0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (4)
  • R250 - R500 (18)
  • R500+ (4,502)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

Model and Data Engineering - 4th International Conference, MEDI 2014, Larnaca, Cyprus, September 24-26, 2014. Proceedings... Model and Data Engineering - 4th International Conference, MEDI 2014, Larnaca, Cyprus, September 24-26, 2014. Proceedings (Paperback, 2014 ed.)
Yamine Ait Ameur, Ladjel Bellatreche, George A Papadopoulos
R2,535 Discovery Miles 25 350 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 4th International Conference on Model and Data Engineering, MEDI 2014, held in Larnaca, Cyprus, in September 2014. The 16 long papers and 12 short papers presented together with 2 invited talks were carefully reviewed and selected from 64 submissions. The papers specifically focus on model engineering and data engineering with special emphasis on most recent and relevant topics in the areas of modeling and models engineering; data engineering; modeling for data management; and applications and tooling.

Computational Social Networks - Security and Privacy (Paperback, 2012 ed.): Ajith Abraham Computational Social Networks - Security and Privacy (Paperback, 2012 ed.)
Ajith Abraham
R2,948 Discovery Miles 29 480 Ships in 10 - 15 working days

This book is the second of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class experts, concentrating on topics relating to security and privacy (the other two volumes review Tools, Perspectives, and Applications, and Mining and Visualization in CSNs). Topics and features: presents the latest advances in security and privacy issues in CSNs, and illustrates how both organizations and individuals can be protected from real-world threats; discusses the design and use of a wide range of computational tools and software for social network analysis; describes simulations of social networks, and the representation and analysis of social networks, with a focus on issues of security, privacy, and anonymization; provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology.

Software Engineering and Formal Methods - 12th International Conference, SEFM 2014, Grenoble, France, September 1-5, 2014,... Software Engineering and Formal Methods - 12th International Conference, SEFM 2014, Grenoble, France, September 1-5, 2014, Proceedings (Paperback, 2014 ed.)
Dimitra Giannakopoulou, Gwen Salaun
R2,712 Discovery Miles 27 120 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th International Conference on Software Engineering and Formal Methods, SEFM 2014, held in Grenoble, France, in September 2014. The 23 full papers presented together with 3 invited and 6 tool papers were carefully reviewed and selected from 106 submissions. They are organized in topical section on program verification, testing, component-based systems, real-time and embedded systems, model checking and automata learning, program correctness, and adaptive and multi-agent systems.

Software Architecture - 8th European Conference, ECSA 2014, Vienna, Austria, August 25-29, 2014, Proceedings (Paperback, 2014... Software Architecture - 8th European Conference, ECSA 2014, Vienna, Austria, August 25-29, 2014, Proceedings (Paperback, 2014 ed.)
Paris Avgeriou, Uwe Zdun
R1,578 Discovery Miles 15 780 Ships in 10 - 15 working days

This book constitutes the proceedings of the 8th European Conference on Software Architecture, ECSA 2014, held in Vienna, Austria, in August 2014. The 16 full papers and 18 short papers presented in this volume were carefully reviewed and selected from 91 submissions. They are organized in topical sections named: architecture decisions and knowledge; architecture patterns and anti-patterns; reference architectures and metamodels; architecture description languages; enterprise architecture, SOA and cloud computing; components and connectors; quality attributes; and architecture analysis and verification.

Multiple Access Communications - 7th International Workshop, MACOM 2014, Halmstad, Sweden, August 27-28, 2014, Proceedings... Multiple Access Communications - 7th International Workshop, MACOM 2014, Halmstad, Sweden, August 27-28, 2014, Proceedings (Paperback, 2014 ed.)
Magnus Jonsson, Alexey Vinel, Boris Bellalta, Evgeny Belyaev
R1,682 Discovery Miles 16 820 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th International Workshop on Multiple Access Communications, MACOM 2014, held in Halmstad, Sweden, in August 2014. The 12 full papers presented were carefully reviewed and selected from 22 submissions. They describe the latest advancements in the field of multiple access communications with an emphasis on reliability issues, physical layer techniques, cognitive radio, medium access control protocols, and video coding.

