0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (1)
  • R250 - R500 (15)
  • R500+ (4,482)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

Mobile IP - Present State and Future (Paperback, Softcover reprint of the original 1st ed. 2003): Abdul Sakib Mondal Mobile IP - Present State and Future (Paperback, Softcover reprint of the original 1st ed. 2003)
Abdul Sakib Mondal
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Mobile IP: Present State and Future is an up-to-date introduction to the rapidly evolving field of mobile IP. In addition to detailed coverage of motivation behind mobile IP and fundamental concepts of mobile IP like agent advertisement and discovery, registration and tunneling, the book provides a comprehensive treatment of various associated technical issues such as security, TCP performance, multicasting and integration with wireless. The book has been written to serve as a text for network professionals who are yearning to acquire a clear understanding of this interesting field.

Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Comuuter Network... Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Comuuter Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012, Proceedings (Paperback, 2012 ed.)
Igor Kotenko, Victor Skormin
R1,419 Discovery Miles 14 190 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 6th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2012, held in St. Petersburg, Russia in October 2012. The 14 revised full papers and 8 revised short presentations were carefully reviewed and selected from a total of 44 submissions. The papers are organized in topical sections on applied cryptography and security protocols, access control and information protection, security policies, security event and information management, instrusion prevention, detection and response, anti-malware techniques, security modeling and cloud security.

Argumentation in Multi-Agent Systems - 8th International Workshop, ArgMAS 2011, Taipei, Taiwan, May 2011, Revised Selected... Argumentation in Multi-Agent Systems - 8th International Workshop, ArgMAS 2011, Taipei, Taiwan, May 2011, Revised Selected Papers (Paperback, 2012 ed.)
Peter McBurney, Simon Parsons, Iyad Rahwan
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the thoroughly reviewed post-proceedings of the 8th International Workshop on Argumentation in Multi-Agent Systems, ArgMas 2011, held in Taipei, Taiwan in May 2011 in association with the 10th International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS 2011). The 8 revised full papers taken from ArgMAS 2011. Also included are 5 invited papers based on presentations on argumentation at the AAMAS 2011 main conference. All together the 13 papers included in the book give a representative overview on current research on argumentation in multi-agent systems. The papers are listed alphabetically by first author within three thematic topics: foundations and theory; argumentation and dialogue; and applications.

Distributed Computing - 26th International Symposium, DISC 2012, Salvador, Brazil, October 16-18, 2012, Proceedings (Paperback,... Distributed Computing - 26th International Symposium, DISC 2012, Salvador, Brazil, October 16-18, 2012, Proceedings (Paperback, 2012 ed.)
Marcos K. Aguilera
R1,454 Discovery Miles 14 540 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 26th International Symposium on Distributed Computing, DISC 2012, held in Salvador, Brazil, in October 2012. The 27 revised full papers presented together with 24 brief announcements were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections on shared memory, mobile agents and overlay networks, wireless and multiple access channel networks, dynamic networks, distributed graph algorithms, wireless and loosely connected networks, robots, and lower bounds and separation.

A Discipline of Multiprogramming - Programming Theory for Distributed Applications (Paperback, Softcover reprint of the... A Discipline of Multiprogramming - Programming Theory for Distributed Applications (Paperback, Softcover reprint of the original 1st ed. 2001)
Jayadev Misra
R1,448 Discovery Miles 14 480 Ships in 18 - 22 working days

In this book, a programming model is developed that addresses the fundamental issues of 'large-scale programming'. The approach unifies several concepts from database theory, object-oriented programming and designs of reactive systems. The model and the associated theory has been christened "Seuss." The major goal of Seuss is to simplify multiprogramming. To this end, the concern of concurrent implementation is separated from the core program design problem. A program execution is understood as a single thread of control - sequential executions of actions that are chosen according to some scheduling policy. As a consequence, it is possible to reason about the properties of a program from its single execution thread.

Knowledge Engineering and Knowledge Management - 18th International Conference, EKAW 2012, Galway City, Ireland, October 8-12,... Knowledge Engineering and Knowledge Management - 18th International Conference, EKAW 2012, Galway City, Ireland, October 8-12, 2012, Proceedings (Paperback, 2012 ed.)
Annette ten Teije, Johanna Voelker, Siegfried Handschuh, Heiner Stuckenschmidt, Mathieu d'Acquin, …
R1,455 Discovery Miles 14 550 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 18th International Conference on Knowledge Engineering and Knowledge Management, EKAW 2012, held in Galway City, Ireland, in October 2012. The 44 revised full papers were carefully reviewed and selected from 107 submissions. The papers are organized in topical sections on knowledge extraction and enrichment, natural language processing, linked data, ontology engineering and evaluation, social and cognitive aspects of knowledge representation, application of knowledge engineering, and demonstrations.

