![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > Network computers
This volume constitutes the refereed proceedings of the International Conferences, FGCN and DCA 2012, held as part of the Future Generation Information Technology Conference, FGIT 2012, Kangwondo, Korea, in December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of grid and distributed computing, industrial environment, safety and health, and computer graphics, animation and game.
This book comprises selected papers of the 4th International Conference on Future Generation Information Technology, FGIT 2012, held in Gangneug, Korea, in December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of advances in information technology. They were selected from the following 11 conferences: BSBT 2012, CGAG 2012, DCA 2012, DTA 2012, EL 2012, FGCN 2012, GDC 2012, IESH 2012, IUrC 2012, MulGraB 2012, and UNESST 2012.
These Transactions publish archival papers in the broad area of Petri nets and other models of concurrency, ranging from theoretical work to tool support and industrial applications. ToPNoC issues are published as LNCS volumes, and hence are widely distributed and indexed. This Journal has its own Editorial Board which selects papers based on a rigorous two-stage refereeing process. ToPNoC contains: - Revised versions of a selection of the best papers from workshops and tutorials at the annual Petri net conferences - Special sections/issues within particular subareas (similar to those published in the Advances in Petri Nets series) - Other papers invited for publication in ToPNoC - Papers submitted directly to ToPNoC by their authors. The sixth volume of ToPNoCincludes revised versions of selected papers from workshops and tutorials held at the 32nd International Conference on Application and Theory of Petri Nets and Concurrency. It alsocontainsa special section on Networks, Protocols, and Services, as well asa contributed paper submitted through the regular submission track of ToPNoC. The 14 papers cover a diverse range of topics including model checking and system verification, synthesis, foundational work on specific classes of Petri nets, and innovative applications of Petri nets and other models of concurrency. Thus this volume gives a good view of ongoing concurrent systems and Petri nets research."
Broadband Satellite Communications for Internet Access is a systems engineering methodology for satellite communication networks. It discusses the implementation of Internet applications that involve network design issues usually addressed in standard organizations. Various protocols for IP- and ATM-based networks are examined and a comparative performance evaluation of different alternatives is described. This methodology can be applied to similar evaluations over any other transport medium.
In the last few years, the world of information networks has undergone significant changes that will revolutionize the future of communications. Data rates have reached the gigabit per second range. Optical fibers have become the transmission medium of choice. Standardization activities have very aggressively produced a set of well established standard for future LANs, MANs and WANs. It has become very difficult for computer and communications professionals to follow these rapidly evolving technologies and standards. High Performance Networks: Technology and Protocols provides a timely technical overview of the start-of-the-art in high performance networking. Chapters cover lightweight protocols, high performance protocol implementation techniques, high speed MAC protocols, optical networks, as well as emerging standards, including ATM, SMDS, B-ISDN, SONET, FCS and HIPPI. Professionals, engineers, and researchers in communications and computers, who need to understand the underlying technologies of high performance (gigabit) networks, will find this volume to be an invaluable reference. The book is also suitable for use as a text for advanced courses on the subject.
This book presents exciting recent research on the compression of images and text. Part 1 presents the (lossy) image compression techniques of vector quantization, iterated transforms (fractal compression), and techniques that employ optical hardware. Part 2 presents the (lossless) text compression techniques of arithmetic coding, context modeling, and dictionary methods (LZ methods); this part of the book also addresses practical massively parallel architectures for text compression. Part 3 presents theoretical work in coding theory that has applications to both text and image compression. The book ends with an extensive bibliography of data compression papers and books which can serve as a valuable aid to researchers in the field. Points of Interest: * Data compression is becoming a key factor in the digital storage of text, speech graphics, images, and video, digital communications, data bases, and supercomputing. * The book addresses 'hot' data compression topics such as vector quantization, fractal compression, optical data compression hardware, massively parallel hardware, LZ methods, arithmetic coding. * Contributors are all accomplished researchers.* Extensive bibliography to aid researchers in the field.
