0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (6)
  • R250 - R500 (19)
  • R500+ (4,515)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

Physical-Layer Security for Cooperative Relay Networks (Hardcover, 1st ed. 2016): Yulong Zou, Jia Zhu Physical-Layer Security for Cooperative Relay Networks (Hardcover, 1st ed. 2016)
Yulong Zou, Jia Zhu
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

This book presents physical-layer security as a promising paradigm for achieving the information-theoretic secrecy required for wireless networks. It explains how wireless networks are extremely vulnerable to eavesdropping attacks and discusses a range of security techniques including information-theoretic security, artificial noise aided security, security-oriented beamforming, and diversity assisted security approaches. It also provides an overview of the cooperative relaying methods for wireless networks such as orthogonal relaying, non-orthogonal relaying, and relay selection.Chapters explore the relay-selection designs for improving wireless secrecy against eavesdropping in time-varying fading environments and a joint relay and jammer selection for wireless physical-layer security, where a relay is used to assist the transmission from the source to destination and a friendly jammer is employed to transmit an artificial noise for confusing the eavesdropper. Additionally, the security-reliability tradeoff (SRT) is mathematically characterized for wireless communications and two main relay-selection schemes, the single-relay and multi-relay selection, are devised for the wireless SRT improvement. In the single-relay selection, only the single best relay is chosen for assisting the wireless transmission, while the multi-relay selection invokes multiple relays for simultaneously forwarding the source transmission to the destination.Physical-Layer Security for Cooperative Relay Networks is designed for researchers and professionals working with networking or wireless security. Advanced-level students interested in networks, wireless, or privacy will also find this book a useful resource.

A Survey on Coordinated Power Management in Multi-Tenant Data Centers (Hardcover, 1st ed. 2018): Thant Zin Oo, Nguyen H. Tran,... A Survey on Coordinated Power Management in Multi-Tenant Data Centers (Hardcover, 1st ed. 2018)
Thant Zin Oo, Nguyen H. Tran, Shaolei Ren, Choong Seon Hong
R3,252 Discovery Miles 32 520 Ships in 12 - 17 working days

This book investigates the coordinated power management of multi-tenant data centers that account for a large portion of the data center industry. The authors include discussion of their quick growth and their electricity consumption, which has huge economic and environmental impacts. This book covers the various coordinated management solutions in the existing literature focusing on efficiency, sustainability, and demand response aspects. First, the authors provide a background on the multi-tenant data center covering the stake holders, components, power infrastructure, and energy usage. Then, each power management mechanism is described in terms of motivation, problem formulation, challenges and solution.

Wireless Sensors in Industrial Time-Critical Environments (Hardcover, 2014 ed.): Jose Cecilio, Pedro Furtado Wireless Sensors in Industrial Time-Critical Environments (Hardcover, 2014 ed.)
Jose Cecilio, Pedro Furtado
R3,217 Discovery Miles 32 170 Ships in 12 - 17 working days

This book introduces the fundamentals of DCS, and shows how to include wireless technology in their design while guaranteeing the desired operation characteristics. The text also presents insights and results gained from extensive practical experience in implementing and testing systems within a specific industrial setting. Features: examines the operations that the DCS implements, covering human-machine interfaces, diagnostics and maintenance interfaces, and controllers; discusses industrial control system and wireless network protocols; reviews scheduling in wireless sensor networks; describes a latency model for heterogeneous DCS with wired and wireless parts, that predicts monitoring, command, and closed loop latencies; explains how to plan operation timings systematically; introduces measures and metrics for performance monitoring and debugging, and describes how to add these to a system; presents experimental results to validate the planning approach, based on an application test-bed.

