0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (2)
  • R250 - R500 (18)
  • R500+ (4,475)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

Transmission-Efficient Design and Management of Wavelength-Routed Optical Networks (Paperback, Softcover reprint of the... Transmission-Efficient Design and Management of Wavelength-Routed Optical Networks (Paperback, Softcover reprint of the original 1st ed. 2001)
Maher Ali
R2,639 Discovery Miles 26 390 Ships in 18 - 22 working days

Optical networks, employing Wavelength-Division Multiplexing (WDM) and wavelength routing, are believed to be the answer for the explosion in IP traffic and the emergence of real-time multimedia applications. These networks offer quantum leaps in transmission capacity as well as eliminate the electronic bottleneck in existing metropolitan and backbone networks. During the last decade, we witnessed a tremendous growth in the theoretical and experimental studies focusing on the cost-effective deployment of wavelength routed networks. The majority of these studies, however, assumed ideal behavior of optical devices. In this book, we argue that for the successful deployment of optical networks, design algorithms and network protocols must be extended to accommodate the non-ideal behavior of optical devices. These extensions should not only focus on maintaining acceptable signal quality (e.g., 12 maintaining BER above 10- ), but should also motivate the development of optimization algorithms and signaling protocols which take transmission impairments into consideration. In addition, the design of enabling technologies, such as optical cross-connects, should be transmission-efficient. This book is a comprehensive treatment of the impact of transmission impairments on the design and management of wavelength-routed networks. We start with transparent networks, focusing on power implications such as cross-connect design, device allocation problems, and management issues. In this all-optical model, we propose a design space based on reduction in overall cost and ease of network management. This design concept, motivates various switch architectures and different optimization problems.

Multiple Access Communications - 5th International Workshop, MACOM 2012, Maynooth, Ireland, November 19-20, 2012, Proceedings... Multiple Access Communications - 5th International Workshop, MACOM 2012, Maynooth, Ireland, November 19-20, 2012, Proceedings (Paperback, 2012 ed.)
Boris Bellalta, Alexey Vinel, Magnus Jonsson, Jaume Barcelo, Roman Maslennikov, …
R1,793 Discovery Miles 17 930 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 5th International Workshop on Multiple Access Communications, MACOM 2012, held in Maynooth, Ireland, in November 2012. The 13 full papers and 5 demo and poster papers presented were carefully reviewed and selected from various submissions. The papers are organized in topical sections on network coding, handling interference and localization techniques at PHY/MAC layers, wireless access networks, and medium access control.

Open Control Networks - LonWorks/EIA 709 Technology (Paperback, Softcover reprint of the original 1st ed. 2001): Dietmar Loy,... Open Control Networks - LonWorks/EIA 709 Technology (Paperback, Softcover reprint of the original 1st ed. 2001)
Dietmar Loy, Dietmar Dietrich, Hans-Joerg Schweinzer
R4,042 Discovery Miles 40 420 Ships in 18 - 22 working days

Control networks span a wide range of application areas. These networks are put into action in the `Digital Home', industrial applications, commercial buildings, transportation systems, gas stations, security systems, and they are found in most instances where smart sensors and smart actuators are used to exchange information. The authors of this volume provide an overview of various control network protocols and discuss LonTalk (R) protocol, Neuron (R) chip, programming model, network structures, network management, interoperability between nodes, application profiles, development and maintenance tools, performance analysis, and standardization activities. Open Control Networks: LonWorks/EIA 709 Technology will be an important resource for advanced students of control systems and embedded systems, engineers designing distributed networks, systems designers and architects, and others developing smart buildings and intelligent transportation systems.

Information Systems Security - 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012, Proceedings... Information Systems Security - 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012, Proceedings (Paperback, 2012 ed.)
Venkat Venkatakrishnan, Diganta Goswami
R1,429 Discovery Miles 14 290 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 8th International Conference on Information Systems Security, ICISS 2012, held in Guwahati, India, in December 2012. The 18 revised full papers and 3 short papers presented were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on software security, acces control, covert communications, network security, and database and distributed systems security.

