![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > Network computers
Optical networks, employing Wavelength-Division Multiplexing (WDM) and wavelength routing, are believed to be the answer for the explosion in IP traffic and the emergence of real-time multimedia applications. These networks offer quantum leaps in transmission capacity as well as eliminate the electronic bottleneck in existing metropolitan and backbone networks. During the last decade, we witnessed a tremendous growth in the theoretical and experimental studies focusing on the cost-effective deployment of wavelength routed networks. The majority of these studies, however, assumed ideal behavior of optical devices. In this book, we argue that for the successful deployment of optical networks, design algorithms and network protocols must be extended to accommodate the non-ideal behavior of optical devices. These extensions should not only focus on maintaining acceptable signal quality (e.g., 12 maintaining BER above 10- ), but should also motivate the development of optimization algorithms and signaling protocols which take transmission impairments into consideration. In addition, the design of enabling technologies, such as optical cross-connects, should be transmission-efficient. This book is a comprehensive treatment of the impact of transmission impairments on the design and management of wavelength-routed networks. We start with transparent networks, focusing on power implications such as cross-connect design, device allocation problems, and management issues. In this all-optical model, we propose a design space based on reduction in overall cost and ease of network management. This design concept, motivates various switch architectures and different optimization problems.
This book constitutes the refereed proceedings of the 5th International Workshop on Multiple Access Communications, MACOM 2012, held in Maynooth, Ireland, in November 2012. The 13 full papers and 5 demo and poster papers presented were carefully reviewed and selected from various submissions. The papers are organized in topical sections on network coding, handling interference and localization techniques at PHY/MAC layers, wireless access networks, and medium access control.
Control networks span a wide range of application areas. These networks are put into action in the `Digital Home', industrial applications, commercial buildings, transportation systems, gas stations, security systems, and they are found in most instances where smart sensors and smart actuators are used to exchange information. The authors of this volume provide an overview of various control network protocols and discuss LonTalk (R) protocol, Neuron (R) chip, programming model, network structures, network management, interoperability between nodes, application profiles, development and maintenance tools, performance analysis, and standardization activities. Open Control Networks: LonWorks/EIA 709 Technology will be an important resource for advanced students of control systems and embedded systems, engineers designing distributed networks, systems designers and architects, and others developing smart buildings and intelligent transportation systems.
This book constitutes the refereed proceedings of the 8th International Conference on Information Systems Security, ICISS 2012, held in Guwahati, India, in December 2012. The 18 revised full papers and 3 short papers presented were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on software security, acces control, covert communications, network security, and database and distributed systems security.
A re-working of C.D. Chaffee's previously published The Rewiring of America (Academia, 1988), this professional book describes the fiber optics revolution. There have been many changes in the fiber optics field since the book's first publication. These include advances in optical networking; the additional bandwidth created by the Internet and associated data services; liberalization of the global telecommunications industry; and the rewiring of the world's oceans with fiber optics. Building the Global Fiber Optics Superhighway details all these developments. C.D. Chaffee writes: 'One thing is clear: as our networks become primarily data-driven, they need to be built differently, to be able to handle data first, but also voice. It is a different way of looking at the world.'
This book constitutes the refereed proceedings of the ACM/IFIP/USENIX 12th International Middleware Conference, held in Lisbon, Portugal, in December 2011. The 22 revised full papers presented together with 2 industry papers and an invited paper were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on social networks, storage and performance management, green computing and resource management, notification and streaming, replication and caching, security and interoperability, and run-time (re)configuration and inspection.
