0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (1)
  • R250 - R500 (14)
  • R500+ (4,503)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22, 2013, Proceedings... Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22, 2013, Proceedings (Paperback, 2013 ed.)
Michel Abdalla, Cristina Nita-Rotaru, Ricardo Dahab
R1,543 Discovery Miles 15 430 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security, CANS 2013, held in Paraty, Brazil, in November 2013.

The 18 revised full papers presented together with four invited talks were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on cryptanalysis, zero-knowledge protocols, distributed protocols, network security and applications, advanced cryptographic primitives, and verifiable computation.

Next Generation Optical Network Design and Modelling - IFIP TC6 / WG6.10 Sixth Working Conference on Optical Network Design and... Next Generation Optical Network Design and Modelling - IFIP TC6 / WG6.10 Sixth Working Conference on Optical Network Design and Modelling (ONDM 2002) February 4-6, 2002, Torino, Italy (Paperback, Softcover reprint of the original 1st ed. 2003)
Andrea Bianco, Fabio Neri
R2,937 Discovery Miles 29 370 Ships in 10 - 15 working days

Optical networks are leaving the labs and becoming a reality. Despite the current crisis of the telecom industry, our everyday life increasingly depends on communication networks for information exchange, medicine, education, data transfer, commerce, and many other endeavours. High capacity links are required by the large futemet traffic demand, and optical networks remain one of the most promising technologies for meeting these needs. WDM systems are today widely deployed, thanks to low-cost at extreme data rates and high reliability of optical components, such as optical amplifiers and fixed/tunable filters and transceivers. Access and metropolitan area networks are increasingly based on optical technologies to overcome the electronic bottleneck at the network edge. Traditional multi-layer architectures, such as the widely deployed IP/ATM/SDH protocol stack, are increasingly based on WDM transport; further efforts are sought to move at the optical layer more of the functionalities available today in higher protocol layers. New components and subsystems for very high speed optical networks offer new design opportunities to network operators and designers. The trends towards dynamically configurable all-optical network infrastructures open up a wide range of new network engineering and design choices, which must face issues such as interoperability and unified control and management.

Location Privacy Protection in Mobile Networks (Paperback, 2013 ed.): Xinxin Liu, Xiaolin Li Location Privacy Protection in Mobile Networks (Paperback, 2013 ed.)
Xinxin Liu, Xiaolin Li
R1,722 Discovery Miles 17 220 Ships in 10 - 15 working days

This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users' privacy. The second approach considers a totally distributed environment where users perform privacy protection by themselves. Finally, more general system architecture is discussed including how a semi-trusted server may exist, but users need to collaborate to achieve maximized privacy protection. This brief is designed for researchers and professionals working with privacy preservation, mobile networks, and threat models. The variety of approaches presented makes it useful for students as well.

Security Engineering and Intelligence Informatics - CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September... Security Engineering and Intelligence Informatics - CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013, Proceedings (Paperback, 2013 ed.)
Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Li Da Xu
R1,576 Discovery Miles 15 760 Ships in 10 - 15 working days

This volume constitutes the refereed proceedings of two workshops: the Second International Workshop on Modern Cryptography and Security Engineering (MoCrySEn 2013) and the Third International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2013) held within the framework of the IFIP 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, in Regensburg, Germany, in September 2013. The 16 revised papers presented at MoCrySEn 2013 were carefully reviewed and selected from 30 submissions. They deal with symmetric-key cryptography, public-key cryptography, algorithmic cryptanalysis, software and hardware implementation of cryptographic algorithms, database encryption, and interaction between cryptographic theory and implementation issues. The 15 papers presented at SeCIHD 2013 are organized in topical sections on cyber security and dependability, network security and privacy, and multimedia technology for homeland defense.