Building the Global Fiber Optics Superhighway (Paperback, Softcover reprint of the original 1st ed. 2002): C. David Chaffee Building the Global Fiber Optics Superhighway (Paperback, Softcover reprint of the original 1st ed. 2002)
C. David Chaffee
R2,612 Discovery Miles 26 120 Ships in 18 - 22 working days

A re-working of C.D. Chaffee's previously published The Rewiring of America (Academia, 1988), this professional book describes the fiber optics revolution. There have been many changes in the fiber optics field since the book's first publication. These include advances in optical networking; the additional bandwidth created by the Internet and associated data services; liberalization of the global telecommunications industry; and the rewiring of the world's oceans with fiber optics. Building the Global Fiber Optics Superhighway details all these developments. C.D. Chaffee writes: 'One thing is clear: as our networks become primarily data-driven, they need to be built differently, to be able to handle data first, but also voice. It is a different way of looking at the world.'

Middleware 2011 - ACM/IFIP/USENIX 12th International Middleware Conference, Lisbon, Portugal, December 12-16, 2011, Proceedings... Middleware 2011 - ACM/IFIP/USENIX 12th International Middleware Conference, Lisbon, Portugal, December 12-16, 2011, Proceedings (Paperback, 2011)
Fabio Kon, Anne-Marie Kermarrec
R2,717 Discovery Miles 27 170 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the ACM/IFIP/USENIX 12th International Middleware Conference, held in Lisbon, Portugal, in December 2011. The 22 revised full papers presented together with 2 industry papers and an invited paper were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on social networks, storage and performance management, green computing and resource management, notification and streaming, replication and caching, security and interoperability, and run-time (re)configuration and inspection.

Local Area Network Interconnection (Paperback, Softcover reprint of the original 1st ed. 1993): Raif O. Onvural, Arne Nilsson Local Area Network Interconnection (Paperback, Softcover reprint of the original 1st ed. 1993)
Raif O. Onvural, Arne Nilsson
R1,453 Discovery Miles 14 530 Ships in 18 - 22 working days

There are many exciting trends and developments in the communications industry, several of which are related to advances in fast packet switching, multi media services, asynchronous transfer mode (ATM) and high-speed protocols. It seems fair to say that the face of networking has been rapidly changing and the distinction between LANs, MANs, and WANs is becoming more and more blurred. It is commonly believed in the industry that ATM represents the next generation in networking. The adoption of ATM standards by the research and development community as a unifying technology for communications that scales from local to wide area has been met with great enthusiasm from the business community and end users. Reflecting these trends, the technical program of the First International Conference on LAN Interconnection consists of papers addressing a wide range of technical challenges and state of the art reviews. We are fortunate to have assembled a strong program committee, expert speakers, and panelists. We would like to thank Professor Schwartz for his keynote speech. We would like to thank Professor Yannis Viniotis and his students for the preparation of the index. We gratefully acknowledge the generous financial support of Dr. Jon Fjeld, Mr. Rick McGee, and Mr. David Witt, all of IBM-Research Triangle Park. We also would like to thank Ms. Mary Safford, our editor, and Mr. John Matzka, both at Plenum Press, for the publication of the proceedings.

The Temporal Logic of Reactive and Concurrent Systems - Specification (Paperback, Softcover reprint of the original 1st ed.... The Temporal Logic of Reactive and Concurrent Systems - Specification (Paperback, Softcover reprint of the original 1st ed. 1992)
Zohar Manna, Amir Pnueli
R1,448 Discovery Miles 14 480 Ships in 18 - 22 working days

Reactive systems are computing systems which are interactive, such as real-time systems, operating systems, concurrent systems, control systems, etc. They are among the most difficult computing systems to program. Temporal logic is a formal tool/language which yields excellent results in specifying reactive systems. This volume, the first of two, subtitled Specification, has a self-contained introduction to temporal logic and, more important, an introduction to the computational model for reactive programs, developed by Zohar Manna and Amir Pnueli of Stanford University and the Weizmann Institute of Science, Israel, respectively.

