0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (2)
  • R250 - R500 (17)
  • R500+ (4,515)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

Network Control and Engineering for QoS, Security and Mobility II - IFIP TC6 / WG6.2 & WG6.7 Second International Conference on... Network Control and Engineering for QoS, Security and Mobility II - IFIP TC6 / WG6.2 & WG6.7 Second International Conference on Network Control and Engineering for QoS, Security and Mobility (Net-Con 2003) October 13-15, 2003, Muscat, Oman (Paperback, Softcover reprint of the original 1st ed. 2003)
Dominique Gaiti, Guy Pujolle, Ahmed M. Al-Naamany, Hadj Bourdoucen, Lazhar Khriji
R2,870 Discovery Miles 28 700 Ships in 10 - 15 working days

Service and network providers must be able to satisfy the demands for new services, improve the quality of service, reduce the cost of network service operations and maintenance, control performance and adapt to user demands. These challenges are so important for the future of our communication environment that it is essential to investigate different approaches for controlling and optimizing network resources. Network Control and Engineering for QoS, Security and Mobility II addresses the problem of network control and engineering with a focus on control of quality of service, management of security, and supervision of mobility. New trends in these different fields are also investigated. This volume contains the proceedings of the Second International Conference on NETwork CONtrol and Engineering (NETCON) for Quality of Service, Security and Mobility, which convened in Oman in October 2003. The conference was sponsored by the International Federation for Information Processing (IFIP) and organized by IFIP's Working Groups 6.2 on Network and Internetwork Architecture, 6.6 on Network Management, and 6.7 on Smart Networks.

Network Control and Engineering for QoS, Security and Mobility - IFIP TC6 / WG6.2 & WG6.7 Conference on Network Control and... Network Control and Engineering for QoS, Security and Mobility - IFIP TC6 / WG6.2 & WG6.7 Conference on Network Control and Engineering for QoS, Security and Mobility (Net-Con 2002) October 23-25, 2002, Paris, France (Paperback, Softcover reprint of the original 1st ed. 2003)
Dominique Gaiti, Nadia Boukhatem
R3,022 Discovery Miles 30 220 Ships in 10 - 15 working days

Service and network providers must be able to satisfy the demands for new services; improve the quality of service; reduce the cost of network service operations and maintenance; control performance; and adapt to user demands. It is essential to investigate different approaches for performing such tasks. One of these approaches is based on policies and the capability of the network to adapt itself to current conditions. With a focus on policy-based networking, this volume addresses the problem of network control and the introduction of policies such as the control of the Quality of Service, security, mobility, performance, mobile and intelligent agents, and traffic engineering. The area of control in networks through policies promises to provide stimulating challenges for years to come. This book is an attempt to answer questions and provide some direction about the best approaches to be followed. This volume contains the proceedings of the first International Conference on NETwork CONtrol and Engineering (NETCON) for Quality of Service, Security and Mobility, which was sponsored by the International Federation for Information Processing (IFIP), and organized by IFIP TC6 Working Group 6.7 (Smart Networks). The conference convened in Paris, France in October 2002.

Wireless Location in CDMA Cellular Radio Systems (Paperback, Softcover reprint of the original 1st ed. 2002): James J. Caffery... Wireless Location in CDMA Cellular Radio Systems (Paperback, Softcover reprint of the original 1st ed. 2002)
James J. Caffery Jr.
R2,848 Discovery Miles 28 480 Ships in 10 - 15 working days

With the increasing market penetration of cellular telephones, the number of E-911 calls placed by cellular telephones has grown cons- erably. This growth in E-911 calls led to a 1996 FCC ruling requiring that all cellular, PCS, and SMR licensees provide location information for the support of E-911 safety services. The provision of such location information is to be implemented in two phases. Phase I, whose deadline has already been passed, requires that wireless carriers relay the caller's telephone number along with location of the cell site and/or sector se- ing the call, to a designated Public Safety Answering Point (PSAP). This information allows the PSAP to return the call if disconnected. Phase II, to be completed by October 1, 2001, is much more stringent and requires that the location of an E-911 caller be determined and reported with an rms location accuracy of 125 m in 67% of the cases. The applications of wireless location technology extend well beyond E-911 services. Location information can be used by cellular telephone operators themselves for more effective management of their radio - sources, so as to achieve greater spectral efficiencies. Resource m- agement algorithms such as hand-offs between cell sites, channel assi- ments, and others can all benefit from subscriber location information. Location information obtained from vehicular based cellular telephones can be used as an input to Intelligent Transportation Systems (ITS), and in particular traffic management and traveler information systems.