This book constitutes the refereed proceedings of the Second International Conference on Security, Privacy and Applied Cryptography Engineering held in Chennai, India, in November 2012. The 11 papers presented were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections on symmetric-key algorithms and cryptanalysis, cryptographic implementations, side channel analysis and countermeasures, fault tolerance of cryptosystems, physically unclonable functions, public-key schemes and cryptanalysis, analysis and design of security protocol, security of systems and applications, high-performance computing in cryptology and cryptography in ubiquitous devices.
Since the early 1990s, the wireless communications field has witnessed explosive growth. The wide range of applications and existing new technologies nowadays stimulated this enormous growth and encouraged wireless applications. The new wireless networks will support heterogeneous traffic, consisting of voice, video, and data (multimedia). This necessitated looking at new wireless generation technologies and enhance its capabilities. This includes new standards, new levels of Quality of Service (QoS), new sets of protocols and architectures, noise reduction, power control, performance enhancement, link and mobility management, nomadic and wireless networks security, and ad-hoc architectures. Many of these topics are covered in this textbook. The aim of this book is research and development in the area of broadband wireless communications and sensor networks. It is intended for researchers that need to learn more and do research on these topics. But, it is assumed that the reader has some background about wireless communications and networking. In addition to background in each of the chapters, an in-depth analysis is presented to help our readers gain more R&D insights in any of these areas. The book is comprised of 22 chapters, written by a group of well-known experts in their respective fields. Many of them have great industrial experience mixed with proper academic background.
This book constitutes the refereed proceedings of the 15th International Conference on Passive and Active Measurement, PAM 2014, held in Los Angeles, CA, USA, in 2014. The 24 revised full papers presented were carefully reviewed and selected from 76 submissions. The papers have been organized in the following topical sections: internet wireless and mobility; measurement design, experience and analysis; performance measurement; protocol and application behavior; characterization of network behavior; and network security and privacy. In addition 7 poster papers have been included.
This book constitutes the refereed proceedings of the 4th International Conference on Human-Centered Software Engineering, HCSE 2012, held in Toulouse, France, in October 2012. The twelve full papers and fourteen short papers presented were carefully reviewed and selected from various submissions. The papers cover the following topics: user interface design, examining the relationship between software engineering and human-computer interaction and on how to strengthen user-centered design as an essential part of software engineering process.
This unique text, for both the first year graduate student and the newcomer to the field, provides in-depth coverage of the basic principles of data communications and covers material which is not treated in other texts, including phase and timing recovery and echo cancellation. Throughout the book, exercises and applications illustrate the material while up-to-date references round out the work.
The Three-Volume-Set CCIS 323, 324, 325 (AsiaSim 2012) together with the Two-Volume-Set CCIS 326, 327 (ICSC 2012) constitutes the refereed proceedings of the Asia Simulation Conference, AsiaSim 2012, and the International Conference on System Simulation, ICSC 2012, held in Shanghai, China, in October 2012. The 267 revised full papers presented were carefully reviewed and selected from 906 submissions. The papers are organized in topical sections on modeling theory and technology; modeling and simulation technology on synthesized environment and virtual reality environment; pervasive computing and simulation technology; embedded computing and simulation technology; verification, validation and accreditation technology; networked modeling and simulation technology; modeling and simulation technology of continuous system, discrete system, hybrid system, and intelligent system; high performance computing and simulation technology; cloud simulation technology; modeling and simulation technology of complex system and open, complex, huge system; simulation based acquisition and virtual prototyping engineering technology; simulator; simulation language and intelligent simulation system; parallel and distributed software; CAD, CAE, CAM, CIMS, VP, VM, and VR; visualization; computing and simulation applications in science and engineering; computing and simulation applications in management, society and economics; computing and simulation applications in life and biomedical engineering; computing and simulation applications in energy and environment; computing and simulation applications in education; computing and simulation applications in military field; computing and simulation applications in medical field.
