![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > Network computers
This book constitutes the refereed proceedings of the 7th European Conference on Technology Enhanced Learning, EC-TEL 2012, held in Saarbrucken, Germany, in September 2012. The 26 revised full papers presented were carefully reviewed and selected from 130 submissions. The book also includes 12 short papers, 16 demonstration papers, 11 poster papers, and 1 invited paper. Specifically, the programme and organizing structure was formed through the themes: mobile learning and context; serious and educational games; collaborative learning; organisational and workplace learning; learning analytics and retrieval; personalised and adaptive learning; learning environments; academic learning and context; and, learning facilitation by semantic means.
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security, CANS 2013, held in Paraty, Brazil, in November 2013. The 18 revised full papers presented together with four invited talks were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on cryptanalysis, zero-knowledge protocols, distributed protocols, network security and applications, advanced cryptographic primitives, and verifiable computation.
This book constitutes the refereed proceedings of the 25th IFIP WG 6.1 International Conference on Testing Software and Systems, ICTSS 2013, held in Istanbul, Turkey, in November 2013. The 17 revised full papers presented together with 3 short papers were carefully selected from 68 submissions. The papers are organized in topical sections on model-based testing, testing timed and concurrent systems, test suite selection and effort estimation, tools and languages, and debugging.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Bio-Inspired Models of Network, Information, and Computing Systems (Bionetics). The event took place in the city of York, UK, in December 2011. Bionetics main objective is to bring bio-inspired paradigms into computer engineering and networking, and to enhance the fruitful interactions between these fields and biology. The papers of the conference were accepted in 2 categories: full papers and work-in progress. Full papers describe significant advances in the Bionetics field, while work-in-progress papers present an opportunity to discuss breaking research which is currently being evaluated. The topics are ranging from robotic coordination to attack detection in peer-to-peer networks, biological mechanisms including evolution, flocking and artificial immune systems, and nano-scale communication and networking.
The papers in this volume were presented at the Second Annual Work shop on Active Middleware Services and were selected for inclusion here by the Editors. The AMS workshop was organized with support from both the National Science Foundation and the CAT center at the Uni versity of Arizona, and was held in Pittsburgh, Pennsylvania, on August 1, 2000, in conjunction with the 9th IEEE International Symposium on High Performance Distributed Computing (HPDC-9). The explosive growth of Internet-based applications and the prolifer ation of networking technologies has been transforming most areas of computer science and engineering as well as computational science and commercial application areas. This opens an outstanding opportunity to explore new, Internet-oriented software technologies that will open new research and application opportunities not only for the multimedia and commercial world, but also for the scientific and high-performance computing applications community. Two emerging technologies - agents and active networks - allow increased programmability to enable bring ing new services to Internet based applications. The AMS workshop presented research results and working papers in the areas of active net works, mobile and intelligent agents, software tools for high performance distributed computing, network operating systems, and application pro gramming models and environments. The success of an endeavor such as this depends on the contributions of many individuals. We would like to thank Dr. Frederica Darema and the NSF for sponsoring the workshop.
Smart Networks comprises the proceedings of Smartnet'2002, the seventh conference on Intelligence in Networks, which was sponsored by the International Federation for Information Processing (IFIP) and organized by Working Group 6.7. It was held in Saariselka, Finland, in April 2002. The conference series closely reflects the developments in networking.
This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their personal profiles without disclosing the profiles. The PDF helps users forward data to their friends via multiple cooperative relay peers while preserving their identity and location privacy. The TSE enables users to locally share service reviews on the vendors such that users receive more valuable information about the services not only from vendors but also from their trusted social friends. The authors address both theoretic and practical aspects of these topics by introducing the system model, reviewing the related works, and presenting the solutions. Security and Privacy for Mobile Social Networks further provides the security analysis and the performance evaluation based on real-trace simulations. It also summarizes the future research directions for this rapidly growing area of research. The book will be valuable for researchers and practitioners who work with mobile social networks, communication platforms, wireless communication techniques, and internet applications. "Suitable for any type of reader as an introduction to the topic... The chapters are well motivated and presented... It is recommended for researchers." -ACM Computing Reviews, 21 July 2014
This book constitutes the thoroughly refereed post-conference proceedings of the First International Joint Conference on Advances in Signal Processing and Information Technology (SPIT 2011) and Recent Trends in Information Processing and Computing (IPC 2011) held in Amsterdam, The Netherlands, in December 2011. The 50 revised full papers presented were carefully selected from 298 submissions. Conference papers promote research and development activities in computer science, information technology, computational engineering, image and signal processing, and communication.
This book constitutes the refereed proceedings of the 18th EUNICE 2012 conference on information and communication technologies, held in Budapest, in August 2012. The 23 oral papers demostrated together with 15 poster presentations were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on radio communications, security, management, protocols and performance, algorithms, models, and simulations.
This book constitutes the thoroughly refereed proceedings of the 14th International Conference on Advanced Concepts for Intelligent Vision Systems, ACIVS 2012, held in Brno, Czech Republic, in September 2012. The 46 revised full papers were carefully selected from 81 submissions and deal with image analysis and computer vision with a focus on detection, recognition, tracking and identification.