Mobile Computing - Implementing Pervasive Information and Communications Technologies (Paperback, Softcover reprint of the... Mobile Computing - Implementing Pervasive Information and Communications Technologies (Paperback, Softcover reprint of the original 1st ed. 2002)
Shambhu Upadhyaya, Abhijit Chaudhury, Kevin Kwiat, Mark Weiser
R2,856 Discovery Miles 28 560 Ships in 10 - 15 working days

Mobil Computing: Implementing Pervasive Information and Communication Technologies is designed to address some of the business and technical challenges of pervasive computing that encompass current and emerging technology standards, infrastructures and architectures, and innovative and high impact applications of mobile technologies in virtual enterprises. The various articles examine a host of issues including: the challenges and current solutions in mobile connectivity and coordination; management infrastructures; innovative architectures for fourth generation wireless and Ad-hoc networks; error-free frequency assignments for wireless communication; cost-effective wavelength assignments in optical communication networks; data and transaction modeling in a mobile environment, and bandwidth issues and data routing in mobile Ad-hoc networks.

Fundamentals of Digital Switching (Paperback, 2nd ed. 1990. Softcover reprint of the original 2nd ed. 1990): John C McDonald Fundamentals of Digital Switching (Paperback, 2nd ed. 1990. Softcover reprint of the original 2nd ed. 1990)
John C McDonald
R2,937 Discovery Miles 29 370 Ships in 10 - 15 working days

Since the publication of the first edition of Fundamentals of Digital Switching in 1983, there has been substantial improvement in digital switching technology and in digital networks. Packet switching has advanced from a low-speed data-oriented switching approach into a robust broadband technology which supports services ranging from low-speed data to video. This technology has eclipsed the flexibility of circuit switching. Fiber optic cable has advanced since the first edition and has substantially changed the technology of transmission. to research in optical devices to find a still better means of This success has led switching. Digital switching systems continue to benefit from the 100-fold improvement in the capabilities of semiconductor devices which has occurred during the past decade. The chip industry forecasts a similar escalation in complexity during the next 10 years. Networks of switching systems have changed due to regulatory policy reform in many nations, including the breakup of the Bell System in the United States, the introduction of new types of carriers in Japan, competition in the United Kingdom, and a reexamination of public policy in virtually all nations. Standards bodies have been productive in specifying new capabilities for future networks involving interactive and distributive services through STM and A TM technologies.

Buffering Techniques for Delivery of Compressed Video in Video-on-Demand Systems (Paperback, Softcover reprint of the original... Buffering Techniques for Delivery of Compressed Video in Video-on-Demand Systems (Paperback, Softcover reprint of the original 1st ed. 1997)
Wu-Chi Feng
R4,308 Discovery Miles 43 080 Ships in 10 - 15 working days

Many emerging technologies such as video conferencing, video-on-demand, and digital libraries require the efficient delivery of compressed video streams. For applications that require the delivery of compressed stored multimedia streams, the a priori knowledge available about these compressed streams can aid in the allocation of server and network resources. By using a client-side buffer, the resource requirements from the server and network can be minimized. Buffering Techniques for Delivery of Compressed Video in Video-on-Demand Systems presents a comprehensive description of buffering techniques for the delivery of compressed, prerecorded multimedia data. While these techniques can be applied to any compressed data streams, this book focusses primarily on the delivery of video streams because of the large resource requirements that they can consume. The book first describes buffering techniques for the continuous playback of stored video sources. In particular, several bandwidth smoothing (or buffering) algorithms that are provably optimal under certain conditions are presented. To provide a well-rounded discussion, the book then describes extensions that aid in the ability to provide interactive delivery of video across networks. Specifically, reservation techniques that take into account interactive functions such as fast-forward and rewind are described. In addition, extensions to the bandwidth smoothing algorithms presented in the first few chapters are described. These algorithms are designed with interactive, continuous playback of stored video in mind and are also provably optimal under certain constraints. Buffering Techniques for Delivery of Compressed Video in Video-on-Demand Systems serves as an excellent resource for multimedia systems, networking and video-on-demand designers, and may be used as a text for advanced courses on the topic.

