized in topical sections on service engineering, service management, cloud, service QoS, service security, privacy and personalization, service applications in business and society, service composition and choreography, service scaling and cloud, process management, service description and discovery, service security, privacy and personalization, applications, as well as cloud computing.

Computer Applications for Web, Human Computer Interaction, Signal and Image Processing, and Pattern Recognition - International... Computer Applications for Web, Human Computer Interaction, Signal and Image Processing, and Pattern Recognition - International Conferences, SIP, WSE, and ICHCI 2012, Held in Conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012. Proceedings (Paperback, 2012 ed.)
Tai-Hoon Kim, Sabah Mohammed, Carlos Ramos, Jemal Abawajy, Byeong Ho Kang, …
R1,435 Discovery Miles 14 350 Ships in 18 - 22 working days

This book comprises the refereed proceedings of the International Conferences, SIP, WSE, and ICHCI 2012, held in conjunction with GST 2012 on Jeju Island, Korea, in November/December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of signal processing, image processing, and pattern recognition, and Web science and engineering, and human computer interaction.

Active Middleware Services - From the Proceedings of the 2nd Annual Workshop on Active Middleware Services (Paperback, 2000... Active Middleware Services - From the Proceedings of the 2nd Annual Workshop on Active Middleware Services (Paperback, 2000 ed.)
Salim Hariri, Craig A. Lee, Cauligi S. Raghavendra
R2,639 Discovery Miles 26 390 Ships in 18 - 22 working days

The papers in this volume were presented at the Second Annual Work shop on Active Middleware Services and were selected for inclusion here by the Editors. The AMS workshop was organized with support from both the National Science Foundation and the CAT center at the Uni versity of Arizona, and was held in Pittsburgh, Pennsylvania, on August 1, 2000, in conjunction with the 9th IEEE International Symposium on High Performance Distributed Computing (HPDC-9). The explosive growth of Internet-based applications and the prolifer ation of networking technologies has been transforming most areas of computer science and engineering as well as computational science and commercial application areas. This opens an outstanding opportunity to explore new, Internet-oriented software technologies that will open new research and application opportunities not only for the multimedia and commercial world, but also for the scientific and high-performance computing applications community. Two emerging technologies - agents and active networks - allow increased programmability to enable bring ing new services to Internet based applications. The AMS workshop presented research results and working papers in the areas of active net works, mobile and intelligent agents, software tools for high performance distributed computing, network operating systems, and application pro gramming models and environments. The success of an endeavor such as this depends on the contributions of many individuals. We would like to thank Dr. Frederica Darema and the NSF for sponsoring the workshop.

Middleware 2013 - ACM/IFIP/USENIX 14th International Middleware Conference, Beijing, China, December 9-13, 2013, Proceedings... Middleware 2013 - ACM/IFIP/USENIX 14th International Middleware Conference, Beijing, China, December 9-13, 2013, Proceedings (Paperback, 2013)
David Eyers, Karsten Schwan
R2,724 Discovery Miles 27 240 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the ACM/IFIP/USENIX 14th International Middleware Conference, held in Beijing, China, in December 2013. The 24 revised full papers presented were carefully reviewed and selected from 189 submissions. The papers cover a wide range of topics including design, implementation, deployment and evaluation of middleware for next-generation platforms such as cloud computing, social networks and large-scale storage and distributed systems. The middleware solutions introduced provide features such as availability, efficiency, scalability, fault-tolerance, trustworthy operation and support security and privacy needs.

E-Voting and Identity - 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013, Proceedings (Paperback,... E-Voting and Identity - 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013, Proceedings (Paperback, 2013 ed.)
James Heather, Steve Schneider, Vanessa Teague
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed conference proceedings of the 4th International Conference on E-Voting and Identity, Vote ID 2013, held in Guildford, UK, during July 17-19, 2013. The 12 revised full papers presented were carefully selected from 26 submissions. The papers include a range of works on end-to-end verifiable election systems, verifiably correct complex tallying algorithms, human perceptions of verifiability, formal models of verifiability and, of course, attacks on systems formerly advertised as verifiable.

