![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet > Network computers
Universal navigation is accessible primarily through smart phones providing users with navigation information regardless of the environment (i.e., outdoor or indoor). Universal Navigation on Smartphones provide the most up-to-date navigation technologies and systems for both outdoor and indoor navigation. It also provides a comparison of the similarities and differences between outdoor and indoor navigation systems from both a technological stand point and user's perspective. All aspects of navigation systems including geo-positioning, wireless communication, databases, and functions will be introduced. The main thrust of this book presents new approaches and techniques for future navigation systems including social networking, as an emerging approach for navigation.
This book constitutes the joint refereed proceedings of the 14th International Conference on Next Generation Wired/Wireless Advanced Networks and Systems, NEW2AN 2014, and the 7th Conference on Internet of Things and Smart Spaces, ruSMART 2014, held in St. Petersburg, Russia, in August 2014. The total of 67 papers was carefully reviewed and selected for inclusion in this book. The 15 papers selected from ruSMART are organized in topical sections named: smart spaces core technologies, smart spaces for geo-location and e-tourism apps, smart space supporting technologies, and video solutions for smart spaces. The 52 papers from NEW2AN deal with the following topics: advances in wireless networking, ad hoc networks and enhanced services, sensor- and machine-type communication, networking architectures and their modeling, traffic analysis and prediction, analytical methods for performance evaluation, materials for future communications, generation and analysis of signals, business aspects of networking, progress on upper layers and implementations, modeling methods and tools, techniques, algorithms, and control problems, photonics and optics, and signals and their processing.
This book constitutes the refereed proceedings of the 26th IFIP WG 6.1 International Conference on Testing Software and Systems, ICTSS 2014, held in Istanbul, Turkey, in September 2014. The 11 revised full papers presented together with 6 short papers were carefully selected from 36 submissions. The scope of the conference was on following topics: testing methodologies, tools and frameworks, and industrial experiences.
This book is the second of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class experts, concentrating on topics relating to security and privacy (the other two volumes review Tools, Perspectives, and Applications, and Mining and Visualization in CSNs). Topics and features: presents the latest advances in security and privacy issues in CSNs, and illustrates how both organizations and individuals can be protected from real-world threats; discusses the design and use of a wide range of computational tools and software for social network analysis; describes simulations of social networks, and the representation and analysis of social networks, with a focus on issues of security, privacy, and anonymization; provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology.
This book constitutes the proceedings of the 8th European Conference on Software Architecture, ECSA 2014, held in Vienna, Austria, in August 2014. The 16 full papers and 18 short papers presented in this volume were carefully reviewed and selected from 91 submissions. They are organized in topical sections named: architecture decisions and knowledge; architecture patterns and anti-patterns; reference architectures and metamodels; architecture description languages; enterprise architecture, SOA and cloud computing; components and connectors; quality attributes; and architecture analysis and verification.
This book constitutes the refereed proceedings of the 7th International Workshop on Multiple Access Communications, MACOM 2014, held in Halmstad, Sweden, in August 2014. The 12 full papers presented were carefully reviewed and selected from 22 submissions. They describe the latest advancements in the field of multiple access communications with an emphasis on reliability issues, physical layer techniques, cognitive radio, medium access control protocols, and video coding.
This book constitutes the refereed proceedings of the 20th International Conference on Parallel and Distributed Computing, Euro-Par 2014, held in Porto, Portugal, in August 2014. The 68 revised full papers presented were carefully reviewed and selected from 267 submissions. The papers are organized in 15 topical sections: support tools environments; performance prediction and evaluation; scheduling and load balancing; high-performance architectures and compilers; parallel and distributed data management; grid, cluster and cloud computing; green high performance computing; distributed systems and algorithms; parallel and distributed programming; parallel numerical algorithms; multicore and manycore programming; theory and algorithms for parallel computation; high performance networks and communication; high performance and scientific applications; and GPU and accelerator computing.
The six-volume set LNCS 8579-8584 constitutes the refereed proceedings of the 14th International Conference on Computational Science and Its Applications, ICCSA 2014, held in Guimaraes, Portugal, in June/July 2014. The 347 revised papers presented in 30 workshops and a special track were carefully reviewed and selected from 1167 initial submissions. The 289 papers presented in the workshops cover various areas in computational science ranging from computational science technologies to specific areas of computational science such as computational geometry and security.
This book constitutes the proceedings of the 10th European Conference on Modelling Foundations and Applications, ECMFA 2014, held as part of STAF 2014, in York, UK, in July 2014. The 14 foundation track papers and the 3 applications track papers presented in this volume were carefully reviewed and selected from 58 submissions. They are on all aspects of MDE, including topics such as model provenance; model transformations and code generation; model synthesis; model-driven testing; formal modeling approaches; business modeling; and usability of models.
