![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > Network computers
This book constitutes the refereed proceedings of the 19th EUNICE/IFIP WG 6.2, 6.6 workshop on Advances in Communication Networking, EUNICE 2013, held in Chemnitz, Germany, in August 2013. The 23 oral papers demonstrated together with 9 poster presentations were carefully reviewed and selected from 40 submissions. The papers are organized in topical sections on network modeling and design, traffic analysis, network and traffic management, services over mobile networks, monitoring and measurement, security concepts, application of ICT in smart grid and smart home environments, data dissemination in ad-hoc and sensor networks, and services and applications.
This book constitutes the thoroughly refereed proceedings of the 17th East-European Conference on Advances in Databases and Information Systems, ADBIS 2013, held in Genoa, Italy, in September 2013. The 26 revised full papers presented together with three invited papers were carefully selected and reviewed from 92 submissions. The papers are organized in topical sections on ontologies; indexing; data mining; OLAP; XML data processing; querying; similarity search; GPU; querying in parallel architectures; performance evaluation; distributed architectures.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Agents and Artificial Intelligence, ICAART 2012, held in Vilamoura, Portugal, in February 2012. The 28 revised full papers presented together with one invited paper were carefully reviewed and selected from 292 submissions. The papers are organized in two topical sections on artificial intelligence and on agents.
Intelligence in Networks is a concept, the meaning of which is highly related to the time-period when it is used. In the 1960s, 1970s and 1980s, it was mainly related to the teleservice repertoire 'an sich'. In the 1990s, it is more related to efficient flexibility in the introduction of new teleservices and teleservice repertoire. This state-of-the-art text sets out to identify and study issues related to solutions for increasing intelligence in networks. As examples, intelligence networks (IN), telecommunication information networking architecture (TINA) and mobile agents and active networks are different solutions for improving the grade of network intelligence. The areas under discussion include research and development within various closely related fields such as: * Teleservices, service architecture and service creation; * Middleware and specification languages; * Mobile agents, active networks, plug-and-play issues; and * Quality of service and performance.GBP/LISTGBP Intelligence in Networks contains the proceedings of SMARTNET'99, the fifth in a series of conferences on intelligence in networks sponsored by the International Federation for Information Processing (IFIP), at the Asian Institute of Technology, Pathumthani, Thailand in November 1999.
This volume presents the refereed proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2011, held in London, UK, in September 2011. The 35 revised papers included in the volume were carefully reviewed and selected from numerous submissions. Topics covered include network intrusion detection; anonymity and privacy; wireless security; system security; DNS and routing security; and key management.
Wireless systems for mobile communication is one of the most rapidly expanding fields in digital telecommunications. Such hot topics as wireless Internet, mobile access to multimedia services and wireless convergence systems are likely to affect the whole of the information society and will pose intellectual challenges to researchers in the foreseeable future. Transmission techniques like WCDMA, user-oriented protocols like WAP and communication structures like LEO are just a few tools that seem to usher in the era of unlimited resource availability. Personal Wireless Communications addresses these issues, with 17 regular papers and 4 invited papers by leading researchers in the area of wireless communications. The volume comprises the proceedings of the Working Conference on Personal Wireless Communications (PWC'2000), which was sponsored by the International Federation for Information Processing (IFIP) and held in Gdansk, Poland in September 2000.The contributions cover a wide range of topics, from 3G cellular systems to wireless Internet and WAP design to wireless LAN and ATM; from speech coding and antenna design to teletraffic modelling and protocol evaluation. The book is thus essential reading for theoreticians and engineers interested in the current progress in wireless systems, as well as for IT students and researchers.
This book is the first attempt to bring together current research findings in the domain of interactive horizontal displays. The novel compilation will integrate and summarise findings from the most important international tabletop research teams. It will provide a state-of-the art overview of this research domain and therefore allow for discussion of emerging and future directions in research and technology of interactive horizontal displays. Latest advances in interaction and software technologies and their increasing availability beyond research labs, refuels the interest in interactive horizontal displays. In the early 1990s Mark Weiser's vision of Ubiquitous Computing redefined the notion of Human Computer Interaction. Interaction was no longer considered to happen only with standard desktop computers but also with elements of their environment. This book is structured in three major areas: 'under', 'on/above' and 'around' tabletops. These areas are associated with different research disciplines such as Hardware/Software and Computer Science, Human Computer Interaction (HCI) and Computer Supported Collaborative Work (CSCW). However, the comprehensive and compelling presentation of the topic of the book results from its interdisciplinary character. The book addresses fellow researchers who are interested in this domain and practitioners considering interactive tabletops in real-world projects. It will also be a useful introduction into tabletop research that can be used for the academic curriculum.
This book constitutes the thoroughly refereed proceedings of the 2011 ICSOC Workshops consisting of 5 scientific satellite events, organized in 4 tracks: workshop track (WESOA 2011; NFPSLAM-SOC 2011), PhD symposium track, demonstration track, and industry track; held in conjunction with the 2011 International Conference on Service-Oriented Computing (ICSOC), in Paphos, Greece, December 2011. The 39 revised papers presented together with 2 introductory descriptions address topics such as software engineering services; the management of service level agreements; Web services and service composition; general or domain-specific challenges of service-oriented computing and its transition towards cloud computing; architecture and modeling of services; workflow management; performance analysis as well as crowdsourcing for improving service processes and for knowledge discovery.