Wireless Sensor Networks - Security, Coverage, and Localization (Hardcover, 1st ed. 2016): Rastko R. Selmic, Vir V Phoha, Abdul... Wireless Sensor Networks - Security, Coverage, and Localization (Hardcover, 1st ed. 2016)
Rastko R. Selmic, Vir V Phoha, Abdul Serwadda
R2,501 Discovery Miles 25 010 Ships in 12 - 17 working days

This book presents a comprehensive overview of wireless sensor networks (WSNs) with an emphasis on security, coverage, and localization. It offers a structural treatment of WSN building blocks including hardware and protocol architectures and also provides a systems-level view of how WSNs operate. These building blocks will allow readers to program specialized applications and conduct research in advanced topics. A brief introductory chapter covers common applications and communication protocols for WSNs. Next, the authors review basic mathematical models such as Voroni diagrams and Delaunay triangulations. Sensor principles, hardware structure, and medium access protocols are examined. Security challenges ranging from defense strategies to network robustness are explored, along with quality of service measures. Finally, this book discusses recent developments and future directions in WSN platforms. Each chapter concludes with classroom-tested exercises that reinforce key concepts. This book is suitable for researchers and for practitioners in industry. Advanced-level students in electrical engineering and computer science will also find the content helpful as a textbook or reference.

Information Technology in Disaster Risk Reduction - 4th IFIP TC 5 DCITDRR International Conference, ITDRR 2019, Kyiv, Ukraine,... Information Technology in Disaster Risk Reduction - 4th IFIP TC 5 DCITDRR International Conference, ITDRR 2019, Kyiv, Ukraine, October 9-10, 2019, Revised Selected Papers (Hardcover, 1st ed. 2020)
Yuko Murayama, Dimiter Velev, Plamena Zlateva
R1,487 Discovery Miles 14 870 Ships in 10 - 15 working days

This volume constitutes the refereed and revised post-conference proceedings of the 4th IFIP TC 5 DCITDRR International Conference on Information Technology in Disaster Risk Reduction, ITDRR 2019, in Kyiv, Ukraine, in October 2019. The 17 full papers and 2 short papers presented were carefully reviewed and selected from 53 submissions. The papers focus on various aspects and challenges of coping with disaster risk reduction. The main topics include areas such as natural disasters, big data, cloud computing, Internet of Things, mobile computing, emergency management, disaster information processing, and disaster risk assessment and management.

The GENI Book (Hardcover, 1st ed. 2016): Rick Mcgeer, Mark Berman, Chip Elliott, Robert Ricci The GENI Book (Hardcover, 1st ed. 2016)
Rick Mcgeer, Mark Berman, Chip Elliott, Robert Ricci
R2,932 Discovery Miles 29 320 Ships in 10 - 15 working days

This book, edited by four of the leaders of the National Science Foundation's Global Environment and Network Innovations (GENI) project, gives the reader a tour of the history, architecture, future, and applications of GENI. Built over the past decade by hundreds of leading computer scientists and engineers, GENI is a nationwide network used daily by thousands of computer scientists to explore the next Cloud and Internet and the applications and services they enable, which will transform our communities and our lives. Since by design it runs on existing computing and networking equipment and over the standard commodity Internet, it is poised for explosive growth and transformational impact over the next five years. Over 70 of the builders of GENI have contributed to present its development, architecture, and implementation, both as a standalone US project and as a federated peer with similar projects worldwide, forming the core of a worldwide network. Applications and services enabled by GENI, from smarter cities to intensive collaboration to immersive education, are discussed. The book also explores the concepts and technologies that transform the Internet from a shared transport network to a collection of "slices" -- private, on-the-fly application-specific nationwide networks with guarantees of privacy and responsiveness. The reader will learn the motivation for building GENI and the experience of its precursor infrastructures, the architecture and implementation of the GENI infrastructure, its deployment across the United States and worldwide, the new network applications and services enabled by and running on the GENI infrastructure, and its international collaborations and extensions. This book is useful for academics in the networking and distributed systems areas, Chief Information Officers in the academic, private, and government sectors, and network and information architects.

