![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > Network computers
This book constitutes the thoroughly refereed proceedings of the 12th International Conference on Ad-hoc, Mobile, and Wireless Networks, ADHOC-NOW 2013, held in Wroclaw, Poland, in July 2013. The 27 revised full papers presented were carefully reviewed and selected from 56 submissions. The papers address such diverse topics as routing, rumor spreading, reliability, topology control, security aspects, and the impact of mobility. Some of the papers contain precise analytical results while other ones are devoted to solving specific practical problems of implementation and deployment.
I3E 2009 was held in Nancy, France, during September 23-25, hosted by Nancy University and INRIA Grand-Est at LORIA. The conference provided scientists andpractitionersofacademia, industryandgovernmentwithaforumwherethey presented their latest ?ndings concerning application of e-business, e-services and e-society, and the underlying technology to support these applications. The 9th IFIP Conference on e-Business, e-Services and e-Society, sponsored by IFIP WG 6.1. of Technical Committees TC6 in cooperation with TC11, and TC8 represents the continuation of previous events held in Zurich (Switzerland) in 2001, Lisbon (Portugal) in 2002, Sao Paulo (Brazil) in 2003, Toulouse (France) in 2004, Poznan (Poland) in 2005, Turku (Finland) in 2006, Wuhan (China) in 2007 and Tokyo (Japan) in 2008. The call for papers attracted papers from 31 countries from the ?ve con- nents. As a result, the I3E 2009 programo?ered 12 sessions of full-paper pres- tations. The 31 selected papers cover a wide and important variety of issues in e-Business, e-servicesande-society, including security, trust, andprivacy, ethical and societal issues, business organization, provision of services as software and software as services, and others. Extended versions of selected papers submitted to I3E 2009 will be published in the International Journal of e-Adoption and in AIS Transactions on Enterprise Systems. In addition, a 500-euros prize was awarded to the authors of the best paper selected by the Program Comm- tee. We thank all authors who submitted their papers, the Program Committee members and external reviewers for their excellent
Most real-world spectrum analysis problems involve the computation of the real-data discrete Fourier transform (DFT), a unitary transform that maps elements N of the linear space of real-valued N-tuples, R , to elements of its complex-valued N counterpart, C , and when carried out in hardware it is conventionally achieved via a real-from-complex strategy using a complex-data version of the fast Fourier transform (FFT), the generic name given to the class of fast algorithms used for the ef?cient computation of the DFT. Such algorithms are typically derived by explo- ing the property of symmetry, whether it exists just in the transform kernel or, in certain circumstances, in the input data and/or output data as well. In order to make effective use of a complex-data FFT, however, via the chosen real-from-complex N strategy, the input data to the DFT must ?rst be converted from elements of R to N elements of C . The reason for choosing the computational domain of real-data problems such N N as this to be C , rather than R , is due in part to the fact that computing equ- ment manufacturers have invested so heavily in producing digital signal processing (DSP) devices built around the design of the complex-data fast multiplier and accumulator (MAC), an arithmetic unit ideally suited to the implementation of the complex-data radix-2 butter?y, the computational unit used by the familiar class of recursive radix-2 FFT algorithms.
Over recent years, a considerable amount of effort has been devoted, both in industry and academia, towards the performance modelling, evaluation and prediction of Asynchronous Transfer Mode (ATM) networks. This book describes recent advances in ATM networks reflecting the state-of-the-art technology and research achievements worldwide. In addition, it provides a fundamental source of reference in the ATM field. Research topics discussed in detail include: * Traffic Modelling and Characterisation; * Routing; * Switch and Multiplexer Models; * Call Admission Control (CAC); * Congestion Control; * Resource Allocation; * Quality of Service (QoS); * Tools and Techniques. This volume contains recently extended refereed papers of the 5th International Workshop on Performance Modelling and Evaluation of ATM Networks, which was sponsored by the International Federation for Information Processing (IFIP) and held in Ilkley, UK in July 1997.Performance Analysis of ATM Networks continues the tradition established by the first three IFIP volumes on the subject, and it is ideal for personnel in computer/communication industries as well as academic and research staff in computer science and electrical engineering.
This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Smart Card Research and Advanced Applications, CARDIS 2012, held in Graz, Austria, in November 2012. The 18 revised full papers presented together with an invited talk were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on Java card security, protocols, side-channel attacks, implementations, and implementations for resource-constrained devices.
