![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > Network computers
This book constitutes the refereed proceedings of the 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, held in Nerja, Spain, in June 2011. The 31 revised full papers included in this volume were carefully reviewed and selected from 172 submissions. They are organized in topical sessions on malware and intrusion detection; attacks, applied crypto; signatures and friends; eclectic assortment; theory; encryption; broadcast encryption; and security services.
The subject of error-control coding bridges several disciplines, in particular mathematics, electrical engineering and computer science. The theory of error-control codes is often described abstractly in mathematical terms only, for the benefit of other coding specialists. Such a theoretical approach to coding makes it difficult for engineers to understand the underlying concepts of error correction, the design of digital error-control systems, and the quantitative behavior of such systems. In this book only a minimal amount of mathematics is introduced in order to describe the many, sometimes mathematical, aspects of error-control coding. The concepts of error correction and detection are in many cases sufficiently straightforward to avoid highly theoretical algebraic constructions. The reader will find that the primary emphasis of the book is on practical matters, not on theoretical problems. In fact, much of the material covered is summarized by examples of real developments, and almost all of the error-correction and detection codes introduced are attached to related practical applications.Error-Control Coding for Data Networks takes a structured approach to channel-coding, starting with the basic coding concepts and working gradually towards the most sophisticated coding systems. The most popular applications are described throughout the book. These applications include the channel-coding techniques used in mobile communication systems, such as: the global system for mobile communications (GSM) and the code-division multiple-access (CDMA) system, coding schemes for High-Definition TeleVision (HDTV) system, the Compact Disk (CD), and Digital Video Disk (DVD), as well as the error-control protocols for the data-link layers of networks, and much more. The book is compiled carefully to bring engineers, coding specialists, and students up to date in the important modern coding technologies. Both electrical engineering students and communication engineers will benefit from the information in this largely self-contained text on error-control system engineering.
This book constitutes the thoroughly refereed proceedings of five workshops of the 13th International Conference on Web-Age Information Management, WAIM 2012, held in Harbin, China, in August 2012. The 34 revised full papers are organized in topical sections on the five following workshops: the First International Workshop on Graph Data Management and Mining (GDMM 2012), the Second International Wireless Sensor Networks Workshop (IWSN 2012), the First International Workshop on Massive Data Storage and Processing (MDSP 2012), the Third International Workshop on Unstructured Data Management (USDM 2012); the 4th International Workshop on XML Data Management (XMLDM 2012).
CDMA Techniques for Third Generation Mobile Systems presents advanced techniques for analyzing and developing third generation mobile telecommunication systems. Coverage includes analysis of CDMA-based systems, multi-user receivers, Turbo coding for mobile radio applications, spatial and temporal processing techniques as well as software radio techniques. Special emphasis has been given to recent advances in coding techniques, smart antenna systems, spatial filtering, and software implementation issues. Internationally recognized specialists contributed to this volume, and each chapter has been reviewed and edited for uniformity. CDMA Techniques for Third Generation Mobile Systems is an invaluable reference work for engineers and researchers involved in the development of specific CDMA systems.
This two-volume set (CCIS 267 and CCIS 268) constitutes the refereed proceedings of the International Conference on Information and Business Intelligence, IBI 2011, held in Chongqing, China, in December 2011. The 229 full papers presented were carefully reviewed and selected from 745 submissions. The papers address topics such as communication systems; accounting and agribusiness; information education and educational technology; manufacturing engineering; multimedia convergence; security and trust computing; business teaching and education; international business and marketing; economics and finance; and control systems and digital convergence.