Terminological Ontologies - Design, Management and Practical Applications (Paperback, 2010 ed.): Javier Lacasta, Javier... Terminological Ontologies - Design, Management and Practical Applications (Paperback, 2010 ed.)
Javier Lacasta, Javier Nogueras-Iso, Francisco Javier Zarazaga-Soria
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Information infrastructures are integrated solutions based on the fusion of information and communication technologies. They are characterized by the large amount of data that must be managed accordingly. An information infrastructure requires an efficient and effective information retrieval system to provide access to the items stored in the infrastructure. Terminological Ontologies: Design, Management and Practical Applications presents the main problems that affect the discovery systems of information infrastructures to manage terminological models, and introduces a combination of research tools and applications in Semantic Web technologies. This book specifically analyzes the need to create, relate, and integrate the models required for an infrastructure by elaborating on the problem of accessing these models in an efficient manner via interoperable services and components.

Terminological Ontologies: Design, Management and Practical Applications is geared toward information management systems and semantic web professionals working as project managers, application developers, government workers and more. Advanced undergraduate and graduate level students, professors and researchers focusing on computer science will also find this book valuable as a secondary text or reference book.

Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers (Paperback,... Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers (Paperback, 2011 ed.)
Bruce Christianson, Bruno Crispo, James Malcolm, Frank Stajano
R1,434 Discovery Miles 14 340 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-workshop proceedings of the 19th International Workshop on Security Protocols, held in Cambridge, UK, in March 2011. Following the tradition of this workshop series, each paper was revised by the authors to incorporate ideas from the workshop, and is followed in these proceedings by an edited transcription of the presentation and ensuing discussion. The volume contains 17 papers with their transcriptions as well as an introduction, i.e. 35 contributions in total. The theme of the workshop was "Alice doesn't live here anymore."

Service Oriented Computing - 9th International Conference, ICSOC 2011, Paphos, Cyprus, December 5-8, 2011, Proceedings... Service Oriented Computing - 9th International Conference, ICSOC 2011, Paphos, Cyprus, December 5-8, 2011, Proceedings (Paperback, 2011 ed.)
Gerti Kappel, Zakaria Maamar, Hamid R. Motahari-Nezhad
R1,517 Discovery Miles 15 170 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 9th International Conference on Service-Oriented Computing, ICSOC 2011, held in Paphos, Cyprus, in December 2011. The 54 revised papers presented were carefully reviewed and selected from 184 submissions. The papers are organized in topical sections on business process modeling, quality of service, formal methods, XaaS computing, service discovery, service security and trust, service runtime infrastructures and service applications.

Foundations and Practice of Security - 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011, Revised... Foundations and Practice of Security - 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011, Revised Selected Papers (Paperback, 2012)
Joaquin Garcia-Alfaro, Pascal Lafourcade
R1,739 Discovery Miles 17 390 Ships in 18 - 22 working days

This book constitutes the carefully refereed and revised selected papers of the 4th Canada-France MITACS Workshop on Foundations and Practice of Security, FPS 2011, held in Paris, France, in May 2011. The book contains a revised version of 10 full papers, accompanied by 3 keynote addresses, 2 short papers, and 5 ongoing research reports. The papers were carefully reviewed and selected from 30 submissions. The topics covered are pervasive security and threshold cryptography; encryption, cryptanalysis and automatic verification; and formal methodsin network security."

Performance Evaluation, Prediction and Visualization of Parallel Systems (Paperback, Softcover reprint of the original 1st ed.... Performance Evaluation, Prediction and Visualization of Parallel Systems (Paperback, Softcover reprint of the original 1st ed. 1999)
Xingfu Wu
R4,025 Discovery Miles 40 250 Ships in 18 - 22 working days

