![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet > Network computers
This book constitutes the refereed proceedings of the 7th China Conference of Wireless Sensor Networks, held in Qingdao, China, in October 2013. The 35 revised full papers were carefully reviewed and selected from 191 submissions. The papers cover a wide range of topics in the wireless sensor network fields like node systems, infrastructures, communication protocols, data management.
The three-volume set IFIP AICT 368-370 constitutes the refereed post-conference proceedings of the 5th IFIP TC 5, SIG 5.1 International Conference on Computer and Computing Technologies in Agriculture, CCTA 2011, held in Beijing, China, in October 2011. The 189 revised papers presented were carefully selected from numerous submissions. They cover a wide range of interesting theories and applications of information technology in agriculture, including simulation models and decision-support systems for agricultural production, agricultural product quality testing, traceability and e-commerce technology, the application of information and communication technology in agriculture, and universal information service technology and service systems development in rural areas. The 62 papers included in the first volume focus on decision support systems, intelligent systems, and artificial intelligence applications.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th IFIP TC 6 International Workshop on Self-Organizing Systems, IWSOS 2013, held in Palma de Mallorca, Spain, in May 2013. The 11 revised full papers and 9 short papers presented were carefully selected from 35 paper submissions. The papers are organized in following topics: design and analysis of self-organizing and self-managing systems, inspiring models of self-organization in nature and society, structure, characteristics and dynamics of self-organizing networks, self-organization in techno-social systems, self-organized social computation and self-organized communication systems.
This book constitutes the refereed proceedings of the Second International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014, held in Trivandrum, India, in March 2014. The 32 revised full papers presented together with 9 short papers and 8 workshop papers were carefully reviewed and selected from 129 submissions. The papers are organized in topical sections on security and privacy in networked systems; multimedia security; cryptosystems, algorithms, primitives; system and network security; short papers. The workshop papers were presented at the following workshops: Second International Workshop on Security in Self-Organising Networks (Self Net 2014); Workshop on Multidisciplinary Perspectives in Cryptology and Information Security (CIS 2014); Second International Workshop on Trust and Privacy in Cyberspace (Cyber Trust 2014).
This book constitutes the refereed proceedings of the 6th International Symposium on Engineering Secure Software and Systems, ESSoS 2014, held in Munich, Germany, in February 2014. The 11 full papers presented together with 4 idea papers were carefully reviewed and selected from 55 submissions. The symposium features the following topics: model-based security, formal methods, web and mobile security and applications.
Born after World War II, large-scale experimental high-energy physics (HEP) has found itself limited ever since by available accelerator, detector and computing technologies. Accordingly, HEP has made significant contributions to the development of these fields, more often than not driving their innovations. The invention of the World Wide Web at CERN is merely the best-known example out of many. This book is the first comprehensive account to trace the history of this pioneering spirit in the field of computing technologies. It covers everything up to and including the present-day handling of the huge demands imposed upon grid and distributed computing by full-scale LHC operations operations which have for years involved many thousands of collaborating members worldwide and accordingly provide the original and natural testbed for grid computing concepts. This book takes the reader on a guided tour encompassing all relevant topics, including programming languages, software engineering, large databases, the Web, and grid- and cloud computing. The important issue of intellectual property regulations for distributed software engineering and computing is also addressed. Aptly, the book closes with a visionary chapter of what may lie ahead. Approachable and requiring only basic understanding of physics and computer sciences, this book is intended for both education and research."
This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Critical Information Infrastructures Security, CRITIS 2013, held in Amsterdam, The Netherlands, in September 2013. The 16 revised full papers and 4 short papers were thoroughly reviewed and selected from 57 submissions. The papers are structured in the following topical sections: new challenges, natural disasters, smart grids, threats and risk, and SCADA/ICS and sensors.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Security and Privacy in Communication Networks, held in Sydney, Australia, in September 2013. The 26 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are grouped in topical sections on: security and privacy in mobile, sensor and ad hoc networks; malware, botnets and distributed denial of service; security for emerging technologies: VoIP, peer-to-peer and cloud computing; encryption and key management; security in software and machine learning; network and system security model; security and privacy in pervasive and ubiquitous computing.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International ICST Conference on Sensor Systems and Software, S-Cube 2013, held in Lucca, Italy, 2013. The 8 revised full papers and 2 invited papers presented cover contributions on different technologies for wireless sensor networks, including security protocols, middleware, analysis tools and frameworks.
Since the early 1990s, the wireless communications field has witnessed explosive growth. The wide range of applications and existing new technologies nowadays stimulated this enormous growth and encouraged wireless applications. The new wireless networks will support heterogeneous traffic, consisting of voice, video, and data (multimedia). This necessitated looking at new wireless generation technologies and enhance its capabilities. This includes new standards, new levels of Quality of Service (QoS), new sets of protocols and architectures, noise reduction, power control, performance enhancement, link and mobility management, nomadic and wireless networks security, and ad-hoc architectures. Many of these topics are covered in this textbook. The aim of this book is research and development in the area of broadband wireless communications and sensor networks. It is intended for researchers that need to learn more and do research on these topics. But, it is assumed that the reader has some background about wireless communications and networking. In addition to background in each of the chapters, an in-depth analysis is presented to help our readers gain more R&D insights in any of these areas. The book is comprised of 22 chapters, written by a group of well-known experts in their respective fields. Many of them have great industrial experience mixed with proper academic background.
