![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > Network computers
The breathtaking success of the WDM technology in backbone networks also pushes the development and implementation of optical packet-switched WDM local and metropolitan area networks. Local and metropolitan area optical WDM networks are emerging as viable and cost-effective solutions for many telecommunication operators and service providers who have to face an extremely growing bandwidth demand and expensive additional fiber installation costs. Thus, the strong need for the development of novel high-speed architectures and protocols for such networks arises. In Optical Packet Access Protocols for WDM Networks, different basic and novel medium access control (MAC) protocols for WDM-based LANs/MANs, typically belonging to the group of single-hop networks, are proposed and analyzed. Thereby, solutions for the direct and efficient support of distinct Quality-of-Service (QoS) classes over the WDM transmission layer are provided.Besides a comprehensive overview on the state-of-the-art photonic metro networks, highly dynamic reservation-based access protocols relying on the passive-star and the ring topology are presented while assuming the deployment of wavelength-tunable transceivers at the network nodes. Optical Packet Access Protocols for WDM Networks provides both a comprehensive survey on existing WDM local and metro lightwave systems and the design of novel highly efficient medium access control protocols with QoS support for such systems. Accordingly, this work is appropriate for communication and network engineers from both the academic and industrial world working in the field of optical communication networks, computer science, and communication engineering.
In large measure the traditional concern of communications engineers has been the conveyance of voice signals. The most prominent example is the telephone network, in which the techniques used for transmission multiplex ing and switching have been designed for voice signals. However, one of the many effects of computers has been the growing volume of the sort of traffic that flows in networks composed of user terminals, processors, and peripherals. The characteristics of this data traffic and the associated perfor mance requirements are quite different from those of voice traffic. These differences, coupled with burgeoning digital technology, have engendered a whole new set of approaches to multiplexing and switching this traffic. The new techniques are the province of what has been loosely called computer communications networks. The subject of this book is the mathematical modeling and analysis of computer communications networks, that is to say, the multiplexing and switching techniques that have been developed for data traffic. The basis for many of the models that we shall consider is queueing theory, although a number of other disciplines are drawn on as well. The level at which this material is covered is that of a first-year graduate course. It is assumed that at the outset the student has had a good undergraduate course in probability and random processes of the sort that are more and more common among electrical engineering and computer science departments."
This book constitutes the proceedings of the 7th International ICST Conference, TridentCom 2011, held in Shanghai, China, in April 2011. Out of numerous submissions the Program Committee finally selected 26 full papers and 2 invited papers. They focus on topics as future Internet testbeds, future wireless testbeds, federated and large scale testbeds, network and resource virtualization, overlay network testbeds, management provisioning and tools for networking research, and experimentally driven research and user experience evaluation.
This Festschrift volume, published in honour of J. Ian Munro, contains contributions written by some of his colleagues, former students, and friends. In celebration of his 66th birthday the colloquium "Conference on Space Efficient Data Structures, Streams and Algorithms" was held in Waterloo, ON, Canada, during August 15-16, 2013. The articles presented herein cover some of the main topics of Ian's research interests. Together they give a good overall perspective of the last 40 years of research in algorithms and data structures.
This book constitutes the thoroughly reviewed post-proceedings of the 9th International Workshop, EUMAS 2011, held in Maastricht, The Netherlands, in November 2011. The 16 revised full papers included in the book were carefully revised and selected from 45 submissions. This workshop is primarily intended as a European forum at which researchers and those interested in activities relating to research in the area of autonomous agents and multi-agent systems could meet, present (potentially preliminary) research results, problems, and issues in an open and informal but academic environment. The aim of this workshop was to encourage and support activity in the research and development of multi-agent systems, in academic and industrial efforts.