Performance Evaluation, Prediction and Visualization in Parallel Systems presents a comprehensive and systematic discussion of theoretics, methods, techniques and tools for performance evaluation, prediction and visualization of parallel systems. Chapter 1 gives a short overview of performance degradation of parallel systems, and presents a general discussion on the importance of performance evaluation, prediction and visualization of parallel systems. Chapter 2 analyzes and defines several kinds of serial and parallel runtime, points out some of the weaknesses of parallel speedup metrics, and discusses how to improve and generalize them. Chapter 3 describes formal definitions of scalability, addresses the basic metrics affecting the scalability of parallel systems, discusses scalability of parallel systems from three aspects: parallel architecture, parallel algorithm and parallel algorithm-architecture combinations, and analyzes the relations of scalability and speedup. Chapter 4 discusses the methodology of performance measurement, describes the benchmark- oriented performance test and analysis and how to measure speedup and scalability in practice. Chapter 5 analyzes the difficulties in performance prediction, discusses application-oriented and architecture-oriented performance prediction and how to predict speedup and scalability in practice. Chapter 6 discusses performance visualization techniques and tools for parallel systems from three stages: performance data collection, performance data filtering and performance data visualization, and classifies the existing performance visualization tools. Chapter 7 describes parallel compiling-based, search-based and knowledge-based performance debugging, which assists programmers to optimize the strategy or algorithm in their parallel programs, and presents visual programming-based performance debugging to help programmers identify the location and cause of the performance problem. It also provides concrete suggestions on how to modify their parallel program to improve the performance. Chapter 8 gives an overview of current interconnection networks for parallel systems, analyzes the scalability of interconnection networks, and discusses how to measure and improve network performances. Performance Evaluation, Prediction and Visualization in Parallel Systems serves as an excellent reference for researchers, and may be used as a text for advanced courses on the topic.

Planning and Architectural Design of Modern Command Control Communications and Information Systems - Military and Civilian... Planning and Architectural Design of Modern Command Control Communications and Information Systems - Military and Civilian Applications (Paperback, Softcover reprint of the original 1st ed. 1997)
A. Nejat Ince, Cem Evrendilek, Dag Wilhelmsen, Fadil Gezer
R5,150 Discovery Miles 51 500 Ships in 18 - 22 working days

The subject of this book is Command Control Communication and Information 3 (C I) which is the management infrastructure for any large or complex dynamic resource systems. Here command means the determination of what to do, and control means the ongoing managementofthe execution ofa command. 3 Decision making is the essence of C I which is accomplished through a phased implementation of a set of facilities, communications, personnel, equipment and procedures for monitoring, forecasting, planning, directing, allocating resources, and generating options to achieve specific and general objectives. 3 The C I system that is in question here is for a strategic military command including its subordinate commands. Although the design methodology that will be expounded in the book is for a military system, it can, to a large extent, apply also to tactical military as well as to civilian management information systems (MIS). 3 A C I system is a decision making network that reflects a hierarchical organization 3 of C I nodes. Each node is responsible for the management of some portion ofthe available resources, where the higher level nodes are responsible for a 3 correspondingly greater portion of the resources. Within a C I system both command and control decision making occur at every level of the hierarchy. Command decisions at one level determine how to satisfy the management decisions at a higher level.

Dependable Network Computing (Paperback, Softcover reprint of the original 1st ed. 2000): Dimiter R. Avresky Dependable Network Computing (Paperback, Softcover reprint of the original 1st ed. 2000)
Dimiter R. Avresky
R5,194 Discovery Miles 51 940 Ships in 18 - 22 working days

Dependable Network Computing provides insights into various problems facing millions of global users resulting from the 'internet revolution'. It covers real-time problems involving software, servers, and large-scale storage systems with adaptive fault-tolerant routing and dynamic reconfiguration techniques. Also included is material on routing protocols, QoS, and dead- and live-lock free related issues. All chapters are written by leading specialists in their respective fields. Dependable Network Computing provides useful information for scientists, researchers, and application developers building networks based on commercially off-the-shelf components.

Fundamentals of Resource Allocation in Wireless Networks - Theory and Algorithms (Paperback, Softcover reprint of hardcover 2nd... Fundamentals of Resource Allocation in Wireless Networks - Theory and Algorithms (Paperback, Softcover reprint of hardcover 2nd ed. 2008)
Slawomir Stanczak, Marcin Wiczanowski, Holger Boche
R2,695 Discovery Miles 26 950 Ships in 18 - 22 working days

