![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > Network computers
Wireless systems for mobile communication is one of the most rapidly expanding fields in digital telecommunications. Such hot topics as wireless Internet, mobile access to multimedia services and wireless convergence systems are likely to affect the whole of the information society and will pose intellectual challenges to researchers in the foreseeable future. Transmission techniques like WCDMA, user-oriented protocols like WAP and communication structures like LEO are just a few tools that seem to usher in the era of unlimited resource availability. Personal Wireless Communications addresses these issues, with 17 regular papers and 4 invited papers by leading researchers in the area of wireless communications. The volume comprises the proceedings of the Working Conference on Personal Wireless Communications (PWC'2000), which was sponsored by the International Federation for Information Processing (IFIP) and held in Gdansk, Poland in September 2000.The contributions cover a wide range of topics, from 3G cellular systems to wireless Internet and WAP design to wireless LAN and ATM; from speech coding and antenna design to teletraffic modelling and protocol evaluation. The book is thus essential reading for theoreticians and engineers interested in the current progress in wireless systems, as well as for IT students and researchers.
Intelligence in Networks is a concept, the meaning of which is highly related to the time-period when it is used. In the 1960s, 1970s and 1980s, it was mainly related to the teleservice repertoire 'an sich'. In the 1990s, it is more related to efficient flexibility in the introduction of new teleservices and teleservice repertoire. This state-of-the-art text sets out to identify and study issues related to solutions for increasing intelligence in networks. As examples, intelligence networks (IN), telecommunication information networking architecture (TINA) and mobile agents and active networks are different solutions for improving the grade of network intelligence. The areas under discussion include research and development within various closely related fields such as: * Teleservices, service architecture and service creation; * Middleware and specification languages; * Mobile agents, active networks, plug-and-play issues; and * Quality of service and performance.GBP/LISTGBP Intelligence in Networks contains the proceedings of SMARTNET'99, the fifth in a series of conferences on intelligence in networks sponsored by the International Federation for Information Processing (IFIP), at the Asian Institute of Technology, Pathumthani, Thailand in November 1999.
This book includes the thoroughly refereed post-conference proceedings of the 15th Annual RoboCup International Symposium, held in Istanbul, Turkey, in July 2011. The 12 revised papers and 32 poster presentation presented were carefully reviewed and selected from 97 submissions. The papers are orginazed on topical sections on robot hardware and software, perception and action, robotic cognition and learning, multi-robot systems, human-robot interaction, education and edutainment and applications.
This book constitutes the joint refereed proceedings of the 12 International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking, NEW2AN, and the 5th Conference on Internet of Things and Smart Spaces, ruSMART 2012, held in St. Petersburg, Russia, in August 2012. The total of 42 papers was carefully reviewed and selected for inclusion in this book. The 14 papers selected from ruSMART are organized in topical sections named: defining an internet-of-things ecosystem; future services; and smart space governing through service mashups. The 28 papers from NEW2AN deal with the following topics: wireless cellular networks; ad-hoc, mesh, and delay-tolerant networks; scalability, cognition, and self-organization; traffic and internet applications; and wireless sensor networks. They also contain 4 selected papers from the NEW2AN 2012 winter session.
This book constitutes the refereed proceedings of the 6th International Conference on Convergence and Hybrid Information Technology, ICHIT 2012, held in Daejeon, Korea, in August 2012. The 94 revised full papers presented were carefully reviewed and selected from 196 submissions. The papers are organized in topical sections on communications and networking; HCI and virtual reality; image processing and pattern recognition; hardware design and applications; computational biology and medical information; data mining and information retrieval; security and safety system; software engineering; workshop on advanced smart convergence (IWASC).
This book constitutes the refereed proceedings of the International Workshop on Internet of Things, IOT 2012, held in Changsha, China, during August 17-19. The 95 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on wireless sensor networks; RFID; sensors and equipments; data processing; security; applications and others.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Model-Based Methodologies for Pervasive and Embedded Software, MOMPES 2012, held in Essen, Germany, in September 2012. The 7 revised full papers presented together with 1 short papers were carefully reviewed and selected from 16 submissions. The papers cover a large spectrum of topics including model-driven engineering, model analysis, runtime verification, modeling of reactive systems, variability modeling, and domain-specific languages.
This book constitutes the proceedings of the 16th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in Intrusion Detection, RAID 2013, held in Rodney Bay, St. Lucia in October 2013. The volume contains 22 full papers that were carefully reviewed and selected from 95 submissions, as well as 10 poster papers selected from the 23 submissions. The papers address all current topics in computer security ranged from hardware-level security, server, web, mobile, and cloud-based security, malware analysis, and web and network privacy.