Multi-Carrier Spread Spectrum & Related Topics (Paperback, Softcover reprint of the original 1st ed. 2000): Khaled Fazel, S... Multi-Carrier Spread Spectrum & Related Topics (Paperback, Softcover reprint of the original 1st ed. 2000)
Khaled Fazel, S Kaiser
R5,172 Discovery Miles 51 720 Ships in 18 - 22 working days

Khaled Fazel Stefan Kaiser Digital Microwave Systems German Aerospace Center (DLR) Bosch Telecom GmbH Institute for Communications Technology D-71522 Backnang, Germany D-82234 Wessling, Germany In this last decade of this millennium the technique of multi-carrier transmission for wireless broadband multimedia applications has been receiving wide interests. Its first great success was in 1990 as it was selected in the European Digital Audio Broadcasting (DAB) standard. Its further prominent successes were in 1995 and 1998 as it was selected as modulation scheme in the European Digital Video Broadcasting (DVB-T) and in three broadband wireless indoor standards, namely ETSI-Hiperlan-II, American IEEE-802. 11 and Japanese MMAC, respectively. The benefits and success of multi-carrier (MC) modulation in one side and the flexibility offered by spread spectrum (SS) technique in other hand motivated many researchers to investigate the combination of both techniques, known as multi-carrier spread-spectrum (MC-SS). This combination benefits from the main advantages of both systems and offers high flexibility, high spectral efficiency, simple detection strategies, narrow band interference rejection capability, etc. . The basic principle of this combination is straightforward: The spreading is performed as direct SS (DS-SS) but instead of transmitting the chips over a single sequence carrier, several sub-carriers could be employed. As depicted in Figure 1, after spreading with assigned user specific code of processing gain G the frequency mapping and multi-carrier modulation is applied. In the receiver side after multi-carrier demodulation and frequency de-mapping, the corresponding detection algorithm will be performed.

Human Computer Interaction - 6th Latin American Conference, CLIHC 2013, Carrillo, Costa Rica, December 2-6, 2013, Proceedings... Human Computer Interaction - 6th Latin American Conference, CLIHC 2013, Carrillo, Costa Rica, December 2-6, 2013, Proceedings (Paperback, 2013 ed.)
Cesar Collazos, Andreia Liborio, Cristian Rusu
R1,815 Discovery Miles 18 150 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 6th bi-annual Latin American Conference on Human-Computer Interaction, CLIHC 2013, held in Guanacasta, Costa Rica, in December 2013. The 11 full papers and 14 short papers were carefully reviewed and selected from 32 submissions. The papers address all current topics in HCI such as: cultural issues, assistive technologies, usability, accessibility, multimodal inter-faces, design issues, HCI education, and visualization and evaluation techniques, among others.

Information Computing and Applications - 4th International Conference, ICICA 2013, Singapore, August 16-18, 2013. Revised... Information Computing and Applications - 4th International Conference, ICICA 2013, Singapore, August 16-18, 2013. Revised Selected Papers, Part I (Paperback, 2013 ed.)
Yuhang Yang, Maode Ma, Baoxiang Liu
R1,513 Discovery Miles 15 130 Ships in 18 - 22 working days

This two-volume set of CCIS 391 and CCIS 392 constitutes the refereed proceedings of the Fourth International Conference on Information Computing and Applications, ICICA 2013, held in Singapore, in August 2013. The 126 revised full papers presented in both volumes were carefully reviewed and selected from 665 submissions. The papers are organized in topical sections on Internet computing and applications; engineering management and applications; intelligent computing and applications; control engineering and applications; cloud and evolutionary computing; knowledge management and applications; computational statistics and applications.