Network Coding at Different Layers in Wireless Networks (Hardcover, 1st ed. 2016): Yang Qin Network Coding at Different Layers in Wireless Networks (Hardcover, 1st ed. 2016)
Yang Qin
R3,983 R3,261 Discovery Miles 32 610 Save R722 (18%) Ships in 12 - 17 working days

This book focuses on how to apply network coding at different layers in wireless networks - including MAC, routing, and TCP - with special focus on cognitive radio networks. It discusses how to select parameters in network coding (e.g., coding field, number of packets involved, redundant information ration) in order to be suitable for the varying wireless environments. The author explores how to deploy network coding in MAC to improve network performance and examine joint network coding with opportunistic routing to improve the successful rate of routing. In regards to TCP and network coding, the author considers transport layer protocol working with network coding to overcome the transmission error rate, particularly with how to use the ACK feedback of TCP to enhance the efficiency of network coding. The book pertains to researchers and postgraduate students, especially whose interests are in opportunistic routing and TCP in cognitive radio networks.

Global Mobile Satellite Communications Applications - For Maritime, Land and Aeronautical Applications Volume 2 (Hardcover, 2nd... Global Mobile Satellite Communications Applications - For Maritime, Land and Aeronautical Applications Volume 2 (Hardcover, 2nd ed. 2018)
Stojce Dimov Ilcev
R5,911 Discovery Miles 59 110 Ships in 12 - 17 working days

This book discusses global mobile satellite communications (GMSC) for maritime, land (road and rail), and aeronautical applications. It covers how these enable connections between moving objects such as ships, road and rail vehicles and aircrafts on one hand, and ground telecommunications subscribers through the medium of communications satellites, ground earth stations, Terrestrial Telecommunication Networks (TTN), Internet Service Providers (ISP) and other wireless and landline telecommunications providers. The new edition covers new developments and initiatives that have resulted in land and aeronautical applications and the introduction of new satellite constellations in non-geostationary orbits and projects of new hybrid satellite constellations. The book presents current GMSC trends, mobile system concepts and network architecture using a simple mode of style with understandable technical information, characteristics, graphics, illustrations and mathematics equations. It represents telecommunications technique and technology, which can be useful for all technical staff on vessels at sea and rivers, on all types of land vehicles, on planes, on off shore constructions and for everyone possessing satellite communications handset phones. The first edition of Global Mobile Satellite Communications (Springer, 2005) was split into two books for the second edition - one on applications and one on theory. This book presents global mobile satellite communications applications.

Potential Game Theory - Applications in Radio Resource Allocation (Hardcover, 1st ed. 2016): Quang Duy La, Yong Huat Chew,... Potential Game Theory - Applications in Radio Resource Allocation (Hardcover, 1st ed. 2016)
Quang Duy La, Yong Huat Chew, Boon-Hee Soong
R3,679 R3,239 Discovery Miles 32 390 Save R440 (12%) Ships in 12 - 17 working days

This book offers a thorough examination of potential game theory and its applications in radio resource management for wireless communications systems and networking. The book addresses two major research goals: how to identify a given game as a potential game, and how to design the utility functions and the potential functions with certain special properties in order to formulate a potential game. After proposing a unifying mathematical framework for the identification of potential games, the text surveys existing applications of this technique within wireless communications and networking problems found in OFDMA 3G/4G/WiFi networks, as well as next-generation systems such as cognitive radios and dynamic spectrum access networks. Professionals interested in understanding the theoretical aspect of this specialized field will find Potential Game Theory a valuable resource, as will advanced-level engineering students. It paves the way for extensive and rigorous research exploration on a topic whose capacity for practical applications is vast but not yet fully exploited.

Wireless Sensors in Heterogeneous Networked Systems - Configuration and Operation Middleware (Hardcover, 2014 ed.): Jose... Wireless Sensors in Heterogeneous Networked Systems - Configuration and Operation Middleware (Hardcover, 2014 ed.)
Jose Cecilio, Pedro Furtado
R3,466 R1,807 Discovery Miles 18 070 Save R1,659 (48%) Ships in 12 - 17 working days

This book presents an examination of the middleware that can be used to configure and operate heterogeneous node platforms and sensor networks. The middleware requirements for a range of application scenarios are compared and analysed. The text then defines middleware architecture that has been integrated in an approach demonstrated live in a refinery. Features: presents a thorough introduction to the major concepts behind wireless sensor networks (WSNs); reviews the various application scenarios and existing middleware solutions for WSNs; discusses the middleware mechanisms necessary for heterogeneous WSNs; provides a detailed examination of platform-agnostic middleware architecture, including important implementation details; investigates the programming paradigms for WSNs, and for heterogeneous sensor networks in general; describes the results of extensive experimentation and testing, demonstrating that the generic architecture is viable for implementation on multiple platforms.

