0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (4)
  • R250 - R500 (19)
  • R500+ (4,514)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

Algorithms and Architectures for Parallel Processing - 13th International Conference, ICA3PP 2013, Vietri sul Mare, Italy,... Algorithms and Architectures for Parallel Processing - 13th International Conference, ICA3PP 2013, Vietri sul Mare, Italy, December 18-20, 2013, Proceedings, Part II (Paperback, 2013 ed.)
Rocco Aversa, Joanna Kolodziej, Jun Zhang, Flora Amato, Fortino Giancarlo
R2,500 Discovery Miles 25 000 Ships in 10 - 15 working days

This two volume set LNCS 8285 and 8286 constitutes the proceedings of the 13th International Conference on Algorithms and Architectures for Parallel Processing , ICA3PP 2013, held in Vietri sul Mare, Italy in December 2013. The first volume contains 10 distinguished and 31 regular papers selected from 90 submissions and covering topics such as big data, multi-core programming and software tools, distributed scheduling and load balancing, high-performance scientific computing, parallel algorithms, parallel architectures, scalable and distributed databases, dependability in distributed and parallel systems, wireless and mobile computing. The second volume consists of four sections including 35 papers from one symposium and three workshops held in conjunction with ICA3PP 2013 main conference. These are 13 papers from the 2013 International Symposium on Advances of Distributed and Parallel Computing (ADPC 2013), 5 papers of the International Workshop on Big Data Computing (BDC 2013), 10 papers of the International Workshop on Trusted Information in Big Data (TIBiDa 2013) as well as 7 papers belonging to Workshop on Cloud-assisted Smart Cyber-Physical Systems (C-Smart CPS 2013).

Frontiers in Internet Technologies - Second CCF Internet Conference of China, ICoC 2013, Zhangjiajie, China. Revised Selected... Frontiers in Internet Technologies - Second CCF Internet Conference of China, ICoC 2013, Zhangjiajie, China. Revised Selected Papers (Paperback, 2013 ed.)
Jinshu Su, Zhigang Sun, Baokang Zhao, Xiaofeng Wang, Fei Wang
R2,346 Discovery Miles 23 460 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second CCF Internet Conference of China, ICoC 2013, held in Zhangjiajie, China, in July 2013. The 24 revised full papers presented were carefully reviewed and selected from 63 submissions. The papers address issues such as future Internet architecture, Internet routing, network security, network management, data center networks, green networks, wireless networks, P2P networks, mobile Internet and the Internet of Things.

Information Computing and Applications - 4th International Conference, ICICA 2013, Singapore, August 16-18, 2013. Revised... Information Computing and Applications - 4th International Conference, ICICA 2013, Singapore, August 16-18, 2013. Revised Selected Papers, Part I (Paperback, 2013 ed.)
Yuhang Yang, Maode Ma, Baoxiang Liu
R1,657 Discovery Miles 16 570 Ships in 10 - 15 working days

This two-volume set of CCIS 391 and CCIS 392 constitutes the refereed proceedings of the Fourth International Conference on Information Computing and Applications, ICICA 2013, held in Singapore, in August 2013. The 126 revised full papers presented in both volumes were carefully reviewed and selected from 665 submissions. The papers are organized in topical sections on Internet computing and applications; engineering management and applications; intelligent computing and applications; control engineering and applications; cloud and evolutionary computing; knowledge management and applications; computational statistics and applications.

Soft Computing in Communications (Paperback, Softcover reprint of the original 1st ed. 2004): Lipo Wang Soft Computing in Communications (Paperback, Softcover reprint of the original 1st ed. 2004)
Lipo Wang
R4,478 Discovery Miles 44 780 Ships in 10 - 15 working days

Soft computing, as opposed to conventional "hard" computing, tolerates imprecision and uncertainty, in a way very much similar to the human mind. Soft computing techniques include neural networks, evolutionary computation, fuzzy logic, and chaos. The recent years have witnessed tremendous success of these powerful methods in virtually all areas of science and technology, as evidenced by the large numbers of research results published in a variety of journals, conferences, as weil as many excellent books in this book series on Studies in Fuzziness and Soft Computing. This volume is dedicated to recent novel applications of soft computing in communications. The book is organized in four Parts, i.e., (1) neural networks, (2) evolutionary computation, (3) fuzzy logic and neurofuzzy systems, and (4) kernel methods. Artificial neural networks consist of simple processing elements called neurons, which are connected by weights that may be adjusted during learning. Part 1 of the book has seven chapters, demonstrating some of the capabilities of two major types of neural networks, i.e., multiplayer perceptron (MLP) neural networks and Hopfield-type neural networks.