Managing QoS in Multimedia Networks and Services - IEEE / IFIP TC6 - WG6.4 & WG6.6 Third International Conference on Management... Managing QoS in Multimedia Networks and Services - IEEE / IFIP TC6 - WG6.4 & WG6.6 Third International Conference on Management of Multimedia Networks and Services (MMNS'2000) September 25-28, 2000, Fortaleza, Ceara, Brazil (Paperback, Softcover reprint of the original 1st ed. 2000)
Jose Neuman De Souza, Raouf Boutaba
R5,583 Discovery Miles 55 830 Ships in 10 - 15 working days

Welcome to the third International Conference on Management of Multimedia Networks and Services (MMNS'2000) in Fortaleza (Brazil)! The first MMNS was held in Montreal ( Canada) in july 1997 and the second MMNS was held in Versailles (France) in November 1998. The MMNS conference takes place every year and a half and is aimed to be a truly international event by bringing together researchers and practitioners from all around the world and by organising the conference each time in a different continent/country. Over the past several years, there has been a considerable amount of research within the fields of multimedia networking and network management. Much of that work has taken place within the context of managing Quality-of Service in broadband integrated services digital networks such as the A TM, and more recently in IP-based networks, to respond to the requirements of emerging multimedia applications. A TM networks were designed to support multimedia traffic with diverse characteristics and can be used as the transfer mode for both wired and wireless networks. A new set of Internet protocols is being developed to provide better quality of service, which is a prerequisite for supporting multimedia applications. Multimedia applications have a different set of requirements, which impacts the design of the underlying communication network as well as its management. Several QoS management mechanisms intervening at different layers of the communication network are required including QoS-routing, QoS-based transport, QoS negotiation, QoS adaptation, FCAPS management, and mobility management.

Testing of Communicating Systems XIV - Application to Internet Technologies and Services (Paperback, Softcover reprint of the... Testing of Communicating Systems XIV - Application to Internet Technologies and Services (Paperback, Softcover reprint of the original 1st ed. 2002)
Ina Schieferdecker, Hartmut Koenig, Adam Wolisz
R4,399 Discovery Miles 43 990 Ships in 10 - 15 working days

Testing of Communicating Systems XIV presents the latest international results in both the theory and industrial practice of the testing of communicating systems, ranging from tools and techniques for testing to test standards, frameworks, notations, algorithms, fundamentals of testing, and industrial experiences and issues. The tools and techniques discussed apply to conformance testing, interoperability testing, performance testing, Internet protocols and applications, and multimedia and distributed systems in general.

Emerging Personal Wireless Communications - IFIP TC6/WG6.8 Working Conference on Personal Wireless Communications... Emerging Personal Wireless Communications - IFIP TC6/WG6.8 Working Conference on Personal Wireless Communications (PWC'2001), August 8-10, 2001, Lappeenranta, Finland (Paperback, Softcover reprint of the original 1st ed. 2002)
Olli Martikainen, Jari Porras, Jenni Hyvarinen
R4,355 Discovery Miles 43 550 Ships in 10 - 15 working days

The growth of telecommunications has been largely based on mobile and data services in the past 10 years and this growth will continue. For instance, it is forecasted that after 2005 the mobile traffic turnover in Europe will exceed that of fixed telephone traffic, and the penetration of Internet access through mobile will exceed that of fixed access. It is expected that new value-added services will be Internet-based and that IP traffic will outweigh the amount of traditional ISDN based telephone traffic. The transition from existing telecommunications services to mobile and Internet-based services will change the service infrastructure as well as the customer and service management structures. This volume comprises the proceedings of the Working Conference on Personal Wireless Communications (PWC'2001), which was sponsored by the International Federation for Information Processing (IFIP) and organized by IFIP Working Group 6.8. It was held in Lappeenranta, Finland in August 2001. The PWC'2001 conference is a forum for tutorials, discussions and presentations of new developments in mobile and wireless research.The contributions to this volume have been divided into six categories that vary from voice over IP implementations to quality of service issues; from service aspects to performance and modelling issues; from modern cellular networks to future wireless systems. This volume will be essential reading for IT students and researchers as well as for theoreticians interested in the current state of the telecommunication systems.

