![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > Network computers
Three speakers at the Second Workshop on Network Management and Control nostalgically remembered the INTEROP Conference at which SNMP was able to interface even to CD players and toasters. We agreed this was indeed a major step forward in standards, but wondered if anyone noticed whether the toast was burned, let alone, would want to eat it. The assurance of the correct operation of practical systems under difficult environments emerged as the dominant theme of the workshop with growth, interoperability, performance, and scalability as the primary sub-themes. Perhaps this thrust is un surprising, since about half the 100 or so attendees were from industry, with a strong contingency of users. Indeed the technical program co-chairs, Shivendra Panwar of Polytechnic and Walter Johnston of NYNEX, took as their assignment the coverage of real problems and opportunities in industry. Nevertheless we take it as a real indication of progress in the field that the community is beginning to take for granted the availability of standards and even the ability to detect physical, link, and network-level faults and is now expecting diagnostics at higher levels as well as system-wide solutions.
This book constitutes the refereed proceedings of the 13th International Conference on Engineering Applications of Neural Networks, EANN 2012, held in London, UK, in September 2012. The 49 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers describe the applications of neural networks and other computational intelligence approaches to intelligent transport, environmental engineering, computer security, civil engineering, financial forecasting, virtual learning environments, language interpretation, bioinformatics and general engineering.
This book constitutes the thoroughly refereed proceedings of the 10th International Symposium on Automated Technology for Verification and Analysis, ATVA 2012, held at Thiruvananthapuram, Kerala, India, in October 2012. The 25 regular papers, 3 invited papers and 4 tool papers presented were carefully selected from numerous submissions. Conference papers are organized in 9 technical sessions, covering the topics of automata theory, logics and proofs, model checking, software verification, synthesis, verification and parallelism, probabilistic verification, constraint solving and applications, and probabilistic systems.
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security, CANS 2013, held in Paraty, Brazil, in November 2013. The 18 revised full papers presented together with four invited talks were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on cryptanalysis, zero-knowledge protocols, distributed protocols, network security and applications, advanced cryptographic primitives, and verifiable computation.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International ICST Conference on Wireless Internet, WICON 2013, held in Shanghai, China, in April 2012. The 20 revised full papers were carefully reviewed and selected from numerous submissions. The papers cover topics such as vehicular communications and heterogeneous networks, cognitive radio and multi-antenna systems, networks and beyond, ad hoc and mesh networks.
This book constitutes the refereed proceedings of the Third International Conference on Simulation, Modeling, and Programming for Autonomous Robots, SIMPAR 2012, held in Tsukuba, Japan, in November 2012. The 33 revised full papers and presented together with 3 invited talks were carefully reviewed and selected from 46 submissions. Ten papers describe design of complex behaviors of autonomous robots, 9 address software layers, 8 papers refer to related modeling and learning. The papers are organized in topical sections on mobile robots, software modeling and architecture and humanoid and biped robots.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Bio-Inspired Models of Network, Information, and Computing Systems (Bionetics). The event took place in the city of York, UK, in December 2011. Bionetics main objective is to bring bio-inspired paradigms into computer engineering and networking, and to enhance the fruitful interactions between these fields and biology. The papers of the conference were accepted in 2 categories: full papers and work-in progress. Full papers describe significant advances in the Bionetics field, while work-in-progress papers present an opportunity to discuss breaking research which is currently being evaluated. The topics are ranging from robotic coordination to attack detection in peer-to-peer networks, biological mechanisms including evolution, flocking and artificial immune systems, and nano-scale communication and networking.
This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their personal profiles without disclosing the profiles. The PDF helps users forward data to their friends via multiple cooperative relay peers while preserving their identity and location privacy. The TSE enables users to locally share service reviews on the vendors such that users receive more valuable information about the services not only from vendors but also from their trusted social friends. The authors address both theoretic and practical aspects of these topics by introducing the system model, reviewing the related works, and presenting the solutions. Security and Privacy for Mobile Social Networks further provides the security analysis and the performance evaluation based on real-trace simulations. It also summarizes the future research directions for this rapidly growing area of research. The book will be valuable for researchers and practitioners who work with mobile social networks, communication platforms, wireless communication techniques, and internet applications. "Suitable for any type of reader as an introduction to the topic... The chapters are well motivated and presented... It is recommended for researchers." -ACM Computing Reviews, 21 July 2014
This book constitutes the thoroughly refereed post-conference proceedings of the 24th International Workshop on Languages and Compilers for Parallel Computing, LCPC 2011, held in Fort Collins, CO, USA, in September 2011. The 19 revised full papers presented and 19 poster papers were carefully reviewed and selected from 52 submissions. The scope of the workshop spans the theoretical and practical aspects of parallel and high-performance computing, and targets parallel platforms including concurrent, multithreaded, multicore, accelerator, multiprocessor, and cluster systems.