Heavy Traffic Analysis of Controlled Queueing and Communication Networks (Paperback, Softcover reprint of the original 1st ed.... Heavy Traffic Analysis of Controlled Queueing and Communication Networks (Paperback, Softcover reprint of the original 1st ed. 2001)
Harold Kushner
R1,613 Discovery Miles 16 130 Ships in 10 - 15 working days

One of the first books in the timely and important area of heavy traffic analysis of controlled and uncontrolled stochastics networks, by one of the leading authors in the field. The general theory is developed, with possibly state dependent parameters, and specialized to many different cases of practical interest.

Webvertising - The Ultimate Internet Advertising Guide (Paperback, Softcover reprint of the original 1st ed. 2000): SCN... Webvertising - The Ultimate Internet Advertising Guide (Paperback, Softcover reprint of the original 1st ed. 2000)
SCN Education BV; Edited by SCN Education BV
R1,556 Discovery Miles 15 560 Ships in 10 - 15 working days

'There is no doubt', dr. Kevin Nunley wrote, 'the Internet really is the biggest gold rush of our lifetime. It is unlikely you or I will get another chance as big as this one to earn huge profits anytime in the next 100 years. Someday people will look back and judge us as one of two groups: those who didn't recognize the Internet revolution and missed the greatest chance of our age, and those who smartly made a place for themselves in the new business model that will dominate the future. It is time to get on board. ' Ing. Adrian Mulder Content Editor Adrian Mulder is an Internet journalist who writes for major business computing magazines. He combines a technical background with a vast experience in the computer and business trade magazine industry The Ultimate Internet Advertising Guide Acknowledgements Many people and professionals have contributed directly or indirectly to this book. To name them all would be practically impossible, as there are many. Nevertheless the editors would like to mention a few of those who have made the production of this book possible. Executive Editor for SCN Education BV: Robert Pieter Schotema Publishing Manager: drs. Marieke Kok Marketing Coordinator: Martijn Robert Broersma Content Editor: ing. Adrian Mulder Editorial Support Dennis Gaasbeek, Rob Guijt, Richard van Winssen Interior Design: Paulien van Hemmen, Bach. Also, we would especially like to thank dr. Roland van Stigt for laying a solid foundation for the Hon Guide series to grow on.

Middleware 2013 - ACM/IFIP/USENIX 14th International Middleware Conference, Beijing, China, December 9-13, 2013, Proceedings... Middleware 2013 - ACM/IFIP/USENIX 14th International Middleware Conference, Beijing, China, December 9-13, 2013, Proceedings (Paperback, 2013)
David Eyers, Karsten Schwan
R3,006 Discovery Miles 30 060 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the ACM/IFIP/USENIX 14th International Middleware Conference, held in Beijing, China, in December 2013. The 24 revised full papers presented were carefully reviewed and selected from 189 submissions. The papers cover a wide range of topics including design, implementation, deployment and evaluation of middleware for next-generation platforms such as cloud computing, social networks and large-scale storage and distributed systems. The middleware solutions introduced provide features such as availability, efficiency, scalability, fault-tolerance, trustworthy operation and support security and privacy needs.

Human Computer Interaction - 6th Latin American Conference, CLIHC 2013, Carrillo, Costa Rica, December 2-6, 2013, Proceedings... Human Computer Interaction - 6th Latin American Conference, CLIHC 2013, Carrillo, Costa Rica, December 2-6, 2013, Proceedings (Paperback, 2013 ed.)
Cesar Collazos, Andreia Liborio, Cristian Rusu
R1,993 Discovery Miles 19 930 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 6th bi-annual Latin American Conference on Human-Computer Interaction, CLIHC 2013, held in Guanacasta, Costa Rica, in December 2013. The 11 full papers and 14 short papers were carefully reviewed and selected from 32 submissions. The papers address all current topics in HCI such as: cultural issues, assistive technologies, usability, accessibility, multimodal inter-faces, design issues, HCI education, and visualization and evaluation techniques, among others.