As part of the NSF's EXPRES project, the authors investigated ways to interchange multi-media documents among diverse systems. Their investigations led to an analysis and implementation of multi-media document format translation in general, and of the ODA standard in particular. ODA, Office Document Architecture, is a new ISO and CCITT international standard for representing multi- media documents. The results of their investigations are presented in this book. The book contains overview information about multi-media document architecture and formats, an introduction to ODA, detailed technical specifications on how to use ODA for multi-media document format translation, and the authors' experiences in implementing and using ODA. The book also contains a complete user manual for the authors' publically available ODA software: tool kits for manipulating ODA and raster formats, tools for examining ODA documents and sample translators between ODA and several other multi-media formats. This book provides comprehensive information about ODA for a large audience. Planners can get basic information about using ODA for interoperation of multi-media systems. Researchers receive detailed discussions about the advantages and problems of using ODA for document representation, format translation and archival storage. System designers can use the technical descriptions of translators and tools in specifying their own. System builders can easily obtain the software as a basis for prototyping and investigating their own ODA implementations.
Recent spectacular achievements in wireless, mobile, and sensor networks have dramatically changed our lives in many ways. However, the rapid evolution of wireless systems not only promises increased functionality, reliability, availability, and security, as well as putting a wide variety of new services at the users' disposal ? it also creates a number of design challenges that our research community is now facing. Scientists and engineers need to come up with, and promptly implement, novel wireless network architectures, while system operators and planners rethink their business models and attend to the growing expectations of their customer base. To provide a suitable forum for discussion between researchers, practitioners, and industry representatives interested in new developments in the respective research area, IFIP WG 6. 8 launched three separate series of conferences: MWCN (Mobile and Wireless Communications Networks), PWC (Personal Wireless Communications), and WSAN (Wireless Sensor and Actors Networks). In 2008, MWCN and PWC were merged into the IFIP Wireless and Mobile Networking Conference (WMNC 2008), held in Toulouse, France, from September 30 to October 2, 2008. MWNC 2008 and PWC 2008 topics were subsequently revised with a view to covering the whole spectrum of hot issues in wireless and mobile networking. As a result, IFIP WG 6. 8 decided to add WSAN as another WMNC track.
This book constitutes the refereed proceedings of the 10th
International Symposium, PETS 2011, held in Waterloo, Canada, in
July 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International ICST Conference on Bio-Inspired Models of Network, Information, and Computing Systems (BIONETICS 2010) which was held in Boston, USA, in December 2010. The 78 revised full papers were carefully reviewed and selected from numerous submissions for inclusion in the proceedings. BIONETICS 2010 aimed to provide the understanding of the fundamental principles and design strategies in biological systems and leverage those understandings to build bio-inspired systems.
This book constitutes the thoroughly refereed post-conference proceedings of the First International Workshop on Energy Efficient Data Centers (E2DC 2012) held in Madrid, Spain, in May 2012. The 13 revised full papers presented were carefully selected from 32 submissions. The papers cover topics from information and communication technologies of green data centers to business models and GreenSLA solutions. The first section presents contributions in form of position and short papers, related to various European projects. The other two sections comprise papers with more in-depth technical details. The topics covered include energy-efficient data center management and service delivery as well as energy monitoring and optimization techniques for data centers.
'The world of information processing is going through a major phase of its evolution. Networking has been associated with computers since the 1960's. Communicating machines, exchanging information or cooperating to solve complex problems, were the dream of many scientists and engineers. Rudi mentary networks and protocols were invented. Local area networks capable of carrying a few megabits per second became basic components of corporate computing installations in the 1980's. At the same time, advances in optical transmission and switching technologies made it possible to transfer billions of bits per second. 'The availability of this huge bandwidth is making people wonder about the seemingly unlimited possibilities of these "fat information pipes" A new world where all interesting up-to-date information becomes instantaneously available to everyone everywhere is often portrayed to be around the comer. New applications are envisioned and their requirements are defined. 'The new field of High Performance Networking is burgeoning with activities at various levels. Several frontiers are being explored simultaneously. In order to achieve more bandwidth and better performance, work is progressing in optical transmission, high speed switching and network resource manage ment. Some researchers have started to investigate all-optical networking as a promising approach to remove the relatively slow electronics from the network infrastructure. This will also introduce a new environment with unique characteristics that will have a definite impact on network architec tures, topologies, addressing schemes, and protocols.