The idea of this book comes from the observation that sensor networks represent a topic of interest from both theoretical and practical perspectives. The title und- lines that sensor networks offer the unique opportunity of clearly linking theory with practice. In fact, owing to their typical low-cost, academic researchers have the opportunity of implementing sensor network testbeds to check the validity of their theories, algorithms, protocols, etc., in reality. Likewise, a practitioner has the opportunity of understanding what are the principles behind the sensor networks under use and, thus, how to properly tune some accessible network parameters to improve the performance. On the basis of the observations above, the book has been structured in three parts: PartIisdenotedas"Theory,"sincethetopicsofits vechaptersareapparently "detached" from real scenarios; Part II is denoted as "Theory and Practice," since the topics of its three chapters, altough theoretical, have a clear connection with speci c practical scenarios; Part III is denoted as "Practice," since the topics of its ve chapters are clearly related to practical applications.
Research in context-aware computing has produced a number of middleware systems for context management. However, development of ubiquitous context-aware applications is still a challenge because most current middleware systems are still focused on isolated and static context-aware environments. Context-aware environments are inherently dynamic as a result of occasional additions or upgrade of sensors, applications or context inference mechanisms. Context Management for Distributed and Dynamic Context-Aware Computing proposes a novel architecture for context management based on the concept of context domains, allowing applications to keep context interests across distributed context management systems. The authors describe a distributed middleware that implements the aforementioned concepts, without compromising scalability and efficiency of context access.
This book constitutes the refereed proceedings of the 14th International Conference on Passive and Active Measurement, PAM 2013, held in Hong Kong, China, in March 2013. The 24 revised full papers presented were carefully reviewed and selected from 74 submissions. The papers have been organized in the following topical sections: measurement design, experience and analysis; Internet wireless and mobility; performance measurement; protocol and application behavior; characterization of network usage; and network security and privacy. In addition, 9 poster abstracts have been included.
Testing of Communicating Systems presents the latest worldwide results in both the theory and practice of the testing of communicating systems. This volume provides a forum that brings together the substantial volume of research on the testing of communicating systems, ranging from conference testing through interoperability testing to performance and QoS testing. The following topics are discussed in detail: * Types of testing; * Phases of the testing process; * Classes of systems to be tested; and * Theory and practice of testing.GBP/LISTGBP This book contains the selected proceedings of the 12th International Workshop on the Testing of Communicating Systems (formerly the International Workshop on Protocol Test Systems), sponsored by the International Federation for Information Processing (IFIP), and held in Budapest, Hungary, in September 1999. The book contains not only interesting research on testing different communication technologies from telecom and datacom systems to distributed systems, but also presents reports on the application of these results in industry.Testing of Communicating Systems will be essential reading for engineers, IT managers and research personnel working in computer science and telecommunications.
This book presents the proceedings of the 1st International Symposium on Intelligent and Distributed Computing, IDC 2007, held in Craiova, Romania, October 2007. Coverage includes: autonomous and adaptive computing; data mining and knowledge discovery; distributed problem solving and decision making; e-business, e-health and e-learning; genetic algorithms; image processing; information retrieval; intelligence in mobile and ubiquitous computing.
Though the reductionist approachto biology and medicine has led to several imp- tant advances, further progresses with respect to the remaining challenges require integration of representation, characterization and modeling of the studied systems along a wide range of spatial and time scales. Such an approach, intrinsically - lated to systems biology, is poised to ultimately turning biology into a more precise and synthetic discipline, paving the way to extensive preventive and regenerative medicine [1], drug discovery [20] and treatment optimization [24]. A particularly appealing and effective approach to addressing the complexity of interactions inherent to the biological systems is provided by the new area of c- plex networks [34, 30, 8, 13, 12]. Basically, it is an extension of graph theory [10], focusing on the modeling, representation, characterization, analysis and simulation ofcomplexsystemsbyconsideringmanyelementsandtheirinterconnections.C- plex networks concepts and methods have been used to study disease [17], tr- scription networks [5, 6, 4], protein-protein networks [22, 36, 16, 39], metabolic networks [23] and anatomy [40].