Advanced Multimedia and Ubiquitous Engineering - MUE/FutureTech 2019 (Hardcover, 1st ed. 2020): James J. Park, Laurence T.... Advanced Multimedia and Ubiquitous Engineering - MUE/FutureTech 2019 (Hardcover, 1st ed. 2020)
James J. Park, Laurence T. Yang, Young-Sik Jeong, Fei Hao
R6,218 Discovery Miles 62 180 Ships in 10 - 15 working days

This book presents the combined proceedings of the 13th International Conference on Multimedia and Ubiquitous Engineering (MUE 2019) and the 14th International Conference on Future Information Technology (Future Tech 2019), both held in Xi'an, China, April 24 - 26, 2019. The aim of these two meetings was to promote discussion and interaction among academics, researchers and professionals in the field of ubiquitous computing technologies. These proceedings reflect the state of the art in the development of computational methods, involving theory, algorithms, numerical simulation, error and uncertainty analysis and novel applications of new processing techniques in engineering, science, and other disciplines related to ubiquitous computing.

Management of Cyber Physical Objects in the Future Internet of Things - Methods, Architectures and Applications (Hardcover, 1st... Management of Cyber Physical Objects in the Future Internet of Things - Methods, Architectures and Applications (Hardcover, 1st ed. 2016)
Antonio Guerrieri, Valeria Loscri, Anna Rovella, Giancarlo Fortino
R3,969 R3,248 Discovery Miles 32 480 Save R721 (18%) Ships in 12 - 17 working days

This book focuses on new methods, architectures, and applications for the management of Cyber Physical Objects (CPOs) in the context of the Internet of Things (IoT). It covers a wide range of topics related to CPOs, such as resource management, hardware platforms, communication and control, and control and estimation over networks. It also discusses decentralized, distributed, and cooperative optimization as well as effective discovery, management, and querying of CPOs. Other chapters outline the applications of control, real-time aspects, and software for CPOs and introduce readers to agent-oriented CPOs, communication support for CPOs, real-world deployment of CPOs, and CPOs in Complex Systems. There is a focus on the importance of application of IoT technologies for Smart Cities.

Advances in Computer Science and Ubiquitous Computing - CSA-CUTE 2018 (Hardcover, 1st ed. 2020): James J. Park, Doo-Soon Park,... Advances in Computer Science and Ubiquitous Computing - CSA-CUTE 2018 (Hardcover, 1st ed. 2020)
James J. Park, Doo-Soon Park, Young-Sik Jeong, Yi Pan
R5,566 Discovery Miles 55 660 Ships in 10 - 15 working days

This book presents the combined proceedings of the 10th International Conference on Computer Science and its Applications (CSA 2018) and the 13th KIPS International Conference on Ubiquitous Information Technologies and Applications (CUTE 2018), both held in Kuala Lumpur, Malaysia, Dec 17 - 19, 2018. The aim of these two meetings was to promote discussion and interaction among academics, researchers and professionals in the field of ubiquitous computing technologies. These proceedings reflect the state of the art in the development of computational methods, involving theory, algorithms, numerical simulation, error and uncertainty analysis and novel applications of new processing techniques in engineering, science, and other disciplines related to ubiquitous computing.