The implementation of Enterprise Networks or e-Networking is of paramount importance for organisations. Enterprise-wide networking would warrant that the components of information architecture are organised to harness more out of the organisation's computing power on the desktop. This would also involve establishment of networks that link the various but important subsystems of the enterprise. Our firm belief is that in order to gain a competitive edge the organisations need knowledge and sound strategy. This conviction is particularly true today, considering the pressures from international competition, environmental concerns and complicated ethical issues. This book, entitled A Manager's Primer on e-Networking, negotiates the hyper dimensions of the Internet through stories from myriad of Web sites with its fluent presentation and simple but chronological organisation of topics highlighting numerous opportunities and providing a solid starting point not only for inexperienced entrepreneurs and managers but anyone interested in applying information technology in the business. I sincerely hope the book will help as well many small and medium size companies and organisations to launch corporate networking successfully in order to attain their strategic objectives. Rajiv Jayashankar, Ph. D.
In this work, the unique power measurement capabilities of the Cray XT architecture were exploited to gain an understanding of power and energy use, and the effects of tuning both CPU and network bandwidth. Modifications were made to deterministically halt cores when idle. Additionally, capabilities were added to alter operating P-state. At the application level, an understanding of the power requirements of a range of important DOE/NNSA production scientific computing applications running at large scale is gained by simultaneously collecting current and voltage measurements on the hosting nodes. The effects of both CPU and network bandwidth tuning are examined, and energy savings opportunities without impact on run-time performance are demonstrated. This research suggests that next-generation large-scale platforms should not only approach CPU frequency scaling differently, but could also benefit from the capability to tune other platform components to achieve more energy-efficient performance.
This book constitutes the refereed proceedings of the 26th International Symposium on Distributed Computing, DISC 2012, held in Salvador, Brazil, in October 2012. The 27 revised full papers presented together with 24 brief announcements were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections on shared memory, mobile agents and overlay networks, wireless and multiple access channel networks, dynamic networks, distributed graph algorithms, wireless and loosely connected networks, robots, and lower bounds and separation.
The International Workshop on "The Internet Challenge: Technology and Applications" is the fifth in a successful series of workshops that were established by Shanghai Jiao Tong University and Technische Universitat Berlin. The goal of those workshops is to bring together researchers from both universities in order to exchange research results achieved in common projects of the two partner universities or to present interesting new work that might lead to new cooperation. The series of workshops started in 1990 with the "International Workshop on Artificial Intelligence" and was continued with the "International Workshop on Advanced Software Technology" in 1994. Both workshops have been hosted by Shanghai Jiao Tong University. In 1998 the third workshop took place in Berlin. This "International Workshop on Communication Based Systems" was essentially based on results from the Graduiertenkolleg on Communication Based systems that was funded by the German Research Society (DFG) from 1991 to 2000. The fourth "International Workshop on Robotics and its Applications" was held in Shanghai in 2000 supported by VDIIVDE-GMA and GI.
This book constitutes the proceedings of the 27th International Symposium on Distributed Computing, DISC 2013, held in Jerusalem, Israel, in October 2013. The 27 full papers presented in this volume were carefully reviewed and selected from 142 submissions; 16 brief announcements are also included. The papers are organized in topical sections named: graph distributed algorithms; topology, leader election, and spanning trees; software transactional memory; shared memory executions; shared memory and storage; gossip and rumor; shared memory tasks and data structures; routing; radio networks and the SINR model; crypto, trust, and influence; and networking.
This book constitutes revised selected papers from the Conference on Energy Efficiency in Large Scale Distributed Systems, EE-LSDS, held in Vienna, Austria, in April 2013. It served as the final event of the COST Action IC0804 which started in May 2009. The 15 full papers presented in this volume were carefully reviewed and selected from 31 contributions. In addition, 7 short papers and 3 demo papers are included in this book. The papers are organized in sections named: modeling and monitoring of power consumption; distributed, mobile and cloud computing; HPC computing; wired and wireless networking; and standardization issues.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International ICST Conference on Personal Satellite Services, PSATS 2013, held in Toulouse, France, in June 2013. The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. They are grouped in the following topical sections: satellite for emergency and aero communication, satellite for networking, resource management, and air interface.
This book constitutes the refereed proceedings of the 6th International Conference on Internet and Distributed Computing Systems, IDCS 2013, held in Hangzhou, China, in October 2013. The 20 revised full papers and 13 invited papers presented were carefully reviewed and selected from numerous submissions. The papers cover the following topics: ad-hoc and sensor networks, internet and Web technologies, network operations and management, information infrastructure; resilience, as well as fault tolerance and availability.
