![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > Network computers
This book constitutes the thoroughly refereed proceedings of the 23rd International Conference on Concurrency Theory, CONCUR 2012, held in Newcastle upon Tyne, UK, September 4-7, 2012. The 35 revised full papers presented together with 4 invited talks were carefully reviewed and selected from 97 submissions. The papers are organized in topics such as reachability analysis; qualitative and timed systems; behavioural equivalences; temporal logics; session types; abstraction; mobility and space in process algebras; stochastic systems; probabilistic systems; Petri nets and non-sequential semantics; verification; decidability.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, MobiQuitous 2012, held in Beijing, China, Denmark, in December 2012. The revised full papers presented were carefully reviewed and selected from numerous submissions. They cover a wide range of topics such as localization and tracking, search and discovery, classification and profiling, context awareness and architecture, location and activity recognition. The proceedings also include papers from the best paper session and the industry track, as well as poster and demo papers.
This book constitutes the refereed proceedings of the 14th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2013, held in Magdeburg, Germany, in September 2013. The 5 revised full papers presented together with 11 short papers, 5 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on biometrics; applied cryptography; digital watermarking, steganography and forensics; and social network privacy, security and authentication.
This book constitutes the refereed proceedings of the 19th EUNICE/IFIP WG 6.2, 6.6 workshop on Advances in Communication Networking, EUNICE 2013, held in Chemnitz, Germany, in August 2013. The 23 oral papers demonstrated together with 9 poster presentations were carefully reviewed and selected from 40 submissions. The papers are organized in topical sections on network modeling and design, traffic analysis, network and traffic management, services over mobile networks, monitoring and measurement, security concepts, application of ICT in smart grid and smart home environments, data dissemination in ad-hoc and sensor networks, and services and applications.
This book constitutes the thoroughly refereed proceedings of the 17th East-European Conference on Advances in Databases and Information Systems, ADBIS 2013, held in Genoa, Italy, in September 2013. The 26 revised full papers presented together with three invited papers were carefully selected and reviewed from 92 submissions. The papers are organized in topical sections on ontologies; indexing; data mining; OLAP; XML data processing; querying; similarity search; GPU; querying in parallel architectures; performance evaluation; distributed architectures.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Agents and Artificial Intelligence, ICAART 2012, held in Vilamoura, Portugal, in February 2012. The 28 revised full papers presented together with one invited paper were carefully reviewed and selected from 292 submissions. The papers are organized in two topical sections on artificial intelligence and on agents.
Intelligence in Networks is a concept, the meaning of which is highly related to the time-period when it is used. In the 1960s, 1970s and 1980s, it was mainly related to the teleservice repertoire 'an sich'. In the 1990s, it is more related to efficient flexibility in the introduction of new teleservices and teleservice repertoire. This state-of-the-art text sets out to identify and study issues related to solutions for increasing intelligence in networks. As examples, intelligence networks (IN), telecommunication information networking architecture (TINA) and mobile agents and active networks are different solutions for improving the grade of network intelligence. The areas under discussion include research and development within various closely related fields such as: * Teleservices, service architecture and service creation; * Middleware and specification languages; * Mobile agents, active networks, plug-and-play issues; and * Quality of service and performance.GBP/LISTGBP Intelligence in Networks contains the proceedings of SMARTNET'99, the fifth in a series of conferences on intelligence in networks sponsored by the International Federation for Information Processing (IFIP), at the Asian Institute of Technology, Pathumthani, Thailand in November 1999.
This volume presents the refereed proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2011, held in London, UK, in September 2011. The 35 revised papers included in the volume were carefully reviewed and selected from numerous submissions. Topics covered include network intrusion detection; anonymity and privacy; wireless security; system security; DNS and routing security; and key management.
Wireless systems for mobile communication is one of the most rapidly expanding fields in digital telecommunications. Such hot topics as wireless Internet, mobile access to multimedia services and wireless convergence systems are likely to affect the whole of the information society and will pose intellectual challenges to researchers in the foreseeable future. Transmission techniques like WCDMA, user-oriented protocols like WAP and communication structures like LEO are just a few tools that seem to usher in the era of unlimited resource availability. Personal Wireless Communications addresses these issues, with 17 regular papers and 4 invited papers by leading researchers in the area of wireless communications. The volume comprises the proceedings of the Working Conference on Personal Wireless Communications (PWC'2000), which was sponsored by the International Federation for Information Processing (IFIP) and held in Gdansk, Poland in September 2000.The contributions cover a wide range of topics, from 3G cellular systems to wireless Internet and WAP design to wireless LAN and ATM; from speech coding and antenna design to teletraffic modelling and protocol evaluation. The book is thus essential reading for theoreticians and engineers interested in the current progress in wireless systems, as well as for IT students and researchers.