Web and Internet Economics - 9th International Conference, WINE 2013, Cambridge, MA, USA, December 1-14, 2013, Proceedings... Web and Internet Economics - 9th International Conference, WINE 2013, Cambridge, MA, USA, December 1-14, 2013, Proceedings (Paperback, 2013 ed.)
Yiling Chen, Nicole Immorlica
R2,829 Discovery Miles 28 290 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed conference proceedings of the 9th International Conference on Web and Internet Economics, WINE 2013, held in Cambridge, MA, USA, in December 2013. The 36 revised full papers were carefully reviewed and selected from 150 submissions and cover research in theoretical computer science, artificial intelligence and microeconomics.

Bluetooth Security Attacks - Comparative Analysis, Attacks, and Countermeasures (Paperback, 2013 ed.): Keijo Haataja,... Bluetooth Security Attacks - Comparative Analysis, Attacks, and Countermeasures (Paperback, 2013 ed.)
Keijo Haataja, Konstantin Hyppoenen, Sanna Pasanen, Pekka Toivanen
R2,045 Discovery Miles 20 450 Ships in 10 - 15 working days

Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literature-review comparative analysis of recent security attacks. They analyze and explain related countermeasures, including one based on secure simple pairing, and they also propose a novel attack that works against all existing Bluetooth versions. They conclude with a discussion on future research directions. The book is appropriate for practitioners and researchers in information security, in particular those engaged in the design of networked and mobile devices.

Distributed Denial of Service Attack and Defense (Paperback, 2014 ed.): Shui Yu Distributed Denial of Service Attack and Defense (Paperback, 2014 ed.)
Shui Yu
R1,804 Discovery Miles 18 040 Ships in 10 - 15 working days

This brief provides readers a complete and self-contained resource for information about DDoS attacks and how to defend against them. It presents the latest developments in this increasingly crucial field along with background context and survey material. The book also supplies an overview of DDoS attack issues, DDoS attack detection methods, DDoS attack source traceback, and details on how hackers organize DDoS attacks. The author concludes with future directions of the field, including the impact of DDoS attacks on cloud computing and cloud technology. The concise yet comprehensive nature of this brief makes it an ideal reference for researchers and professionals studying DDoS attacks. It is also a useful resource for graduate students interested in cyberterrorism and networking.

Cloud Computing - Third International Conference, CloudComp 2012, Vienna, Austria, September 24-26, 2012, Revised Selected... Cloud Computing - Third International Conference, CloudComp 2012, Vienna, Austria, September 24-26, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Mazin Yousif, Lutz Schubert
R1,819 Discovery Miles 18 190 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post conference proceedings of the Third International Conference on Cloud Computing, Cloud Comp 2012, held in Vienna, Austria, in September 2012. The 14 revised full papers were carefully reviewed and selected from numerous submissions and cover various topics in the application of cloud computing technologies.

Advances in Computer Entertainment - 10th International Conference, ACE 2013, Boekelo, The Netherlands, November 12-15, 2013.... Advances in Computer Entertainment - 10th International Conference, ACE 2013, Boekelo, The Netherlands, November 12-15, 2013. Proceedings (Paperback, 2013 ed.)
Dennis Reidsma, Katayose Haruhiro, Anton Nijholt
R3,047 Discovery Miles 30 470 Ships in 10 - 15 working days

This book constitutes the refereed conference proceedings of the 10th International Conference on Advances in Computer Entertainment, ACE 2013, held in Boekelo, The Netherlands, in November 2013. The 19 full paper and 16 short papers presented together 42 extended abstracts were carefully reviewed and selected from a total of 133 submissions in all categories. The papers cover topics across a wide spectrum of disciplines including new devices; evaluation and user studies; games as interface to serious applications; creating immersion; interfaces; new experiences; procedural approaches and AI; and theory. Focusing on all areas related to interactive entertainment they aim at stimulating discussion in the development of new and compelling entertainment computing and interactive art concepts and applications.

Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, HVC 2013, Haifa, Israel,... Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, HVC 2013, Haifa, Israel, November 5-7, 2013, Proceedings (Paperback, 2013 ed.)
Valeria Bertacco, Axel Legay
R1,567 Discovery Miles 15 670 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 9th International Haifa Verification Conference, HVC 2013, held in Haifa, Israel in November 2013. The 24 revised full papers presented were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on SAT and SMT-based verification, software testing, supporting dynamic verification, specification and coverage, abstraction and model presentation.

Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday (Paperback, 2013):... Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday (Paperback, 2013)
Marc Fischlin, Stefan Katzenbeisser
R1,414 Discovery Miles 14 140 Ships in 10 - 15 working days

Johannes Buchmann is internationally recognized as one of the leading figures in areas of computational number theory, cryptography and information security. He has published numerous scientific papers and books spanning a very wide spectrum of interests; besides R&D he also fulfilled lots of administrative tasks for instance building up and directing his research group CDC at Darmstadt, but he also served as the Dean of the Department of Computer Science at TU Darmstadt and then went on to become Vice President of the university for six years (2001-2007). This festschrift, published in honor of Johannes Buchmann on the occasion of his 60th birthday, contains contributions by some of his colleagues, former students and friends. The papers give an overview of Johannes Buchmann's research interests, ranging from computational number theory and the hardness of cryptographic assumptions to more application-oriented topics such as privacy and hardware security. With this book we celebrate Johannes Buchmann's vision and achievements.

Swarm, Evolutionary, and Memetic Computing - 4th International Conference, SEMCCO 2013, Chennai, India, December 19-21, 2013,... Swarm, Evolutionary, and Memetic Computing - 4th International Conference, SEMCCO 2013, Chennai, India, December 19-21, 2013, Proceedings, Part II (Paperback, 2013 ed.)
Bijaya Ketan Panigrahi, Ponnuthurai Nagaratnam Suganthan, Swagatam Das, Shubhransu Sekhar Dash
R3,045 Discovery Miles 30 450 Ships in 10 - 15 working days

The two-volume set LNCS 8297 and LNCS 8298 constitutes the proceedings of the 4th International Conference on Swarm, Evolutionary and Memetic Computing, SEMCCO 2013, held in Chennai, India, in December 2013. The total of 123 papers presented in this volume was carefully reviewed and selected for inclusion in the proceedings. They cover cutting-edge research on swarm, evolutionary and memetic computing, neural and fuzzy computing and its application.

Distributed Computing and Networking - 15th International Conference, ICDCN 2014, Coimbatore, India, January 4-7, 2014,... Distributed Computing and Networking - 15th International Conference, ICDCN 2014, Coimbatore, India, January 4-7, 2014, Proceedings (Paperback, 2013)
Mainak Chatterjee, Jiannong Cao, Kishore Kothapalli, Sergio Rajsbaum
R1,622 Discovery Miles 16 220 Ships in 10 - 15 working days

This book constitutes the proceedings of the 15th International Conference on Distributed Computing and Networking, ICDCN 2014, held in Coimbatore, India, in January 2014. The 32 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 110 submissions. They are organized in topical sections named: mutual exclusion, agreement and consensus; parallel and multi-core computing; distributed algorithms; transactional memory; P2P and distributed networks; resource sharing and scheduling; cellular and cognitive radio networks and backbone networks.

Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22, 2013, Proceedings... Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22, 2013, Proceedings (Paperback, 2013 ed.)
Michel Abdalla, Cristina Nita-Rotaru, Ricardo Dahab
R1,561 Discovery Miles 15 610 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security, CANS 2013, held in Paraty, Brazil, in November 2013.

The 18 revised full papers presented together with four invited talks were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on cryptanalysis, zero-knowledge protocols, distributed protocols, network security and applications, advanced cryptographic primitives, and verifiable computation.