Advances in Parallel and Distributed Computing and Ubiquitous Services - UCAWSN & PDCAT 2015 (Hardcover, 1st ed. 2016): James J... Advances in Parallel and Distributed Computing and Ubiquitous Services - UCAWSN & PDCAT 2015 (Hardcover, 1st ed. 2016)
James J (Jong Hyuk) Park, Gangman Yi, Young-Sik Jeong, Hong Shen
R3,768 R3,329 Discovery Miles 33 290 Save R439 (12%) Ships in 12 - 17 working days

This book contains the combined proceedings of the 4th International Conference on Ubiquitous Computing Application and Wireless Sensor Network (UCAWSN-15) and the 16th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT-15). The combined proceedings present peer-reviewed contributions from academic and industrial researchers in fields including ubiquitous and context-aware computing, context-awareness reasoning and representation, location awareness services, and architectures, protocols and algorithms, energy, management and control of wireless sensor networks. The book includes the latest research results, practical developments and applications in parallel/distributed architectures, wireless networks and mobile computing, formal methods and programming languages, network routing and communication algorithms, database applications and data mining, access control and authorization and privacy preserving computation.

Cyber Threat Intelligence (Hardcover, 1st ed. 2018): Ali Dehghantanha, Mauro Conti, Tooska Dargahi Cyber Threat Intelligence (Hardcover, 1st ed. 2018)
Ali Dehghantanha, Mauro Conti, Tooska Dargahi
R4,384 Discovery Miles 43 840 Ships in 12 - 17 working days

This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices. This book also provides the technical information on cyber-threat detection methods required for the researcher and digital forensics experts, in order to build intelligent automated systems to fight against advanced cybercrimes. The ever increasing number of cyber-attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost real-time, and with such a large number of attacks is not possible without deeply perusing the attack features and taking corresponding intelligent defensive actions - this in essence defines cyber threat intelligence notion. However, such intelligence would not be possible without the aid of artificial intelligence, machine learning and advanced data mining techniques to collect, analyze, and interpret cyber-attack campaigns which is covered in this book. This book will focus on cutting-edge research from both academia and industry, with a particular emphasis on providing wider knowledge of the field, novelty of approaches, combination of tools and so forth to perceive reason, learn and act on a wide range of data collected from different cyber security and forensics solutions. This book introduces the notion of cyber threat intelligence and analytics and presents different attempts in utilizing machine learning and data mining techniques to create threat feeds for a range of consumers. Moreover, this book sheds light on existing and emerging trends in the field which could pave the way for future works. The inter-disciplinary nature of this book, makes it suitable for a wide range of audiences with backgrounds in artificial intelligence, cyber security, forensics, big data and data mining, distributed systems and computer networks. This would include industry professionals, advanced-level students and researchers that work within these related fields.

Cybersecurity Risk of IoT on Smart Cities (Hardcover, 1st ed. 2021): Roberto O. Andrade, Luis Tello-Oquendo, Ivan Ortiz Cybersecurity Risk of IoT on Smart Cities (Hardcover, 1st ed. 2021)
Roberto O. Andrade, Luis Tello-Oquendo, Ivan Ortiz
R3,483 Discovery Miles 34 830 Ships in 10 - 15 working days

This book covers the topics on cyber security in IoT systems used in different verticals such as agriculture, health, homes, transportation within the context of smart cities. The authors provide an analysis of the importance of developing smart cities by incorporating technologies such as IoT to achieve the sustainable development goals (SDGs) within the agenda 2030. Furthermore, it includes an analysis of the cyber security challenges generated by IoT systems due to factors such as heterogeneity, lack of security in design and few hardware resources in these systems, and how they should be addressed from a risk analysis approach, evaluating the risk analysis methodologies widely used in traditional IT systems.

Security in Wireless Sensor Networks (Hardcover, 1st ed. 2015): George S. Oreku, Tamara Pazynyuk Security in Wireless Sensor Networks (Hardcover, 1st ed. 2015)
George S. Oreku, Tamara Pazynyuk
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

This monograph covers different aspects of sensor network security including new emerging technologies. The authors present a mathematical approach to the topic and give numerous practical examples as well as case studies to illustrate the theory. The target audience primarily comprises experts and practitioners in the field of sensor network security, but the book may also be beneficial for researchers in academia as well as for graduate students.