Testing of Communicating Systems - IFIP TC6 10th International Workshop on Testing of Communicating Systems, 8-10 September... Testing of Communicating Systems - IFIP TC6 10th International Workshop on Testing of Communicating Systems, 8-10 September 1997, Cheju Island, Korea (Paperback, Softcover reprint of the original 1st ed. 1997)
Myungchul Kim, Sungwon Kang, Keesoo Hong
R5,628 Discovery Miles 56 280 Ships in 10 - 15 working days

The aim of this book is to bring together the research of academics and practitioners in the field of communication systems testing. It covers four major topic areas; types of testing including conformance testing, inoperability testing, performance and QoS testing; phases of testing including test case generation, means of testing, test execution and test results analysis; classes of systems tested and the theory and practice of testing including test-related algorithms, practical testing methodology and practical testing experience.

Intelligent Networks and Intelligence in Networks - IFIP TC6 WG6.7 International Conference on Intelligent Networks and... Intelligent Networks and Intelligence in Networks - IFIP TC6 WG6.7 International Conference on Intelligent Networks and Intelligence in Networks, 2-5 September 1997, Paris, France (Paperback, Softcover reprint of the original 1st ed. 1997)
Jorgen Norgaard, Villy Baek Iversen
R5,586 Discovery Miles 55 860 Ships in 10 - 15 working days

The IFIP International Working Conference on Intelligent Networks '95 was held at the Technical University of Denmark (DTU) in Copenhagen. The conference was organised jointly by the Center for Tete-Information at DTU and Tele Danmark Research! during August 30-31 1995 and was hosted by the Center for Tete-Information. The conference was sponsored by IFIP TC6. The papers contained in this book are edited versions of the papers from the conference and some of the tutorial presentations that were arranged prior to the conference. The mixture of tutorial papers and conference papers gives a broad and yet thorough coverage of activities and central areas of development in the IN world at this point in time. Future developments, especially in the area of extended mobility support and multimedia capabilities, are also pre sented. BACKGROUND The theme of the conference was the two major trends in Intelligent Networks (IN) develop ment: * ITU and ETSI based IN standards, such as CS-1 and the upcoming CS-2 and * long term development as undertaken by, for example, the TINA consortium and the Euro pean RACE and ACTS programmes. The present IN technology based on capability sets is on its way into the networks, and opera tors are pushing for open platforms to be deployed in the networks in the near future in order to obtain greater freedom in selecting platforms for service provisioning.

Information Computing and Applications - 4th International Conference, ICICA 2013, Singapore, August 16-18, 2013. Revised... Information Computing and Applications - 4th International Conference, ICICA 2013, Singapore, August 16-18, 2013. Revised Selected Papers, Part I (Paperback, 2013 ed.)
Yuhang Yang, Maode Ma, Baoxiang Liu
R1,636 Discovery Miles 16 360 Ships in 10 - 15 working days

This two-volume set of CCIS 391 and CCIS 392 constitutes the refereed proceedings of the Fourth International Conference on Information Computing and Applications, ICICA 2013, held in Singapore, in August 2013. The 126 revised full papers presented in both volumes were carefully reviewed and selected from 665 submissions. The papers are organized in topical sections on Internet computing and applications; engineering management and applications; intelligent computing and applications; control engineering and applications; cloud and evolutionary computing; knowledge management and applications; computational statistics and applications.

Security and Privacy in the Age of Uncertainty - IFIP TC11 18th International Conference on Information Security (SEC2003) May... Security and Privacy in the Age of Uncertainty - IFIP TC11 18th International Conference on Information Security (SEC2003) May 26-28, 2003, Athens, Greece (Paperback, Softcover reprint of the original 1st ed. 2003)
Sabrina de Capitani di Vimercati, Pierangela Samarati, Sokratis Katsikas
R2,938 Discovery Miles 29 380 Ships in 10 - 15 working days

Security and Privacy in the Age of Uncertainty covers issues related to security and privacy of information in a wide range of applications including: *Secure Networks and Distributed Systems; *Secure Multicast Communication and Secure Mobile Networks; *Intrusion Prevention and Detection; *Access Control Policies and Models; *Security Protocols; *Security and Control of IT in Society. This volume contains the papers selected for presentation at the 18th International Conference on Information Security (SEC2003) and at the associated workshops. The conference and workshops were sponsored by the International Federation for Information Processing (IFIP) and held in Athens, Greece in May 2003.