There are many exciting trends and developments in the communications industry, several of which are related to advances in fast packet switching, multi media services, asynchronous transfer mode (ATM) and high-speed protocols. It seems fair to say that the face of networking has been rapidly changing and the distinction between LANs, MANs, and WANs is becoming more and more blurred. It is commonly believed in the industry that ATM represents the next generation in networking. The adoption of ATM standards by the research and development community as a unifying technology for communications that scales from local to wide area has been met with great enthusiasm from the business community and end users. Reflecting these trends, the technical program of the First International Conference on LAN Interconnection consists of papers addressing a wide range of technical challenges and state of the art reviews. We are fortunate to have assembled a strong program committee, expert speakers, and panelists. We would like to thank Professor Schwartz for his keynote speech. We would like to thank Professor Yannis Viniotis and his students for the preparation of the index. We gratefully acknowledge the generous financial support of Dr. Jon Fjeld, Mr. Rick McGee, and Mr. David Witt, all of IBM-Research Triangle Park. We also would like to thank Ms. Mary Safford, our editor, and Mr. John Matzka, both at Plenum Press, for the publication of the proceedings.
Reactive systems are computing systems which are interactive, such as real-time systems, operating systems, concurrent systems, control systems, etc. They are among the most difficult computing systems to program. Temporal logic is a formal tool/language which yields excellent results in specifying reactive systems. This volume, the first of two, subtitled Specification, has a self-contained introduction to temporal logic and, more important, an introduction to the computational model for reactive programs, developed by Zohar Manna and Amir Pnueli of Stanford University and the Weizmann Institute of Science, Israel, respectively.
Information infrastructures are integrated solutions based on the fusion of information and communication technologies. They are characterized by the large amount of data that must be managed accordingly. An information infrastructure requires an efficient and effective information retrieval system to provide access to the items stored in the infrastructure. Terminological Ontologies: Design, Management and Practical Applications presents the main problems that affect the discovery systems of information infrastructures to manage terminological models, and introduces a combination of research tools and applications in Semantic Web technologies. This book specifically analyzes the need to create, relate, and integrate the models required for an infrastructure by elaborating on the problem of accessing these models in an efficient manner via interoperable services and components. Terminological Ontologies: Design, Management and Practical Applications is geared toward information management systems and semantic web professionals working as project managers, application developers, government workers and more. Advanced undergraduate and graduate level students, professors and researchers focusing on computer science will also find this book valuable as a secondary text or reference book.
This book constitutes the thoroughly refereed post-workshop proceedings of the 19th International Workshop on Security Protocols, held in Cambridge, UK, in March 2011. Following the tradition of this workshop series, each paper was revised by the authors to incorporate ideas from the workshop, and is followed in these proceedings by an edited transcription of the presentation and ensuing discussion. The volume contains 17 papers with their transcriptions as well as an introduction, i.e. 35 contributions in total. The theme of the workshop was "Alice doesn't live here anymore."
This book constitutes the refereed proceedings of the 9th International Conference on Service-Oriented Computing, ICSOC 2011, held in Paphos, Cyprus, in December 2011. The 54 revised papers presented were carefully reviewed and selected from 184 submissions. The papers are organized in topical sections on business process modeling, quality of service, formal methods, XaaS computing, service discovery, service security and trust, service runtime infrastructures and service applications.
This book constitutes the carefully refereed and revised selected papers of the 4th Canada-France MITACS Workshop on Foundations and Practice of Security, FPS 2011, held in Paris, France, in May 2011. The book contains a revised version of 10 full papers, accompanied by 3 keynote addresses, 2 short papers, and 5 ongoing research reports. The papers were carefully reviewed and selected from 30 submissions. The topics covered are pervasive security and threshold cryptography; encryption, cryptanalysis and automatic verification; and formal methodsin network security."