Flow Control of Congested Networks (Paperback, Softcover reprint of the original 1st ed. 1987): Amedeo R Odoni, Lucio Bianco,... Flow Control of Congested Networks (Paperback, Softcover reprint of the original 1st ed. 1987)
Amedeo R Odoni, Lucio Bianco, Giorgio Szegoe
R1,443 Discovery Miles 14 430 Ships in 18 - 22 working days

This volume is a compendium of papers presented during the NATO Workshop which took place in Capri, Italy, October 12-18, 1986 on the general subject of "Flow Control of Congested Networks: The Case of Data Processing and Transportation," and of which we acted as co-chairmen. The focus of the workshop was on flow control methodologies, as applied to preventing or reducing congestion on: (1) data communication networks; (2) urban transportation networks; and (3) air traffic control systems. The goals of the workshop included: review of the state-of-the-art of flow control methodologies, in general, and in each of the three application areas; identification of similarities and differences in the objective functions, modeling approaches and mathematics used in the three areas; examination of opportunities for "technology transfers" and for future interactions among researchers in the three areaso These goals were pursued through individual presentations of papers on current research by workshop participants and, in the cases of the second and third goals, through a number of open-ended discussion and-review sessions which were interspersed throughout the workshop's programmeD The full texts or extended summaries of all but a few of the papers given at the workshop are included in this volume."

Theory and Practice of Natural Computing - First International Conference, TPNC 2012, Tarragona, Spain, October 2-4, 2012.... Theory and Practice of Natural Computing - First International Conference, TPNC 2012, Tarragona, Spain, October 2-4, 2012. Proceedings (Paperback, 2012 ed.)
Adrian Horia Dediu, Carlos Martin-Vide, Bianca Truthe
R1,793 Discovery Miles 17 930 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the First International Conference, TPNC 2012, held in Tarragona, Spain, in October 2012. The 12 revised full papers presented together with 6 invited talks were carefully reviewed and selected from 34 submissions. The papers are organized in topical sections on nature-inspired models of computation; synthesizing nature by means of computation; nature-inspired materials; and information processing in nature.

Design and Engineering of Intelligent Communication Systems (Paperback, Softcover reprint of the original 1st ed. 1997): Syed... Design and Engineering of Intelligent Communication Systems (Paperback, Softcover reprint of the original 1st ed. 1997)
Syed V. Ahamed, Victor B. Lawrence
R5,258 Discovery Miles 52 580 Ships in 18 - 22 working days

FIGURE 18.13e. Detector Output. ..................................................................... 618 FIGURE 18.14a. WDM Energy Distrubution into the Fiber ........................... 619 FIGURE 18.14b. Fiber Loss for the WDM Band .............................................. 619 FIGURE 18.14c. Fiber Group Delay Distribution ............................................ 619 FIGURE 18.14d. Receive Energy Distribution ................................................. 619 FIGURE 18.15a. Channell Eye Diagram at PIN Diode ................................. 621 FIGURE 18.15b. Channel 2 Eye Diagram at PIN Diode ................................. 621 FIGURE 18.15c. Channell System Output at Detector ................................. 621 FIGURE 18.15d. Channel 2 System Output at Detector ................................. 621 PREFACE The emerging networks in our society will touch upon the life of everyone. These networks have started to bring about an immense information revolution. The revolution within our intellectual life will be similar to the materialistic revolution that followed the invention of the steam and the internal combustion engines. From the perspective of the 1980s, the information networks are indeed evolving and their influence can only be gradual. However, the strides of progress are accelerating in the 1990s. Networks in our society offer the most candid area of convergence for the computer and the communication technologies. The two technologies are mature in their own right. However, there are a few major factors that prevent network engineers from constructing modern communication systems from components borrowed from each of these two technologies: * Major innovations are happening. * Specialized components evolve in synergistic patterns. * New technologies emerge. * Inquisitive minds cross disciplinary barriers.

Third Generation Wireless Information Networks (Paperback, 1992 ed.): David J. Goodman, Sanjiv Nanda Third Generation Wireless Information Networks (Paperback, 1992 ed.)
David J. Goodman, Sanjiv Nanda
R4,027 Discovery Miles 40 270 Ships in 18 - 22 working days

Rutgers University launched WINLAB in 1989, just as the communications industry, the Federal government, and the financial community in the United States, were waking up to the growing public appetite for wireless communications and to the shortage of technology to feed it. The secret was already out in Europe, where no fewer than three new cordless and cellular systems were progressing from drawing board to laboratory to factory to consumers. In July 1989, the FCC held a well-attended tutorial that turned into a debate over whether second generation British or Swedish technology held the key to mass-market personal communications. Many in the audience wondered whether United States technology was out of the picture. Technology uncertainties are more acute in wireless communications than in any other information service. For example multi-gigabit optical fiber communications have followed an orderly progression from basic science leading to technology, which in turn stimulated standards, and then commercial products. Eventually applications will be found and industry and society at large will reap the benefits. By contrast, the applications of wireless communications are apparent to an eager public. A large market exists but is held in check by a shortage of capacity. The demand has led the cellular industry to formulate standards for advanced systems before the technology is in place to implement them. Everyone holds their breath waiting to observe performance of the first products. Gaps in basic science add to the uncertainty and forestall the resolution of technological debates.