The purpose of this book is to provide tools for a better understanding of the fundamental tradeo's and interdependencies in wireless networks, with the goal of designing resource allocation strategies that exploit these int- dependencies to achieve signi?cant performance gains. Two facts prompted us to write it: First, future wireless applications will require a fundamental understanding of the design principles and control mechanisms in wireless networks. Second, the complexity of the network problems simply precludes the use of engineering common sense alone to identify good solutions, and so mathematics becomes the key avenue to cope with central technical problems in the design of wireless networks. In this book, two ?elds of mathematics play a central role: Perron-Frobenius theory for non-negative matrices and optimization theory. This book is a revised and expanded version of the research monograph "Resource Allocation in Wireless Networks" that was published as Lecture Notes in Computer Sciences (LNCS 4000) in 2006. Although the general structure has remained unchanged to a large extent, the book contains - merous additional results and more detailed discussion. For instance, there is a more extensive treatment of general nonnegative matrices and interf- ence functions that are described by an axiomatic model. Additional material on max-min fairness, proportional fairness, utility-based power control with QoS (quality of service) support and stochastic power control has been added.

Structural Information and Communication Complexity - 19th International Colloquium, SIROCCO 2012, Reykjavik, Iceland, June 30... Structural Information and Communication Complexity - 19th International Colloquium, SIROCCO 2012, Reykjavik, Iceland, June 30 - July 2, 2012, Revised Selected Papers (Paperback)
Guy Even, Magnus M. Halldorsson
R1,424 Discovery Miles 14 240 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 19th International Colloquium on Structural Information and Communication Complexity, SIROCCO 2012, held in Reykjavik, Iceland for 3 days starting June 30, 2012. The 28 revised full papers presented were carefully reviewed and selected from 54 submissions. SIROCCO is devoted to the study of communication and knowledge in distributed systems. Special emphasis is given to innovative approaches and fundamental understanding, in addition to efforts to optimize current designs. The typical areas include distributed computing, communication networks, game theory, parallel computing, social networks, mobile computing (including autonomous robots), peer to peer systems, communication complexity, fault tolerant graph theories, and randomized/probabilistic issues in networks.

Modeling and Analysis of Computer Communications Networks (Paperback, Softcover reprint of the original 1st ed. 1984): Jeremiah... Modeling and Analysis of Computer Communications Networks (Paperback, Softcover reprint of the original 1st ed. 1984)
Jeremiah F. Hayes
R1,435 Discovery Miles 14 350 Ships in 18 - 22 working days

In large measure the traditional concern of communications engineers has been the conveyance of voice signals. The most prominent example is the telephone network, in which the techniques used for transmission multiplex ing and switching have been designed for voice signals. However, one of the many effects of computers has been the growing volume of the sort of traffic that flows in networks composed of user terminals, processors, and peripherals. The characteristics of this data traffic and the associated perfor mance requirements are quite different from those of voice traffic. These differences, coupled with burgeoning digital technology, have engendered a whole new set of approaches to multiplexing and switching this traffic. The new techniques are the province of what has been loosely called computer communications networks. The subject of this book is the mathematical modeling and analysis of computer communications networks, that is to say, the multiplexing and switching techniques that have been developed for data traffic. The basis for many of the models that we shall consider is queueing theory, although a number of other disciplines are drawn on as well. The level at which this material is covered is that of a first-year graduate course. It is assumed that at the outset the student has had a good undergraduate course in probability and random processes of the sort that are more and more common among electrical engineering and computer science departments."

SDL 2011: Integrating System and Software Modeling - 15th International SDL Forum Toulouse, France, July 5-7, 2011. Revised... SDL 2011: Integrating System and Software Modeling - 15th International SDL Forum Toulouse, France, July 5-7, 2011. Revised Papers (Paperback, 2012)
Iulian Ober, Ileana Ober
R1,745 Discovery Miles 17 450 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 15th International SDL Forum, SDL 2011, held in Toulouse, France, in July 2011. The 16 revised full papers presented together were carefully reviewed and selected for inclusion in the book. The papers cover a wide range of topics such as SDL and related languages; testing; and services and components to a wide range presentations of domain specific languages and applications, going from use maps to train station models or user interfaces for scientific dataset editors for high performance computing.

Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers... Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers (Paperback, 2011)
Liqun Chen, Moti Yung
R1,429 Discovery Miles 14 290 Ships in 18 - 22 working days

This book constitutes the proceedings of the International Conference on Trusted Systems, held in Beijing, China, in December 2010.The 23 contributed papers presented together with nine invited talks from a workshop, titled "Asian Lounge on Trust, Security and Privacy" were carefully selected from 66 submissions. The papers are organized in seven topical sections on implentation technology, security analysis, cryptographic aspects, mobile trusted systems, hardware security, attestation, and software protection.