Performance Evaluation, Prediction and Visualization in Parallel Systems presents a comprehensive and systematic discussion of theoretics, methods, techniques and tools for performance evaluation, prediction and visualization of parallel systems. Chapter 1 gives a short overview of performance degradation of parallel systems, and presents a general discussion on the importance of performance evaluation, prediction and visualization of parallel systems. Chapter 2 analyzes and defines several kinds of serial and parallel runtime, points out some of the weaknesses of parallel speedup metrics, and discusses how to improve and generalize them. Chapter 3 describes formal definitions of scalability, addresses the basic metrics affecting the scalability of parallel systems, discusses scalability of parallel systems from three aspects: parallel architecture, parallel algorithm and parallel algorithm-architecture combinations, and analyzes the relations of scalability and speedup. Chapter 4 discusses the methodology of performance measurement, describes the benchmark- oriented performance test and analysis and how to measure speedup and scalability in practice. Chapter 5 analyzes the difficulties in performance prediction, discusses application-oriented and architecture-oriented performance prediction and how to predict speedup and scalability in practice. Chapter 6 discusses performance visualization techniques and tools for parallel systems from three stages: performance data collection, performance data filtering and performance data visualization, and classifies the existing performance visualization tools. Chapter 7 describes parallel compiling-based, search-based and knowledge-based performance debugging, which assists programmers to optimize the strategy or algorithm in their parallel programs, and presents visual programming-based performance debugging to help programmers identify the location and cause of the performance problem. It also provides concrete suggestions on how to modify their parallel program to improve the performance. Chapter 8 gives an overview of current interconnection networks for parallel systems, analyzes the scalability of interconnection networks, and discusses how to measure and improve network performances. Performance Evaluation, Prediction and Visualization in Parallel Systems serves as an excellent reference for researchers, and may be used as a text for advanced courses on the topic.
The subject of this book is Command Control Communication and Information 3 (C I) which is the management infrastructure for any large or complex dynamic resource systems. Here command means the determination of what to do, and control means the ongoing managementofthe execution ofa command. 3 Decision making is the essence of C I which is accomplished through a phased implementation of a set of facilities, communications, personnel, equipment and procedures for monitoring, forecasting, planning, directing, allocating resources, and generating options to achieve specific and general objectives. 3 The C I system that is in question here is for a strategic military command including its subordinate commands. Although the design methodology that will be expounded in the book is for a military system, it can, to a large extent, apply also to tactical military as well as to civilian management information systems (MIS). 3 A C I system is a decision making network that reflects a hierarchical organization 3 of C I nodes. Each node is responsible for the management of some portion ofthe available resources, where the higher level nodes are responsible for a 3 correspondingly greater portion of the resources. Within a C I system both command and control decision making occur at every level of the hierarchy. Command decisions at one level determine how to satisfy the management decisions at a higher level.
Dependable Network Computing provides insights into various problems facing millions of global users resulting from the 'internet revolution'. It covers real-time problems involving software, servers, and large-scale storage systems with adaptive fault-tolerant routing and dynamic reconfiguration techniques. Also included is material on routing protocols, QoS, and dead- and live-lock free related issues. All chapters are written by leading specialists in their respective fields. Dependable Network Computing provides useful information for scientists, researchers, and application developers building networks based on commercially off-the-shelf components.
The purpose of this book is to provide tools for a better understanding of the fundamental tradeo's and interdependencies in wireless networks, with the goal of designing resource allocation strategies that exploit these int- dependencies to achieve signi?cant performance gains. Two facts prompted us to write it: First, future wireless applications will require a fundamental understanding of the design principles and control mechanisms in wireless networks. Second, the complexity of the network problems simply precludes the use of engineering common sense alone to identify good solutions, and so mathematics becomes the key avenue to cope with central technical problems in the design of wireless networks. In this book, two ?elds of mathematics play a central role: Perron-Frobenius theory for non-negative matrices and optimization theory. This book is a revised and expanded version of the research monograph "Resource Allocation in Wireless Networks" that was published as Lecture Notes in Computer Sciences (LNCS 4000) in 2006. Although the general structure has remained unchanged to a large extent, the book contains - merous additional results and more detailed discussion. For instance, there is a more extensive treatment of general nonnegative matrices and interf- ence functions that are described by an axiomatic model. Additional material on max-min fairness, proportional fairness, utility-based power control with QoS (quality of service) support and stochastic power control has been added.
This book constitutes the refereed proceedings of the 19th International Colloquium on Structural Information and Communication Complexity, SIROCCO 2012, held in Reykjavik, Iceland for 3 days starting June 30, 2012. The 28 revised full papers presented were carefully reviewed and selected from 54 submissions. SIROCCO is devoted to the study of communication and knowledge in distributed systems. Special emphasis is given to innovative approaches and fundamental understanding, in addition to efforts to optimize current designs. The typical areas include distributed computing, communication networks, game theory, parallel computing, social networks, mobile computing (including autonomous robots), peer to peer systems, communication complexity, fault tolerant graph theories, and randomized/probabilistic issues in networks.