Architecture of Computing Systems -- ARCS 2013 - 26th International Conference, Prague, Czech Republic, February 19-22, 2013... Architecture of Computing Systems -- ARCS 2013 - 26th International Conference, Prague, Czech Republic, February 19-22, 2013 Proceedings (Paperback, 2013 ed.)
Hana Kubatova, Christian Hochberger, Martin Danek, Bernhard Sick
R1,543 Discovery Miles 15 430 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 26th International Conference on Architecture of Computing Systems, ARCS 2013, held in Prague, Czech Republic, in February 2013. The 29 papers presented were carefully reviewed and selected from 73 submissions. The topics covered are computer architecture topics such as multi-cores, memory systems, and parallel computing, adaptive system architectures such as reconfigurable systems in hardware and software, customization and application specific accelerators in heterogeneous architectures, organic and autonomic computing including both theoretical and practical results on self-organization, self-configuration, self-optimization, self-healing, and self-protection techniques, operating systems including but not limited to scheduling, memory management, power management, RTOS, energy-awareness, and green computing.

Databases in Networked Information Systems - 8th International Workshop, DNIS 2013, Aizu-Wakamatsu, Japan, March 25-27, 2013.... Databases in Networked Information Systems - 8th International Workshop, DNIS 2013, Aizu-Wakamatsu, Japan, March 25-27, 2013. Proceedings (Paperback, 2013 ed.)
Aastha Madaan, Shinji Kikuchi, Subhash Bhalla
R1,530 Discovery Miles 15 300 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Workshop on Databases in Networked Information Systems, DNIS 2013, held in Aizu-Wakamatsu, Japan in March 2013. The 22 revised full papers presented were carefully reviewed and selected for inclusion in the book. The workshop generally puts the main focus on data semantics and infrastructure for information management and interchange. The papers are organized in topical sections on cloud-based database systems; information and knowledge management; information extraction from data resources; bio-medical information management; and networked information systems: infrastructure.

High Performance Networking - IFIP TC-6 Eighth International Conference on High Performance Networking (HPN'98) Vienna,... High Performance Networking - IFIP TC-6 Eighth International Conference on High Performance Networking (HPN'98) Vienna, Austria, September 21-25, 1998 (Paperback, Softcover reprint of the original 1st ed. 1998)
Harmen R.Van As
R5,701 Discovery Miles 57 010 Ships in 10 - 15 working days

High Performance Networking is a state-of-the-art book that deals with issues relating to the fast-paced evolution of public, corporate and residential networks. It focuses on the practical and experimental aspects of high performance networks and introduces novel approaches and concepts aimed at improving the performance, usability, interoperability and scalability of such systems. Among others, the topics covered include: * Java applets and applications; * distributed virtual environments; * new internet streaming protocols; * web telecollaboration tools; * Internet, Intranet; * real-time services like multimedia; * quality of service; * mobility. High Performance Networking comprises the proceedings of the Eighth International Conference on High Performance Networking, sponsored by the International Federation for Information Processing (IFIP), and was held at Vienna Univrsity of Technology, Vienna, Austria, in September 1998. High Performance Networking is suitable as a secondary text for a graduate level course on high performance networking, and as a reference for researchers and practitioners in industry.

Deadline Scheduling for Real-Time Systems - EDF and Related Algorithms (Paperback, Softcover reprint of the original 1st ed.... Deadline Scheduling for Real-Time Systems - EDF and Related Algorithms (Paperback, Softcover reprint of the original 1st ed. 1998)
John A. Stankovic, Marco Spuri, Krithi Ramamritham, Giorgio C Buttazzo
R4,348 Discovery Miles 43 480 Ships in 10 - 15 working days