Euro-Par 2014: Parallel Processing - 20th International Conference, Porto, Portugal, August 25-29, 2014, Proceedings... Euro-Par 2014: Parallel Processing - 20th International Conference, Porto, Portugal, August 25-29, 2014, Proceedings (Paperback, 2014 ed.)
Fernando Silva, Ines Dutra, Vitor Santos Costa
R1,713 Discovery Miles 17 130 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 20th International Conference on Parallel and Distributed Computing, Euro-Par 2014, held in Porto, Portugal, in August 2014. The 68 revised full papers presented were carefully reviewed and selected from 267 submissions. The papers are organized in 15 topical sections: support tools environments; performance prediction and evaluation; scheduling and load balancing; high-performance architectures and compilers; parallel and distributed data management; grid, cluster and cloud computing; green high performance computing; distributed systems and algorithms; parallel and distributed programming; parallel numerical algorithms; multicore and manycore programming; theory and algorithms for parallel computation; high performance networks and communication; high performance and scientific applications; and GPU and accelerator computing.

Computational Science and Its Applications - ICCSA 2014 - 14th International Conference, Guimaraes, Portugal, June 30 - July 3,... Computational Science and Its Applications - ICCSA 2014 - 14th International Conference, Guimaraes, Portugal, June 30 - July 3, 204, Proceedings, Part I (Paperback, 2014 ed.)
Beniamino Murgante, Sanjay Misra, Ana Maria Alves Coutinho Rocha, Carmelo Torre, Jorge Gustavo Rocha, …
R3,100 Discovery Miles 31 000 Ships in 10 - 15 working days

The six-volume set LNCS 8579-8584 constitutes the refereed proceedings of the 14th International Conference on Computational Science and Its Applications, ICCSA 2014, held in Guimaraes, Portugal, in June/July 2014. The 347 revised papers presented in 30 workshops and a special track were carefully reviewed and selected from 1167 initial submissions. The 289 papers presented in the workshops cover various areas in computational science ranging from computational science technologies to specific areas of computational science such as computational geometry and security.

Computational Science and Its Applications - ICCSA 2014 - 14th International Conference, Guimaraes, Portugal, June 30 - July 3,... Computational Science and Its Applications - ICCSA 2014 - 14th International Conference, Guimaraes, Portugal, June 30 - July 3, 204, Proceedings, Part III (Paperback, 2014 ed.)
Beniamino Murgante, Sanjay Misra, Ana Maria Alves Coutinho Rocha, Carmelo Torre, Jorge Gustavo Rocha, …
R1,704 Discovery Miles 17 040 Ships in 10 - 15 working days

The six-volume set LNCS 8579-8584 constitutes the refereed proceedings of the 14th International Conference on Computational Science and Its Applications, ICCSA 2014, held in Guimaraes, Portugal, in June/July 2014. The 347 revised papers presented in 30 workshops and a special track were carefully reviewed and selected from 1167. The 289 papers presented in the workshops cover various areas in computational science ranging from computational science technologies to specific areas of computational science such as computational geometry and security.

Data Management in Cloud, Grid and P2P Systems - 7th International Conference, Globe 2014, Munich, Germany, September 2-3,... Data Management in Cloud, Grid and P2P Systems - 7th International Conference, Globe 2014, Munich, Germany, September 2-3, 2014. Proceedings (Paperback, 2014 ed.)
Abdelkader Hameurlain, Tran Khanh Dang, Franck Morvan
R1,517 Discovery Miles 15 170 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th International Conference on Data Management in Grid and Peer-to-Peer Systems, Globe 2014, held in Munich, Germany, in September 2014, in conjunction with DEXA 2014. The 7 revised full papers presented were carefully reviewed and selected from 14 submissions. The papers are organized in the following topical sections: query processing in cloud, grid, and P2P systems: optimization and recommendation; MapReduce framework: data privacy and similarity search; data management in grid systems: protocol and recovery failure.