This book constitutes the refereed proceedings of the 20th International Conference on Computing and Combinatorics, COCOON 2014, held in Atlanta, GA, USA, in August 2014. The 51 revised full papers presented were carefully reviewed and selected from 110 submissions. There was a co-organized workshop on computational social networks (CSoNet 2014) where 8 papers were accepted. The papers cover the following topics: sampling and randomized methods; logic, algebra and automata; database and data structures; parameterized complexity and algorithms; computational complexity; computational biology and computational geometry; approximation algorithm; graph theory and algorithms; game theory and cryptography; scheduling algorithms and circuit complexity and CSoNet.
This brief focuses on medium access control (MAC) in vehicular ad hoc networks (VANETs), and presents VeMAC, a novel MAC scheme based on distributed time division multiple access (TDMA) for VANETs. The performance of VeMAC is evaluated via mathematical analysis and computer simulations in comparison with other existing MAC protocols, including the IEEE 802.11p standard. This brief aims at proposing TDMA as a suitable MAC scheme for VANETs, which can support the quality-of-service requirements of high priority VANET applications.
This book constitutes the proceedings of the 11th International Conference on Cellular Automata for Research and Industry, ACRI 2014, held in Krakow, Poland, in September 2014. The 67 full papers and 7 short papers presented in this volume were carefully reviewed and selected from 125 submissions. They are organized in topical sections named: theoretical results on cellular automata; cellular automata dynamics and synchronization; modeling and simulation with cellular automata; cellular automata-based hardware and computing; cryptography, networks and pattern recognition with cellular automata. The volume also contains contributions from ACRI 2014 workshops on crowds and cellular automata; asynchronous cellular automata; traffic and cellular automata; and agent-based simulation and cellular automata.
Systems Management is emerging as the predominant area for computer science in the enterprise, with studies showing that the bulk (up to 80%) of an enterprise IT budget is spent on management/operational issues and is the largest piece of the expenditure. This textbook provides an overview of the field of computer systems and network management. Systems management courses are being taught in different graduate and undergraduate computer science programs, but there are no good books with a comprehensive overview of the subject. This text book will provide content appropriate for either an undergraduate course (junior or senior year) or a graduate course in systems management.
Future Application and Middleware Technology on e-Science presents selected papers from the 2008 Korea e-Science All-Hands-Meeting (AHM 2008). Hosted by the Korea Institute of Science and Technology Information, this meeting was designed to bring together developers and users of e-Science applications and enabling information technologies from international and interdisciplinary research communities. The AHM 2008 conference served as a forum for engineers and scientists to present state-of-the-art research and product/tool developments, and to highlight related activities in all fields of e-Science. The works presented in this edited volume bring together cross-disciplinary information on e-Science in one cohesive source. This book is suitable for the professional audience composed of industry researchers and practitioners of e-Science. This volume should also be suitable for advanced-level students in the field.
As a beginning graduate student, I recall being frustrated by a general lack of acces sible sources from which I could learn about (theoretical) cryptography. I remember wondering: why aren't there more books presenting the basics of cryptography at an introductory level? Jumping ahead almost a decade later, as a faculty member my graduate students now ask me: what is the best resource for learning about (various topics in) cryptography? This monograph is intended to serve as an answer to these 1 questions - at least with regard to digital signature schemes. Given the above motivation, this book has been written with a beginninggraduate student in mind: a student who is potentially interested in doing research in the ?eld of cryptography, and who has taken an introductory course on the subject, but is not sure where to turn next. Though intended primarily for that audience, I hope that advanced graduate students and researchers will ?nd the book useful as well. In addition to covering various constructions of digital signature schemes in a uni?ed framework, this text also serves as a compendium of various "folklore" results that are, perhaps, not as well known as they should be. This book could also serve as a textbook for a graduate seminar on advanced cryptography; in such a class, I expect the entire book could be covered at a leisurely pace in one semester with perhaps some time left over for excursions into related topics.
This two volume set LNCS 8630 and 8631 constitutes the proceedings of the 14th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2014, held in Dalian, China, in August 2014. The 70 revised papers presented in the two volumes were selected from 285 submissions. The first volume comprises selected papers of the main conference and papers of the 1st International Workshop on Emerging Topics in Wireless and Mobile Computing, ETWMC 2014, the 5th International Workshop on Intelligent Communication Networks, IntelNet 2014, and the 5th International Workshop on Wireless Networks and Multimedia, WNM 2014. The second volume comprises selected papers of the main conference and papers of the Workshop on Computing, Communication and Control Technologies in Intelligent Transportation System, 3C in ITS 2014, and the Workshop on Security and Privacy in Computer and Network Systems, SPCNS 2014.