Many real-time systems rely on static scheduling algorithms. This includes cyclic scheduling, rate monotonic scheduling and fixed schedules created by off-line scheduling techniques such as dynamic programming, heuristic search, and simulated annealing. However, for many real-time systems, static scheduling algorithms are quite restrictive and inflexible. For example, highly automated agile manufacturing, command, control and communications, and distributed real-time multimedia applications all operate over long lifetimes and in highly non-deterministic environments. Dynamic real-time scheduling algorithms are more appropriate for these systems and are used in such systems. Many of these algorithms are based on earliest deadline first (EDF) policies. There exists a wealth of literature on EDF-based scheduling with many extensions to deal with sophisticated issues such as precedence constraints, resource requirements, system overload, multi-processors, and distributed systems.Deadline Scheduling for Real-Time Systems: EDF and Related Algorithms aims at collecting a significant body of knowledge on EDF scheduling for real-time systems, but it does not try to be all-inclusive (the literature is too extensive). The book primarily presents the algorithms and associated analysis, but guidelines, rules, and implementation considerations are also discussed, especially for the more complicated situations where mathematical analysis is difficult. In general, it is very difficult to codify and taxonomize scheduling knowledge because there are many performance metrics, task characteristics, and system configurations. Also, adding to the complexity is the fact that a variety of algorithms have been designed for different combinations of these considerations. In spite of the recent advances there are still gaps in the solution space and there is a need to integrate the available solutions.For example, a list of issues to consider includes: * preemptive versus non-preemptive tasks, * uni-processors versus multi-processors, * using EDF at dispatch time versus EDF-based planning, * precedence constraints among tasks, * resource constraints, * periodic versus aperiodic versus sporadic tasks, * scheduling during overload, * fault tolerance requirements, and * providing guarantees and levels of guarantees (meeting quality of service requirements). Deadline Scheduling for Real-Time Systems: EDF and Related Algorithms should be of interest to researchers, real-time system designers, and instructors and students, either as a focussed course on deadline-based scheduling for real-time systems, or, more likely, as part of a more general course on real-time computing. The book serves as an invaluable reference in this fast-moving field.

Any Time, Anywhere Computing - Mobile Computing Concepts and Technology (Paperback, Softcover reprint of the original 1st ed.... Any Time, Anywhere Computing - Mobile Computing Concepts and Technology (Paperback, Softcover reprint of the original 1st ed. 1999)
Abdelsalam A. Helal, Bert Haskell, Jeffery L. Carter, Richard Brice, Darrell Woelk, …
R4,318 Discovery Miles 43 180 Ships in 10 - 15 working days

Mobile communications havepermeated the globe in both business and social cultures. In only af ew short years, Japan aloneh ash ad more than ten million subscribers enter the mobilem arket. Such explosive popularity is an indication ofa strong commercial demand for communications in both the tethered and tetherless environments. Accompanying the vibrant growth in mobile communications is the growth in multimedia communications, includingthe Internet. Mobile and multime dia communications technologies are merging, making mobile computing ak ey phrasei n the coming advanced information communication era. Thegrowth i n these dynamic industries shows that achange in our chosen method of commu nications is already well advanced. Reading e mail and connecting to various information feeds have already become a part ofdaily business activities. We are trying to grasp theo verall picture of mobile computing. Its shape and form are just starting to appear as personal digital assistants (PDA), handheld personal computers (HPC), wireless data communication services, and com mercial software designed for mobile environments. We are at the cusp of vast popularization of "computers on the go. " "Any time Anywhere Computing" provides the reader with an understand able explanationo ft he current developments and commercialization of mobile computing. Thec oret ec hnologies and applications needed to un derstand the industry are comprehensively addressed. Thebook emphasizes three infrastruc tures: (1) wireless communication network infrastructure, (2) terminal devices (or "computers on the go"), and (3) software middleware and architectures that support wireless and mobile computing.

Mobile Computing (Paperback, Softcover reprint of the original 1st ed. 1996): Tomasz Imielinski, Henry F. Korth Mobile Computing (Paperback, Softcover reprint of the original 1st ed. 1996)
Tomasz Imielinski, Henry F. Korth
R8,416 Discovery Miles 84 160 Ships in 10 - 15 working days

The desire and the necessity for accessing and processing information stored in computer networks anytime and anywhere' has been the impetus for the growing interest in mobile computing research. Wired computing networks and end devices such as PCs and workstations have effectively extended the data-only networking capability of a few years ago to sophisticated multimedia networking. The cost of such transformation to the end user turns out to be very nominal. Undoubtedly the wireless access technology has given a big boost to mobile cellular telephony and data networking. Processing general purpose multimedia information requires, besides higher bandwidth, means for controlling the available bandwidth and caring for quality of service issues. This problem is accentuated by the need for providing such service in the presence of wireless physical layer and host mobility. Thus, tetherless and ubiquitous mobile and wireless computing systems should carefully combine advances in computer networking and wireless communication. While several experimental mobile computing platforms have sprung up, much research is needed to overcome technological obstacles in low power system design, sustainable battery life, unreliability and limited bandwidth of the wireless channel. Mobile Computing addresses some aspects of this new but rapidly growing field of research. A total of eight papers span the areas of protocols, network architecture, and performance issues. All of the papers deal with the complexities of host mobility in a wireless setting. They expose several challenges that affect system design of mobile computing networks at various levels. By addressing these challenges in an efficient and cost-effective manner, it is hoped that user-friendly, seamless and faster networks will emerge to serve the sophisticated and demanding applications of mobile users. Mobile Computing serves as an excellent reference, providing insights into some of the most important issues in mobile and wireless computing.