The idea of this book comes from the observation that sensor networks represent a topic of interest from both theoretical and practical perspectives. The title und- lines that sensor networks offer the unique opportunity of clearly linking theory with practice. In fact, owing to their typical low-cost, academic researchers have the opportunity of implementing sensor network testbeds to check the validity of their theories, algorithms, protocols, etc., in reality. Likewise, a practitioner has the opportunity of understanding what are the principles behind the sensor networks under use and, thus, how to properly tune some accessible network parameters to improve the performance. On the basis of the observations above, the book has been structured in three parts: PartIisdenotedas"Theory,"sincethetopicsofits vechaptersareapparently "detached" from real scenarios; Part II is denoted as "Theory and Practice," since the topics of its three chapters, altough theoretical, have a clear connection with speci c practical scenarios; Part III is denoted as "Practice," since the topics of its ve chapters are clearly related to practical applications.
This book constitutes the refereed proceedings of the Third International Conference on Autonomous and Intelligent Systems, AIS 2012, held in Aveiro, Portugal, in June 2012, collocated with the International Conference on Image Analysis and Recognition, IACIAR 2012. The 31 revised full papers were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on autonomous sensors and sensor systems, autonomous systems and intelligent control with applications, intelligent fuzzy systems, intelligent robotics, intelligent knowledge management, swarm and evolutionary methods, and applications
This book constitutes the thoroughly refereed conference proceedings of the 4th International Conference on E-Voting and Identity, Vote ID 2013, held in Guildford, UK, during July 17-19, 2013. The 12 revised full papers presented were carefully selected from 26 submissions. The papers include a range of works on end-to-end verifiable election systems, verifiably correct complex tallying algorithms, human perceptions of verifiability, formal models of verifiability and, of course, attacks on systems formerly advertised as verifiable.
This book constitutes the refereed proceedings of the First International Conference on Wireless Sensor Networks for Developing Countries, WSN4DC 2013, held in Jamshoro, Pakistan, in April 2013. The 10 revised full papers presented were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on WSN applications/services for developing countries; mobile WSN; underwater WSN; VANETS; body area networks; energy harvesting in WSN; WSN and cloud integration; WSN and IoT; QoS and Qot; WSN MAC, network and transport protocols; cross layer approaches; security aspects in WSN; WSN applications in smart grid and energy management; WSN in structural health monitoring.
Research in context-aware computing has produced a number of middleware systems for context management. However, development of ubiquitous context-aware applications is still a challenge because most current middleware systems are still focused on isolated and static context-aware environments. Context-aware environments are inherently dynamic as a result of occasional additions or upgrade of sensors, applications or context inference mechanisms. Context Management for Distributed and Dynamic Context-Aware Computing proposes a novel architecture for context management based on the concept of context domains, allowing applications to keep context interests across distributed context management systems. The authors describe a distributed middleware that implements the aforementioned concepts, without compromising scalability and efficiency of context access.
This book is dedicated to Marek Sergot, Professor in Computational Logic at Imperial College London, on the occasion of his 60th birthday. Professor Sergot's scientific contributions range over many different fields. He has developed a series of novel ideas and formal methods bridging areas including artificial intelligence, computational logic, philosophical logic, legal theory, artificial intelligence and law, multi-agent systems and bioinformatics. By combining his background in logic and computing with his interest in the law, deontic logic, action, and related areas, and applying to all his capacity to understand the subtleties of social interaction and normative reasoning, Professor Sergot has opened up new directions of research, and has been a reference, an inspiration, and a model for many researchers in the fields to which he has contributed. The Festschrift includes several reminiscences and introductory essays describing Professor Sergot's achievements, followed by a series of articles on logic programming, temporal reasoning and action languages, artificial intelligence and law, deontic logic and norm-governed systems, and logical approaches to policies.
This book constitutes the refereed proceedings of the 8th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2013, held in Zhangjiajie, China, in August 2013. The 25 revised full papers presented together with 18 invited papers were carefully reviewed and selected from 80 submissions. The papers cover the following topics: effective and efficient state-of-the-art algorithm design and analysis, reliable and secure system development and implementations, experimental study and testbed validation, and new application exploration in wireless networks.