Urolithiasis is not only one of the most frequently encountered diseases at uro logical clinics; it is also the disorder whose treatment has shown the most rapid progress in the past decade. In that period, medicine has experienced a real revolution, characterized by minimally invasive treatments, improvement of the quality of life, and cost-effectiveness in treatment outcomes. In urology, the revolution started with the development of endoscopic retrograde treatment of urolithiasis in the upper urinary tract, which led to development of the percuta neous antegrade maneuver in the latter half of the 1970s. The most remarkable event occurred in 1982, when clinical use of extracorporeal shock wave lithotripsy was introduced by the Munich group, represented by Dr. Christian Chaussy, at the 18th Congress of the International Society of Urology in San Francisco. With the advent of these new strategies, open surgery for urolithiasis has all but dis appeared. Today, with the availability of new technology and equipment, guide lines for the treatment of urolithiasis have changed in all developed countries. It is quite timely that the Meeting of International Consultation on Urolithiasis will be held in Paris in June 2001 to establish international guidelines for urolithiasis. Looking through this textbook for urolithiasis, I was greatly impressed to learn that we have already drawn up some guidelines. The book includes all the updated advances of urolithiasis presented by the most prominent and experi enced urologists from all around the world.
The combination of Internet and GSM (Global System for Mobile
communications, cellular phones) enables individuals with wireless
devices to interact easily with information and services over
existing wireless networks. The Wireless Application Protocol (WAP)
is the facilitator of this process.
This volume contains the proceedings of the NATO Advanced Study Institute on "Picture Archiving and Communication Systems (PACS) in Medicine" held in Evian, France, October 14- 26, 1990. The program committee of the institute consisted of H.K. Huang (Director), Osman Ratib, Albert Bakker, and Gerd Witte. This institute brought together approximately 90 participants from 15 countries. These proceedings are the accumulation of eight years of research and development results in PACS by various dedicated groups throughout the world. The purpose of this institute was to review the most recent technology available for PACS and some clinical results. The readers should notice the remarkable advances in this field by comparing the contents in these proceedings with those in a previous institute on "Pictorial Information Systems in Medicine" held August 27 - September 7, 1984 in Braunlage/Harz, Federal Republic of Germany, and published as Vol. 19 in this series. The institute was organized according to four categories: PACS components and system integration, PACS and related research in various countries and manufacturing companies, clinical experience and research support, and participants' scientific communications. In PACS components, we included image acquisition, workstations, data storage and networking. In system integration, topics on interfaces between Hospital Information System (HIS), Radiology Information System (RIS) and PACS, clinical reports, the ACR/NEMA standard, databases, reliability, and system integration were discussed. This lecture series emphasized the technical detail and "how to" aspects.
This two-volume set (CCIS 201 and CCIS 202) constitutes the refereed proceedings of the International Conference on Computer Science and Education, CSE 2011, held in Qingdao, China, in July 2011. The 164 revised full papers presented in both volumes were carefully reviewed and selected from a large number of submissions. The papers address a large number of research topics and applications: from artificial intelligence to computers and information technology; from education systems to methods research and other related issues; such as: database technology, computer architecture, software engineering, computer graphics, control technology, systems engineering, network, communication, and other advanced technology, computer education, and life-long education.
This Three-Volume-Set constitutes the refereed proceedings of the Second International Conference on Software Engineering and Computer Systems, ICSECS 2011, held in Kuantan, Malaysia, in June 2011. The 190 revised full papers presented together with invited papers in the three volumes were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on software engineering; network; bioinformatics and e-health; biometrics technologies; Web engineering; neural network; parallel and distributed e-learning; ontology; image processing; information and data management; engineering; software security; graphics and multimedia; databases; algorithms; signal processing; software design/testing; e- technology; ad hoc networks; social networks; software process modeling; miscellaneous topics in software engineering and computer systems.