Modelling Foundations and Applications - 10th European Conference, ECMFA 2014, Held as Part of STAF 2014, York, UK, July 21-25,... Modelling Foundations and Applications - 10th European Conference, ECMFA 2014, Held as Part of STAF 2014, York, UK, July 21-25, 2014. Proceedings (Paperback, 2014 ed.)
Jordi Cabot, Julia Rubin
R2,335 Discovery Miles 23 350 Ships in 10 - 15 working days

This book constitutes the proceedings of the 10th European Conference on Modelling Foundations and Applications, ECMFA 2014, held as part of STAF 2014, in York, UK, in July 2014. The 14 foundation track papers and the 3 applications track papers presented in this volume were carefully reviewed and selected from 58 submissions. They are on all aspects of MDE, including topics such as model provenance; model transformations and code generation; model synthesis; model-driven testing; formal modeling approaches; business modeling; and usability of models.

Computing and Combinatorics - 20th International Conference, COCOON 2014, Atlanta, GA, USA, August 4-6, 2014, Proceedings... Computing and Combinatorics - 20th International Conference, COCOON 2014, Atlanta, GA, USA, August 4-6, 2014, Proceedings (Paperback, 2014 ed.)
Zhipeng Cai, Alexander Zelikovsky, Anu Bourgeois
R1,662 Discovery Miles 16 620 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 20th International Conference on Computing and Combinatorics, COCOON 2014, held in Atlanta, GA, USA, in August 2014. The 51 revised full papers presented were carefully reviewed and selected from 110 submissions. There was a co-organized workshop on computational social networks (CSoNet 2014) where 8 papers were accepted. The papers cover the following topics: sampling and randomized methods; logic, algebra and automata; database and data structures; parameterized complexity and algorithms; computational complexity; computational biology and computational geometry; approximation algorithm; graph theory and algorithms; game theory and cryptography; scheduling algorithms and circuit complexity and CSoNet.

Time Division Multiple Access For Vehicular Communications (Paperback, 2014 ed.): Hassan Aboubakr Omar, Weihua Zhuang Time Division Multiple Access For Vehicular Communications (Paperback, 2014 ed.)
Hassan Aboubakr Omar, Weihua Zhuang
R1,722 Discovery Miles 17 220 Ships in 10 - 15 working days

This brief focuses on medium access control (MAC) in vehicular ad hoc networks (VANETs), and presents VeMAC, a novel MAC scheme based on distributed time division multiple access (TDMA) for VANETs. The performance of VeMAC is evaluated via mathematical analysis and computer simulations in comparison with other existing MAC protocols, including the IEEE 802.11p standard. This brief aims at proposing TDMA as a suitable MAC scheme for VANETs, which can support the quality-of-service requirements of high priority VANET applications.

Algorithms and Architectures for Parallel Processing - 14th International Conference, ICA3PP 2014, Dalian, China, August 24-27,... Algorithms and Architectures for Parallel Processing - 14th International Conference, ICA3PP 2014, Dalian, China, August 24-27, 2014. Proceedings, Part I (Paperback, 2014 ed.)
Xiang-he Sun, Wenyu Qu, Ivan Stojmenovic, Wanlei Zhou, Zhiyang Li, …
R1,715 Discovery Miles 17 150 Ships in 10 - 15 working days

This two volume set LNCS 8630 and 8631 constitutes the proceedings of the 14th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2014, held in Dalian, China, in August 2014. The 70 revised papers presented in the two volumes were selected from 285 submissions. The first volume comprises selected papers of the main conference and papers of the 1st International Workshop on Emerging Topics in Wireless and Mobile Computing, ETWMC 2014, the 5th International Workshop on Intelligent Communication Networks, IntelNet 2014, and the 5th International Workshop on Wireless Networks and Multimedia, WNM 2014. The second volume comprises selected papers of the main conference and papers of the Workshop on Computing, Communication and Control Technologies in Intelligent Transportation System, 3C in ITS 2014, and the Workshop on Security and Privacy in Computer and Network Systems, SPCNS 2014.