The working group WG 11.4 of IFIP ran an iNetSec conference a few times in the past, sometimes together with IFIP security conference, sometimes as a stand-alone workshop with a program selected from peer-reviewed submissions. When we were elected to chair WG 11.4 we asked ourselveswhether the security and also the computer science community at large bene?ts from this workshop. In particular, as there aremany (too many?) securityconferences, it has become di?cult to keep up with the ?eld. After having talked to many colleagues, far too many to list all of them here, we decided to try a di?erent kind of workshop: one where people would attend to discuss open research topics in our ?eld, as typically only happens during the co?ee breaks of ordinary conferences. Toenablethiswecalledforabstractsof2pageswheretheauthorsoutlinethe open problems that they would like to discuss at the workshop, the intent being that the author would be given 15 minutes to present the topic and another 15 minutes for discussion. These abstracts were then read by all members of the Program Committee and ranked by them according to whether they thought thiswouldleadtoaninterestingtalk and discussion. We then simply selected the abstracts that got the best rankings. We were happy to see this result in many really interesting talks and disc- sions in the courseof the workshop.Ofcourse, these lively anddirect discussions are almost impossible to achieve in a printed text. Still, we asked the authors to distill the essence of these discussions into full papers. The results are in your hand
The requirement of causality in system theory is inevitably accompanied by the appearance of certain mathematical operations, namely the Riesz proj- tion,theHilberttransform,andthespectralfactorizationmapping.Aclassical exampleillustratingthisisthedeterminationoftheso-calledWiener?lter(the linear, minimum means square error estimation ?lter for stationary stochastic sequences [88]). If the ?lter is not required to be causal, the transfer function of the Wiener ?lter is simply given by H(?)=? (?)/? (?),where ? (?) xy xx xx and ? (?) are certain given functions. However, if one requires that the - xy timation ?lter is causal, the transfer function of the optimal ?lter is given by 1 ? (?) xy H(?)= P ,?? (??,?] . + [? ] (?) [? ] (?) xx + xx? Here [? ] and [? ] represent the so called spectral factors of ? ,and xx + xx? xx P is the so called Riesz projection. Thus, compared to the non-causal ?lter, + two additional operations are necessary for the determination of the causal ?lter, namely the spectral factorization mapping ? ? ([? ] ,[? ] ),and xx xx + xx? the Riesz projection P .
Testing of Communicating Systems presents the latest world-wide results in both theory and practice. This volume provides a forum in which the substantial volume of research on the testing of communicating systems, spanning from conformance testing through interoperability testing, to performance and QoS testing, is brought together. The following topics are discussed in detail: Types of testing; Phases of the testing process; Classes of systems to be tested; and Theory and practice of testing. This book contains the selected proceedings of the 11th International Workshop on the Testing of Communicating Systems, formerly the International Workshop on Protocol Test Systems, sponsored by the International Federation for Information Processing (IFIP), and held in Tomsk, Russia, in August/September 1998. Testing of Communicating Systems will be essential reading for engineers, IT managers and research personnel working in computer sciences and telecommunications.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Reversible Computation, RC 2011, held in Gent, Belgium, in July 2011. The 10 revised full papers presented were carefully reviewed and selected from 25 initial submissions for inclusion in the book. The papers are devoted to all aspects of reversible computation, ranging from theoretical and experimental aspects to various applications. Topics addressed are: functional language for reversible computations, logic design, reversible circuits designed by a software toolkit called RevKit, application of reversible computation to the domain of quantum circuits, and physical realizations of reversible circuits in CMOS technologies.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Workshop on Resource Discovery, RED 2010, held in Paris, France, in November 2010. The 13 revised full papers - from 24 initial submissions - were carefully selected during a second round of reviewing and improvement from the lectures given at the workshop and are presented in extended version in the book. They deal with the following topics: resource discovery for composition; bioinformatics resource discovery; textual resource discovery; and Web service discovery.