In large measure the traditional concern of communications engineers has been the conveyance of voice signals. The most prominent example is the telephone network, in which the techniques used for transmission multiplex ing and switching have been designed for voice signals. However, one of the many effects of computers has been the growing volume of the sort of traffic that flows in networks composed of user terminals, processors, and peripherals. The characteristics of this data traffic and the associated perfor mance requirements are quite different from those of voice traffic. These differences, coupled with burgeoning digital technology, have engendered a whole new set of approaches to multiplexing and switching this traffic. The new techniques are the province of what has been loosely called computer communications networks. The subject of this book is the mathematical modeling and analysis of computer communications networks, that is to say, the multiplexing and switching techniques that have been developed for data traffic. The basis for many of the models that we shall consider is queueing theory, although a number of other disciplines are drawn on as well. The level at which this material is covered is that of a first-year graduate course. It is assumed that at the outset the student has had a good undergraduate course in probability and random processes of the sort that are more and more common among electrical engineering and computer science departments."
This book constitutes the thoroughly refereed post-conference proceedings of the 15th International SDL Forum, SDL 2011, held in Toulouse, France, in July 2011. The 16 revised full papers presented together were carefully reviewed and selected for inclusion in the book. The papers cover a wide range of topics such as SDL and related languages; testing; and services and components to a wide range presentations of domain specific languages and applications, going from use maps to train station models or user interfaces for scientific dataset editors for high performance computing.
This book constitutes the proceedings of the International Conference on Trusted Systems, held in Beijing, China, in December 2010.The 23 contributed papers presented together with nine invited talks from a workshop, titled "Asian Lounge on Trust, Security and Privacy" were carefully selected from 66 submissions. The papers are organized in seven topical sections on implentation technology, security analysis, cryptographic aspects, mobile trusted systems, hardware security, attestation, and software protection.
Turbo coding principles have found widespread applications in information theory and, in part, have entered into mainstream telecommunication theory and practice. These principles are used in error control, detection, interference suppression, equalization, and other communications-related areas. Turbo Codes: Principles and Applications is intended for use by advanced level students and professional engineers involved in coding and telecommunication research. The material is organized into a coherent framework, starting with basic concepts of block and convolutional coding, and gradually increasing in a logical and progressive manner to more advanced material, including applications. All algorithms are fully described and supported by examples, and evaluations of their performance are carried out both analytically and by simulations. The book includes new and original material on a bidirectional SOVA decoding algorithm, design of turbo codes based on the distance spectrum, design of code-matched interleavers, performance on fading channels, and a turbo trellis code modulation scheme.Trellis-based and iterative decoding algorithms, along with a comparison of algorithms based on their performance and complexity, are discussed. Various practical aspects of turbo coding, such as interleaver design, turbo codes on fading channels, and turbo trellis-coded modulation, are presented. Turbo Codes: Principles and Applications will be especially useful to practicing communications engineers, researchers, and advanced level students who are designing turbo coding systems, including encoder/decoder and interleavers, and carrying out performance analysis and sensitivity studies.
Agent technology has recently become one of the most vibrant and fastest growing areas in information technology. Within this booming area, intelligent information agents are attracting particular attention from the research and development community as well as from industry and user communities interested in everyday private and professional applications. This monographic text is the first systematic state-of-the-art survey on intelligent information agents. Eighteen coherently written chapters by leading authorities provide complementary coverage of the relevant issues organized in four parts: cooperative information systems and agents; rational information agents and electronic commerce; adaptive information agents; mobile agents and security. In addition, the volume editor has provided a detailed introductory survey chapter, motivational introductions to the four parts, and a comprehensive bibliography listing more than 700 entries.
