0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (4)
  • R250 - R500 (18)
  • R500+ (4,502)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

Network Science - Complexity in Nature and Technology (Hardcover, 2010): Ernesto Estrada, Maria Fox, Desmond J. Higham,... Network Science - Complexity in Nature and Technology (Hardcover, 2010)
Ernesto Estrada, Maria Fox, Desmond J. Higham, Gian-Luca Oppo
R3,077 Discovery Miles 30 770 Ships in 10 - 15 working days

Network Science is the emerging field concerned with the study of large, realistic networks. This interdisciplinary endeavor, focusing on the patterns of interactions that arise between individual components of natural and engineered systems, has been applied to data sets from activities as diverse as high-throughput biological experiments, online trading information, smart-meter utility supplies, and pervasive telecommunications and surveillance technologies. This unique text/reference provides a fascinating insight into the state of the art in network science, highlighting the commonality across very different areas of application and the ways in which each area can be advanced by injecting ideas and techniques from another. The book includes contributions from an international selection of experts, providing viewpoints from a broad range of disciplines. It emphasizes networks that arise in nature-such as food webs, protein interactions, gene expression, and neural connections-and in technology-such as finance, airline transport, urban development and global trade. Topics and Features: begins with a clear overview chapter to introduce this interdisciplinary field; discusses the classic network science of fixed connectivity structures, including empirical studies, mathematical models and computational algorithms; examines time-dependent processes that take place over networks, covering topics such as synchronisation, and message passing algorithms; investigates time-evolving networks, such as the World Wide Web and shifts in topological properties (connectivity, spectrum, percolation); explores applications of complex networks in the physical and engineering sciences, looking ahead to new developments in the field. Researchers and professionals from disciplines as varied as computer science, mathematics, engineering, physics, chemistry, biology, ecology, neuroscience, epidemiology, and the social sciences will all benefit from this topical and broad overview of current activities and grand challenges in the unfolding field of network science.

Cybersecurity Risk of IoT on Smart Cities (Hardcover, 1st ed. 2021): Roberto O. Andrade, Luis Tello-Oquendo, Ivan Ortiz Cybersecurity Risk of IoT on Smart Cities (Hardcover, 1st ed. 2021)
Roberto O. Andrade, Luis Tello-Oquendo, Ivan Ortiz
R3,658 Discovery Miles 36 580 Ships in 10 - 15 working days

This book covers the topics on cyber security in IoT systems used in different verticals such as agriculture, health, homes, transportation within the context of smart cities. The authors provide an analysis of the importance of developing smart cities by incorporating technologies such as IoT to achieve the sustainable development goals (SDGs) within the agenda 2030. Furthermore, it includes an analysis of the cyber security challenges generated by IoT systems due to factors such as heterogeneity, lack of security in design and few hardware resources in these systems, and how they should be addressed from a risk analysis approach, evaluating the risk analysis methodologies widely used in traditional IT systems.

Structured Peer-to-Peer Systems - Fundamentals of Hierarchical Organization, Routing, Scaling, and Security (Hardcover, 2013... Structured Peer-to-Peer Systems - Fundamentals of Hierarchical Organization, Routing, Scaling, and Security (Hardcover, 2013 ed.)
Dmitry Korzun, Andrei Gurtov
R4,198 R3,622 Discovery Miles 36 220 Save R576 (14%) Ships in 12 - 17 working days

The field of structured P2P systems has seen fast growth upon the introduction of Distributed Hash Tables (DHTs) in the early 2000s. The first proposals, including Chord, Pastry, Tapestry, were gradually improved to cope with scalability, locality and security issues. By utilizing the processing and bandwidth resources of end users, the P2P approach enables high performance of data distribution which is hard to achieve with traditional client-server architectures. The P2P computing community is also being actively utilized for software updates to the Internet, P2PSIP VoIP, video-on-demand, and distributed backups. The recent introduction of the identifier-locator split proposal for future Internet architectures poses another important application for DHTs, namely mapping between host permanent identity and changing IP address. The growing complexity and scale of modern P2P systems requires the introduction of hierarchy and intelligence in routing of requests.