Describing how to avoid common vendor traps, Buying, Supporting, Maintaining Software and Equipment: An IT Manager's Guide to Controlling the Product Lifecycle will help readers better control the negotiation of their IT products and services and, ultimately, better manage the lifecycle of those purchases. The book supplies an inside look at the methods and goals of vendors and their contracts-which are almost always in conflict with end-user goals. The text is set up to follow the way most people experience technology products and contracting decisions. It begins by explaining the significance of the decisions made at the time of product selection. It details what you need to focus on when negotiating service and support agreements and describes how to use purchase orders to negotiate more favorable agreements. Covers product acquisition, support, and maintenance Examines hardware and software warranty and support models Considers finance and accounting issues for maintenance and support Spells out technology product details Explains postwarranty support and maintenance Provides the understanding to better negotiate with vendor sales teams Illustrating the types of problems typically experienced during product use, the book describes how to better control the useful life of your equipment. It supplies tips on how to avoid excessive charges from predatory vendors and concludes by delving into issues of product end of life. Explaining how to manage support and maintenance issues for the long term, this book provides the understanding you need to make sure you are more knowledgeable about the products and services your organization needs than the vendor teams with whom you are negotiating.
This book consists mainly of revised papers that were presented at the Agents for Educational Games and Simulation (AEGS) workshop held on May 2, 2011, as part of the Autonomous Agents and MultiAgent Systems (AAMAS) conference in Taipei, Taiwan. The 12 full papers presented were carefully reviewed and selected from various submissions. The papers are organized topical sections on middleware applications, dialogues and learning, adaption and convergence, and agent applications.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Symposium on Trustworthy Global Computing, TGC 2012, held in Newcastle upon Tyne, UK, in September 2012. The 9 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 14 submissions. The papers cover a wide range of topics in the area of global computing and reliable computation in the so-called global computers, i.e., those computational abstractions emerging in large-scale infrastructures such as service-oriented architectures, autonomic systems and cloud computing, providing frameworks, tools, algorithms and protocols for designing open-ended, large-scale applications and for reasoning about their behavior and properties in a rigorous way.
This book constitutes the refereed proceedings of the Third International Conference on Security, Privacy and Applied Cryptography Engineering held in Kharagpur, India, in October 2013. The 12 papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in topical sections on implementations and protocols, side channel attacks and countermeasures, identity-based identification schemes, and signatures.
The two volumes set, CCIS 383 and 384, constitutes the refereed proceedings of the 14th International Conference on Engineering Applications of Neural Networks, EANN 2013, held on Halkidiki, Greece, in September 2013. The 91 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers describe the applications of artificial neural networks and other soft computing approaches to various fields such as pattern recognition-predictors, soft computing applications, medical applications of AI, fuzzy inference, evolutionary algorithms, classification, learning and data mining, control techniques-aspects of AI evolution, image and video analysis, classification, pattern recognition, social media and community based governance, medical applications of AI-bioinformatics and learning.
This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2011, held in Beijing, China, in November 2011. The 21 revised full papers were carefully reviewed and selected from 34 submissions for inclusion in the book. Except these contributed papers the program of INTRUST also consisted of a workshop titled Asian Lounge on Trust, Security and Privacy consisting of six keynote speeches. The papers are organized in topical sections on trusted services, mobile trusted systems, security analysis, cryptographic aspects, trusted networks, implementation, and direct anonymous attestation.
Modern knowledge discovery methods enable users to discover complex patterns of various types in large information repositories. However, the underlying assumption has always been that the data to which the methods are applied to originates from one domain. The focus of this book, and the BISON project from which the contributions are originating, is a network based integration of various types of data repositories and the development of new ways to analyse and explore the resulting gigantic information networks. Instead of finding well defined global or local patterns they wanted to find domain bridging associations which are, by definition, not well defined since they will be especially interesting if they are sparse and have not been encountered before. The 32 contributions presented in this state-of-the-art volume together with a detailed introduction to the book are organized in topical sections on bisociation; representation and network creation; network analysis; exploration; and applications and evaluation.
This book constitutes the refereed proceedings of the 12th International Conference on Intelligent Virtual Agents, IVA 2012, held in Santa Cruz, CA, USA, in September 2012. The 17 revised full papers presented together with 31 short papers and 18 poster papers were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on IVAs on learning environments; emotion and personality; evaluation and empirical studies; multimodal perception and expression; narrative and interactive applications; social interaction; authoring and tools; conceptual frameworks.
This book constitutes the refereed proceedings of the 32nd Annual International Cryptology Conference, CRYPTO 2012, held in Santa Barbara, CA, USA, in August 2012. The 48 revised full papers presented were carefully reviewed and selected from 225 submissions. The volume also contains the abstracts of two invited talks. The papers are organized in topical sections on symmetric cryptosystems, secure computation, attribute-based and functional encryption, proofs systems, protocols, hash functions, composable security, privacy, leakage and side-channels, signatures, implementation analysis, black-box separation, cryptanalysis, quantum cryptography, and key encapsulation and one-way functions.
This book constitutes the proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in Intrusion Detection, RAID 2012, held in Amsterdam, The Netherlands in September 2012. The 18 full and 12 poster papers presented were carefully reviewed and selected from 84 submissions. The papers address all current topics in virtualization, attacks and defenses, host and network security, fraud detection and underground economy, web security, intrusion detection.