This book constitutes the refereed proceedings of the 14th International Conference on Passive and Active Measurement, PAM 2013, held in Hong Kong, China, in March 2013. The 24 revised full papers presented were carefully reviewed and selected from 74 submissions. The papers have been organized in the following topical sections: measurement design, experience and analysis; Internet wireless and mobility; performance measurement; protocol and application behavior; characterization of network usage; and network security and privacy. In addition, 9 poster abstracts have been included.
The GSM system is undoubtedly the most successful second-generation digital mobile radio system. One of the key factors for this exceptional performance is the constant evolution of the GSM system and its derivatives. GSM: Evolution towards 3rd generation systems addresses new concepts in the GSM system, dealing both with standardized features as well as with theoretically and technologically feasible improvements which contribute to evolutionary changes in general. Ongoing efforts in GSM standardization are focused on Phase 2+ with gradual additions for a fast and modular evolution. Speech remains the prime service of cellular systems, with ongoing work on spectral efficiency taking into account the tradeoff between cost of the system and transmission quality. Most of the notable results from novel speech service implementations are addressed herein such as new EFR speech codec and Advanced Speech Cell Items (ASCI). Data capability in Phase 2+ has been covered under General Packet Radio Service (GPRS) and High-Speed Circuit Switched Data (HCSD) work items. Initiatives under CAMEL cover intelligent networking (IN) within the GSM framework.Dual mode operation in GSM includes not only dual-band solutions but also inter-networking with other systems like DECT or satellite systems. Numerous specific wireless applications such as inbuilding communications, WLL, etc., have also been developed based on GSM. To support the required changes a number of issues have to be solved in the radio part of the system. Deployment of adaptive antenna arrays for enhanced quality, interference suppression techniques and slow frequency hopping are among the techniques presented in the GSM framework. Dynamic evolution of GSM presents a platform for the introduction of UMTS. Presently, efforts are directed towards the standardization of the UMTS air interface in ETSI. Major trends in progress towards new radio interfaces are outlined including contributions from pan-European projects such as ATDMA, which was carried out under the RACE II framework, and the ACTS project AC090 FRAMES. GSM: Evolution towards 3rd generation systems comprises a collection of specially written contributions from GSM specialists.The information presented is essential reading for all researchers, engineers and managers working on GSM and third generation wireless systems. This book covers the most important advances in GSM that will have lasting impact on the system influencing third generation wireless systems.
Although the computer's life has been relatively short, it has brought about an information revolution that is transforming our world on a scale that is still difficult to comprehend. This digital convergence is shaping society, technology and the media for the next millennium. Areas as diverse as home banking and shopping over the Internet; WWW access over mobile phone networks; and television systems such as Web TV which combine on-line services with television. But convergence is not just about technology. It is also about services and new ways of doing business and of interacting with society. Digital convergence heralds the 'Information Revolution'. Edited by John Vince and Rae Earnshaw this important new book on Digital Convergence: The Information Revolution is an edited volume of papers, bringing together state-of-the-art developments in the Internet and World Wide Web and should be compulsory reading for all those interested in and working in those areas. |
You may like...
Handbook of Multimedia Information…
Amit Kumar Singh, Anand Mohan
Hardcover
R6,633
Discovery Miles 66 330
Private Cloud Computing - Consolidation…
Stephen R. Smoot, Nam K. Tan
Paperback
R1,225
Discovery Miles 12 250
Mobile Networks for Biometric Data…
Massimo Conti, Natividad Martinez Madrid, …
Hardcover
R6,197
Discovery Miles 61 970
Malicious Attack Propagation and Source…
Jiaojiao Jiang, Sheng Wen, …
Hardcover
R3,336
Discovery Miles 33 360
Full-Duplex Wireless Communications…
Tho Le-Ngoc, Ahmed Masmoudi
Hardcover
R3,731
Discovery Miles 37 310
Cyber-Physical Systems - Foundations…
Houbing Song, Danda B. Rawat, …
Paperback
Architectural Design - Conception and…
Chris A. Vissers, Luis Ferreira Pires, …
Hardcover
|