This book constitutes the refereed conference proceedings of the 9th International Conference on Advances in Computer Entertainment, ACE 2012, held in Kathmandu, Nepal, in November 2012. The 10 full paper and 19 short papers presented together with 5 papers from the special track Arts and Culture and 35 extended abstracts were carefully reviewed and selected from a total of 140 submissions in all categories. The papers cover topics across a wide spectrum of disciplines including computer science, design, arts, sociology, anthropology, psychology, and marketing. Focusing on all areas related to interactive entertainment they aim at stimulating discussion in the development of new and compelling entertainment computing and interactive art concepts and applications.
This book constitutes the proceedings of the 6th International Conference on Advances in Information Technology, IAIT 2013, held in Bangkok, Thailand, in December 2013. The 23 revised papers presented in this volume were carefully reviewed and selected from numerous submissions. They deal with all areas related to applied information technology.
This book constitutes the proceedings of the 15th International Conference on Distributed Computing and Networking, ICDCN 2014, held in Coimbatore, India, in January 2014. The 32 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 110 submissions. They are organized in topical sections named: mutual exclusion, agreement and consensus; parallel and multi-core computing; distributed algorithms; transactional memory; P2P and distributed networks; resource sharing and scheduling; cellular and cognitive radio networks and backbone networks.
This brief investigates spectrum efficient and energy efficient strategies, known as cognitive radio networks (CRNs), to ensure secure cooperation between licensed and unlicensed users. The authors address issues of spectrum scarcity, spectrum sensing, transmission performance, trust-aware cooperation, and secure communications. Two security-aware cooperation based spectrum access schemes are presented. The first is a trust-aware cooperative framework for CRNs to improve the throughput or energy efficiency of licensed users and offer transmission opportunities to unlicensed users, taking into consideration the trustworthiness of unlicensed users. The second scheme is a cooperative framework to enhance secure communications of licensed users. An introduction to CRNs and literature survey enhance the discussion while numerical results are provided to demonstrate the viability of the proposed schemes. The brief is designed for researchers and professionals working with cognitive radio networks or interested in cooperation based access. Advanced-level students studying computer communication networks and communications engineering will also find this brief useful.
This book presents the thoroughly refereed and revised post-workshop proceedings of the 17th Monterey Workshop, held in Oxford, UK, in March 2012. The workshop explored the challenges associated with the Development, Operation and Management of Large-Scale complex IT Systems. The 21 revised full papers presented were significantly extended and improved by the insights gained from the productive and lively discussions at the workshop, and the feedback from the post-workshop peer reviews.
This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012. The 23 regular papers and 26 short papers were carefully reviewed and selected from 101 submissions. The papers cover many important areas in information security such as privacy, security in mobile systems, software and network security, cryptanalysis, applied cryptography as well as GPU-enabled computation.
This book constitutes the conference proceedings of the 10th International Conference on Service-Oriented Computing, ICSOC 2012, held in Shanghai, China in November 2012. The 32 full papers and 21 short papers presented were carefully reviewed and selected from 185 submissions. The papers are organized in topical sections on service engineering, service management, cloud, service QoS, service security, privacy and personalization, service applications in business and society, service composition and choreography, service scaling and cloud, process management, service description and discovery, service security, privacy and personalization, applications, as well as cloud computing.
This book comprises the refereed proceedings of the International Conferences, SIP, WSE, and ICHCI 2012, held in conjunction with GST 2012 on Jeju Island, Korea, in November/December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of signal processing, image processing, and pattern recognition, and Web science and engineering, and human computer interaction.
The papers in this volume were presented at the Second Annual Work shop on Active Middleware Services and were selected for inclusion here by the Editors. The AMS workshop was organized with support from both the National Science Foundation and the CAT center at the Uni versity of Arizona, and was held in Pittsburgh, Pennsylvania, on August 1, 2000, in conjunction with the 9th IEEE International Symposium on High Performance Distributed Computing (HPDC-9). The explosive growth of Internet-based applications and the prolifer ation of networking technologies has been transforming most areas of computer science and engineering as well as computational science and commercial application areas. This opens an outstanding opportunity to explore new, Internet-oriented software technologies that will open new research and application opportunities not only for the multimedia and commercial world, but also for the scientific and high-performance computing applications community. Two emerging technologies - agents and active networks - allow increased programmability to enable bring ing new services to Internet based applications. The AMS workshop presented research results and working papers in the areas of active net works, mobile and intelligent agents, software tools for high performance distributed computing, network operating systems, and application pro gramming models and environments. The success of an endeavor such as this depends on the contributions of many individuals. We would like to thank Dr. Frederica Darema and the NSF for sponsoring the workshop.