Cyber Security and Privacy - Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April... Cyber Security and Privacy - Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected Papers (Paperback, 2013 ed.)
Massimo Felici
R1,868 Discovery Miles 18 680 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed, selected papers on Cyber Security and Privacy EU Forum 2013, held in Belgium, in April 2013. The 14 revised full papers presented were carefully reviewed and selected from various submissions. The papers are organized in topical sections on cloud computing, security and privacy management, security and privacy technology, security and privacy policy.

Distributed Denial of Service Attack and Defense (Paperback, 2014 ed.): Shui Yu Distributed Denial of Service Attack and Defense (Paperback, 2014 ed.)
Shui Yu
R1,645 Discovery Miles 16 450 Ships in 18 - 22 working days

This brief provides readers a complete and self-contained resource for information about DDoS attacks and how to defend against them. It presents the latest developments in this increasingly crucial field along with background context and survey material. The book also supplies an overview of DDoS attack issues, DDoS attack detection methods, DDoS attack source traceback, and details on how hackers organize DDoS attacks. The author concludes with future directions of the field, including the impact of DDoS attacks on cloud computing and cloud technology. The concise yet comprehensive nature of this brief makes it an ideal reference for researchers and professionals studying DDoS attacks. It is also a useful resource for graduate students interested in cyberterrorism and networking.

Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Revised Selected Papers... Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Revised Selected Papers (Paperback, 2013 ed.)
Tanveer Zia, Albert Zomaya, Vijay Varadharajan, Morley Mao
R2,502 Discovery Miles 25 020 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Security and Privacy in Communication Networks, held in Sydney, Australia, in September 2013. The 26 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are grouped in topical sections on: security and privacy in mobile, sensor and ad hoc networks; malware, botnets and distributed denial of service; security for emerging technologies: VoIP, peer-to-peer and cloud computing; encryption and key management; security in software and machine learning; network and system security model; security and privacy in pervasive and ubiquitous computing.

Building Scalable Network Services - Theory and Practice (Paperback, Softcover reprint of the original 1st ed. 2004): Cheng... Building Scalable Network Services - Theory and Practice (Paperback, Softcover reprint of the original 1st ed. 2004)
Cheng Jin, Sugih Jamin, Danny Raz, Yuval Shavitt
R2,618 Discovery Miles 26 180 Ships in 18 - 22 working days

Building Scalable Network Services: Theory and Practice is on building scalable network services on the Internet or in a network service provider's network. The focus is on network services that are provided through the use of a set of servers. The authors present a tiered scalable network service model and evaluate various services within this architecture. The service model simplifies design tasks by implementing only the most basic functionalities at lower tiers where the need for scalability dominates functionality. The book includes a number of theoretical results that are practical and applicable to real networks, such as building network-wide measurement, monitoring services, and strategies for building better P2P networks. Various issues in scalable system design and placement algorithms for service nodes are discussed. Using existing network services as well as potentially new but useful services as examples, the authors formalize the problem of placing service nodes and provide practical solutions for them.

Neural Networks in Telecommunications (Paperback, Softcover reprint of the original 1st ed. 1994): Ben Yuhas, Nirwan Ansari Neural Networks in Telecommunications (Paperback, Softcover reprint of the original 1st ed. 1994)
Ben Yuhas, Nirwan Ansari
R7,659 Discovery Miles 76 590 Ships in 18 - 22 working days

Neural Networks in Telecommunications consists of a carefully edited collection of chapters that provides an overview of a wide range of telecommunications tasks being addressed with neural networks. These tasks range from the design and control of the underlying transport network to the filtering, interpretation and manipulation of the transported media. The chapters focus on specific applications, describe specific solutions and demonstrate the benefits that neural networks can provide. By doing this, the authors demonstrate that neural networks should be another tool in the telecommunications engineer's toolbox. Neural networks offer the computational power of nonlinear techniques, while providing a natural path to efficient massively-parallel hardware implementations. In addition, the ability of neural networks to learn allows them to be used on problems where straightforward heuristic or rule-based solutions do not exist. Together these capabilities mean that neural networks offer unique solutions to problems in telecommunications. For engineers and managers in telecommunications, Neural Networks in Telecommunications provides a single point of access to the work being done by leading researchers in this field, and furnishes an in-depth description of neural network applications.