Turbo Codes - Principles and Applications (Paperback, Softcover reprint of the original 1st ed. 2000): Branka Vucetic, Jinhong... Turbo Codes - Principles and Applications (Paperback, Softcover reprint of the original 1st ed. 2000)
Branka Vucetic, Jinhong Yuan
R4,025 Discovery Miles 40 250 Ships in 18 - 22 working days

Turbo coding principles have found widespread applications in information theory and, in part, have entered into mainstream telecommunication theory and practice. These principles are used in error control, detection, interference suppression, equalization, and other communications-related areas. Turbo Codes: Principles and Applications is intended for use by advanced level students and professional engineers involved in coding and telecommunication research. The material is organized into a coherent framework, starting with basic concepts of block and convolutional coding, and gradually increasing in a logical and progressive manner to more advanced material, including applications. All algorithms are fully described and supported by examples, and evaluations of their performance are carried out both analytically and by simulations. The book includes new and original material on a bidirectional SOVA decoding algorithm, design of turbo codes based on the distance spectrum, design of code-matched interleavers, performance on fading channels, and a turbo trellis code modulation scheme.Trellis-based and iterative decoding algorithms, along with a comparison of algorithms based on their performance and complexity, are discussed. Various practical aspects of turbo coding, such as interleaver design, turbo codes on fading channels, and turbo trellis-coded modulation, are presented. Turbo Codes: Principles and Applications will be especially useful to practicing communications engineers, researchers, and advanced level students who are designing turbo coding systems, including encoder/decoder and interleavers, and carrying out performance analysis and sensitivity studies.

Intelligent Information Agents - Agent-Based Information Discovery and Management on the Internet (Paperback, Softcover reprint... Intelligent Information Agents - Agent-Based Information Discovery and Management on the Internet (Paperback, Softcover reprint of the original 1st ed. 1999)
Matthias Klusch
R2,714 Discovery Miles 27 140 Ships in 18 - 22 working days

Agent technology has recently become one of the most vibrant and fastest growing areas in information technology. Within this booming area, intelligent information agents are attracting particular attention from the research and development community as well as from industry and user communities interested in everyday private and professional applications. This monographic text is the first systematic state-of-the-art survey on intelligent information agents. Eighteen coherently written chapters by leading authorities provide complementary coverage of the relevant issues organized in four parts: cooperative information systems and agents; rational information agents and electronic commerce; adaptive information agents; mobile agents and security. In addition, the volume editor has provided a detailed introductory survey chapter, motivational introductions to the four parts, and a comprehensive bibliography listing more than 700 entries.

Passive and Active Measurement - 14th International Conference, PAM 2013, Hong Kong, China, March 18-19, 2013, Proceedings... Passive and Active Measurement - 14th International Conference, PAM 2013, Hong Kong, China, March 18-19, 2013, Proceedings (Paperback, 2013 ed.)
Matthew Roughan, Chang Rocky
R1,793 Discovery Miles 17 930 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 14th International Conference on Passive and Active Measurement, PAM 2013, held in Hong Kong, China, in March 2013. The 24 revised full papers presented were carefully reviewed and selected from 74 submissions. The papers have been organized in the following topical sections: measurement design, experience and analysis; Internet wireless and mobility; performance measurement; protocol and application behavior; characterization of network usage; and network security and privacy. In addition, 9 poster abstracts have been included.