Congestion Control in Data Transmission Networks - Sliding Mode and Other Designs (Paperback): Przemyslaw Ignaciuk, Andrzej... Congestion Control in Data Transmission Networks - Sliding Mode and Other Designs (Paperback)
Przemyslaw Ignaciuk, Andrzej Bartoszewicz
R4,052 Discovery Miles 40 520 Ships in 10 - 15 working days

Congestion Control in Data Transmission Networks details the modeling and control of data traffic in communication networks. It shows how various networking phenomena can be represented in a consistent mathematical framework suitable for rigorous formal analysis. The monograph differentiates between fluid-flow continuous-time traffic models, discrete-time processes with constant sampling rates, and sampled-data systems with variable discretization periods. The authors address a number of difficult real-life problems, such as: optimal control of flows with disparate, time-varying delay; the existence of source and channel nonlinearities; the balancing of quality of service and fairness requirements; and the incorporation of variable rate allocation policies. Appropriate control mechanisms which can handle congestion and guarantee high throughput in various traffic scenarios (with different networking phenomena being considered) are proposed. Systematic design procedures using sound control-theoretic foundations are adopted. Since robustness issues are of major concern in providing efficient data-flow regulation in today's networks, sliding-mode control is selected as the principal technique to be applied in creating the control solutions. The controller derivation is given extensive analytical treatment and is supported with numerous realistic simulations. A comparison with existing solutions is also provided. The concepts applied are discussed in a number of illustrative examples, and supported by many figures, tables, and graphs walking the reader through the ideas and introducing their relevance in real networks. Academic researchers and graduate students working in computer networks and telecommunications and in control (especially time-delay systems and discrete-time optimal and sliding-mode control) will find this text a valuable assistance in ensuring smooth data-flow within communications networks.

Communication Technologies, Information Security and Sustainable Development - Third International Multi-topic Conference,... Communication Technologies, Information Security and Sustainable Development - Third International Multi-topic Conference, IMTIC 2013, Jamshoro, Pakistan, December 18--20, 2013, Revised Selected Papers (Paperback, 2014 ed.)
Faisal Karim Shaikh, Bhawani Shankar Chowdhry, Sherali Zeadally, Dil Muhammad Akbar Hussain, Aftab Ahmed Memon, …
R2,429 Discovery Miles 24 290 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed proceedings of the Third International Multi-topic Conference on Communications, Technologies, Information Security and Sustainable Development, IMTIC 2013, held in Jamshoro, Pakistan, in December 2013. The 27 revised papers presented in this volume were carefully reviewed and selected from 140 submissions. The topics presented had a reasonable balance between theory and practice in multi-disciplined topics including wireless sensor networks, cloud computing, wireless communication, antenna design, signal processing, software engineering, image processing, bioinformatics and telemedicine, neural networks, automation and control, and green renewable energy.

Cellular Automata - 11th International Conference on Cellular Automata for Research and Industry, ACRI 2014, Krakow, Poland,... Cellular Automata - 11th International Conference on Cellular Automata for Research and Industry, ACRI 2014, Krakow, Poland, September 22-25, 2014, Proceedings (Paperback, 2014 ed.)
Jaroslaw Was, Georgios Sirakoulis, Stefania Bandini
R1,670 Discovery Miles 16 700 Ships in 10 - 15 working days

This book constitutes the proceedings of the 11th International Conference on Cellular Automata for Research and Industry, ACRI 2014, held in Krakow, Poland, in September 2014. The 67 full papers and 7 short papers presented in this volume were carefully reviewed and selected from 125 submissions. They are organized in topical sections named: theoretical results on cellular automata; cellular automata dynamics and synchronization; modeling and simulation with cellular automata; cellular automata-based hardware and computing; cryptography, networks and pattern recognition with cellular automata. The volume also contains contributions from ACRI 2014 workshops on crowds and cellular automata; asynchronous cellular automata; traffic and cellular automata; and agent-based simulation and cellular automata.