Recent Advances in the Message Passing Interface - 19th European MPI Users' Group Meeting, EuroMPI 2012, Vienna, Austria,... Recent Advances in the Message Passing Interface - 19th European MPI Users' Group Meeting, EuroMPI 2012, Vienna, Austria, September 23-26, 2012. Proceedings (Paperback, 2012 ed.)
Jesper Larsson Traff, Siegfried Benkner, Jack Dongarra
R1,415 Discovery Miles 14 150 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 19th European MPI Users' Group Meeting, EuroMPI 2012, Vienna, Austria, September 23-26, 2012. The 29 revised papers presented together with 4 invited talks and 7 poster papers were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on MPI implementation techniques and issues; benchmarking and performance analysis; programming models and new architectures; run-time support; fault-tolerance; message-passing algorithms; message-passing applications; IMUDI, improving MPI user and developer interaction.

Stabilization, Safety, and Security of Distributed Systems - 14th International Symposium, SSS 2012, Toronto, Canada, October... Stabilization, Safety, and Security of Distributed Systems - 14th International Symposium, SSS 2012, Toronto, Canada, October 1-4, 2012, Proceedings (Paperback, 2012 ed.)
Andrea W. Richa, Christian Scheideler
R1,423 Discovery Miles 14 230 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 14th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2012, held in Toronto, Canada, in October 2012. The 21 full papers and 10 brief announcements presented in this volume were carefully reviewed and selected from 75 submissions. The conference provides a wide spectrum of topics, covered in the following tracks: self-stabilization, ad-hoc and sensor networks, fault-tolerance and dependable systems, safety and security, cloud computing, formal methods, social networks, peer-to-peer, self-organizing and autonomic systems.

Pattern Recognition - Chinese Conference, CCPR 2012, Beijing, China, September 24-26, 2012. Proceedings (Paperback, 2012 ed.):... Pattern Recognition - Chinese Conference, CCPR 2012, Beijing, China, September 24-26, 2012. Proceedings (Paperback, 2012 ed.)
Chenglin Liu, Changshui Zhang, Liang Wang
R1,518 Discovery Miles 15 180 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Chinese Conference on Pattern Recognition, CCPR 2012, held in Beijing, China, in September 2012. The 82 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on pattern recognition theory; computer vision; biometric recognition; medical imaging; image and video analysis; document analysis; speech processing; natural language processing and information retrieval.

Networking Security and Standards (Paperback, Softcover reprint of the original 1st ed. 1997): Weidong Kou Networking Security and Standards (Paperback, Softcover reprint of the original 1st ed. 1997)
Weidong Kou
R3,993 Discovery Miles 39 930 Ships in 18 - 22 working days

Security is the science and technology of secure communications and resource protection from security violation such as unauthorized access and modification. Putting proper security in place gives us many advantages. It lets us exchange confidential information and keep it confidential. We can be sure that a piece of information received has not been changed. Nobody can deny sending or receiving a piece of information. We can control which piece of information can be accessed, and by whom. We can know when a piece of information was accessed, and by whom. Networks and databases are guarded against unauthorized access. We have seen the rapid development of the Internet and also increasing security requirements in information networks, databases, systems, and other information resources. This comprehensive book responds to increasing security needs in the marketplace, and covers networking security and standards. There are three types of readers who are interested in security: non-technical readers, general technical readers who do not implement security, and technical readers who actually implement security. This book serves all three by providing a comprehensive explanation of fundamental issues of networking security, concept and principle of security standards, and a description of some emerging security technologies. The approach is to answer the following questions: 1. What are common security problems and how can we address them? 2. What are the algorithms, standards, and technologies that can solve common security problems? 3.