Conflicts between agents acting in a multi-agent environment arise for different reasons, involve different concepts, and are dealt with in different ways, depending on the kind of agents and on the domain where they are considered. Agents may have conflicting beliefs, conflicting goals, or may have to share limited resources. Consequently, conflicts may be expressed as mere differences, or as contradictions, or even as social conflicts. They may be avoided, solved, kept, or even created deliberately. Conflicting Agents studies conflicts in the context of multi-agent systems, i.e. artificial societies modeled on the basis of autonomous, interacting agents. This book addresses questions about types of conflicts, conflict definitions and the use of conflicts as trigger functions for activities in multi-agent systems. The book is also dedicated to questions of conflict management, resolution and avoidance, i.e. the question of how agents cope with conflicts and conflicting situations.
This book constitutes the thoroughly refereed proceedings of the 14th International Conference on Advanced Concepts for Intelligent Vision Systems, ACIVS 2012, held in Brno, Czech Republic, in September 2012. The 46 revised full papers were carefully selected from 81 submissions and deal with image analysis and computer vision with a focus on detection, recognition, tracking and identification.
This book constitutes the thoroughly refereed post-conference proceedings of the First International Joint Conference on Advances in Signal Processing and Information Technology (SPIT 2011) and Recent Trends in Information Processing and Computing (IPC 2011) held in Amsterdam, The Netherlands, in December 2011. The 50 revised full papers presented were carefully selected from 298 submissions. Conference papers promote research and development activities in computer science, information technology, computational engineering, image and signal processing, and communication.
This book constitutes the refereed proceedings of the 18th EUNICE 2012 conference on information and communication technologies, held in Budapest, in August 2012. The 23 oral papers demostrated together with 15 poster presentations were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on radio communications, security, management, protocols and performance, algorithms, models, and simulations.
This book constitutes the thoroughly refereed conference proceedings of the Third International Conference on Algorithmic Decision Theory, ADT 2013, held in November 2013 in Bruxelles, Belgium. The 33 revised full papers presented were carefully selected from more than 70 submissions, covering preferences in reasoning and decision making, uncertainty and robustness in decision making, multi-criteria decision analysis and optimization, collective decision making, learning and knowledge extraction for decision support.
This book constitutes the proceedings of the 27th International Symposium on Distributed Computing, DISC 2013, held in Jerusalem, Israel, in October 2013. The 27 full papers presented in this volume were carefully reviewed and selected from 142 submissions; 16 brief announcements are also included. The papers are organized in topical sections named: graph distributed algorithms; topology, leader election, and spanning trees; software transactional memory; shared memory executions; shared memory and storage; gossip and rumor; shared memory tasks and data structures; routing; radio networks and the SINR model; crypto, trust, and influence; and networking.
This book constitutes the refereed proceedings of the 9th International Conference on Information Systems Security, ICISS 2013, held in Kolkata, India, in December 2013. The 20 revised full papers and 6 short papers presented together with 3 invited papers were carefully reviewed and selected from 82 submissions. The papers address theoretical and practical problems in information and systems security and related areas.
With the continuing success of Local Area Networks (IANs), there is an increasing demand to extend their capabilities towards higher data rates and wider areas. This, together with the progress in fiber-optic technology, has given rise to the so-called Metropolitan Area Networks (MANs). MANs can span much greater distances than current LAN s, and offer data rates on the order of hundreds of Megabits/sec (Mbps). The success of MANs is mainly due to the opportunity they provide to develop new networking products capable of providing high-speed commu nications between applications at competitive prices, which nonetheless give an adequate return on the manufacturers' investments. A major factor in of appropriate networking standards. achieving this goal is the availability Fiber Distributed Data Interface (FDDl) and Distributed Queue Dual Bus (DQDB) are the two standard technologies for MANs for which industrial products are already available. For this reason, this book focuses mainly on these two standards. Nowadays there are several books dealing with MANs, and these look mainly at FDDI (e.g., [2], [92], [118], [141]). These books focus primarily on the architectures and protocols, whereas they pay little attention to per formance analysis. Due to the capability of MANs to integrate services, a quantitative analysis of the Quality of Service (QoS) provided by these tech nologies is a relevant issue, and is thus covered in depth in this book.
This book constitutes the thoroughly refereed proceedings of the 18th International Conference, Euro-Par 2012, held in Rhodes Islands, Greece, in August 2012. The 75 revised full papers presented were carefully reviewed and selected from 228 submissions. The papers are organized in topical sections on support tools and environments; performance prediction and evaluation; scheduling and load balancing; high-performance architectures and compilers; parallel and distributed data management; grid, cluster and cloud computing; peer to peer computing; distributed systems and algorithms; parallel and distributed programming; parallel numerical algorithms; multicore and manycore programming; theory and algorithms for parallel computation; high performance network and communication; mobile and ubiquitous computing; high performance and scientific applications; GPU and accelerators computing.