Principles of Computer Systems and Network Management (Paperback, 2009 ed.): Dinesh Chandra Verma Principles of Computer Systems and Network Management (Paperback, 2009 ed.)
Dinesh Chandra Verma
R3,179 Discovery Miles 31 790 Ships in 10 - 15 working days

Systems Management is emerging as the predominant area for computer science in the enterprise, with studies showing that the bulk (up to 80%) of an enterprise IT budget is spent on management/operational issues and is the largest piece of the expenditure. This textbook provides an overview of the field of computer systems and network management. Systems management courses are being taught in different graduate and undergraduate computer science programs, but there are no good books with a comprehensive overview of the subject. This text book will provide content appropriate for either an undergraduate course (junior or senior year) or a graduate course in systems management.

Future Application and Middleware Technology on e-Science (Paperback, 2010 ed.): Ok-Hwan Byeon, Jang-Hyuk Kwon, Thom Dunning,... Future Application and Middleware Technology on e-Science (Paperback, 2010 ed.)
Ok-Hwan Byeon, Jang-Hyuk Kwon, Thom Dunning, Kum Won Cho, Aurore Savoy-Navarro
R4,441 Discovery Miles 44 410 Ships in 10 - 15 working days

Future Application and Middleware Technology on e-Science presents selected papers from the 2008 Korea e-Science All-Hands-Meeting (AHM 2008). Hosted by the Korea Institute of Science and Technology Information, this meeting was designed to bring together developers and users of e-Science applications and enabling information technologies from international and interdisciplinary research communities. The AHM 2008 conference served as a forum for engineers and scientists to present state-of-the-art research and product/tool developments, and to highlight related activities in all fields of e-Science. The works presented in this edited volume bring together cross-disciplinary information on e-Science in one cohesive source. This book is suitable for the professional audience composed of industry researchers and practitioners of e-Science. This volume should also be suitable for advanced-level students in the field.

Pervasive Computing and the Networked World - Joint International Conference, ICPCA/SWS 2013, Vina del Mar, Chile, December... Pervasive Computing and the Networked World - Joint International Conference, ICPCA/SWS 2013, Vina del Mar, Chile, December 5-7, 2013. Revised Selected Papers (Paperback, 2014 ed.)
Qiaohong Zu, Maria Vargas-Vera, Bo Hu
R1,706 Discovery Miles 17 060 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the Joint International Conference on Pervasive Computing and Web Society, ICPCA/SWS 2013, held in Vina de Mar, Chile, in December 2013. The 56 revised full papers presented together with 29 poster papers were carefully reviewed and selected from 156 submissions. The papers are organized in topical sections on infrastructure and devices; service and solution; data and knowledge; as well as community.

Data and Applications Security and Privacy XXVIII - 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria,... Data and Applications Security and Privacy XXVIII - 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014, Proceedings (Paperback, 2014 ed.)
Vijay Atluri, Gunther Pernul
R2,700 Discovery Miles 27 000 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 28th IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2014, held in Vienna, Austria, in July 2014. The 22 revised full papers and 4 short papers presented were carefully reviewed and selected from 63 submissions. The papers are organized in topical sections on access control, privacy, networked and mobile environments, data access, cloud databases, and private retrieval.