Technological Innovation for Cyber-Physical Systems - 7th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing,... Technological Innovation for Cyber-Physical Systems - 7th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2016, Costa de Caparica, Portugal, April 11-13, 2016, Proceedings (Hardcover, 1st ed. 2016)
Luis M. Camarinha-Matos, Antonio J Falcao, Nazanin Vafaei, Shirin Najdi
R2,902 Discovery Miles 29 020 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2016, held in Costa de Caparica, Portugal, in April 2016. The 53 revised full papers were carefully reviewed and selected from 112 submissions. The papers present selected results produced in engineering doctoral programs and focus on research, development, and application of cyber-physical systems. Research results and ongoing work are presented, illustrated and discussed in the following areas: enterprise collaborative networks; ontologies; Petri nets; manufacturing systems; biomedical applications; intelligent environments; control and fault tolerance; optimization and decision support; wireless technologies; energy: smart grids, renewables, management, and optimization; bio-energy; and electronics.

Hardware Based Packet Classification for High Speed Internet Routers (Hardcover, 2010 ed.): Chad R. Meiners, Alex X. Liu, Eric... Hardware Based Packet Classification for High Speed Internet Routers (Hardcover, 2010 ed.)
Chad R. Meiners, Alex X. Liu, Eric Torng
R2,862 Discovery Miles 28 620 Ships in 10 - 15 working days

Hardware Based Packet Classification for High Speed Internet Routers presents the most recent developments in hardware based packet classification algorithms and architectures. This book describes five methods which reduce the space that classifiers occupy within TCAMs; TCAM Razor, All-Match Redundancy Removal, Bit Weaving, Sequential Decomposition, and Topological Transformations. These methods demonstrate that in most cases a substantial reduction of space is achieved. Case studies and examples are provided throughout this book. About this book: * Presents the only book in the market that exclusively covers hardware based packet classification algorithms and architectures. * Describes five methods which reduce the space that classifiers occupy within TCAMs: TCAM Razor, All-Match Redundancy Removal, Bit Weaving, Sequential Decomposition, and Topological Transformations. * Provides case studies and examples throughout. Hardware Based Packet Classification for High Speed Internet Routers is designed for professionals and researchers who work within the related field of router design. Advanced-level students concentrating on computer science and electrical engineering will also find this book valuable as a text or reference book.

Cybersecurity Systems for Human Cognition Augmentation (Hardcover, 2014 ed.): Robinson E. Pino, Alexander Kott, Michael... Cybersecurity Systems for Human Cognition Augmentation (Hardcover, 2014 ed.)
Robinson E. Pino, Alexander Kott, Michael Shevenell
R4,042 R3,297 Discovery Miles 32 970 Save R745 (18%) Ships in 12 - 17 working days

This book explores cybersecurity research and development efforts, including ideas that deal with the growing challenge of how computing engineering can merge with neuroscience. The contributing authors, who are renowned leaders in this field, thoroughly examine new technologies that will automate security procedures and perform autonomous functions with decision making capabilities. To maximize reader insight into the range of professions dealing with increased cybersecurity issues, this book presents work performed by government, industry, and academic research institutions working at the frontier of cybersecurity and network sciences. Cybersecurity Systems for Human Cognition Augmentation is designed as a reference for practitioners or government employees working in cybersecurity. Advanced-level students or researchers focused on computer engineering or neuroscience will also find this book a useful resource.

Audio Watermark - A Comprehensive Foundation Using MATLAB (Hardcover, 2015 ed.): Yiqing Lin, Waleed H. Abdulla Audio Watermark - A Comprehensive Foundation Using MATLAB (Hardcover, 2015 ed.)
Yiqing Lin, Waleed H. Abdulla
R4,322 R3,319 Discovery Miles 33 190 Save R1,003 (23%) Ships in 12 - 17 working days