This book is the first attempt to bring together current research findings in the domain of interactive horizontal displays. The novel compilation will integrate and summarise findings from the most important international tabletop research teams. It will provide a state-of-the art overview of this research domain and therefore allow for discussion of emerging and future directions in research and technology of interactive horizontal displays. Latest advances in interaction and software technologies and their increasing availability beyond research labs, refuels the interest in interactive horizontal displays. In the early 1990s Mark Weiser's vision of Ubiquitous Computing redefined the notion of Human Computer Interaction. Interaction was no longer considered to happen only with standard desktop computers but also with elements of their environment. This book is structured in three major areas: 'under', 'on/above' and 'around' tabletops. These areas are associated with different research disciplines such as Hardware/Software and Computer Science, Human Computer Interaction (HCI) and Computer Supported Collaborative Work (CSCW). However, the comprehensive and compelling presentation of the topic of the book results from its interdisciplinary character. The book addresses fellow researchers who are interested in this domain and practitioners considering interactive tabletops in real-world projects. It will also be a useful introduction into tabletop research that can be used for the academic curriculum.
This book constitutes the thoroughly refereed proceedings of the 2011 ICSOC Workshops consisting of 5 scientific satellite events, organized in 4 tracks: workshop track (WESOA 2011; NFPSLAM-SOC 2011), PhD symposium track, demonstration track, and industry track; held in conjunction with the 2011 International Conference on Service-Oriented Computing (ICSOC), in Paphos, Greece, December 2011. The 39 revised papers presented together with 2 introductory descriptions address topics such as software engineering services; the management of service level agreements; Web services and service composition; general or domain-specific challenges of service-oriented computing and its transition towards cloud computing; architecture and modeling of services; workflow management; performance analysis as well as crowdsourcing for improving service processes and for knowledge discovery.
This book constitutes the refereed proceedings of the 13th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2012, held in Canterbury, UK, in September 2012. The 6 revised full papers presented together with 8 short papers, 8 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 43 submissions. The papers are organized in topical sections on image and handwriting analysis, authentication and performance, biometrics, forensics and watermarking, and communications security.
This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013. The 43 papers included in the book were carefully reviewed and selected from 242 papers. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together researchers in this area, by promoting the exchange of ideas with system developers and by encouraging links with researchers in related areas. The papers cover all topics related to security, privacy and trust in computer systems and networks.
This book constitutes the joint refereed proceedings of the 13 International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking, NEW2AN, and the 6th Conference on Internet of Things and Smart Spaces, ruSMART 2013, held in St. Petersburg, Russia, in August 2013. The total of 38 papers was carefully reviewed and selected for inclusion in this book. The 14 papers selected from ruSMART are organized in topical sections named: internet on things, smart spaces technologies; and smart systems. The 24 papers from NEW2AN deal with the following topics: performance and efficiency analysis, network and transport layer issues; cognitive radio networks; sensor and mesh networks; upper layer protocols and applications; ad-hoc, cellular and satellite networks.
MotionCast for Mobile Wireless Networks provides an overview on the research for mobile ad-hoc networks regarding capacity and connectivity. Wireless ad-hoc networks are useful when there is a lack of infrastructure for communication. The proposed notion "MotionCast" is for the capacity analysis of multicast in MANET. A new kind of connectivity (k;m)-connectivity, is also defined, and its critical transmission range for i.i.d. (independently and identically distributed) and random walk mobility models are derived respectively. This book also investigates the related issues of connectivity in mobile and static circumstances. In addition, it provides a survey of the capacity scaling research, which gives a good summary of this field.
A re-working of C.D. Chaffee's previously published The Rewiring of America (Academia, 1988), this professional book describes the fiber optics revolution. There have been many changes in the fiber optics field since the book's first publication. These include advances in optical networking; the additional bandwidth created by the Internet and associated data services; liberalization of the global telecommunications industry; and the rewiring of the world's oceans with fiber optics. Building the Global Fiber Optics Superhighway details all these developments. C.D. Chaffee writes: 'One thing is clear: as our networks become primarily data-driven, they need to be built differently, to be able to handle data first, but also voice. It is a different way of looking at the world.'
This book constitutes the revised selected papers of the First International Conference on Networked Systems, NETYS 2013, held in Marrakech, Morocco, in May 2013. The 33 papers (17 regular and 16 short papers) presented were carefully reviewed and selected from 74 submissions. They address major topics from theory and practice of networked systems: multi-core architectures, middleware, environments, storage clusters, as well as peer-to-peer, sensor, wireless, and mobile networks.