This book constitutes the refereed proceedings of the 15th International Conference on Passive and Active Measurement, PAM 2014, held in Los Angeles, CA, USA, in 2014. The 24 revised full papers presented were carefully reviewed and selected from 76 submissions. The papers have been organized in the following topical sections: internet wireless and mobility; measurement design, experience and analysis; performance measurement; protocol and application behavior; characterization of network behavior; and network security and privacy. In addition 7 poster papers have been included.
This book constitutes the proceedings of the 27th International Conference on Architecture of Computing Systems, ARCS 2014, held in Lubeck, Germany, in February 2014. The 20 papers presented in this volume were carefully reviewed and selected from 44 submissions. They are organized in topical sections named: parallelization: applications and methods; self-organization and trust; system design; system design and sensor systems; and virtualization: I/O, memory, cloud; dependability: safety, security, and reliability aspects."
This book constitutes the refereed post-conference proceedings of the 44th International Simulation and Gaming Association Conference, ISAGA 2013, and the IFIP WG 5.7 Workshop on Experimental Interactive Learning in Industrial Management, held in Stockholm, Sweden, in June 2013 The 30 revised full papers were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on frontiers in gaming simulation for education; frontiers in gaming simulation for design and experimentation; frontiers in gaming simulation for transportation and logistics; and professionalism and business in gaming simulation.
This book constitutes the refereed proceedings of the 11th
European Conference on Wireless Sensor Networks, EWSN 2014, held in
Oxford, UK, in February 2014.
This brief investigates spectrum efficient and energy efficient strategies, known as cognitive radio networks (CRNs), to ensure secure cooperation between licensed and unlicensed users. The authors address issues of spectrum scarcity, spectrum sensing, transmission performance, trust-aware cooperation, and secure communications. Two security-aware cooperation based spectrum access schemes are presented. The first is a trust-aware cooperative framework for CRNs to improve the throughput or energy efficiency of licensed users and offer transmission opportunities to unlicensed users, taking into consideration the trustworthiness of unlicensed users. The second scheme is a cooperative framework to enhance secure communications of licensed users. An introduction to CRNs and literature survey enhance the discussion while numerical results are provided to demonstrate the viability of the proposed schemes. The brief is designed for researchers and professionals working with cognitive radio networks or interested in cooperation based access. Advanced-level students studying computer communication networks and communications engineering will also find this brief useful.
The subject of computer communications is changing very rapidly. Improvements in terminal access, aligned with the development of timesharing, has brought hands-on experience to a large number of non specialist users. Computer networks have made available vast computing resources and data banks to these users. This book is for anyone familiar with using computers who wishes to understand the techniques used in computer communications. It is also an introduction to the architecture of present day computer communication systems. I would like to thank Roland lbbett, Steve Treadwell, Peter Kirstein and Del Thomas for their invaluable advice and encouragement. My thanks also to Malcolm Stewart and the staff at Macmillan. The late Gareth Pugh encouraged my interest in computer communications and provided the opportunity to develop the material for this book. The text was formatted on a UNIX computer system: I am grateful to Professor Kirstein for permission to use this system. I am indebted to NEC Telecommunications Europe for the use of a spinwriter printer on which the master copy was produced. Finally, no amount of words can express my debt to Jo this project and Rosemary for patiently bearing with over the last three years.
The huge bandwidth of optical fiber was recognized back in the 1970s during the early development of fiber optic technology. For the last two decades, the capacity of experimental and deployed systems has been increasing at a rate of 100-fold each decade-a rate exceeding the increase of integrated circuit speeds. Today, optical communication in the public communication networks has developed from the status of a curiosity into being the dominant technology. Various great challenges arising from the deployment of the wavelength division multiplexing (WDM) have attracted a lot of efforts from many researchers. Indeed, the optical networking has been a fertile ground for both theoretical researches and experimental studies. This monograph presents the contribution from my past and ongoing research in the optical networking area. The works presented in this book focus more on graph-theoretical and algorithmic aspects of optical networks. Although this book is limited to the works by myself and my coauthors, there are many outstanding achievements made by other individuals, which will be cited in many places in this book. Without the inspiration from their efforts, this book would have never been possible. This monograph is divided into four parts: * Multichannel Optical Networking Architectures, * Broadcast-and-Select Passive Optical Networks, * Wavelength-Switched Optical Networks, * SONET/WDM Optical Networks. The first part consists of the first three chapters. Chapter 1 pro vides a brief survey on the networking architectures of optical trans- XVll xvm MULTICHANNEL OPTICAL NETWORKS port networks, optical access networks and optical premise networks.