Digital Signatures (Paperback, 2010 ed.): Jonathan Katz Digital Signatures (Paperback, 2010 ed.)
Jonathan Katz
R2,927 Discovery Miles 29 270 Ships in 10 - 15 working days

As a beginning graduate student, I recall being frustrated by a general lack of acces sible sources from which I could learn about (theoretical) cryptography. I remember wondering: why aren't there more books presenting the basics of cryptography at an introductory level? Jumping ahead almost a decade later, as a faculty member my graduate students now ask me: what is the best resource for learning about (various topics in) cryptography? This monograph is intended to serve as an answer to these 1 questions - at least with regard to digital signature schemes. Given the above motivation, this book has been written with a beginninggraduate student in mind: a student who is potentially interested in doing research in the ?eld of cryptography, and who has taken an introductory course on the subject, but is not sure where to turn next. Though intended primarily for that audience, I hope that advanced graduate students and researchers will ?nd the book useful as well. In addition to covering various constructions of digital signature schemes in a uni?ed framework, this text also serves as a compendium of various "folklore" results that are, perhaps, not as well known as they should be. This book could also serve as a textbook for a graduate seminar on advanced cryptography; in such a class, I expect the entire book could be covered at a leisurely pace in one semester with perhaps some time left over for excursions into related topics.

The Internet of Things - 20th Tyrrhenian Workshop on Digital Communications (Paperback, 2010 ed.): Daniel Giusto, Antonio Iera,... The Internet of Things - 20th Tyrrhenian Workshop on Digital Communications (Paperback, 2010 ed.)
Daniel Giusto, Antonio Iera, Giacomo Morabito, Luigi Atzori
R5,755 Discovery Miles 57 550 Ships in 10 - 15 working days

In the last few years, a stimulating idea is fast emergingin the wireless scenario: the pervasive presence around us of a variety of "things" or "objects", such as RFID, sensors, actuators, mobile phones, which, through unique addressing schemes, are able to interact with each other and cooperate with their neighboring "smart" c- ponents to reach common goals. This novel paradigm, named "The Internet of Things" (IoT) continues on the path set by the concept of smart environments and paves the way to the depl- ment of numerous applications with a signi cant impact on many elds of future every-day life. In this context, logistics, Intelligent Transportation Systems (ITS), business/process management,assisted living, and e-health are only a few examples of possible application elds in which this novel paradigm will play a leading role in the next future. Actually,manychallengingissues still needto be addressedand both technolo- calandsocialnodesuntiedbeforethe IoTideabeingwidelyaccepted.Centralissues are making a full interoperabilityof such devices possible, enablingtheir adaptation and autonomousbehavior, as well as guaranteeingtrust, privacy,and security. Also, the IoT idea poses several new problemsconcerningthe networkingaspects. In fact, the "things" composing the IoT will be characterized by low resources in terms of both computation and energy capacity. Accordingly, the proposed solutions need to payspecial attentionto resourceef ciencybesides the obviousscalability problems. The papers included in this volume present a picture of the current state of the art on the above issues; more speci cally, concepts and ideas are discussed on n- working, middleware, security and privacy, RFID and sensor networks, as well as electromagnetic aspects.

Algorithms and Architectures for Parallel Processing - 14th International Conference, ICA3PP 2014, Dalian, China, August 24-27,... Algorithms and Architectures for Parallel Processing - 14th International Conference, ICA3PP 2014, Dalian, China, August 24-27, 2014. Proceedings, Part II (Paperback, 2014 ed.)
Xiang-he Sun, Wenyu Qu, Ivan Stojmenovic, Wanlei Zhou, Zhiyang Li, …
R1,666 Discovery Miles 16 660 Ships in 10 - 15 working days

This two volume set LNCS 8630 and 8631 constitutes the proceedings of the 14th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2014, held in Dalian, China, in August 2014. The 70 revised papers presented in the two volumes were selected from 285 submissions. The first volume comprises selected papers of the main conference and papers of the 1st International Workshop on Emerging Topics in Wireless and Mobile Computing, ETWMC 2014, the 5th International Workshop on Intelligent Communication Networks, IntelNet 2014, and the 5th International Workshop on Wireless Networks and Multimedia, WNM 2014. The second volume comprises selected papers of the main conference and papers of the Workshop on Computing, Communication and Control Technologies in Intelligent Transportation System, 3C in ITS 2014, and the Workshop on Security and Privacy in Computer and Network Systems, SPCNS 2014.