This 2-Volume-Set, CCIS 0269-CCIS 0270, constitutes the refereed proceedings of the International Conference on Global Trends in Computing and Communication (CCIS 0269) and the International Conference on Global Trends in Information Systems and Software Applications (CCIS 0270), ObCom 2011, held in Vellore, India, in December 2011. The 173 full papers presented together with a keynote paper and invited papers were carefully reviewed and selected from 842 submissions. The conference addresses issues associated with computing, communication and information. Its aim is to increase exponentially the participants' awareness of the current and future direction in the domains and to create a platform between researchers, leading industry developers and end users to interrelate.
In Ambient Intelligence (AmI) systems, reasoning is fundamental for triggering actions or adaptations according to specific situations that may be meaningful and relevant to some applications. However, such reasoning operations may need to evaluate context data collected from distributed sources and stored in different devices, as usually not all context data is readily available to the reasoners within the system. Decentralized Reasoning in Ambient Intelligence proposes a decentralized reasoning approach for performing rule-based reasoning about context data targeting AmI systems. For this purpose, the authors define a context model assuming context data distributed over two sides: the user side, represented by the users and their mobile devices, and the ambient side, represented by the fixed computational infrastructure and ambient services. They formalize the cooperative reasoning operation - in which two entities cooperate to perform decentralized rule-based reasoning - and define a complete process to perform this operation.
1.1 Scope This paper deals with the following subjects: 1. Introduction 2. Feasibility study definition in IT 3. Forming a feasibility study team 4. The feasibility study work 5. The feasibility study report 6. Discussion 1.2 Information Technology (IT) Information was defined as anything sensed by at least one of the human senses and that may change the level of his knowledge. The information may be true or false, sent by premeditation or generated by coincidence, needed by the interceptor or intended to create new needs. The creation of the information may be very costly or free of charge. The information may be an essential need or just a luxury. Each information may be a one shot nature, eg., announcing a marriage, or a constant update need one, eg., news. Information technology as defined herein means all the types of systems needed to deal wi.th the information, transfer it to any place, store it, adapt it, etc. Information technology is usually bused on Telecommunications. Telecommunications means a large variety of possibilities. Usually, the IT's are based on the creation, updating, processing and transmission of information. The information itself is usually alphanumeric and graphic. Gradually, there is a tendency to step over to what is seen as more natural information, audio and visual.
Systematic Design of Sigma-Delta Analog-to-Digital Converters
describes the issues related to the sigma-delta analog-to-digital
converters (ADCs) design in a systematic manner: from the top level
of abstraction represented by the filters defining signal and noise
transfer functions (STF, NTF), passing through the architecture
level where topology-related performance is calculated and
simulated, and finally down to parameters of circuit elements like
resistors, capacitors, and amplifier transconductances used in
individual integrators. The systematic approach allows the
evaluation of different loop filters (order, aggressiveness,
discrete-time or continuous-time implementation) with quantizers
varying in resolution. Topologies explored range from simple single
loops to multiple cascaded loops with complex structures including
more feedbacks and feedforwards. For differential circuits, with
switched-capacitor integrators for discrete-time (DT) loop filters
and active-RC for continuous-time (CT) ones, the passive integrator
components are calculated and the power consumption is estimated,
based on top-level requirements like harmonic distortion and noise
budget.
The book constitutes the refereed proceedings of the 11th International Conference on Software Composition, SC 2012, held in Prague, Czech Republic, in May/June 2012, co-located with TOOLS 2012 Federated Conferences. The 12 revised full papers were carefully reviewed and selected from 42 submissions for inclusion in the book. The papers reflect all current research in software composition and are organized in topical sections on software composition in specification languages; context-aware and dynamic composition; composition in software development; and applications of software composition.
This book constitutes the refereed proceedings of the International Conference on Advances in Security of Information and Communication Networks, Sec Net 2013, held in Cairo, Egypt, in September 2013. The 21 revised full papers presented were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on networking security; data and information security; authentication and privacy; security applications. "
This two-volume set (CCIS 267 and CCIS 268) constitutes the refereed proceedings of the International Conference on Information and Business Intelligence, IBI 2011, held in Chongqing, China, in December 2011. The 229 full papers presented were carefully reviewed and selected from 745 submissions. The papers address topics such as communication systems; accounting and agribusiness; information education and educational technology; manufacturing engineering; multimedia convergence; security and trust computing; business teaching and education; international business and marketing; economics and finance; and control systems and digital convergence.