Testing Software and Systems - 25th IFIP WG 6.1 International Conference, ICTSS 2013, Istanbul, Turkey, November 13-15, 2013,... Testing Software and Systems - 25th IFIP WG 6.1 International Conference, ICTSS 2013, Istanbul, Turkey, November 13-15, 2013, Proceedings (Paperback, 2013 ed.)
Husnu Yenigun, Cemal Yilmaz, Andreas Ulrich
R1,543 Discovery Miles 15 430 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 25th IFIP WG 6.1 International Conference on Testing Software and Systems, ICTSS 2013, held in Istanbul, Turkey, in November 2013. The 17 revised full papers presented together with 3 short papers were carefully selected from 68 submissions. The papers are organized in topical sections on model-based testing, testing timed and concurrent systems, test suite selection and effort estimation, tools and languages, and debugging.

Advanced Concepts for Intelligent Vision Systems - 15th International Conference, ACIVS 2013, Poznan, Poland, October 28-31,... Advanced Concepts for Intelligent Vision Systems - 15th International Conference, ACIVS 2013, Poznan, Poland, October 28-31, 2013, Proceedings (Paperback, 2013 ed.)
Jaques Blanc-Talon, Andrzej Kasiniski, Wilfried Philips, Dan Popescu, Paul Scheunders
R3,059 Discovery Miles 30 590 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed proceedings of the 15th International Conference on Advanced Concepts for Intelligent Vision Systems, ACIVS 2013, held in Pozna, Poland, in October 2013. The 63 revised full papers were carefully selected from 111 submissions. The topics covered are aquisition, pre-processing and coding, biometry, classification and recognition, depth, 3D and tracking, efficient implementation and frameworks, low level image analysis, segmentation and video analysis."

Mobile Web Information Systems - MobiWIS 2013, International Workshops, Paphos, Cyprus, August 26-28, Revised Selected Papers... Mobile Web Information Systems - MobiWIS 2013, International Workshops, Paphos, Cyprus, August 26-28, Revised Selected Papers (Paperback, 2013 ed.)
Maristella Matera, Gustavo Rossi
R1,981 Discovery Miles 19 810 Ships in 10 - 15 working days

This book constitutes the revised selected papers of the workshops of the 10th International Conference on Mobile Web Information, MobiWIS 2013, held in Paphos, Cyprus, in August 2013. The conference hosted two workshops: the First International Workshop on Future Internet of Things and Cloud, FICloud 2013, focusing on the Internet of Things and its relation with cloud computing and the Fourth International Workshop on Service Discovery and Composition in Ubiquitous and Pervasive Environments, SUPE 2013, addressing the issues that characterize automatic service composition in ubiquitous and pervasive computing. The 14 papers presented were carefully reviewed and selected from various submissions.

An Introduction to Queueing Systems (Paperback, Softcover reprint of the original 1st ed. 2002): Sanjay K. Bose An Introduction to Queueing Systems (Paperback, Softcover reprint of the original 1st ed. 2002)
Sanjay K. Bose
R4,469 Discovery Miles 44 690 Ships in 10 - 15 working days

Queueing is an aspect of modern life that we encounter at every step in our daily activities. Whether it happens at the checkout counter in the supermarket or in accessing the Internet, the basic phenomenon of queueing arises whenever a shared facility needs to be accessed for service by a ]arge number of jobs or customers. The study of queueing is important as it gravides both a theoretical background to the kind of service that we may expect from such a facility and the way in which the facility itself may be designed to provide some specified grade of service to its customers. Our study of queueing was basically motivated by its use in the study of communication systems and computer networks. The various computers, routers and switches in such a network may be modelled as individual queues. The whole system may itself be modelled as a queueing network providing the required service to the messages, packets or cells that need to be carried. Application of queueing theory provides the theoretical framework for the design and study of such networks. The purpose of this book is to support a course on queueing systems at the senior undergraduate or graduate Ievels. Such a course would then provide the theoretical background on which a subsequent course on the performance modeHing and analysis of computer networks may be based.