GSM - Evolution towards 3rd Generation Systems (Paperback, Softcover reprint of the original 1st ed. 2002): Z. Zvonar, Peter... GSM - Evolution towards 3rd Generation Systems (Paperback, Softcover reprint of the original 1st ed. 2002)
Z. Zvonar, Peter Jung, Karl Kammerlander
R5,164 Discovery Miles 51 640 Ships in 18 - 22 working days

The GSM system is undoubtedly the most successful second-generation digital mobile radio system. One of the key factors for this exceptional performance is the constant evolution of the GSM system and its derivatives. GSM: Evolution towards 3rd generation systems addresses new concepts in the GSM system, dealing both with standardized features as well as with theoretically and technologically feasible improvements which contribute to evolutionary changes in general. Ongoing efforts in GSM standardization are focused on Phase 2+ with gradual additions for a fast and modular evolution. Speech remains the prime service of cellular systems, with ongoing work on spectral efficiency taking into account the tradeoff between cost of the system and transmission quality. Most of the notable results from novel speech service implementations are addressed herein such as new EFR speech codec and Advanced Speech Cell Items (ASCI). Data capability in Phase 2+ has been covered under General Packet Radio Service (GPRS) and High-Speed Circuit Switched Data (HCSD) work items. Initiatives under CAMEL cover intelligent networking (IN) within the GSM framework.Dual mode operation in GSM includes not only dual-band solutions but also inter-networking with other systems like DECT or satellite systems. Numerous specific wireless applications such as inbuilding communications, WLL, etc., have also been developed based on GSM. To support the required changes a number of issues have to be solved in the radio part of the system. Deployment of adaptive antenna arrays for enhanced quality, interference suppression techniques and slow frequency hopping are among the techniques presented in the GSM framework. Dynamic evolution of GSM presents a platform for the introduction of UMTS. Presently, efforts are directed towards the standardization of the UMTS air interface in ETSI. Major trends in progress towards new radio interfaces are outlined including contributions from pan-European projects such as ATDMA, which was carried out under the RACE II framework, and the ACTS project AC090 FRAMES. GSM: Evolution towards 3rd generation systems comprises a collection of specially written contributions from GSM specialists.The information presented is essential reading for all researchers, engineers and managers working on GSM and third generation wireless systems. This book covers the most important advances in GSM that will have lasting impact on the system influencing third generation wireless systems.

Digital Convergence: The Information Revolution (Paperback, Softcover reprint of the original 1st ed. 1999): John Vince, Rae... Digital Convergence: The Information Revolution (Paperback, Softcover reprint of the original 1st ed. 1999)
John Vince, Rae Earnshaw
R1,426 Discovery Miles 14 260 Ships in 18 - 22 working days

Although the computer's life has been relatively short, it has brought about an information revolution that is transforming our world on a scale that is still difficult to comprehend. This digital convergence is shaping society, technology and the media for the next millennium. Areas as diverse as home banking and shopping over the Internet; WWW access over mobile phone networks; and television systems such as Web TV which combine on-line services with television. But convergence is not just about technology. It is also about services and new ways of doing business and of interacting with society. Digital convergence heralds the 'Information Revolution'. Edited by John Vince and Rae Earnshaw this important new book on Digital Convergence: The Information Revolution is an edited volume of papers, bringing together state-of-the-art developments in the Internet and World Wide Web and should be compulsory reading for all those interested in and working in those areas.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Dwellings of the Philosophers
Fulcanelli Hardcover R1,086 Discovery Miles 10 860
Buzzy's Adventures in Online Privacy…
Soylu Bilal, Aluskewicz Patricia Hardcover R657 Discovery Miles 6 570
The Garbage Collection Handbook - The…
Richard Jones, Antony Hosking, … Hardcover R1,918 Discovery Miles 19 180
Great Expectations: York Notes for GCSE…
Martin Walker, Charles Dickens, … Paperback  (1)
R184 R143 Discovery Miles 1 430
ASN.1 Complete
John Larmouth Paperback R2,578 Discovery Miles 25 780
Shifting to Online Learning Through…
Caroline M. Crawford Hardcover R5,333 Discovery Miles 53 330
Alteration of Ovoproducts - From…
Olivier Goncalves, Jack Legrand Hardcover R3,937 Discovery Miles 39 370
ICT Critical Infrastructures and Society…
Magda David Hercheui, Diane Whitehouse, … Hardcover R2,712 Discovery Miles 27 120
Gas Chromatography
Colin Poole Hardcover R3,983 R3,752 Discovery Miles 37 520
Dark Silicon and Future On-chip Systems…
Suyel Namasudra, Hamid Sarbazi-Azad Hardcover R3,940 Discovery Miles 39 400

 

Partners