Scalable Uncertainty Management - 7th International Conference, SUM 2013, Washington, DC, USA, September 16-18, 2013,... Scalable Uncertainty Management - 7th International Conference, SUM 2013, Washington, DC, USA, September 16-18, 2013, Proceedings (Paperback, 2013 ed.)
Weiru Liu, V.S. Subrahmanian, Jef Wijsen
R1,553 Discovery Miles 15 530 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th International Conference on Scalable Uncertainty Management, SUM 2013, held in Washington, DC, USA, in September 2013. The 26 revised full papers and 3 revised short papers were carefully reviewed and selected from 57 submissions. The papers cover topics in all areas of managing and reasoning with substantial and complex kinds of uncertain, incomplete or inconsistent information including applications in decision support systems, machine learning, negotiation technologies, semantic web applications, search engines, ontology systems, information retrieval, natural language processing, information extraction, image recognition, vision systems, data and text mining, and the consideration of issues such as provenance, trust, heterogeneity, and complexity of data and knowledge.

Communications and Multimedia Security - 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September... Communications and Multimedia Security - 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings (Paperback, 2013 ed.)
Bart De Decker, Jana Dittmann, Christian Kraetzer, Claus Vielhauer
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 14th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2013, held in Magdeburg, Germany, in September 2013. The 5 revised full papers presented together with 11 short papers, 5 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on biometrics; applied cryptography; digital watermarking, steganography and forensics; and social network privacy, security and authentication.

Protocols for High Speed Networks IV (Paperback, 1995 ed.): G. Neufeld, Mito Protocols for High Speed Networks IV (Paperback, 1995 ed.)
G. Neufeld, Mito
R4,372 Discovery Miles 43 720 Ships in 10 - 15 working days

Welcome to the fourth IFIP workshop on protocols for high speed networks in Vancouver. This workshop follows three very successful workshops held in Ziirich (1989), Palo Alto (1990) and Stockholm (1993) respectively. We received a large number of papers in response to our call for contributions. This year, forty papers were received of which sixteen were presented as full papers and four were presented as poster papers. Although we received many excellent papers the program committee decided to keep the number of full presentations low in order to accommodate more discussion in keeping with the format of a workshop. Many people have contributed to the success of this workshop including the members of the program committee who, with the additional reviewers, helped make the selection of the papers. We are thankful to all the authors of the papers that were submitted. We also thank several organizations which have contributed financially to this workshop, specially NSERC, ASI, CICSR, UBC, MPR Teltech and Newbridge Networks.

Distributed Computing - 27th International Symposium, DISC 2013, Jerusalem, Israel, October 14-18, 2013, Proceedings... Distributed Computing - 27th International Symposium, DISC 2013, Jerusalem, Israel, October 14-18, 2013, Proceedings (Paperback, 2013 ed.)
Yehuda Afek
R1,614 Discovery Miles 16 140 Ships in 10 - 15 working days

This book constitutes the proceedings of the 27th International Symposium on Distributed Computing, DISC 2013, held in Jerusalem, Israel, in October 2013. The 27 full papers presented in this volume were carefully reviewed and selected from 142 submissions; 16 brief announcements are also included. The papers are organized in topical sections named: graph distributed algorithms; topology, leader election, and spanning trees; software transactional memory; shared memory executions; shared memory and storage; gossip and rumor; shared memory tasks and data structures; routing; radio networks and the SINR model; crypto, trust, and influence; and networking.

Evolution of Telecommunication Services - The Convergence of Telecom and Internet: Technologies and Ecosystems (Paperback, 2013... Evolution of Telecommunication Services - The Convergence of Telecom and Internet: Technologies and Ecosystems (Paperback, 2013 ed.)
Emmanuel Bertin, Noel Crespi, Thomas Magedanz
R2,445 Discovery Miles 24 450 Ships in 10 - 15 working days

In the telecom world, services have usually been conceived with a specific mindset. This mindset has defined the traditional characteristics of these services; services distinguished by their linkage with the access network, tight control over service use (e.g., authentication, billing), lack of deep personalization capabilities (mass services only) and reliance on standardization to achieve end-to-end interoperability between all the actors of the value chain (e.g., operators, platform manufacturers, device manufactures). This book offers insights into this complex but exciting world of telecommunications characterized by constant evolution, and approaches it from technology as well as business perspectives. The book is appropriately structured in three parts: (a) an overview of the state-of-the-art in fixed/mobile NGN and standardization activities; (b) an analysis of the competitive landscape between operators, device manufactures and OTT providers, emphasizing why network operators are challenged on their home turf; and (c) opportunities for business modeling and innovative telecom service offers.