This SpringerBriefs is an overview of the emerging field of wireless access and mobile network virtualization. It provides a clear and relevant picture of the current virtualization trends in wireless technologies by summarizing and comparing different architectures, techniques and technologies applicable to a future virtualized wireless network infrastructure. The readers are exposed to a short walkthrough of the future Internet initiative and network virtualization technologies in order to understand the potential role of wireless virtualization in the broader context of next-generation ubiquitous networks. Three main wireless virtualization perspectives are explored, along with the potential challenges and requirements of a sustainable wireless virtualization framework. Finally, it presents an example of a multi-perspective wireless virtualization framework. The readers learn the latest concepts in the application of wireless virtualization as well as its relationship with cutting-edge wireless technologies such as software-defined radio (SDR) and cognitive radio.
Agent-based Semantic Web Service Composition closely examines the various aspects of SWS composition, and explores the concept that a Multi-Agent system can serve as an SWS composition system in which its agents can interact with one another to satisfy a high-level goal. In addition to surveying various proposed multi-agent-based SWS composition models, the book also highlights the cognitive parameter-based semantic web service selection models that can be used in multi-agent-based SWS composition, and outlines a new negotiation agreement-based SWS composition that can outperform existing techniques. Agent-based Semantic Web Service Composition is intended for researchers and practitioners as a reference guide for optimizing SWS composition and implementing multi-agent systems. Instructors and other academics working in a related field will also find the book invaluable.
This two-volume-set (CCIS 293 and CCIS 294) constitutes the refereed proceedings of the International Conference on Networked Digital Technologies, NDT 2012, held in Dubai, UAE, in April 2012. The 96 papers presented in the two volumes were carefully reviewed and selected from 228 submissions. The papers are organized in topical sections on collaborative systems for e-sciences; context-aware processing and ubiquitous systems; data and network mining; grid and cloud computing; information and data management; intelligent agent-based systems; internet modeling and design; mobile, ad hoc and sensor network management; peer-to-peer social networks; quality of service for networked systems; semantic Web and ontologies; security and access control; signal processing and computer vision for networked systems; social networks; Web services.
This book is the first attempt to bring together current research findings in the domain of interactive horizontal displays. The novel compilation will integrate and summarise findings from the most important international tabletop research teams. It will provide a state-of-the art overview of this research domain and therefore allow for discussion of emerging and future directions in research and technology of interactive horizontal displays. Latest advances in interaction and software technologies and their increasing availability beyond research labs, refuels the interest in interactive horizontal displays. In the early 1990s Mark Weiser's vision of Ubiquitous Computing redefined the notion of Human Computer Interaction. Interaction was no longer considered to happen only with standard desktop computers but also with elements of their environment. This book is structured in three major areas: 'under', 'on/above' and 'around' tabletops. These areas are associated with different research disciplines such as Hardware/Software and Computer Science, Human Computer Interaction (HCI) and Computer Supported Collaborative Work (CSCW). However, the comprehensive and compelling presentation of the topic of the book results from its interdisciplinary character. The book addresses fellow researchers who are interested in this domain and practitioners considering interactive tabletops in real-world projects. It will also be a useful introduction into tabletop research that can be used for the academic curriculum.
The two volume set LNCS 7439 and 7440 comprises the proceedings of the 12th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2012, as well as some workshop papers of the CDCN 2012 workshop which was held in conjunction with this conference. The 40 regular paper and 26 short papers included in these proceedings were carefully reviewed and selected from 156 submissions. The CDCN workshop attracted a total of 19 original submissions, 8 of which are included in part II of these proceedings. The papers cover many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental results, and commercial components and systems.
This book constitutes the thoroughly refereed proceedings of the 23rd International Conference on Concurrency Theory, CONCUR 2012, held in Newcastle upon Tyne, UK, September 4-7, 2012. The 35 revised full papers presented together with 4 invited talks were carefully reviewed and selected from 97 submissions. The papers are organized in topics such as reachability analysis; qualitative and timed systems; behavioural equivalences; temporal logics; session types; abstraction; mobility and space in process algebras; stochastic systems; probabilistic systems; Petri nets and non-sequential semantics; verification; decidability.
This book constitutes the refereed proceedings of the 11th German Conference on Multiagent System Technologies, MATES 2013, held in Koblenz, Germany, in September 2013. The 29 revised full papers and 3 keynote talks presented were carefully reviewed and selected from various submissions. The papers cover a broad area of topics of interest ranging from issues of agent-based coordination to simulation to negotiation. |
You may like...
Architectural Design - Conception and…
Chris A. Vissers, Luis Ferreira Pires, …
Hardcover
Robust Resource Allocation in Future…
Saeedeh Parsaeefard, Ahmad Reza Sharafat, …
Hardcover
R4,326
Discovery Miles 43 260
Cyber-Physical Systems - Foundations…
Houbing Song, Danda B. Rawat, …
Paperback
Engineering Scalable, Elastic, and…
Steffen Becker, Gunnar Brataas, …
Hardcover
R2,017
Discovery Miles 20 170
Handbook of Multimedia Information…
Amit Kumar Singh, Anand Mohan
Hardcover
R6,633
Discovery Miles 66 330
|