This book constitutes the refereed proceedings of the International Conference on Advances in Security of Information and Communication Networks, Sec Net 2013, held in Cairo, Egypt, in September 2013. The 21 revised full papers presented were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on networking security; data and information security; authentication and privacy; security applications. "
This book constitutes the refereed proceedings of the 8th International Workshop on Security, IWSEC 2013, held in Okinawa, Japan, in November 2013. The 20 revised selected papers presented in this volume were carefully reviewed and selected from 63 submissions. They are organized in topical sections named: software and system security, cryptanalysis, privacy and cloud computing, public key cryptosystems, and security protocols.
In the last few years the subject of optical cornmunications has moved rapidly from being a promising research area to a practical reality already being installed and carrying traffic in trunk networks in many countries. At the same time new applications for fibre technology are emerging and are placing new demands on the system components. In telecommunications there is a steady increase of interest in the use of fibres for undersea cables, in local area networks and wideband links, and a little further ahead the possibility of coherent communications systems. With an optical carrier bandwidth of 200 THz, today's maximum bit rates of the order of Gb s-l do not approach the limits of the medium, and questions about the ultimate limits of optical communications are already being asked. On a different front, the rapid advance of fibre sensors, previously drawing heavily on the communications technology, is becoming a major driving force in the development of fibres and other components. This picture of dramatic growth in optical technology gives rise to other phenomena. A profusion of small companies mushrooms to meet the demands of specific market areas, each such company formed around a nucleus of experienced personnel from the established research groups. Multi- nationals jostle for position in the optoelectronics marketplace and price wars develop as fibre costs fall. University groups expand with government and industrial funding in attempts to maintain long-term research options and produce trained personnei."
This book focuses on emerging issues in power-aware portable multimedia communications devices beyond low-power electronic design. It compiles system-level power management approaches, from theoretical and simulation studies to experimental test beds related to low power computing, mobile communication and networking.
This book and its companion volume, LNCS vols. 7331 and 7332, constitute the proceedings of the Third International Conference on Swarm Intelligence, ICSI 2012, held in Shenzhen, China in June 2012. The 145 revised full papers presented were carefully reviewed and selected from 247 submissions. The papers are organized in 27 cohesive sections covering all major topics of swarm intelligence research and developments.
This book constitutes the refereed proceedings of the 14th International Conference on Coordination Models and Languages, COORDINATION 2012, held in Stockholm, Sweden, in June 2012, as one of the DisCoTec 2012 events. The 18 revised full papers presented were carefully reviewed and selected from 55 submissions. The papers cover a wide range of topics including coordination of social collaboration processes, coordination of mobile systems in peer-to-peer and ad-hoc networks, programming and reasoning about distributed and concurrent software, types, contracts, synchronization, coordination patterns, and families of distributed systems.
In Ambient Intelligence (AmI) systems, reasoning is fundamental for triggering actions or adaptations according to specific situations that may be meaningful and relevant to some applications. However, such reasoning operations may need to evaluate context data collected from distributed sources and stored in different devices, as usually not all context data is readily available to the reasoners within the system. Decentralized Reasoning in Ambient Intelligence proposes a decentralized reasoning approach for performing rule-based reasoning about context data targeting AmI systems. For this purpose, the authors define a context model assuming context data distributed over two sides: the user side, represented by the users and their mobile devices, and the ambient side, represented by the fixed computational infrastructure and ambient services. They formalize the cooperative reasoning operation - in which two entities cooperate to perform decentralized rule-based reasoning - and define a complete process to perform this operation.
This book constitutes the refereed post-proceedings of the Joint International Semantic Technology Conference, JIST 2011, held in Hangzhou, China, in December 2011. This conference is a joint event for regional semantic Web related conferences. JIST 2011 brings together the Asian Semantic Web Conference 2011 and the Chinese Semantic Web Conference 2011. The 21 revised full papers presented together with 12 short papers were carefully reviewed and selected from 82 submissions. The papers cover a wide range of topics in disciplines related to semantic technology including applications of the semantic Web, management of semantic Web data, ontology and reasoning, social semantic Web, and user interfaces to the semantic Web. |
You may like...
EAI International Conference on Big Data…
Anandakumar Haldorai, Arulmurugan Ramu, …
Hardcover
R4,074
Discovery Miles 40 740
Structured Peer-to-Peer Systems…
Dmitry Korzun, Andrei Gurtov
Hardcover
Private Cloud Computing - Consolidation…
Stephen R. Smoot, Nam K. Tan
Paperback
R1,225
Discovery Miles 12 250
The Role of SDN in Broadband Networks
Hassan Habibi Gharakheili
Hardcover
R3,172
Discovery Miles 31 720
Full-Duplex Wireless Communications…
Tho Le-Ngoc, Ahmed Masmoudi
Hardcover
R3,731
Discovery Miles 37 310
|