"Future Internet" is a worldwide hot topic. The Internet has become a critical infrastructure for business development and social interactions. However, the immense growth of the Internet has resulted in additional stresses on its architecture, resulting in a network difficult to monitor, understand, and manage due to its huge scale in terms of connected devices and actors (end users, content providers, equipment vendors, etc). This book presents and discusses the ongoing initiatives and experimental facilities for the creation of new Future Internet Architectures using alternative approaches like Clean Slate and Incremental improvements: It considers several possible internet network use scenarios that include seamless mobility, ad hoc networks, sensor networks, internet of things and new paradigms like content and user centric networks.
This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Workshop on Fast Software Encryption, held in Washington, DC, USA, in March 2012. The 24 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 89 initial submissions. The papers are organized in topical sections on block ciphers, differential cryptanalysis, hash functions, modes of operation, new tools for cryptanalysis, new designs and Keccak.
This book constitutes the refereed proceedings of the Third International Conference on Information Technology in Bio- and Medical Informatics, ITBAM 2012, held in Vienna, Austria, September 2012, in conjunction with DEXA 2012. The 12 revised long papers and 3 revised short papers presented were carefully reviewed and selected from numerous submissions. The papers address the following topics: medical data mining and information retrieval; metadata models, prediction and mobile applications; systems biology and data mining in bioinformatics. The papers show how broad the spectrum of topics in applications of information technology to biomedical engineering and medical informatics is.
Like the 120 volt standard for electricity, the appearance of standards in network management heralds new opportunities for creativity and achievement. As one example, within the framework of these evolving standards, consider a system of local area networks connecting computing equipment from different vendors. A bridge 1qc. k:8 up because of a transient caused by a repeater failure. The result is a massive disconnecHon of virtual circuits. What is the role of the manager and the network management system in solving the problem? How does the vendor implement the solution? How does the user use it? What measurements should be made? How should they be displayed? How much of the diagnosis and correction should be automated? How does the solution change with different hardware and software? In the IEEE Communications Magazine, I recently reported a timely illustration in the area of problems in fault management. At the workshop hotel, "I was waiting for a room assignment at the reception desk, when my attendant left the counter for a moment. Upon returning, he took one look at his screen and whined an accusatory question at everyone in sight, 'Who logged out my terminal?' Who indeed! It wasn't any of us. It was the system.
This book constitutes the refereed proceedings of the Joint International Conference on Electronic Government and the Information Systems Perspective, and Electronic Democracy, EGOVIS/EDEM 2012, held in Vienna, Austria, in September 2012, in conjunction with DEXA 2012. The 27 revised full papers presented were carefully reviewed and selected from numerous submissions. They cover topics from recent research fields such as open data, cloud applications, interoperability and e-government architectures, Web 2.0 and Web 3.0 solutions and public dialogies. The papers are organized in the following topical sections: e-government country studies; e-government processes; identy management in e-government; e-government: process management; e-participation; social networks; and open data.
This book constitutes the refereed proceedings of the 8th International Conference on Trust and Privacy in Digital Business, TrustBus 2012, held in Vienna, Austria, in September 2012 in conjunction with DEXA 2012. The 18 revised full papers presented together with 12 presentations of EU projects were carefully reviewed and selected from 42 submissions. The papers are organized in the following topical sections: Web security; secure management processes and procedures; access control; intrusion detection - trust; applied cryptography; secure services, databases, and data warehouses; and presentations of EU projects.
This book constitutes revised selected papers from the 6th International Workshop on Critical Information Infrastructure Security, CRITIS 2011, held in Lucerne, Switzerland, in September 2011. The 16 full papers and 6 short papers presented in this volume were carefully reviewed and selected from 38 submissions. They deal with all areas of critical infrastructure protection research. |
You may like...
Architectural Design - Conception and…
Chris A. Vissers, Luis Ferreira Pires, …
Hardcover
5G-Enabled Vehicular Communications and…
Xiang Cheng, Rongqing Zhang, …
Hardcover
R3,106
Discovery Miles 31 060
Full-Duplex Wireless Communications…
Tho Le-Ngoc, Ahmed Masmoudi
Hardcover
R3,731
Discovery Miles 37 310
Fault Tolerant Architectures for…
Sikhar Patranabis, Debdeep Mukhopadhyay
Hardcover
R3,802
Discovery Miles 38 020
Private Cloud Computing - Consolidation…
Stephen R. Smoot, Nam K. Tan
Paperback
R1,225
Discovery Miles 12 250
Cyber-Physical Systems - Foundations…
Houbing Song, Danda B. Rawat, …
Paperback
Handbook of Multimedia Information…
Amit Kumar Singh, Anand Mohan
Hardcover
R6,633
Discovery Miles 66 330
|