This book constitutes the refereed proceedings of the 8th IFIP WG 6.6 International Conference on Monitoring and Securing Virtualized Networks and Services, AIMS 2014, held in Brno, Czech Republic, in June/July 2014. The 9 full papers presented were carefully reviewed and selected from 29 submissions. The volume also includes 13 papers presented at the AIMS Ph.D. workshop. They were reviewed and selected from 27 submissions. The full papers are organized in topical sections on emerging infrastructures for networks and services; experimental studies for security management; and monitoring methods for quality-of-service and security. The workshop papers are organized in topical sections on management of virtualized network resources and functions; security management; SDN and content delivery; monitoring and information sharing.
This book constitutes the proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2014, held in Gothenburg, Sweden, in September 2014. The 22 full papers were carefully reviewed and selected from 113 submissions, and are presented together with 10 poster abstracts. The papers address all current topics in computer security, including network security, authentication, malware, intrusion detection, browser security, web application security, wireless security, vulnerability analysis.
The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists. Quantum Attacks on Public-Key Cryptosystems presemts almost all known quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems. This book is intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the field.
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Workshop on Job Scheduling Strategies for Parallel Processing, JSSPP 2013, held Boston, MA, USA, in May 2013. The 10 revised papers presented were carefully reviewed and selected from 20 submissions. The papers cover the following topics parallel scheduling for commercial environments, scientific computing, supercomputing and cluster platforms.
This SpringerBrief discusses the current research on coordinated multipoint transmission/reception (CoMP) in wireless multi-cell systems. This book analyzes the structure of the CoMP precoders and the message exchange mechanism in the CoMP system in order to reveal the advantage of CoMP. Topics include interference management in wireless cellular networks, joint signal processing, interference coordination, uplink and downlink precoding and system models. After an exploration of the motivations and concepts of CoMP, the authors present the architectures of a CoMP system. Practical implementation and operational challenges of CoMP are discussed in detail. Also included is a review of CoMP architectures and deployment scenarios in the LTE-Advanced standard. Readers are exposed to the latest multiuser precoding designs for the CoMP system under two operating modes, interference aware and interference coordination. Wireless Coordinated Multi cell Systems: Architectures and Precoding Designs is a concise and approachable tool for researchers, professionals and advanced-level students interested in wireless communications and networks.
This book constitutes the proceedings of the 28th European Conference on Object-Oriented Programming, ECOOP 2014, held in Uppsala, Sweden, in July/August 2014. The 27 papers presented in this volume were carefully reviewed and selected from 101 submissions. They are organized in topical sections named: analysis; design; concurrency; types; implementation; refactoring; JavaScript, PHP and frameworks; and parallelism.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Symposium on Combinatorial Optimization, ISCO 2014, held in Lisbon, Portugal, in March 2014. The 37 revised full papers presented together with 64 short papers were carefully reviewed and selected from 97 submissions. They present original research on all aspects of combinatorial optimization, such as algorithms and complexity; mathematical programming; operations research; stochastic optimization; graphs and combinatorics.
The six-volume set LNCS 8579-8584 constitutes the refereed proceedings of the 14th International Conference on Computational Science and Its Applications, ICCSA 2014, held in Guimaraes, Portugal, in June/July 2014. The 347 revised papers presented in 30 workshops and a special track were carefully reviewed and selected from 1167. The 289 papers presented in the workshops cover various areas in computational science ranging from computational science technologies to specific areas of computational science such as computational geometry and security.
This SpringerBrief provides a concise guide to applying wireless energy transfer techniques in traditional battery-powered sensor networks. It examines the benefits and challenges of wireless power including efficiency and reliability. The authors build a wireless rechargeable sensor networks from scratch and aim to provide perpetual network operation. Chapters cover a wide range of topics from the collection of energy information and recharge scheduling to joint design with typical sensing applications such as data gathering. Problems are approached using a natural combination of probability theory, optimization, algorithm and protocol designs. All proposed mechanisms are evaluated by extensive simulations. Wireless Rechargeable Sensor Networks targets professionals and researchers working in networks, wireless communications, energy technology and information technology. Advanced-level students studying electrical engineering and computer science will also find this material useful as a study guide. |
![]() ![]() You may like...
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, …
Paperback
R1,077
Discovery Miles 10 770
Advances in Core Computer Science-Based…
George A. Tsihrintzis, Maria Virvou
Hardcover
R2,954
Discovery Miles 29 540
New Developments and Advances in Robot…
Nabil Derbel, Jawhar Ghommam, …
Hardcover
R2,925
Discovery Miles 29 250
The Classification of the Finite Simple…
Inna Capdeboscq, Daniel Gorenstein, …
Paperback
R2,661
Discovery Miles 26 610
Advances in Robot Kinematics
Jadran Lenarcic, Oussama Khatib
Hardcover
|