![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet > Network computers
This Springer Brief focuses on cognitive resource management in heterogeneous cellular networks (Het Net) with small cell deployment for the LTE-Advanced system. It introduces the Het Net features, presents practical approaches using cognitive radio technology in accommodating small cell data relay and optimizing resource allocation and examines the effectiveness of resource management among small cells given limited coordination bandwidth and wireless channel uncertainty. The authors introduce different network characteristics of small cell, investigate the mesh of small cell access points in parallel with macrocells in network control and resource management and address resource management in the backhaul with coordination constraints and wireless channel uncertainty. The final section of this brief summarizes and provides future research directions for this topic, including a proposed framework that has been evaluated through realistic simulations. Cognitive Resource Management for Heterogeneous Cellular Networks is designed for researchers and professionals working in wireless communications and networks. Advanced-level students studying electrical and computer engineering should also find the content helpful.
This book constitutes the refereed proceedings of the 27th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2013, held in Newark, NJ, USA in July 2013. The 16 revised full and 6 short papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections on privacy, access control, cloud computing, data outsourcing, and mobile computing.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop, COSADE 2013, held in Paris, France, in March 2013. The 13 revised full papers presented together with two invited talks were carefully selected from 39 submissions and collect truly existing results in cryptographic engineering, from concepts to artifacts, from software to hardware, from attack to countermeasure.
This book constitutes the refereed proceedings of the 20th International Conference on Analytical and Stochastic Modelling and Applications, ASMTA 2013, held in Ghent, Belgium, in July 2013. The 32 papers presented were carefully reviewed and selected from numerous submissions. The focus of the papers is on the following application topics: complex systems; computer and information systems; communication systems and networks; wireless and mobile systems and networks; peer-to-peer application and services; embedded systems and sensor networks; workload modelling and characterization; road traffic and transportation; social networks; measurements and hybrid techniques; modeling of virtualization; energy-aware optimization; stochastic modeling for systems biology; biologically inspired network design.
This book constitutes the thoroughly refereed proceedings of the 12th International Conference on Ad-hoc, Mobile, and Wireless Networks, ADHOC-NOW 2013, held in Wroclaw, Poland, in July 2013. The 27 revised full papers presented were carefully reviewed and selected from 56 submissions. The papers address such diverse topics as routing, rumor spreading, reliability, topology control, security aspects, and the impact of mobility. Some of the papers contain precise analytical results while other ones are devoted to solving specific practical problems of implementation and deployment.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, MobiQuitous 2012, held in Beijing, China, Denmark, in December 2012. The revised full papers presented were carefully reviewed and selected from numerous submissions. They cover a wide range of topics such as localization and tracking, search and discovery, classification and profiling, context awareness and architecture, location and activity recognition. The proceedings also include papers from the best paper session and the industry track, as well as poster and demo papers.
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2013, held in Beijing, China, in August 2013 in conjunction with the International Joint Conference on Artificial Intelligence (IJCAI 2013). The 4 revised full papers presented together with 7 short papers were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on information sharing and data/text mining; terrorism informatics; network-based data analytics; and information access and security.
Device-to-Device (D2D) communication will become a key feature supported by next generation cellular networks, a topic of enormous importance to modern communication. Currently, D2D serves as an underlay to the cellular network as a means to increase spectral efficiency. Although D2D communication brings large benefits in terms of system capacity, it also causes interference as well as increased computation complexity to cellular networks as a result of spectrum sharing. Thus, efficient resource management must be performed to guarantee a target performance level of cellular communication. This brief presents the state-of-the-art research on resource management for D2D communication underlaying cellular networks. Those who work with D2D communication will use this book's information to help ensure their work is as efficient as possible. Along with the survey of existing work, this book also includes the fundamental theories, key techniques, and applications.
The five-volume set LNCS 7971-7975 constitutes the refereed proceedings of the 13th International Conference on Computational Science and Its Applications, ICCSA 2013, held in Ho Chi Minh City, Vietnam, in June 2013. Apart from the general track, ICCSA 2013 also include 33 special sessions and workshops, in various areas of computational sciences, ranging from computational science technologies, to specific areas of computational sciences, such as computer graphics and virtual reality. There are 46 papers from the general track, and 202 in special sessions and workshops.
This book constitutes the refereed proceedings of the 10th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2013, held in Berlin, Germany, in July 2013. The 9 revised full papers presented together with 3 short papers were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on malware; network security, Web security; attacks and defenses; and host security.