The two-volume set LNCS 6769 + LNCS 6770 constitutes the proceedings of the First International Conference on Design, User Experience, and Usability, DUXU 2011, held in Orlando, FL, USA in July 2011 in the framework of the 14th International Conference on Human-Computer Interaction, HCII 2011, incorporating 12 thematically similar conferences. A total of 4039 contributions was submitted to HCII 2011, of which 1318 papers were accepted for publication. The total of 154 contributions included in the DUXU proceedings were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on DUXU theory, methods and tools; DUXU guidelines and standards; novel DUXU: devices and their user interfaces; DUXU in industry; DUXU in the mobile and vehicle context; DXU in Web environment; DUXU and ubiquitous interaction/appearance; DUXU in the development and usage lifecycle; DUXU evaluation; and DUXU beyond usability: culture, branding, and emotions.
This volume constitutes the refereed proceedings of the 4th International Conference on Internationalization, Design and Global Development, IDGD 2011, held in Orlando, FL, USA, in July 2011 in the framework of the 14th International Conference on Human-Computer Interaction, HCII 2011. The 71 revised papers presented were carefully reviewed and selected from numerous submissions. The papers accepted for presentation thoroughly cover the entire field of internationalization, design and global development and address the following major topics: Cultural and cross-cultural design, culture and usability, design, emotion, trust and aesthetics, cultural issues in business and industry, culture, communication and society.
From Markov Jump Processes to Spatial Queues aims to develop a unified theory of spatial queues that yields concrete results for the performance analysis of mobile communication networks. A particular objective is to develop the most natural generalization of existing concepts (e.g. the BMAP) toward the needs of mobile communication networks. To these belong the spatial distribution of batch arrivals and users in the system as well as time-inhomogeneous (e.g. periodic) arrival intensities and user movements. One of the major recent challenges for the stochastic modelling of communication systems is the emergence of wireless networks, which are used by more and more subscribers today. The main new feature of those, which is not covered by classical queuing theory, clearly is the importance of the user location within the area that is served by the base stations of the network. In the framework of queuing theory, this opens up the natural extension of classical queuing models towards queues with a structured space in which users are served. The present book is intended to introduce this extension under the name of spatial queues. The main point of view and the general approach will be that of Markov jump processes. We start with a closer look into the theory. Then we present new results for the theory of stochastic processes as well as for classical queuing theory. Finally we introduce the new concepts of spatial Markovian arrival processes and spatial queues. The main text is divided into three parts. The first part provides a new presentation of the theory of Markov jump processes. We derive a number of new results, especially for time-inhomogeneous processes, which have been neglected too much in the current textbooks on stochastic processes. For the first time, the class of Markov-additive jump processes is analysed in detail. This extends and unifies all Markovian arrival processes that have been proposed up to now (including arrivals for fluid queues) and provides a foundation for the subsequent introduction of spatial Markovian arrival processes. The second part contains new results for classical queues with BMAP input. These include the first explicit formulae for the distribution of periodic queues. The class of fluid Markovian arrival processes is introduced, and we give statistical estimates for the parameters of a BMAP. In the third part, the concepts of spatial Markovian arrival
processes (abbreviated: SMAPs) and spatial queues are introduced.
After that, periodic spatial Markovian queues are analysed as a
model for the cells of a wireless communication network.
The main objective of pervasive computing systems is to create environments where computers become invisible by being seamlessly integrated and connected into our everyday environment, where such embedded computers can then provide inf- mation and exercise intelligent control when needed, but without being obtrusive. Pervasive computing and intelligent multimedia technologies are becoming incre- ingly important to the modern way of living. However, many of their potential applications have not yet been fully realized. Intelligent multimedia allows dynamic selection, composition and presentation of the most appropriate multimedia content based on user preferences. A variety of applications of pervasive computing and - telligent multimedia are being developed for all walks of personal and business life. Pervasive computing (often synonymously called ubiquitous computing, palpable computing or ambient intelligence) is an emerging ?eld of research that brings in revolutionary paradigms for computing models in the 21st century. Pervasive c- puting is the trend towards increasingly ubiquitous connected computing devices in the environment, a trend being brought about by a convergence of advanced el- tronic - and particularly, wireless - technologies and the Internet. Recent advances in pervasive computers, networks, telecommunications and information technology, along with the proliferation of multimedia mobile devices - such as laptops, iPods, personal digital assistants (PDAs) and cellular telephones - have further stimulated the development of intelligent pervasive multimedia applications. These key te- nologiesarecreatingamultimediarevolutionthatwillhavesigni?cantimpactacross a wide spectrum of consumer, business, healthcare and governmental domains.