This book constitutes the refereed proceedings of the ACM/IFIP/USENIX 14th International Middleware Conference, held in Beijing, China, in December 2013. The 24 revised full papers presented were carefully reviewed and selected from 189 submissions. The papers cover a wide range of topics including design, implementation, deployment and evaluation of middleware for next-generation platforms such as cloud computing, social networks and large-scale storage and distributed systems. The middleware solutions introduced provide features such as availability, efficiency, scalability, fault-tolerance, trustworthy operation and support security and privacy needs.
This book constitutes the thoroughly refereed conference proceedings of the 4th International Conference on E-Voting and Identity, Vote ID 2013, held in Guildford, UK, during July 17-19, 2013. The 12 revised full papers presented were carefully selected from 26 submissions. The papers include a range of works on end-to-end verifiable election systems, verifiably correct complex tallying algorithms, human perceptions of verifiability, formal models of verifiability and, of course, attacks on systems formerly advertised as verifiable.
With the tragic airline disaster in New York City, on September
11th, 2001, the subject of emergency communications has become very
important. Preferential Emergency Communications: From
Telecommunications to the Internet is intended to provide an
in-depth exposure to authorized emergency communications. These
communications generally involve preferential treatment of
signaling and/or data to help ensure forwarding of information
through a network. This book covers examples ranging from private
networks to current investigations using Next Generation Networks
(i.e., IP based communications). The information acts as a
reference for network designers, network vendors, and users of
authorized emergency communications services.
To operate future generation multimedia communications systems high data rate transmission needs to be guaranteed with a high quality of service. For instance, the third generation cellular mobile systems should offer a high data rate up to 2 Mbit/s for video, audio, speech and data transmission. The important challenge for these cellular systems will be the choice of an appropriate multiple access scheme. The advantages of the spread spectrum technique are: High immunity against multipath distortion, no need for frequency planning, high flexibility and easier variable rate transmission etc. On the other hand, the technique of multi-carrier transmission has recently been receiving wide interest for high data rate applications. The advantages of multi-carrier transmission are the robustness in the case of frequency selective fading channels, in particular the reduced signal processing complexity by equalization in the frequency domain, and in the capability of narrow-band interference rejection.The advantages and success of multi-carrier (MC) modulation and the spread spectrum (SS) technique has led to the combination of MCM with SS, known as multi-carrier spread-spectrum (MC-SS) for cellular systems. This combination, benefits from the advantages of both schemes: Higher flexibility, higher spectral efficiency, simpler detection techniques, narrow band interference rejection capability, etc. Multicarrier-Spread-Spectrum comprises a collection of papers which collectively provide a state-of-the-art overview of this emerging multiple access scheme. It will be a valuable reference for all researchers and practitioners working on the area of wireless communications and networking. |
You may like...
Designing Networks for Innovation and…
Matthaus P. Zylka, Hauke Fuehres, …
Hardcover
Automated Workflow Scheduling in…
G. Kousalya, P. Balakrishnan, …
Hardcover
R1,600
Discovery Miles 16 000
Mobile Networks for Biometric Data…
Massimo Conti, Natividad Martinez Madrid, …
Hardcover
R6,197
Discovery Miles 61 970
Cyber-Physical Systems - Foundations…
Houbing Song, Danda B. Rawat, …
Paperback
Handbook of Multimedia Information…
Amit Kumar Singh, Anand Mohan
Hardcover
R6,633
Discovery Miles 66 330
When Compressive Sensing Meets Mobile…
Linghe Kong, Bowen Wang, …
Hardcover
R2,653
Discovery Miles 26 530
Handbook of Computer Networks and Cyber…
Brij B. Gupta, Gregorio Martinez Perez, …
Hardcover
R7,167
Discovery Miles 71 670
|