Formal Techniques for Networked and Distributed Systems - FORTE 2001 (Paperback, Softcover reprint of the original 1st ed.... Formal Techniques for Networked and Distributed Systems - FORTE 2001 (Paperback, Softcover reprint of the original 1st ed. 2002)
Myungchul Kim, Byoungmoon Chin, Sungwon Kang, Danhyung Lee
R5,192 Discovery Miles 51 920 Ships in 18 - 22 working days

FORTE 2001, formerly FORTE/PSTV conference, is a combined conference of FORTE (Formal Description Techniques for Distributed Systems and Communication Protocols) and PSTV (Protocol Specification, Testing and Verification) conferences. This year the conference has a new name FORTE (Formal Techniques for Networked and Distributed Systems). The previous FORTE began in 1989 and the PSTV conference in 1981. Therefore the new FORTE conference actually has a long history of 21 years. The purpose of this conference is to introduce theories and formal techniques applicable to various engineering stages of networked and distributed systems and to share applications and experiences of them. This FORTE 2001 conference proceedings contains 24 refereed papers and 4 invited papers on the subjects. We regret that many good papers submitted could not be published in this volume due to the lack of space. FORTE 2001 was organized under the auspices of IFIP WG 6.1 by Information and Communications University of Korea. It was financially supported by Ministry of Information and Communication of Korea. We would like to thank every author who submitted a paper to FORTE 2001 and thank the reviewers who generously spent their time on reviewing. Special thanks are due to the reviewers who kindly conducted additional reviews for rigorous review process within a very short time frame. We would like to thank Prof. Guy Leduc, the chairman of IFIP WG 6.1, who made valuable suggestions and shared his experiences for conference organization.

Network Management and Control - Volume 2 (Paperback, Softcover reprint of the original 1st ed. 1994): I. T. Frisch, Manu... Network Management and Control - Volume 2 (Paperback, Softcover reprint of the original 1st ed. 1994)
I. T. Frisch, Manu Malek, S.S. Panwar
R4,109 Discovery Miles 41 090 Ships in 18 - 22 working days

Three speakers at the Second Workshop on Network Management and Control nostalgically remembered the INTEROP Conference at which SNMP was able to interface even to CD players and toasters. We agreed this was indeed a major step forward in standards, but wondered if anyone noticed whether the toast was burned, let alone, would want to eat it. The assurance of the correct operation of practical systems under difficult environments emerged as the dominant theme of the workshop with growth, interoperability, performance, and scalability as the primary sub-themes. Perhaps this thrust is un surprising, since about half the 100 or so attendees were from industry, with a strong contingency of users. Indeed the technical program co-chairs, Shivendra Panwar of Polytechnic and Walter Johnston of NYNEX, took as their assignment the coverage of real problems and opportunities in industry. Nevertheless we take it as a real indication of progress in the field that the community is beginning to take for granted the availability of standards and even the ability to detect physical, link, and network-level faults and is now expecting diagnostics at higher levels as well as system-wide solutions.

Engineering Applications of Neural Networks - 13th International Conference, EANN 2012, London, UK, September 20-23, 2012.... Engineering Applications of Neural Networks - 13th International Conference, EANN 2012, London, UK, September 20-23, 2012. (Paperback, 2012 ed.)
Chrisina Jayne, Shigang Yue, Lazaros S. Iliadis
R1,466 Discovery Miles 14 660 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 13th International Conference on Engineering Applications of Neural Networks, EANN 2012, held in London, UK, in September 2012. The 49 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers describe the applications of neural networks and other computational intelligence approaches to intelligent transport, environmental engineering, computer security, civil engineering, financial forecasting, virtual learning environments, language interpretation, bioinformatics and general engineering.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Fractured Vuggy Carbonate Reservoir…
Jun Yao, Zhao-Qin Huang Hardcover R3,956 Discovery Miles 39 560
Advances in Geophysics, Volume 59
Cedric Schmelzbach Hardcover R4,796 Discovery Miles 47 960
Geospatial Algebraic Computations…
Joseph Awange, Bela Palancz Hardcover R4,216 R3,686 Discovery Miles 36 860
Heat Transport and Energetics of the…
Anne Hofmeister Paperback R2,348 Discovery Miles 23 480
Intraseasonal Variability in the…
William K. -M Lau, Duane E. Waliser Hardcover R5,259 Discovery Miles 52 590
Machine Learning for Planetary Science
Joern Helbert, Mario D'Amore, … Paperback R3,380 Discovery Miles 33 800
Everyday Applied Geophysics 2…
Nicolas Florsch, Frederic Muhlach, … Hardcover R2,325 R2,198 Discovery Miles 21 980
Geophysical Potential Fields, Volume 2…
Lev Eppelbaum Hardcover R3,062 Discovery Miles 30 620
Dynamical Characteristics of…
Ryosuke Shibuya Hardcover R1,408 Discovery Miles 14 080
Geoengineering Responses to Climate…
Tim Lenton, Naomi Vaughan Hardcover R3,559 R3,298 Discovery Miles 32 980

 

Partners