This book constitutes the thoroughly refereed post-conference proceedings of the 10th European Workshop, EuroPKI 2013, held in Egham, UK, in September 2013. The 11 revised full papers presented together with 1 invited talk were carefully selected from 20 submissions. The papers are organized in topical sections such as authorization and delegation, certificates management, cross certification, interoperability, key management, legal issues, long-time archiving, time stamping, trust management, trusted computing, ubiquitous scenarios and Web services security.
This book constitutes the refereed proceedings of the First International Conference on Applied Algorithms, ICAA 2014, held in Kolkata, India, in January 2014. ICAA is a new conference series with a mission to provide a quality forum for researchers working in applied algorithms. Papers presenting original contributions related to the design, analysis, implementation and experimental evaluation of efficient algorithms and data structures for problems with relevant real-world applications were sought, ideally bridging the gap between academia and industry. The 21 revised full papers presented together with 7 short papers were carefully reviewed and selected from 122 submissions.
This brief presents a peer-to-peer (P2P) web-hosting infrastructure (named pWeb) that can transform networked, home-entertainment devices into lightweight collaborating Web servers for persistently storing and serving multimedia and web content. The issues addressed include ensuring content availability, Plexus routing and indexing, naming schemes, web ID, collaborative web search, network architecture and content indexing. In pWeb, user-generated voluminous multimedia content is proactively uploaded to a nearby network location (preferably within the same LAN or at least, within the same ISP) and a structured P2P mechanism ensures Internet accessibility by tracking the original content and its replicas. This new paradigm of information management strives to provide low or no-cost cloud storage and entices the end users to upload voluminous multimedia content to the cloud data centers. However, it leads to difficulties in privacy, network architecture and content availability. Concise and practical, this brief examines the benefits and pitfalls of the pWeb web-hosting infrastructure. It is designed for professionals and practitioners working on P2P and web management and is also a useful resource for advanced-level students studying networks or multimedia.
This two volume set LNCS 8285 and 8286 constitutes the proceedings of the 13th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2013, held in Vietri sul Mare, Italy in December 2013. The first volume contains 10 distinguished and 31 regular papers selected from 90 submissions and covering topics such as big data, multi-core programming and software tools, distributed scheduling and load balancing, high-performance scientific computing, parallel algorithms, parallel architectures, scalable and distributed databases, dependability in distributed and parallel systems, wireless and mobile computing. The second volume consists of four sections including 35 papers from one symposium and three workshops held in conjunction with ICA3PP 2013 main conference. These are 13 papers from the 2013 International Symposium on Advances of Distributed and Parallel Computing (ADPC 2013), 5 papers of the International Workshop on Big Data Computing (BDC 2013), 10 papers of the International Workshop on Trusted Information in Big Data (TIBiDa 2013) as well as 7 papers belonging to Workshop on Cloud-assisted Smart Cyber-Physical Systems (C-Smart CPS 2013).
This book constitutes the refereed post-proceedings of the 10th International Symposium on Advanced Parallel Processing Technologies, APPT 2013, held in Stockholm, Sweden, in August 2013. The 30 revised full papers presented were carefully reviewed and selected from 62 submissions. The papers cover a wide range of topics capturing some of the state of the art and practice in parallel architecture, parallel software, concurrent and distributed systems, and cloud computing, with a highlight on computing systems for big data applications.
The two-volume set LNCS 8297 and LNCS 8298 constitutes the proceedings of the 4th International Conference on Swarm, Evolutionary and Memetic Computing, SEMCCO 2013, held in Chennai, India, in December 2013. The total of 123 papers presented in this volume set was carefully reviewed and selected for inclusion in the proceedings. They cover cutting-edge research on swarm, evolutionary and memetic computing, neural and fuzzy computing and its application.
This book constitutes the thoroughly refereed proceedings of the Second International Conference on Cloud Computing and Services Science, CLOSER 2012, held in Porto, Portugal, in April 2012. The 15 papers were selected from 145 submissions and are presented together with one invited paper. The papers cover the following topics: cloud computing fundamentals, services science foundation for cloud computing, cloud computing platforms and applications, and cloud computing enabling technology.
This book constitutes the proceedings of the 6th International Conference on Advances in Information Technology, IAIT 2013, held in Bangkok, Thailand, in December 2013. The 23 revised papers presented in this volume were carefully reviewed and selected from numerous submissions. They deal with all areas related to applied information technology. |
![]() ![]() You may like...
Learning-Based Reconfigurable Multiple…
Tho Le-Ngoc, Atoosa Dalili Shoaei
Hardcover
R2,931
Discovery Miles 29 310
Privacy-Preserving in Edge Computing
Longxiang Gao, Tom H. Luan, …
Hardcover
R4,130
Discovery Miles 41 300
Computational Intelligence in Data…
Vallidevi Krishnamurthy, Suresh Jaganathan, …
Hardcover
R2,621
Discovery Miles 26 210
Cyber-Physical Systems - Foundations…
Houbing Song, Danda B. Rawat, …
Paperback
|