This book constitutes the refereed proceedings of the 13th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2012, held in Canterbury, UK, in September 2012. The 6 revised full papers presented together with 8 short papers, 8 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 43 submissions. The papers are organized in topical sections on image and handwriting analysis, authentication and performance, biometrics, forensics and watermarking, and communications security.
This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013. The 43 papers included in the book were carefully reviewed and selected from 242 papers. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together researchers in this area, by promoting the exchange of ideas with system developers and by encouraging links with researchers in related areas. The papers cover all topics related to security, privacy and trust in computer systems and networks.
This book constitutes the joint refereed proceedings of the 13 International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking, NEW2AN, and the 6th Conference on Internet of Things and Smart Spaces, ruSMART 2013, held in St. Petersburg, Russia, in August 2013. The total of 38 papers was carefully reviewed and selected for inclusion in this book. The 14 papers selected from ruSMART are organized in topical sections named: internet on things, smart spaces technologies; and smart systems. The 24 papers from NEW2AN deal with the following topics: performance and efficiency analysis, network and transport layer issues; cognitive radio networks; sensor and mesh networks; upper layer protocols and applications; ad-hoc, cellular and satellite networks.
MotionCast for Mobile Wireless Networks provides an overview on the research for mobile ad-hoc networks regarding capacity and connectivity. Wireless ad-hoc networks are useful when there is a lack of infrastructure for communication. The proposed notion "MotionCast" is for the capacity analysis of multicast in MANET. A new kind of connectivity (k;m)-connectivity, is also defined, and its critical transmission range for i.i.d. (independently and identically distributed) and random walk mobility models are derived respectively. This book also investigates the related issues of connectivity in mobile and static circumstances. In addition, it provides a survey of the capacity scaling research, which gives a good summary of this field.
A re-working of C.D. Chaffee's previously published The Rewiring of America (Academia, 1988), this professional book describes the fiber optics revolution. There have been many changes in the fiber optics field since the book's first publication. These include advances in optical networking; the additional bandwidth created by the Internet and associated data services; liberalization of the global telecommunications industry; and the rewiring of the world's oceans with fiber optics. Building the Global Fiber Optics Superhighway details all these developments. C.D. Chaffee writes: 'One thing is clear: as our networks become primarily data-driven, they need to be built differently, to be able to handle data first, but also voice. It is a different way of looking at the world.'
This book constitutes the revised selected papers of the First International Conference on Networked Systems, NETYS 2013, held in Marrakech, Morocco, in May 2013. The 33 papers (17 regular and 16 short papers) presented were carefully reviewed and selected from 74 submissions. They address major topics from theory and practice of networked systems: multi-core architectures, middleware, environments, storage clusters, as well as peer-to-peer, sensor, wireless, and mobile networks.
This book constitutes the refereed proceedings of the International Conference on Advances in Security of Information and Communication Networks, Sec Net 2013, held in Cairo, Egypt, in September 2013. The 21 revised full papers presented were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on networking security; data and information security; authentication and privacy; security applications. "
This book constitutes the refereed proceedings of the 8th International Workshop on Security, IWSEC 2013, held in Okinawa, Japan, in November 2013. The 20 revised selected papers presented in this volume were carefully reviewed and selected from 63 submissions. They are organized in topical sections named: software and system security, cryptanalysis, privacy and cloud computing, public key cryptosystems, and security protocols.
In the last few years the subject of optical cornmunications has moved rapidly from being a promising research area to a practical reality already being installed and carrying traffic in trunk networks in many countries. At the same time new applications for fibre technology are emerging and are placing new demands on the system components. In telecommunications there is a steady increase of interest in the use of fibres for undersea cables, in local area networks and wideband links, and a little further ahead the possibility of coherent communications systems. With an optical carrier bandwidth of 200 THz, today's maximum bit rates of the order of Gb s-l do not approach the limits of the medium, and questions about the ultimate limits of optical communications are already being asked. On a different front, the rapid advance of fibre sensors, previously drawing heavily on the communications technology, is becoming a major driving force in the development of fibres and other components. This picture of dramatic growth in optical technology gives rise to other phenomena. A profusion of small companies mushrooms to meet the demands of specific market areas, each such company formed around a nucleus of experienced personnel from the established research groups. Multi- nationals jostle for position in the optoelectronics marketplace and price wars develop as fibre costs fall. University groups expand with government and industrial funding in attempts to maintain long-term research options and produce trained personnei."
This book focuses on emerging issues in power-aware portable multimedia communications devices beyond low-power electronic design. It compiles system-level power management approaches, from theoretical and simulation studies to experimental test beds related to low power computing, mobile communication and networking.