Database Systems for Advanced Applications - 18th International Conference, DASFAA 2013, International Workshops:  BDMA, SNSM,... Database Systems for Advanced Applications - 18th International Conference, DASFAA 2013, International Workshops: BDMA, SNSM, SeCoP, Wuhan, China, April 22-25, 2013, Proceedings (Paperback, 2013 ed.)
Bonghee Hong, Xiaofeng Meng, Lei Chen, Werner Winiwarter, Wei Song
R1,399 Discovery Miles 13 990 Ships in 10 - 15 working days

This book constitutes the workshop proceedings of the 18th International Conference on Database Systems for Advanced Applications, DASFAA 2013, held in Wuhan, China, in April 2013. The volume contains three workshops, each focusing on specific area that contributes to the main themes of the DASFAA conference: The First International Workshop on Big Data Management and Analytics (BDMA 2013), the Third International Workshop on Social Networks and Social Web (SNSM 2013) and the International Workshop on Semantic Computing and Personalization (SeCoP 2013).

Computer Security -- ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013,... Computer Security -- ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013, Proceedings (Paperback, 2013 ed.)
Jason Crampton, Sushil Jajodia, Keith Mayes
R1,673 Discovery Miles 16 730 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013.

The 43 papers included in the book were carefully reviewed and selected from 242 papers. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together researchers in this area, by promoting the exchange of ideas with system developers and by encouraging links with researchers in related areas. The papers cover all topics related to security, privacy and trust in computer systems and networks.

Advances in Communication Networking - 19th EUNICE/IFIP EG WG 6.6 International Workshop, Chemnitz, Germany, August 28-30,... Advances in Communication Networking - 19th EUNICE/IFIP EG WG 6.6 International Workshop, Chemnitz, Germany, August 28-30, 2013, Proceedings (Paperback, 2013 ed.)
Thomas Bauschert
R1,534 Discovery Miles 15 340 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 19th EUNICE/IFIP WG 6.2, 6.6 workshop on Advances in Communication Networking, EUNICE 2013, held in Chemnitz, Germany, in August 2013.

The 23 oral papers demonstrated together with 9 poster presentations were carefully reviewed and selected from 40 submissions. The papers are organized in topical sections on network modeling and design, traffic analysis, network and traffic management, services over mobile networks, monitoring and measurement, security concepts, application of ICT in smart grid and smart home environments, data dissemination in ad-hoc and sensor networks, and services and applications.

Trustworthy Execution on Mobile Devices (Paperback, 2014 ed.): Amit Vasudevan, Jonathan M. McCune, James Newsome Trustworthy Execution on Mobile Devices (Paperback, 2014 ed.)
Amit Vasudevan, Jonathan M. McCune, James Newsome
R1,465 Discovery Miles 14 650 Ships in 10 - 15 working days

This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated for leveraging such primitives, and proves that they can indeed strengthen the security properties available to applications and users, without reducing the properties currently enjoyed by OEMs and network carriers. Finally, this brief makes recommendations for future research that may yield practical and deployable results.

Advances in Security of Information and Communication Networks - First International Conference, SecNet 2013, Cairo, Egypt,... Advances in Security of Information and Communication Networks - First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedings (Paperback, 2013 ed.)
Ali Ismail Awad, Aboul Ella Hassanien, Kensuke Baba
R1,513 Discovery Miles 15 130 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the International Conference on Advances in Security of Information and Communication Networks, Sec Net 2013, held in Cairo, Egypt, in September 2013. The 21 revised full papers presented were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on networking security; data and information security; authentication and privacy; security applications.