Intelligent Computing, Communication and Devices - Proceedings of ICCD 2014, Volume 2 (Paperback, 2015 ed.): Lakhmi C. Jain,... Intelligent Computing, Communication and Devices - Proceedings of ICCD 2014, Volume 2 (Paperback, 2015 ed.)
Lakhmi C. Jain, Srikanta Patnaik, Nikhil Ichalkaranje
R7,287 Discovery Miles 72 870 Ships in 10 - 15 working days

In the history of mankind, three revolutions which impact the human life are the tool-making revolution, agricultural revolution and industrial revolution. They have transformed not only the economy and civilization but the overall development of the society. Probably, intelligence revolution is the next revolution, which the society will perceive in the next 10 years. ICCD-2014 covers all dimensions of intelligent sciences, i.e. Intelligent Computing, Intelligent Communication and Intelligent Devices. This volume covers contributions from Intelligent Communication which are from the areas such as Communications and Wireless Ad Hoc & Sensor Networks, Speech & Natural Language Processing, including Signal, Image and Video Processing and Mobile broadband and Optical networks, which are the key to the ground-breaking inventions to intelligent communication technologies. Secondly, Intelligent Device is any type of equipment, instrument or machine that has its own computing capability. Contributions from the areas such as Embedded Systems, RFID, RF MEMS, VLSI Design & Electronic Devices, Analog and Mixed-Signal IC Design and Testing, MEMS and Microsystems, CMOS MEMS, Solar Cells and Photonics, Nano Devices, Single Electron & Spintronics Devices, Space Electronics and Intelligent Robotics are covered in this volume.

Monitoring and Securing Virtualized Networks and Services - 8th IFIP WG 6.6 International Conference on Autonomous... Monitoring and Securing Virtualized Networks and Services - 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, Brno, Czech Republic, June 30 -- July 3, 2014. Proceedings (Paperback, 2014 ed.)
Anna Sperotto, Guillaume, Doyen,, Steven Latre, Marinos Charalambides, Burkhard Stiller
R2,111 Discovery Miles 21 110 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th IFIP WG 6.6 International Conference on Monitoring and Securing Virtualized Networks and Services, AIMS 2014, held in Brno, Czech Republic, in June/July 2014. The 9 full papers presented were carefully reviewed and selected from 29 submissions. The volume also includes 13 papers presented at the AIMS Ph.D. workshop. They were reviewed and selected from 27 submissions. The full papers are organized in topical sections on emerging infrastructures for networks and services; experimental studies for security management; and monitoring methods for quality-of-service and security. The workshop papers are organized in topical sections on management of virtualized network resources and functions; security management; SDN and content delivery; monitoring and information sharing.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Advances in Wireless Communications and…
Roumen Kountchev, Aniket Mahanti, … Hardcover R4,463 Discovery Miles 44 630
Machine Learning, Deep Learning and…
E.S. Gopi Hardcover R6,600 Discovery Miles 66 000
Peering Carrier Ethernet Networks
Sachidananda Kangovi Paperback R1,523 Discovery Miles 15 230
Information Technology in Disaster Risk…
Yuko Murayama, Dimiter Velev, … Hardcover R2,969 Discovery Miles 29 690
Cyber-Physical Systems - Foundations…
Houbing Song, Danda B. Rawat, … Paperback R2,614 R2,446 Discovery Miles 24 460
Advances in Communication Systems and…
J. Jayakumari, George K. Karagiannidis, … Hardcover R5,907 Discovery Miles 59 070
Privacy-Preserving in Edge Computing
Longxiang Gao, Tom H. Luan, … Hardcover R4,130 Discovery Miles 41 300
Computational Intelligence in Data…
Vallidevi Krishnamurthy, Suresh Jaganathan, … Hardcover R2,621 Discovery Miles 26 210
5G and Beyond - Fundamentals and…
Xingqin Lin, Namyoon Lee Hardcover R4,843 Discovery Miles 48 430
Reconfigurable Intelligent…
Hongliang Zhang, Boya Di, … Hardcover R4,811 Discovery Miles 48 110

 

Partners