This book and its companion volume, LNCS vols. 7331 and 7332, constitute the proceedings of the Third International Conference on Swarm Intelligence, ICSI 2012, held in Shenzhen, China in June 2012. The 145 revised full papers presented were carefully reviewed and selected from 247 submissions. The papers are organized in 27 cohesive sections covering all major topics of swarm intelligence research and developments.
This book constitutes the refereed proceedings of the 14th International Conference on Coordination Models and Languages, COORDINATION 2012, held in Stockholm, Sweden, in June 2012, as one of the DisCoTec 2012 events. The 18 revised full papers presented were carefully reviewed and selected from 55 submissions. The papers cover a wide range of topics including coordination of social collaboration processes, coordination of mobile systems in peer-to-peer and ad-hoc networks, programming and reasoning about distributed and concurrent software, types, contracts, synchronization, coordination patterns, and families of distributed systems.
In Ambient Intelligence (AmI) systems, reasoning is fundamental for triggering actions or adaptations according to specific situations that may be meaningful and relevant to some applications. However, such reasoning operations may need to evaluate context data collected from distributed sources and stored in different devices, as usually not all context data is readily available to the reasoners within the system. Decentralized Reasoning in Ambient Intelligence proposes a decentralized reasoning approach for performing rule-based reasoning about context data targeting AmI systems. For this purpose, the authors define a context model assuming context data distributed over two sides: the user side, represented by the users and their mobile devices, and the ambient side, represented by the fixed computational infrastructure and ambient services. They formalize the cooperative reasoning operation - in which two entities cooperate to perform decentralized rule-based reasoning - and define a complete process to perform this operation.
This book constitutes the refereed post-proceedings of the Joint International Semantic Technology Conference, JIST 2011, held in Hangzhou, China, in December 2011. This conference is a joint event for regional semantic Web related conferences. JIST 2011 brings together the Asian Semantic Web Conference 2011 and the Chinese Semantic Web Conference 2011. The 21 revised full papers presented together with 12 short papers were carefully reviewed and selected from 82 submissions. The papers cover a wide range of topics in disciplines related to semantic technology including applications of the semantic Web, management of semantic Web data, ontology and reasoning, social semantic Web, and user interfaces to the semantic Web.
The advances in sensor design have decreased the size, weight, and cost of sensors by orders of magnitude, yet with the increase of higher spatial and temporal re- lution and accuracy. With the fast progress of sensors design and communications technique, sensor networks have also been quickly evolving in both research and practical domains in the last decade. More and more sensor networks have been - ployed in real-world to gather information for our daily life. Applications of sensor networks can be found in battle?eld surveillance, environmental monitoring, b- logical detection, smart spaces, industrial diagnostics, etc. Although the technique of sensor networks has a very promising future, many challenges are still deserving lots of research efforts for its successful applications. Thisbookisdevotedtocoveragecontrol,oneofthemostfundamentalandimportant research issues in sensor networks. The aim of the book is to provide tutorial-like and up-to-date reference resources on various coverage control problems in sensor networks, a hot topic that has been intensively researched in recent years. Due to some unique characteristics of sensor networks such as energy constraint and - hoc topology, the coverage problems in sensor networks have many new scenarios and features that entitle them an important research issue in recent years. I have done my best to include in the book the most recent advances, techniques, protocols, results, and ?ndings in this ?eld.
This book constitutes the refereed proceedings of the 14th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems, FMOODS 2012, and the 32nd IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems, FORTE 2012, held in Stockholm, Sweden, in June 2012, as one of the DisCoTec 2012 events. The 16 revised full papers presented were carefully reviewed and selected from 42 submissions. They cover a wide range of topics combining theory and practice in application areas of telecommunication services, Internet, embedded and real-time systems, networking and communication security and reliability, sensor networks, service-oriented architecture, and Web services.
This book constitutes the refereed proceedings of the 6th International Conference on Internet and Distributed Computing Systems, IDCS 2013, held in Hangzhou, China, in October 2013. The 20 revised full papers and 13 invited papers presented were carefully reviewed and selected from numerous submissions. The papers cover the following topics: ad-hoc and sensor networks, internet and Web technologies, network operations and management, information infrastructure; resilience, as well as fault tolerance and availability. |
You may like...
Design and Implementation of Practical…
Akshay Kumar, Ahmed Abdelhadi, …
Hardcover
R2,663
Discovery Miles 26 630
Fault Tolerant Architectures for…
Sikhar Patranabis, Debdeep Mukhopadhyay
Hardcover
R3,802
Discovery Miles 38 020
Structured Peer-to-Peer Systems…
Dmitry Korzun, Andrei Gurtov
Hardcover
Frontier and Innovation in Future…
James J (Jong Hyuk) Park, Albert Zomaya, …
Hardcover
R7,867
Discovery Miles 78 670
Handbook of Multimedia Information…
Amit Kumar Singh, Anand Mohan
Hardcover
R6,633
Discovery Miles 66 330
Robust Resource Allocation in Future…
Saeedeh Parsaeefard, Ahmad Reza Sharafat, …
Hardcover
R4,326
Discovery Miles 43 260
|