"

Lightweight Cryptography for Security and Privacy - 2nd International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013,... Lightweight Cryptography for Security and Privacy - 2nd International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers (Paperback, 2013 ed.)
Gildas Avoine, Orhun Kara
R1,399 Discovery Miles 13 990 Ships in 10 - 15 working days

This book constitutes the proceedings of the 2th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2013, held in Gebze, Turkey, during May 6-7, 2013. The 10 full papers presented together with 3 invited talks were carefully reviewed and selected from 27 submissions. The papers are grouped in topical sections on efficient Implementations and designs, block cipher cryptanalysis, wireless sensor networks, and cryptographic protocols.

Research in Attacks, Intrusions, and Defenses - 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25,... Research in Attacks, Intrusions, and Defenses - 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013, Proceedings (Paperback, 2013 ed.)
Salvatore J Stolfo, Angelos Stavrou, Charles V. Wright
R1,578 Discovery Miles 15 780 Ships in 10 - 15 working days

This book constitutes the proceedings of the 16th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in Intrusion Detection, RAID 2013, held in Rodney Bay, St. Lucia in October 2013. The volume contains 22 full papers that were carefully reviewed and selected from 95 submissions, as well as 10 poster papers selected from the 23 submissions. The papers address all current topics in computer security ranged from hardware-level security, server, web, mobile, and cloud-based security, malware analysis, and web and network privacy.

Engineering Secure Software and Systems - 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014.... Engineering Secure Software and Systems - 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014. Proceedings (Paperback, 2014 ed.)
Jan Jurjens, Frank Piessens, Nataliia Bielova
R2,193 Discovery Miles 21 930 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 6th International Symposium on Engineering Secure Software and Systems, ESSoS 2014, held in Munich, Germany, in February 2014. The 11 full papers presented together with 4 idea papers were carefully reviewed and selected from 55 submissions. The symposium features the following topics: model-based security, formal methods, web and mobile security and applications.

Euro-Par 2013: Parallel Processing - 19th International Conference, Aachen, Germany, August 26-30, 2013, Proceedings... Euro-Par 2013: Parallel Processing - 19th International Conference, Aachen, Germany, August 26-30, 2013, Proceedings (Paperback, 2013 ed.)
Felix Wolf, Bernd Mohr, Dieter an Mey
R1,704 Discovery Miles 17 040 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 19th International Conference on Parallel and Distributed Computing, Euro-Par 2013, held in Aachen, Germany, in August 2013. The 70 revised full papers presented were carefully reviewed and selected from 261 submissions. The papers are organized in 16 topical sections: support tools and environments; performance prediction and evaluation; scheduling and load balancing; high-performance architectures and compilers; parallel and distributed data management; grid, cluster and cloud computing; peer-to-peer computing; distributed systems and algorithms; parallel and distributed programming; parallel numerical algorithms; multicore and manycore programming; theory and algorithms for parallel computation; high performance networks and communication; high performance and scientific applications; GPU and accelerator computing; and extreme-scale computing.

Internet Resource Pricing Models (Paperback, 2014 ed.): Ke Xu, Yifeng Zhong, Huan He Internet Resource Pricing Models (Paperback, 2014 ed.)
Ke Xu, Yifeng Zhong, Huan He
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This brief guides the reader through three basic Internet resource pricing models using an Internet cost analysis. Addressing the evolution of service types, it presents several corresponding mechanisms which can ensure pricing implementation and resource allocation. The authors discuss utility optimization of network pricing methods in economics and underline two classes of pricing methods including system optimization and entities' strategic optimization. The brief closes with two examples of the newly proposed pricing strategy helping to solve the profit distribution problem brought by P2P free-riding and improve the pricing efficiency with the introduction of the price discrimination. The Internet resource pricing strategy is not only the key factor of Internet resource allocation efficiency, but also the determinant of the profit. The methods and models discussed in Internet Resource Pricing Models increase the efficiency of existing pricing strategies to ensure a sound and sustainable development of the Internet. The brief will help researchers and professionals working with this key factor of Internet resource allocation.