This book illustrates the commonly used and novel approaches of audio watermarking for copyrights protection. The author examines the theoretical and practical step by step guide to the topic of data hiding in audio signal such as music, speech, broadcast. The book covers new techniques developed by the authors are fully explained and MATLAB programs, for audio watermarking and audio quality assessments and also discusses methods for objectively predicting the perceptual quality of the watermarked audio signals.Explains the theoretical basics of the commonly used audio watermarking techniquesDiscusses the methods used to objectively and subjectively assess the quality of the audio signalsProvides a comprehensive well tested MATLAB programs that can be used efficiently to watermark any audio media

Reliability, Availability and Serviceability of Networks-on-Chip (Hardcover, 2012): Erika Cota, Alexandre de Morais Amory,... Reliability, Availability and Serviceability of Networks-on-Chip (Hardcover, 2012)
Erika Cota, Alexandre de Morais Amory, Marcelo Soares Lubaszewski
R2,799 Discovery Miles 27 990 Ships in 10 - 15 working days

This book presents an overview of the issues related to the test, diagnosis and fault-tolerance of Network on Chip-based systems. It is the first book dedicated to the quality aspects of NoC-based systems and will serve as an invaluable reference to the problems, challenges, solutions, and trade-offs related to designing and implementing state-of-the-art, on-chip communication architectures.

Network Science - Complexity in Nature and Technology (Hardcover, 2010): Ernesto Estrada, Maria Fox, Desmond J. Higham,... Network Science - Complexity in Nature and Technology (Hardcover, 2010)
Ernesto Estrada, Maria Fox, Desmond J. Higham, Gian-Luca Oppo
R2,935 Discovery Miles 29 350 Ships in 10 - 15 working days

Network Science is the emerging field concerned with the study of large, realistic networks. This interdisciplinary endeavor, focusing on the patterns of interactions that arise between individual components of natural and engineered systems, has been applied to data sets from activities as diverse as high-throughput biological experiments, online trading information, smart-meter utility supplies, and pervasive telecommunications and surveillance technologies. This unique text/reference provides a fascinating insight into the state of the art in network science, highlighting the commonality across very different areas of application and the ways in which each area can be advanced by injecting ideas and techniques from another. The book includes contributions from an international selection of experts, providing viewpoints from a broad range of disciplines. It emphasizes networks that arise in nature-such as food webs, protein interactions, gene expression, and neural connections-and in technology-such as finance, airline transport, urban development and global trade. Topics and Features: begins with a clear overview chapter to introduce this interdisciplinary field; discusses the classic network science of fixed connectivity structures, including empirical studies, mathematical models and computational algorithms; examines time-dependent processes that take place over networks, covering topics such as synchronisation, and message passing algorithms; investigates time-evolving networks, such as the World Wide Web and shifts in topological properties (connectivity, spectrum, percolation); explores applications of complex networks in the physical and engineering sciences, looking ahead to new developments in the field. Researchers and professionals from disciplines as varied as computer science, mathematics, engineering, physics, chemistry, biology, ecology, neuroscience, epidemiology, and the social sciences will all benefit from this topical and broad overview of current activities and grand challenges in the unfolding field of network science.

Structured Peer-to-Peer Systems - Fundamentals of Hierarchical Organization, Routing, Scaling, and Security (Hardcover, 2013... Structured Peer-to-Peer Systems - Fundamentals of Hierarchical Organization, Routing, Scaling, and Security (Hardcover, 2013 ed.)
Dmitry Korzun, Andrei Gurtov
R4,198 R3,477 Discovery Miles 34 770 Save R721 (17%) Ships in 12 - 17 working days

The field of structured P2P systems has seen fast growth upon the introduction of Distributed Hash Tables (DHTs) in the early 2000s. The first proposals, including Chord, Pastry, Tapestry, were gradually improved to cope with scalability, locality and security issues. By utilizing the processing and bandwidth resources of end users, the P2P approach enables high performance of data distribution which is hard to achieve with traditional client-server architectures. The P2P computing community is also being actively utilized for software updates to the Internet, P2PSIP VoIP, video-on-demand, and distributed backups. The recent introduction of the identifier-locator split proposal for future Internet architectures poses another important application for DHTs, namely mapping between host permanent identity and changing IP address. The growing complexity and scale of modern P2P systems requires the introduction of hierarchy and intelligence in routing of requests.