The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge processing, which are core and hot topics in computer science. Since the 1990s, the Internet has become the main driving force behind application development in all domains. An increase in the demand for resource sharing across different sites connected through networks has led to an evolution of data- and knowledge-management systems from centralized systems to decentralized systems enabling large-scale distributed applications providing high scalability. Current decentralized systems still focus on data and knowledge as their main resource. Feasibility of these systems relies basically on P2P (peer-to-peer) techniques and the support of agent systems with scaling and decentralized control. Synergy between grids, P2P systems, and agent technologies is the key to data-and knowledge-centered systems in large-scale environments. This, the 10th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains seven full papers chosen following two additional rounds of reviewing from revised and extended versions of a selection of papers presented at DEXA 2012. Topics covered include formal modelling and verification of web services, incremental computation of skyline queries, the implication problem for XML keys, lossless data compression, declarative view selection methods, time awareness in recommender systems, and network data mining."
With the continuing success of Local Area Networks (IANs), there is an increasing demand to extend their capabilities towards higher data rates and wider areas. This, together with the progress in fiber-optic technology, has given rise to the so-called Metropolitan Area Networks (MANs). MANs can span much greater distances than current LAN s, and offer data rates on the order of hundreds of Megabits/sec (Mbps). The success of MANs is mainly due to the opportunity they provide to develop new networking products capable of providing high-speed commu nications between applications at competitive prices, which nonetheless give an adequate return on the manufacturers' investments. A major factor in of appropriate networking standards. achieving this goal is the availability Fiber Distributed Data Interface (FDDl) and Distributed Queue Dual Bus (DQDB) are the two standard technologies for MANs for which industrial products are already available. For this reason, this book focuses mainly on these two standards. Nowadays there are several books dealing with MANs, and these look mainly at FDDI (e.g., [2], [92], [118], [141]). These books focus primarily on the architectures and protocols, whereas they pay little attention to per formance analysis. Due to the capability of MANs to integrate services, a quantitative analysis of the Quality of Service (QoS) provided by these tech nologies is a relevant issue, and is thus covered in depth in this book.
This book constitutes the thoroughly refereed proceedings of the 18th International Conference, Euro-Par 2012, held in Rhodes Islands, Greece, in August 2012. The 75 revised full papers presented were carefully reviewed and selected from 228 submissions. The papers are organized in topical sections on support tools and environments; performance prediction and evaluation; scheduling and load balancing; high-performance architectures and compilers; parallel and distributed data management; grid, cluster and cloud computing; peer to peer computing; distributed systems and algorithms; parallel and distributed programming; parallel numerical algorithms; multicore and manycore programming; theory and algorithms for parallel computation; high performance network and communication; mobile and ubiquitous computing; high performance and scientific applications; GPU and accelerators computing.
This book constitutes the refereed proceedings of the Third International Conference on Information Technology in Bio- and Medical Informatics, ITBAM 2012, held in Vienna, Austria, September 2012, in conjunction with DEXA 2012. The 12 revised long papers and 3 revised short papers presented were carefully reviewed and selected from numerous submissions. The papers address the following topics: medical data mining and information retrieval; metadata models, prediction and mobile applications; systems biology and data mining in bioinformatics. The papers show how broad the spectrum of topics in applications of information technology to biomedical engineering and medical informatics is.
This book constitutes the refereed proceedings of the International RuleML Symposium, RuleML 2012, held in Montpellier, France, in August 2012 - collocated with the 20th biennial European Conference on Artificial Intelligence, ECAI 2012. The 14 full papers, 8 short papers and 2 track papers presented together with 2 keynote talks were carefully reviewed and selected from numerous submissions. The accepted papers address topics such as business rules and processes; rule-based event processing and reaction rules; rule-based policies and agents on the pragmatic web; rules and the semantic web; rule markup languages and rule interchange; and rule transformation, extraction and learning.
Like the 120 volt standard for electricity, the appearance of standards in network management heralds new opportunities for creativity and achievement. As one example, within the framework of these evolving standards, consider a system of local area networks connecting computing equipment from different vendors. A bridge 1qc. k:8 up because of a transient caused by a repeater failure. The result is a massive disconnecHon of virtual circuits. What is the role of the manager and the network management system in solving the problem? How does the vendor implement the solution? How does the user use it? What measurements should be made? How should they be displayed? How much of the diagnosis and correction should be automated? How does the solution change with different hardware and software? In the IEEE Communications Magazine, I recently reported a timely illustration in the area of problems in fault management. At the workshop hotel, "I was waiting for a room assignment at the reception desk, when my attendant left the counter for a moment. Upon returning, he took one look at his screen and whined an accusatory question at everyone in sight, 'Who logged out my terminal?' Who indeed! It wasn't any of us. It was the system.
This book constitutes the refereed proceedings of the 31st International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2012, held in Magdeburg, Germany, in September 2012. The 33 revised full papers presented were carefully reviewed and selected from more than 70 submissions. The papers are organized in topical sections on tools, risk analysis, testing, quantitative analysis, security, formal methods, aeronautic, automotive, and process. Also included are 4 case studies. |
You may like...
Unf*ck Yourself - Get Out Of Your Head…
Gary John Bishop
Paperback
(2)
Beyond Stoicism - A Guide To The Good…
Massimo Pigliucci, Gregory Lopez, …
Paperback
|