Automated Technology for Verification and Analysis - 11th International Symposium, ATVA 2013, Hanoi, Vietnam, October 15-18,... Automated Technology for Verification and Analysis - 11th International Symposium, ATVA 2013, Hanoi, Vietnam, October 15-18, 2013, Proceedings (Paperback, 2013 ed.)
Dang Van Hung, Mizuhito Ogawa
R1,594 Discovery Miles 15 940 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th International Symposium on Automated Technology for Verification and Analysis, ATVA 2013, held at Hanoi, Vietnam, in October 2013. The 27 regular papers, 3 short papers and 12 tool papers presented together with 3 invited talks were carefully selected from73 submissions. The papers are organized in topical, sections on analysis and verification of hardware circuits, systems-on-chip and embedded systems, analysis of real-time, hybrid, priced/weighted and probabilistic systems, deductive, algorithmic, compositional, and abstraction/refinement techniques for analysis and verification, analytical techniques for safety, security, and dependability, testing and runtime analysis based on verification technology, analysis and verification of parallel and concurrent hardware/software systems, verification in industrial practice, and applications and case studies.

Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences... Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013, Proceedings (Paperback, 2013 ed.)
David Basin, John C. Mitchell
R1,525 Discovery Miles 15 250 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second International Conference on Principles of Security and Trust, POST 2013, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2013, in Rome, Italy, in March 2013. The 14 papers included in this volume were carefully reviewed and selected from 59 submissions. They deal with the theoretical and foundational aspects of security and trust such as new theoretical results, practical applications of existing foundational ideas, and innovative theoretical approaches stimulated by pressing practical problems.

New Trends in Optical Network Design and Modeling - IFIP TC6 Fourth Working Conference on Optical Network Design and Modeling... New Trends in Optical Network Design and Modeling - IFIP TC6 Fourth Working Conference on Optical Network Design and Modeling February 7-8, 2000, Athens, Greece (Paperback, Softcover reprint of the original 1st ed. 2001)
Alexandros A. Stavdas
R4,349 Discovery Miles 43 490 Ships in 10 - 15 working days

Optical network design and modeling is an essential issue for planning and operating networks for the next century. The main issues in optical networking are being widely investigated, not only for WDM networks but also for optical TDM and optical packet switching. This book contributes to further progress in optical network architectures, design, operation and management and covers the following topics in detail: * Optical switching and Teabit networking; * Future OTDM and packet switched networks; * WDM ring networks; * Optical interworking and 'packets over wavelength'; * Hybrid and switchless networks; * Medium access protocols for optical LANs and MANs. This book contains the selected proceedings of the Fourth International Working Conference on Optical Network Design and Modeling, which was sponsored by the International Federation for Information Processing (IFIP), and held in February 2000, in Athens, Greece. This valuable new book will be essential reading for academic researchers and practitioners working in computer science, electrical engineering, and communications.

Physical Layer Approaches for Securing Wireless Communication Systems (Paperback, 2013 ed.): Hong Wen Physical Layer Approaches for Securing Wireless Communication Systems (Paperback, 2013 ed.)
Hong Wen
R1,745 Discovery Miles 17 450 Ships in 10 - 15 working days

This book surveys the outstanding work of physical-layer (PHY) security, including the recent achievements of confidentiality and authentication for wireless communication systems by channel identification. A practical approach to building unconditional confidentiality for Wireless Communication security by feedback and error correcting code is introduced and a framework of PHY security based on space time block code (STBC) MIMO system is demonstrated. Also discussed is a scheme which combines cryptographic techniques implemented in the higher layer with the physical layer security approach using redundant antennas of MIMO systems to provide stronger security for wireless networks. The channel responses between communication peers have been explored as a form of fingerprint with spatial and temporal uniqueness. Finally, the book develops a new lightweight method of channel identification for Sybil attack and node clone detection in wireless sensor networks (WSNs).