"Structured Peer-to-Peer Systems" covers fundamental issues in organization, optimization, and tradeoffs of present large-scale structured P2P systems, as well as, provides principles, analytical models, and simulation methods applicable in designing future systems. Part I presents the state-of-the-art of structured P2P systems, popular DHT topologies and protocols, and the design challenges for efficient P2P network topology organization, routing, scalability, and security. Part II shows that local strategies with limited knowledge per peer provide the highest scalability level subject to reasonable performance and security constraints. Although the strategies are local, their efficiency is due to elements of hierarchical organization, which appear in many DHT designs that traditionally are considered as flat ones. Part III describes methods to gradually enhance the local view limit when a peer is capable to operate with larger knowledge, still partial, about the entire system. These methods were formed in the evolution of hierarchical organization from flat DHT networks to hierarchical DHT architectures, look-ahead routing, and topology-aware ranking. Part IV highlights some known P2P-based experimental systems and commercial applications in the modern Internet. The discussion clarifies the importance of P2P technology for building present and future Internet systems."

Body Sensor Networks (Hardcover, 2nd ed. 2014): Guang-Zhong Yang Body Sensor Networks (Hardcover, 2nd ed. 2014)
Guang-Zhong Yang
R3,124 Discovery Miles 31 240 Ships in 10 - 15 working days

The last decade has witnessed a rapid surge of interest in new sensing and monitoring devices for wellbeing and healthcare. One key development in this area is wireless, wearable and implantable "in vivo" monitoring and intervention. A myriad of platforms are now available from both academic institutions and commercial organisations. They permit the management of patients with both acute and chronic symptoms, including diabetes, cardiovascular diseases, treatment of epilepsy and other debilitating neurological disorders. Despite extensive developments in sensing technologies, there are significant research issues related to system integration, sensor miniaturisation, low-power sensor interface, wireless telemetry and signal processing.

In the 2nd edition of this popular and authoritative reference on Body Sensor Networks (BSN), major topics related to the latest technological developments and potential clinical applications are discussed, with contents covering.

Biosensor Design, Interfacing and Nanotechnology

Wireless Communication and Network Topologies

Communication Protocols and Standards

Energy Harvesting and Power Delivery

Ultra-low Power Bio-inspired Processing

Multi-sensor Fusion and Context Aware Sensing

Autonomic Sensing

Wearable, Ingestible Sensor Integration and Exemplar Applications

System Integration and Wireless Sensor Microsystems

The book also provides a comprehensive review of the current wireless sensor development platforms and a step-by-step guide to developing your own BSN applications through the use of BSN development kit.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Industrial IoT - Challenges, Design…
Ismail Butun Hardcover R4,586 Discovery Miles 45 860
6G Mobile Wireless Networks
Yulei Wu, Sukhdeep Singh, … Hardcover R4,610 Discovery Miles 46 100
Advances in Wireless Communications and…
Roumen Kountchev, Aniket Mahanti, … Hardcover R4,250 Discovery Miles 42 500
Algorithms for Data and Computation…
Alex X. Liu, Rui Li Hardcover R3,643 Discovery Miles 36 430
Artificial Intelligence Applications and…
Ilias Maglogiannis, John MacIntyre, … Hardcover R3,363 Discovery Miles 33 630
Smart and Sustainable Collaborative…
Luis M. Camarinha-Matos, Xavier Boucher, … Hardcover R6,332 Discovery Miles 63 320
The Internet of Things in the Industrial…
Zaigham Mahmood Hardcover R3,955 Discovery Miles 39 550
Federated Learning for Wireless Networks
Choong Seon Hong, Latif U. Khan, … Hardcover R4,266 Discovery Miles 42 660
Research Trends in Graph Theory and…
Daniela Ferrero, Leslie Hogben, … Hardcover R3,259 Discovery Miles 32 590
Privacy-Preserving in Edge Computing
Longxiang Gao, Tom H. Luan, … Hardcover R3,937 Discovery Miles 39 370

 

Partners