Several years ago when I began consulting full time, I quickly discovered that despite three advanced academic degrees my practical industrial experience had some significant gaps. It thus was necessary initially to spend considerable (nonbillable) time collecting and organizing a great deal of essential information on the various aspects of modern data communica tions. The task was made more difficult by the highly interdisciplinary nature of the field, with the required information scattered throughout the vast international literature of telecommunications, computers, electrical engineering, military systems, mathematics, operations research, optimiza tion, speech processing, and the murky world oflegal and regulatory policy. Although there were a number of fine books and periodicals in each of these specialized disciplines, I was unable to find a single comprehensive text that covered the entire field at even a modestly attractive technical and mathematical level. After going to the trouble of organizing all this diverse material for my clients and students, it seemed rather natural to put it into book form and thus share it with those professionals working with computer data communi cations who need a comprehensive coverage of the subject at a level immediately applicable to their work and yet easily accessible for self-study. The project was facilitated by an agreeable publisher and an incredibly understanding and cooperative family, and Practical Computer Data Com munications is the result."
Readers will progress from an understanding of what the Internet is now towards an understanding of the motivations and techniques that will drive its future.
ATM Network Performance describes a unified approach to ATM network management. The focus is on satisfying quality-of-service requirements for individual B-ISDN connections. For an ATM network of output-buffer switches, the author describes how the basic network resources (switch buffer memory and link transmission bandwidth) should be allocated to achieve the required quality-of-service connections. The performance of proposed bandwidth scheduling policies is evaluated. Both single node and end-to-end performance results are given. In particular, these results are applied to resource provisioning problems for prerecorded (stored) video and video teleconferencing. The flow control problem for available bit rate traffic is also described. This book is intended for a one-term course in performance of Broadband Integrated-Services Digital Networks (B-ISDNs) based on a type of packet-switched communication network called Asynchronous Transfer Mode (ATM). The level of presentation is at the first year of graduate studies and for professionals working in the field, but it may be accessible to senior undergraduates as well. Some familiarity with ATM standards is assumed as such standards are only briefly outlined. All of the required background in discrete-time queueing theory is supplied. Exercises are given at the end of chapters. Solutions and/or hints to selected exercises are given in an Appendix.
This Festschrift volume, published in honor of Jean-Jaques Quisquater on the occasion of his 65th Birthday, contains 33 papers from colleagues all over the world and deals with all the fields to which Jean-Jaques dedicated his work during his academic career. Focusing on personal tributes and re-visits of Jean-Jaques Quisquater's legacy, the volume addresses the following central topics: symmetric and asymmetric cryptography, side-channels attacks, hardware and implementations, smart cards, and information security. In addition there are four more contributions just "as diverse as Jean-Jacques' scientific interests."
This book is an expanded third edition of the book Performance Analysis of Digital Transmission Systems, originally published in 1990. Second edition of the book titled Digital Transmission Systems: Performance Analysis and Modeling was published in 1998. The book is intended for those who design communication systems and networks. A computer network designer is interested in selecting communication channels, error protection schemes, and link control protocols. To do this efficiently, one needs a mathematical model that accurately predicts system behavior. Two basic problems arise in mathematical modeling: the problem of identifying a system and the problem of applying a model to the system analysis. System identification consists of selecting a class of mathematical objects to describe fundamental properties of the system behavior. We use a specific class of hidden Markov models (HMMs) to model communication systems. This model was introduced by C. E. Shannon more than 50 years ago as a Noisy Discrete Channel with a finite number of states. The model is described by a finite number of matrices whose elements are estimated on the basis of experimental data. We develop several methods of model identification and show their relationship to other methods of data analysis, such as spectral methods, autoregressive moving average CARMA) approximations, and rational transfer function approximations.
ATM Network Performance, Second Edition, describes approaches to computer and communication network management at the ATM layer of the protocol hierarchy. The focus is on satisfying quality-of-service requirements for individual connections. Results in both areas of bandwidth scheduling and traffic control are explained. Recent results in end-to-end performance, provisioning for video connections and statistical multiplexing are also described. All of the material has been updated where appropriate and new references added and expanded. Timely updates: * Entirely new chapter on ATM switches with an emphasis on scalable-to-terabit switching. * New material on round-robin scheduling, jitter control, QoS paradigms as well as special treatment of fluid modeling and variable bit rate channel capacity. * Expanded coverage of CBR channels, IP over ATM, and guaranteed-rate performance. * Substantial increase in end-of-chapter exercises. Solutions for selected exercises in separate appendix. Complete solutions for all exercises also available from author.