Preferential Emergency Communications - From Telecommunications to the Internet (Paperback, Softcover reprint of the original... Preferential Emergency Communications - From Telecommunications to the Internet (Paperback, Softcover reprint of the original 1st ed. 2003)
Ken Carlberg, Robert Desourdis, James Polk, Ian Brown
R2,627 Discovery Miles 26 270 Ships in 18 - 22 working days

With the tragic airline disaster in New York City, on September 11th, 2001, the subject of emergency communications has become very important. Preferential Emergency Communications: From Telecommunications to the Internet is intended to provide an in-depth exposure to authorized emergency communications. These communications generally involve preferential treatment of signaling and/or data to help ensure forwarding of information through a network. This book covers examples ranging from private networks to current investigations using Next Generation Networks (i.e., IP based communications). The information acts as a reference for network designers, network vendors, and users of authorized emergency communications services.
Preferential Emergency Communications: From Telecommunications to the Internet, a professional monograph, is divided into three sections. The first describes systems and protocols that have been deployed as private networks for use by government agencies like the U.S. Department of Defense. This section also presents an in-depth discussion on MLPP. We then present current work in the area of Land Mobile Radio, commonly used by local emergency personnel such as police and fireman. This second section also describes systems that have been deployed over the public switched telephone network. Finally, the third section presents insights on trying to support emergency communications over TCP/IP networks and the Internet. In this last item we look into what IETF protocols can be considered candidates for change, as well as those protocols and applications that should not be altered.
Preferential Emergency Communications: From Telecommunications to the Internet is designed to meet the needs of a professional audience composed of practitioners and researchers in industry. This book is also suitable for senior undergraduate and graduate-level students in computer science and electrical engineering.

Multi-Carrier Spread-Spectrum (Paperback, Softcover reprint of the original 1st ed. 1997): Khaled Fazel, Gerhard P. Fettweis Multi-Carrier Spread-Spectrum (Paperback, Softcover reprint of the original 1st ed. 1997)
Khaled Fazel, Gerhard P. Fettweis
R1,403 Discovery Miles 14 030 Ships in 18 - 22 working days

To operate future generation multimedia communications systems high data rate transmission needs to be guaranteed with a high quality of service. For instance, the third generation cellular mobile systems should offer a high data rate up to 2 Mbit/s for video, audio, speech and data transmission. The important challenge for these cellular systems will be the choice of an appropriate multiple access scheme. The advantages of the spread spectrum technique are: High immunity against multipath distortion, no need for frequency planning, high flexibility and easier variable rate transmission etc. On the other hand, the technique of multi-carrier transmission has recently been receiving wide interest for high data rate applications. The advantages of multi-carrier transmission are the robustness in the case of frequency selective fading channels, in particular the reduced signal processing complexity by equalization in the frequency domain, and in the capability of narrow-band interference rejection.The advantages and success of multi-carrier (MC) modulation and the spread spectrum (SS) technique has led to the combination of MCM with SS, known as multi-carrier spread-spectrum (MC-SS) for cellular systems. This combination, benefits from the advantages of both schemes: Higher flexibility, higher spectral efficiency, simpler detection techniques, narrow band interference rejection capability, etc. Multicarrier-Spread-Spectrum comprises a collection of papers which collectively provide a state-of-the-art overview of this emerging multiple access scheme. It will be a valuable reference for all researchers and practitioners working on the area of wireless communications and networking.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Designing Networks for Innovation and…
Matthaus P. Zylka, Hauke Fuehres, … Hardcover R3,554 R3,294 Discovery Miles 32 940
Automated Workflow Scheduling in…
G. Kousalya, P. Balakrishnan, … Hardcover R1,600 Discovery Miles 16 000
Mobile Networks for Biometric Data…
Massimo Conti, Natividad Martinez Madrid, … Hardcover R6,197 Discovery Miles 61 970
The Internet of Things in the Industrial…
Zaigham Mahmood Hardcover R4,001 Discovery Miles 40 010
Cyber-Physical Systems - Foundations…
Houbing Song, Danda B. Rawat, … Paperback R2,507 R2,368 Discovery Miles 23 680
Handbook of Multimedia Information…
Amit Kumar Singh, Anand Mohan Hardcover R6,633 Discovery Miles 66 330
Computer Networking - An All-in-One…
Quinn Kiser Hardcover R665 R594 Discovery Miles 5 940
When Compressive Sensing Meets Mobile…
Linghe Kong, Bowen Wang, … Hardcover R2,653 Discovery Miles 26 530
Handbook of Computer Networks and Cyber…
Brij B. Gupta, Gregorio Martinez Perez, … Hardcover R7,167 Discovery Miles 71 670
Cable Networks, Services, and Management
M Toy Hardcover R3,354 Discovery Miles 33 540

 

Partners