Information and Communication Technology - International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29,... Information and Communication Technology - International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013, Proceedings (Paperback, 2013 ed.)
Khabib Mustofa, Erich Neuhold, A. Min Tjoa, Edgar R. Weippl, Ilsun You
R3,100 Discovery Miles 31 000 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the collocation of AsiaARES 2013 as a special track on Availability, Reliability, and Security, held in Yogyakarta, Indonesia, in March 2013. The 62 revised full papers presented were carefully reviewed and selected from a numerous submissions. The papers are organized in topical sections on e-society, software engineering, security and privacy, cloud and internet computing, knowledge management, dependable systems and applications, cryptography, privacy and trust management, network analysis and security, and multimedia security.

GSM - Evolution towards 3rd Generation Systems (Paperback, Softcover reprint of the original 1st ed. 2002): Z. Zvonar, Peter... GSM - Evolution towards 3rd Generation Systems (Paperback, Softcover reprint of the original 1st ed. 2002)
Z. Zvonar, Peter Jung, Karl Kammerlander
R5,600 Discovery Miles 56 000 Ships in 10 - 15 working days

The GSM system is undoubtedly the most successful second-generation digital mobile radio system. One of the key factors for this exceptional performance is the constant evolution of the GSM system and its derivatives. GSM: Evolution towards 3rd generation systems addresses new concepts in the GSM system, dealing both with standardized features as well as with theoretically and technologically feasible improvements which contribute to evolutionary changes in general. Ongoing efforts in GSM standardization are focused on Phase 2+ with gradual additions for a fast and modular evolution. Speech remains the prime service of cellular systems, with ongoing work on spectral efficiency taking into account the tradeoff between cost of the system and transmission quality. Most of the notable results from novel speech service implementations are addressed herein such as new EFR speech codec and Advanced Speech Cell Items (ASCI). Data capability in Phase 2+ has been covered under General Packet Radio Service (GPRS) and High-Speed Circuit Switched Data (HCSD) work items. Initiatives under CAMEL cover intelligent networking (IN) within the GSM framework.Dual mode operation in GSM includes not only dual-band solutions but also inter-networking with other systems like DECT or satellite systems. Numerous specific wireless applications such as inbuilding communications, WLL, etc., have also been developed based on GSM. To support the required changes a number of issues have to be solved in the radio part of the system. Deployment of adaptive antenna arrays for enhanced quality, interference suppression techniques and slow frequency hopping are among the techniques presented in the GSM framework. Dynamic evolution of GSM presents a platform for the introduction of UMTS. Presently, efforts are directed towards the standardization of the UMTS air interface in ETSI. Major trends in progress towards new radio interfaces are outlined including contributions from pan-European projects such as ATDMA, which was carried out under the RACE II framework, and the ACTS project AC090 FRAMES. GSM: Evolution towards 3rd generation systems comprises a collection of specially written contributions from GSM specialists.The information presented is essential reading for all researchers, engineers and managers working on GSM and third generation wireless systems. This book covers the most important advances in GSM that will have lasting impact on the system influencing third generation wireless systems.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cyber-Physical Systems - Foundations…
Houbing Song, Danda B. Rawat, … Paperback R2,667 R2,514 Discovery Miles 25 140
Computer Networking - An All-in-One…
Quinn Kiser Hardcover R722 R638 Discovery Miles 6 380
Computational Intelligence in Data…
Vallidevi Krishnamurthy, Suresh Jaganathan, … Hardcover R2,640 Discovery Miles 26 400
3rd International Conference on…
Isaac Woungang, Sanjay Kumar Dhurandher Hardcover R7,550 Discovery Miles 75 500
Research Trends in Graph Theory and…
Daniela Ferrero, Leslie Hogben, … Hardcover R3,543 Discovery Miles 35 430
Privacy-Preserving in Edge Computing
Longxiang Gao, Tom H. Luan, … Hardcover R4,233 Discovery Miles 42 330
5G and Beyond - Fundamentals and…
Xingqin Lin, Namyoon Lee Hardcover R4,960 Discovery Miles 49 600
Reconfigurable Intelligent…
Hongliang Zhang, Boya Di, … Hardcover R4,928 Discovery Miles 49 280
Advances in Computing and Network…
Sabu M. Thampi, Erol Gelenbe, … Hardcover R8,756 Discovery Miles 87 560
Algorithms for Data and Computation…
Alex X. Liu, Rui Li Hardcover R3,916 Discovery Miles 39 160

 

Partners