This book constitutes the refereed proceedings of the 13th Algorithms and Data Structures Symposium, WADS 2013, held in London, ON, Canada, August 2013. The Algorithms and Data Structures Symposium - WADS (formerly "Workshop on Algorithms and Data Structures") is intended as a forum for researchers in the area of design and analysis of algorithms and data structures. The 44 revised full papers presented in this volume were carefully reviewed and selected from 139 submissions. The papers present original research on algorithms and data structures in all areas, including bioinformatics, combinatorics, computational geometry, databases, graphics, and parallel and distributed computing.
This book constitutes the refereed proceedings of the 32nd International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2013, held in Toulouse, France, in September 2013. The 20 revised full papers presented together with 5 practical experience reports were carefully reviewed and selected from more than 88 submissions. The papers are organized in topical sections on safety requirements and assurance, testing and verification, security, software reliability assessment, practical experience reports and tools, safety assurance in automotive, error control codes, dependable user interfaces, and hazard and failure mode analysis.
This book constitutes the refereed proceedings of the 11th German Conference on Multiagent System Technologies, MATES 2013, held in Koblenz, Germany, in September 2013. The 29 revised full papers and 3 keynote talks presented were carefully reviewed and selected from various submissions. The papers cover a broad area of topics of interest ranging from issues of agent-based coordination to simulation to negotiation.
This book constitutes the thoroughly refereed proceedings of the 17th East-European Conference on Advances in Databases and Information Systems, ADBIS 2013, held in Genoa, Italy, in September 2013. The 26 revised full papers presented together with three invited papers were carefully selected and reviewed from 92 submissions. The papers are organized in topical sections on ontologies; indexing; data mining; OLAP; XML data processing; querying; similarity search; GPU; querying in parallel architectures; performance evaluation; distributed architectures.
This book constitutes the refereed proceedings of the 9th International Conference on Wireless Algorithms, Systems and Applications, WASA 2014, held in Harbin, China, in June 2014. The 41 revised full papers presented together with 30 invited papers were carefully reviewed and selected from 134 submissions. The papers cover a wide range of topics including cognitive radio networks, wireless sensor networks, cyber-physical systems, distributed and localized algorithm design and analysis, information and coding theory for wireless networks, localization, mobile cloud computing, topology control and coverage, security and privacy, underwater and underground networks, vehicular networks, information processing and data management, programmable service interfaces, energy-efficient algorithms, system and protocol design, operating system and middle-ware support and experimental test-beds and models.
This book constitutes the refereed proceedings of the 8th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2013, held in Zhangjiajie, China, in August 2013. The 25 revised full papers presented together with 18 invited papers were carefully reviewed and selected from 80 submissions. The papers cover the following topics: effective and efficient state-of-the-art algorithm design and analysis, reliable and secure system development and implementations, experimental study and testbed validation, and new application exploration in wireless networks.
This book constitutes the refereed post-proceedings of the 10th European Performance Engineering Workshop, EPEW 2013, held in Venice, Italy, in September 2013. The 16 regular papers presented together with 8 short papers and 2 invited talks were carefully reviewed and selected from 33 submissions. The Workshop aims to gather academic and industrial researchers working on all aspects of performance engineering. Original papers related to theoretical and methodological issues as well as case studies and automated tool support are solicited in the following areas: performance modeling and evaluation, system and network performance engineering, and software performance engineering.
This book constitutes the proceedings of the 6th International Workshop on Communication Technologies for Vehicles, Nets4Cars/Nets4Trains/Nets4Aircraft 2014, held in Offenburg, Germany in May 2014. The 10 papers presented in this volume were carefully reviewed and selected from 15 submissions. The book also contains 4 invited papers. The contributions are organized in topical sections named: automotive issues, car-to-car, aviation issues, in-car, and infrastructures.
This book is an outgrowth of a course given by the author for people in industry, government, and universities wishing to understand the implica tions of emerging optical fiber technology, and how this technology can be applied to their specific information transport and sensing system needs. The course, in turn, is an outgrowth of 15 exciting years during which the author participated in the research and development, as well as in the application, of fiber technology. The aim of this book is to provide the reader with a working knowledge of the components and subsystems which make up fiber systems and of a wide variety of implemented and proposed applications for fiber technology. The book is directed primarily at those who would be users, as opposed to developers, of the technology. The first half of this book is an overview of components and subsys tems including fibers, connectors, cables, sources, detectors, receivers, transmitters, and miscellaneous components. The goal is to familiarize the reader with the properties of these components and subsystems to the extent necessary to understand their potential applications and limitations.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th European Workshop, EuroPKI 2012, held in Pisa, Italy, in September 2012. The 12 revised full papers presented were carefully selected from 30 submissions and cover topics such as Cryptographic Schemas and Protocols, Public Key Infrastructure, Wireless Authentication and Revocation, Certificate and Trusted Computing, and Digital Structures.