Networked Systems - First International Conference, NETYS 2013, Marrakech, Marocco, May 2-4, 2013, Revised Selected Papers... Networked Systems - First International Conference, NETYS 2013, Marrakech, Marocco, May 2-4, 2013, Revised Selected Papers (Paperback, 2013 ed.)
Vincent Gramoli, Rachid Guerraoui
R1,536 Discovery Miles 15 360 Ships in 10 - 15 working days

This book constitutes the revised selected papers of the First International Conference on Networked Systems, NETYS 2013, held in Marrakech, Morocco, in May 2013. The 33 papers (17 regular and 16 short papers) presented were carefully reviewed and selected from 74 submissions. They address major topics from theory and practice of networked systems: multi-core architectures, middleware, environments, storage clusters, as well as peer-to-peer, sensor, wireless, and mobile networks.

Computer Information Systems and Industrial Management - 12th IFIP TC 8 International Conference, CISIM 2013, Krakow, Poland,... Computer Information Systems and Industrial Management - 12th IFIP TC 8 International Conference, CISIM 2013, Krakow, Poland, September 25-27, 2013, Proceedings (Paperback, 2013 ed.)
Khalid Saeed, Rituparna Chaki, Agostino Cortesi, Slawomir Wierzchon
R1,594 Discovery Miles 15 940 Ships in 10 - 15 working days

This book constitutes the proceedings of the 12th IFIP TC 8 International Conference, CISIM 2013, held in Cracow, Poland, in September 2013. The 44 papers presented in this volume were carefully reviewed and selected from over 60 submissions. They are organized in topical sections on biometric and biomedical applications; pattern recognition and image processing; various aspects of computer security, networking, algorithms, and industrial applications. The book also contains full papers of a keynote speech and the invited talk.

Wireless Sensor Networks for Developing Countries - First International Conference, WSN4DC 2013, Jamshoro, Pakistan, April... Wireless Sensor Networks for Developing Countries - First International Conference, WSN4DC 2013, Jamshoro, Pakistan, April 24-26, 2013, Revised Selected Papers (Paperback, 2013 ed.)
Faisal Karim Shaikh, Bhawani Shankar Chowdhry, Habib M. Ammari, Muhammad Aslam Uqaili, Assadullah Shah
R1,475 Discovery Miles 14 750 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the First International Conference on Wireless Sensor Networks for Developing Countries, WSN4DC 2013, held in Jamshoro, Pakistan, in April 2013. The 10 revised full papers presented were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on WSN applications/services for developing countries; mobile WSN; underwater WSN; VANETS; body area networks; energy harvesting in WSN; WSN and cloud integration; WSN and IoT; QoS and Qot; WSN MAC, network and transport protocols; cross layer approaches; security aspects in WSN; WSN applications in smart grid and energy management; WSN in structural health monitoring.

Handbook of Optimization in Complex Networks - Theory and Applications (Paperback, 2012 ed.): My T. Thai, Panos M. Pardalos Handbook of Optimization in Complex Networks - Theory and Applications (Paperback, 2012 ed.)
My T. Thai, Panos M. Pardalos
R4,426 Discovery Miles 44 260 Ships in 10 - 15 working days

Complex Social Networks is a newly emerging (hot) topic with applications in a variety of domains, such as communication networks, engineering networks, social networks, and biological networks. In the last decade, there has been an explosive growth of research on complex real-world networks, a theme that is becoming pervasive in many disciplines, ranging from mathematics and computer science to the social and biological sciences. Optimization of complex communication networks requires a deep understanding of the interplay between the dynamics of the physical network and the information dynamics within the network. Although there are a few books addressing social networks or complex networks, none of them has specially focused on the optimization perspective of studying these networks. This book provides the basic theory of complex networks with several new mathematical approaches and optimization techniques to design and analyze dynamic complex networks. A wide range of applications and optimization problems derived from research areas such as cellular and molecular chemistry, operations research, brain physiology, epidemiology, and ecology.