Globalization of Manufacturing in the Digital Communications Era of the 21st Century - Innovation, Agility, and the Virtual... Globalization of Manufacturing in the Digital Communications Era of the 21st Century - Innovation, Agility, and the Virtual Enterprise (Paperback, Softcover reprint of the original 1st ed. 1998)
Gianni Jacucci, Gustav J. Olling, Kenneth Preiss, Michael J. Wozny
R1,717 Discovery Miles 17 170 Ships in 10 - 15 working days

The International PROLAMAT Conference is an internationally well known event for demonstrating and evaluating activities and progress in the field of discrete manufacturing. Sponsored by the International Federation for Information Processing (IFIP), the PROLAMAT is traditionally held every three years and it includes the whole area of advanced software technology for Design and Manufacturing in Discrete Manufacturing. Past editions of the International PROLAMA T Conference have explored: -Manufacturing Technology, -Advances in CAD/CAM, -Software for Discrete Manufacturing, -Software for Manufacturing. The Eight International PROLAMAT held in 1992 (Tokyo), focused on the theme of Man in CIM. The 1995 PROLAMAT (Berlin), featured the theme of Life Cycle Modelling for Innovative Products and Processes. This past emphasis on human aspects and innovation provides a strong foundation for the next PROLAMAT. Under the title: The globalization of manufacturing in the digital communications era of the 21th century: innovation, agility and the virtual enterprise, the 1998 conference expands the PROLAMAT scope to include teams and virtual enterprises which come together across space and time to develop new products and bring them to global markets. Manufacturing issues and information models have long been part of concurrent engineering; they are increasingly important in new product innovation and in the development of manufacturing plans and processes which span multiple companies along with multiple time zones.

Location Privacy Protection in Mobile Networks (Paperback, 2013 ed.): Xinxin Liu, Xiaolin Li Location Privacy Protection in Mobile Networks (Paperback, 2013 ed.)
Xinxin Liu, Xiaolin Li
R1,745 Discovery Miles 17 450 Ships in 10 - 15 working days

This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users' privacy. The second approach considers a totally distributed environment where users perform privacy protection by themselves. Finally, more general system architecture is discussed including how a semi-trusted server may exist, but users need to collaborate to achieve maximized privacy protection. This brief is designed for researchers and professionals working with privacy preservation, mobile networks, and threat models. The variety of approaches presented makes it useful for students as well.

Wireless Internet - 7th International ICST Conference, WICON 2013, Shanghai, China, April 11-12, 2013, Revised Selected Papers... Wireless Internet - 7th International ICST Conference, WICON 2013, Shanghai, China, April 11-12, 2013, Revised Selected Papers (Paperback, 2013)
Hua Qian, Kai Kang
R1,390 Discovery Miles 13 900 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International ICST Conference on Wireless Internet, WICON 2013, held in Shanghai, China, in April 2012. The 20 revised full papers were carefully reviewed and selected from numerous submissions. The papers cover topics such as vehicular communications and heterogeneous networks, cognitive radio and multi-antenna systems, networks and beyond, ad hoc and mesh networks.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Blockchain Cybersecurity, Trust and…
Kim-Kwang Raymond Choo, Ali Dehghantanha, … Hardcover R4,814 Discovery Miles 48 140
Research Trends in Graph Theory and…
Daniela Ferrero, Leslie Hogben, … Hardcover R3,422 Discovery Miles 34 220
Reconfigurable Intelligent…
Hongliang Zhang, Boya Di, … Hardcover R4,811 Discovery Miles 48 110
5G and Beyond - Fundamentals and…
Xingqin Lin, Namyoon Lee Hardcover R4,843 Discovery Miles 48 430
Privacy-Preserving in Edge Computing
Longxiang Gao, Tom H. Luan, … Hardcover R4,130 Discovery Miles 41 300
Advances in Communication Systems and…
J. Jayakumari, George K. Karagiannidis, … Hardcover R5,907 Discovery Miles 59 070
Big Data in Emergency Management…
Rajendra Akerkar Hardcover R4,468 Discovery Miles 44 680
Intelligent Resource Management for…
Qiang Ye, Weihua Zhuang Hardcover R4,132 Discovery Miles 41 320
6G Mobile Wireless Networks
Yulei Wu, Sukhdeep Singh, … Hardcover R4,835 Discovery Miles 48 350
Cyber-Physical Systems - Foundations…
Houbing Song, Danda B. Rawat, … Paperback R2,614 R2,446 Discovery Miles 24 460

 

Partners