The implementation of Enterprise Networks or e-Networking is of paramount importance for organisations. Enterprise-wide networking would warrant that the components of information architecture are organised to harness more out of the organisation's computing power on the desktop. This would also involve establishment of networks that link the various but important subsystems of the enterprise. Our firm belief is that in order to gain a competitive edge the organisations need knowledge and sound strategy. This conviction is particularly true today, considering the pressures from international competition, environmental concerns and complicated ethical issues. This book, entitled A Manager's Primer on e-Networking, negotiates the hyper dimensions of the Internet through stories from myriad of Web sites with its fluent presentation and simple but chronological organisation of topics highlighting numerous opportunities and providing a solid starting point not only for inexperienced entrepreneurs and managers but anyone interested in applying information technology in the business. I sincerely hope the book will help as well many small and medium size companies and organisations to launch corporate networking successfully in order to attain their strategic objectives. Rajiv Jayashankar, Ph. D.
Concurrent Enterprising: Toward the Concurrent Enterprise in the Era of the Internet and Electronic Commerce presents the concurrent enterprise business model and concurrent enterprising approach, which is emerging as a crucial challenge for organizations in all geographical locations and economic sectors. To achieve this goal, this book deals with the main aspects of the merging context in which enterprises are doing business. This context is characterized by the fastest-spread information and communication technologies (ICT) that constitute the new infrastructure of the global marketplace. This book discusses a set of the most advanced enterprise paradigms created during the 1980s and 1990s, most of them supported by advanced research programs, especially in the worldwide manufacturing industry. The book discusses differences between these enterprise paradigms and presents Internet-related technologies as a main driver toward a new business model. It then examines less theoretical questions - among them, how to implement this new business model and how companies can move to the concurrent enterprise paradigm in creating a concurrent business environment. And it introduces a methodology for enterprises willing to maintain or even improve their competitiveness in the global marketplace. The book has eight chapters. The first two concentrate on the advanced enterprise paradigms, and their advantages and limits for maintaining or improving competitiveness in the global marketplace. Chapter 3 studies, separately, the virtual enterprise and related approaches. Chapter 4 studies another fundamental ingredient of the new business model - concurrent engineering (CE). Chapter 5 summarizes these preceding approaches and establishes a foundation for building a concurrent enterprise. Chapter 6 presents specific business cases illustrating the advantages and limits of virtual enterprise applications and introduces electronic commerce and electronic documents. Chapter 7 presents concurrent enterprise as a new business model, and Chapter 8 synthesizes the concurrent enterprising process. Concurrent Enterprising: Toward the Concurrent Enterprise in the Era of the Internet and Electronic Commerce is a reference and a user's guide designed for business managers, IT managers, engineers, researchers, scientists, and other individuals interested in learning how to use a sustainable business model driven by the Internet and electronic commerce.
This book constitutes the refereed proceedings of the First International Conference on Human Factors in Computing and Informatics, SouthCHI 2013, held in Maribor, Slovenia, in July 2013. SouthCHI is the successor of the USAB Conference series and promotes all aspects of human-computer interaction. The 38 revised full papers presented together with 12 short papers, 4 posters and 3 doctoral thesis papers were carefully reviewed and selected from 169 submissions. The papers are organized in the following topical sections: measurement and usability evaluation; usability evaluation - medical environments; accessibility methodologies; game-based methodologies; Web-based systems and attribution research; virtual environments; design culture for ageing well: designing for "situated elderliness"; input devices; adaptive systems and intelligent agents; and assessing the state of HCI research and practice in South-Eastern Europe. |
You may like...
German Phrase Book - The Ultimate German…
Language Learning University
Hardcover
German Short Stories - 11 Simple Stories…
Daily Language Learning
Hardcover
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, …
Paperback
R1,018
Discovery Miles 10 180
Time and Relational Theory - Temporal…
C.J. Date, Hugh Darwen, …
Paperback
R1,244
Discovery Miles 12 440
|