This book constitutes the refereed proceedings of the 9th Extended Semantic Web Conference, ESWC 2012, held in Heraklion, Crete, Greece, in May 2012. The 53 revised full papers presented were carefully reviewed and selected from 212 submissions. They are organized in tracks on linked open data, machine learning, natural language processing and information retrieval, ontologies, reasoning, semantic data management, services, processes, and cloud computing, social Web and Web science, in-use and industrial, digital libraries and cultural heritage, and e-government. The book also includes 13 PhD papers presented at the PhD Symposium.
This book constitutes the refereed proceedings of the 10th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2013, held in Berlin, Germany, in July 2013. The 9 revised full papers presented together with 3 short papers were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on malware; network security, Web security; attacks and defenses; and host security.
This Festschrift volume, published in honour of J. Ian Munro, contains contributions written by some of his colleagues, former students, and friends. In celebration of his 66th birthday the colloquium "Conference on Space Efficient Data Structures, Streams and Algorithms" was held in Waterloo, ON, Canada, during August 15-16, 2013. The articles presented herein cover some of the main topics of Ian's research interests. Together they give a good overall perspective of the last 40 years of research in algorithms and data structures.
As part of the NSF's EXPRES project, the authors investigated ways to interchange multi-media documents among diverse systems. Their investigations led to an analysis and implementation of multi-media document format translation in general, and of the ODA standard in particular. ODA, Office Document Architecture, is a new ISO and CCITT international standard for representing multi- media documents. The results of their investigations are presented in this book. The book contains overview information about multi-media document architecture and formats, an introduction to ODA, detailed technical specifications on how to use ODA for multi-media document format translation, and the authors' experiences in implementing and using ODA. The book also contains a complete user manual for the authors' publically available ODA software: tool kits for manipulating ODA and raster formats, tools for examining ODA documents and sample translators between ODA and several other multi-media formats. This book provides comprehensive information about ODA for a large audience. Planners can get basic information about using ODA for interoperation of multi-media systems. Researchers receive detailed discussions about the advantages and problems of using ODA for document representation, format translation and archival storage. System designers can use the technical descriptions of translators and tools in specifying their own. System builders can easily obtain the software as a basis for prototyping and investigating their own ODA implementations.
This book presents the proceedings of the 1st International Symposium on Intelligent and Distributed Computing, IDC 2007, held in Craiova, Romania, October 2007. Coverage includes: autonomous and adaptive computing; data mining and knowledge discovery; distributed problem solving and decision making; e-business, e-health and e-learning; genetic algorithms; image processing; information retrieval; intelligence in mobile and ubiquitous computing.
Though the reductionist approachto biology and medicine has led to several imp- tant advances, further progresses with respect to the remaining challenges require integration of representation, characterization and modeling of the studied systems along a wide range of spatial and time scales. Such an approach, intrinsically - lated to systems biology, is poised to ultimately turning biology into a more precise and synthetic discipline, paving the way to extensive preventive and regenerative medicine [1], drug discovery [20] and treatment optimization [24]. A particularly appealing and effective approach to addressing the complexity of interactions inherent to the biological systems is provided by the new area of c- plex networks [34, 30, 8, 13, 12]. Basically, it is an extension of graph theory [10], focusing on the modeling, representation, characterization, analysis and simulation ofcomplexsystemsbyconsideringmanyelementsandtheirinterconnections.C- plex networks concepts and methods have been used to study disease [17], tr- scription networks [5, 6, 4], protein-protein networks [22, 36, 16, 39], metabolic networks [23] and anatomy [40]. |
You may like...
Malicious Attack Propagation and Source…
Jiaojiao Jiang, Sheng Wen, …
Hardcover
R3,336
Discovery Miles 33 360
Handbook of Multimedia Information…
Amit Kumar Singh, Anand Mohan
Hardcover
R6,633
Discovery Miles 66 330
Engineering Scalable, Elastic, and…
Steffen Becker, Gunnar Brataas, …
Hardcover
R2,017
Discovery Miles 20 170
Fault Tolerant Architectures for…
Sikhar Patranabis, Debdeep Mukhopadhyay
Hardcover
R3,802
Discovery Miles 38 020
5G-Enabled Vehicular Communications and…
Xiang Cheng, Rongqing Zhang, …
Hardcover
R3,106
Discovery Miles 31 060
Architectural Design - Conception and…
Chris A. Vissers, Luis Ferreira Pires, …
Hardcover
|