This book includes the thoroughly refereed post-conference proceedings of the 16th Annual RoboCup International Symposium, held in Mexico City, Mexico, in June 2012. The 24 revised papers presented together with nine champion team papers and one best paper award were carefully reviewed and selected from 64 submissions. The papers present current research and educational activities within the fields of Robotics and Artificial Intelligence with a special focus to robot hardware and software, perception and action, robotic cognition and learning, multi-robot systems, human-robot interaction, education and edutainment, and applications.
This book constitutes the joint refereed proceedings of the 13 International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking, NEW2AN, and the 6th Conference on Internet of Things and Smart Spaces, ruSMART 2013, held in St. Petersburg, Russia, in August 2013. The total of 38 papers was carefully reviewed and selected for inclusion in this book. The 14 papers selected from ruSMART are organized in topical sections named: internet on things, smart spaces technologies; and smart systems. The 24 papers from NEW2AN deal with the following topics: performance and efficiency analysis, network and transport layer issues; cognitive radio networks; sensor and mesh networks; upper layer protocols and applications; ad-hoc, cellular and satellite networks.
The last ten years have seen a great flowering of the theory of digital data modulation. This book is a treatise on digital modulation theory, with an emphasis on these more recent innovations. It has its origins in a collabor ation among the authors that began in 1977. At that time it seemed odd to us that the subjects of error-correcting codes and data modulation were so separated; it seemed also that not enough understanding underlay the mostly ad hoc approaches to data transmission. A great many others were intrigued, too, and the result was a large body of new work that makes up most of this book. Now the older disciplines of detection theory and coding theory have been generalized and applied to the point where it is hard to tell where these end and the theories of signal design and modulation begin. Despite our emphasis on the events of the last ten years, we have included all the traditional topics of digital phase modulation. Signal space concepts are developed, as are simple phase-shift-keyed and pulse-shaped modulations; receiver structures are discussed, from the simple linear receiver to the Viterbi algorithm; the effects of channel filtering and of hardlimiting are described. The volume thus serves well as a pedagogical book for research engineers in industry and second-year graduate students in communications engineering. The production of a manageable book required that many topics be left out."
The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge processing, which are core and hot topics in computer science. Since the 1990s, the Internet has become the main driving force behind application development in all domains. An increase in the demand for resource sharing across different sites connected through networks has led to an evolution of data- and knowledge-management systems from centralized systems to decentralized systems enabling large-scale distributed applications providing high scalability. Current decentralized systems still focus on data and knowledge as their main resource. Feasibility of these systems relies basically on P2P (peer-to-peer) techniques and the support of agent systems with scaling and decentralized control. Synergy between grids, P2P systems, and agent technologies is the key to data- and knowledge-centered systems in large-scale environments. This, the ninth issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains five revised selected regular papers focusing on the following topics: top-k query processing in P2P systems, self-stabilizing consensus average algorithms in distributed sensor networks, recoverable encryption schemes, xml data in a multi-system environment, and pairwise similarity for cluster ensemble problems.
This book constitutes revised selected papers from the Conference on Energy Efficiency in Large Scale Distributed Systems, EE-LSDS, held in Vienna, Austria, in April 2013. It served as the final event of the COST Action IC0804 which started in May 2009. The 15 full papers presented in this volume were carefully reviewed and selected from 31 contributions. In addition, 7 short papers and 3 demo papers are included in this book. The papers are organized in sections named: modeling and monitoring of power consumption; distributed, mobile and cloud computing; HPC computing; wired and wireless networking; and standardization issues. |
![]() ![]() You may like...
Multimedia Cartography
William Cartwright, Michael P. Peterson, …
Hardcover
R5,689
Discovery Miles 56 890
Recent Econometric Techniques for…
Gilles Dufrenot, Takashi Matsuki
Hardcover
R4,257
Discovery Miles 42 570
Analytically Tractable Stochastic Stock…
Archil Gulisashvili
Hardcover
R2,367
Discovery Miles 23 670
Cross-Cultural Analysis of Image-Based…
Lisa Keller, Robert Keller, …
Hardcover
R3,560
Discovery Miles 35 600
|