Big Data - Related Technologies, Challenges and Future Prospects (Paperback, 2014 ed.): Min Chen, Shiwen Mao, Yin Zhang, Victor... Big Data - Related Technologies, Challenges and Future Prospects (Paperback, 2014 ed.)
Min Chen, Shiwen Mao, Yin Zhang, Victor C. M. Leung
R2,383 Discovery Miles 23 830 Ships in 10 - 15 working days

This Springer Brief provides a comprehensive overview of the background and recent developments of big data. The value chain of big data is divided into four phases: data generation, data acquisition, data storage and data analysis. For each phase, the book introduces the general background, discusses technical challenges and reviews the latest advances. Technologies under discussion include cloud computing, Internet of Things, data centers, Hadoop and more. The authors also explore several representative applications of big data such as enterprise management, online social networks, healthcare and medical applications, collective intelligence and smart grids. This book concludes with a thoughtful discussion of possible research directions and development trends in the field. Big Data: Related Technologies, Challenges and Future Prospects is a concise yet thorough examination of this exciting area. It is designed for researchers and professionals interested in big data or related research. Advanced-level students in computer science and electrical engineering will also find this book useful.

From the Web to the Grid and Beyond - Computing Paradigms Driven by High-Energy Physics (Paperback, 2012 ed.): Rene Brun,... From the Web to the Grid and Beyond - Computing Paradigms Driven by High-Energy Physics (Paperback, 2012 ed.)
Rene Brun, Federico Carminati, Giuliana Galli Carminati
R1,546 Discovery Miles 15 460 Ships in 10 - 15 working days

Born after World War II, large-scale experimental high-energy physics (HEP) has found itself limited ever since by available accelerator, detector and computing technologies. Accordingly, HEP has made significant contributions to the development of these fields, more often than not driving their innovations. The invention of the World Wide Web at CERN is merely the best-known example out of many. This book is the first comprehensive account to trace the history of this pioneering spirit in the field of computing technologies. It covers everything up to and including the present-day handling of the huge demands imposed upon grid and distributed computing by full-scale LHC operations operations which have for years involved many thousands of collaborating members worldwide and accordingly provide the original and natural testbed for grid computing concepts. This book takes the reader on a guided tour encompassing all relevant topics, including programming languages, software engineering, large databases, the Web, and grid- and cloud computing. The important issue of intellectual property regulations for distributed software engineering and computing is also addressed. Aptly, the book closes with a visionary chapter of what may lie ahead. Approachable and requiring only basic understanding of physics and computer sciences, this book is intended for both education and research."

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Mobile Health - Sensors, Analytic…
James M. Rehg, Susan.A Murphy, … Hardcover R5,691 Discovery Miles 56 910
Survey of Text Mining - Clustering…
Michael W. Berry Hardcover R2,897 Discovery Miles 28 970
Cancer Prediction for Industrial IoT 4.0…
Meenu Gupta, Rachna Jain, … Hardcover R3,876 Discovery Miles 38 760
Hierarchical Scheduling in Parallel and…
Sivarama Dandamudi Hardcover R4,507 Discovery Miles 45 070
Demystifying Graph Data Science - Graph…
Pethuru Raj, Abhishek Kumar, … Hardcover R3,618 R3,261 Discovery Miles 32 610
Royal Observatory, Cape of Good Hope…
Brian Warner Hardcover R3,018 Discovery Miles 30 180
Handbook of Research on Engineering…
Bhushan Patil, Manisha Vohra Hardcover R10,287 Discovery Miles 102 870
Information Systems Engineering - From…
Paul Johannesson, Eva Soderstrom Hardcover R2,849 Discovery Miles 28 490
Symbolic Analysis for Parallelizing…
Mohammad R. Haghighat Hardcover R2,876 Discovery Miles 28 760
Big Data Analytics for Sustainable…
Anandakumar Haldorai, Arulmurugan Ramu Hardcover R7,263 Discovery Miles 72 630

 

Partners