The five-volume set LNCS 6782 - 6786 constitutes the refereed proceedings of the International Conference on Computational Science and Its Applications, ICCSA 2011, held in Santander, Spain, in June 2011. The five volumes contain papers presenting a wealth of original research results in the field of computational science, from foundational issues in computer science and mathematics to advanced applications in virtually all sciences making use of computational techniques. The topics of the fully refereed papers are structured according to the five major conference themes: geographical analysis, urban modeling, spatial statistics; cities, technologies and planning; computational geometry and applications; computer aided modeling, simulation, and analysis; and mobile communications.
A fundamental and comprehensive framework for network security designed for military, government, industry, and academic network personnel. Scientific validation of "security on demand" through computer modeling and simulation methods. The book presents an example wherein the framework is utilized to integrate security into the operation of a network. As a result of the integration, the inherent attributes of the network may be exploited to reduce the impact of security on network performance and the security availability may be increased down to the user level. The example selected is the ATM network which is gaining widespread acceptance and use.
IT securiteers - The human and technical dimension working for the organisation. Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry. More often than desired, these teams are only useful for companies' executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems. IT Security Management provides an insight into how to create and grow a team of passionate IT security professionals. We will call them "securiteers". They will add value to the business, improving the information security stance of organisations.
The International Workshop on "The Internet Challenge: Technology and Applications" is the fifth in a successful series of workshops that were established by Shanghai Jiao Tong University and Technische Universitat Berlin. The goal of those workshops is to bring together researchers from both universities in order to exchange research results achieved in common projects of the two partner universities or to present interesting new work that might lead to new cooperation. The series of workshops started in 1990 with the "International Workshop on Artificial Intelligence" and was continued with the "International Workshop on Advanced Software Technology" in 1994. Both workshops have been hosted by Shanghai Jiao Tong University. In 1998 the third workshop took place in Berlin. This "International Workshop on Communication Based Systems" was essentially based on results from the Graduiertenkolleg on Communication Based systems that was funded by the German Research Society (DFG) from 1991 to 2000. The fourth "International Workshop on Robotics and its Applications" was held in Shanghai in 2000 supported by VDIIVDE-GMA and GI.
This volume constitutes the refereed proceedings of the 10th International Symposium on Experimental Algorithms, SEA 2011, held in Kolimpari, Chania, Crete, Greece, in May 2011. The 36 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 83 submissions and present current research in the area of design, analysis, and experimental evaluation and engineering of algorithms, as well as in various aspects of computational optimization and its applications. |
You may like...
Quantitative Magnetic Resonance Imaging…
Nicole Seiberlich, Vikas Gulani, …
Paperback
R3,714
Discovery Miles 37 140
Discovering Computers, Essentials…
Susan Sebok, Jennifer Campbell, …
Paperback
Managing Technology Integration for…
Naman Sharma, Kumar Shalender
Hardcover
R5,363
Discovery Miles 53 630
Computer-Graphic Facial Reconstruction
John G. Clement, Murray K. Marks
Hardcover
R2,327
Discovery Miles 23 270
NMR Spectroscopy in the Undergraduate…
David Soulsby, Laura J. Anna, …
Hardcover
R4,835
Discovery Miles 48 350
Distance Measurements in Biological…
Lawrence J. Berliner, Sandra S. Eaton, …
Hardcover
R5,499
Discovery Miles 54 990
|