"Structured Peer-to-Peer Systems" covers fundamental issues in organization, optimization, and tradeoffs of present large-scale structured P2P systems, as well as, provides principles, analytical models, and simulation methods applicable in designing future systems. Part I presents the state-of-the-art of structured P2P systems, popular DHT topologies and protocols, and the design challenges for efficient P2P network topology organization, routing, scalability, and security. Part II shows that local strategies with limited knowledge per peer provide the highest scalability level subject to reasonable performance and security constraints. Although the strategies are local, their efficiency is due to elements of hierarchical organization, which appear in many DHT designs that traditionally are considered as flat ones. Part III describes methods to gradually enhance the local view limit when a peer is capable to operate with larger knowledge, still partial, about the entire system. These methods were formed in the evolution of hierarchical organization from flat DHT networks to hierarchical DHT architectures, look-ahead routing, and topology-aware ranking. Part IV highlights some known P2P-based experimental systems and commercial applications in the modern Internet. The discussion clarifies the importance of P2P technology for building present and future Internet systems."

Body Sensor Networks (Hardcover, 2nd ed. 2014): Guang-Zhong Yang Body Sensor Networks (Hardcover, 2nd ed. 2014)
Guang-Zhong Yang
R3,278 Discovery Miles 32 780 Ships in 10 - 15 working days

The last decade has witnessed a rapid surge of interest in new sensing and monitoring devices for wellbeing and healthcare. One key development in this area is wireless, wearable and implantable "in vivo" monitoring and intervention. A myriad of platforms are now available from both academic institutions and commercial organisations. They permit the management of patients with both acute and chronic symptoms, including diabetes, cardiovascular diseases, treatment of epilepsy and other debilitating neurological disorders. Despite extensive developments in sensing technologies, there are significant research issues related to system integration, sensor miniaturisation, low-power sensor interface, wireless telemetry and signal processing.

In the 2nd edition of this popular and authoritative reference on Body Sensor Networks (BSN), major topics related to the latest technological developments and potential clinical applications are discussed, with contents covering.

Biosensor Design, Interfacing and Nanotechnology

Wireless Communication and Network Topologies

Communication Protocols and Standards

Energy Harvesting and Power Delivery

Ultra-low Power Bio-inspired Processing

Multi-sensor Fusion and Context Aware Sensing

Autonomic Sensing

Wearable, Ingestible Sensor Integration and Exemplar Applications

System Integration and Wireless Sensor Microsystems

The book also provides a comprehensive review of the current wireless sensor development platforms and a step-by-step guide to developing your own BSN applications through the use of BSN development kit.

Pervasive Computing - Innovations in Intelligent Multimedia and Applications (Hardcover, 2010 ed.): Aboul Ella Hassanien, Jemal... Pervasive Computing - Innovations in Intelligent Multimedia and Applications (Hardcover, 2010 ed.)
Aboul Ella Hassanien, Jemal H. Abawajy, Ajith Abraham, Hani Hagras
R4,575 Discovery Miles 45 750 Ships in 12 - 17 working days

The main objective of pervasive computing systems is to create environments where computers become invisible by being seamlessly integrated and connected into our everyday environment, where such embedded computers can then provide inf- mation and exercise intelligent control when needed, but without being obtrusive. Pervasive computing and intelligent multimedia technologies are becoming incre- ingly important to the modern way of living. However, many of their potential applications have not yet been fully realized. Intelligent multimedia allows dynamic selection, composition and presentation of the most appropriate multimedia content based on user preferences. A variety of applications of pervasive computing and - telligent multimedia are being developed for all walks of personal and business life. Pervasive computing (often synonymously called ubiquitous computing, palpable computing or ambient intelligence) is an emerging ?eld of research that brings in revolutionary paradigms for computing models in the 21st century. Pervasive c- puting is the trend towards increasingly ubiquitous connected computing devices in the environment, a trend being brought about by a convergence of advanced el- tronic - and particularly, wireless - technologies and the Internet. Recent advances in pervasive computers, networks, telecommunications and information technology, along with the proliferation of multimedia mobile devices - such as laptops, iPods, personal digital assistants (PDAs) and cellular telephones - have further stimulated the development of intelligent pervasive multimedia applications. These key te- nologiesarecreatingamultimediarevolutionthatwillhavesigni?cantimpactacross a wide spectrum of consumer, business, healthcare and governmental domains.

Automated Firewall Analytics - Design, Configuration and Optimization (Hardcover, 2014 ed.): Ehab Al-Shaer Automated Firewall Analytics - Design, Configuration and Optimization (Hardcover, 2014 ed.)
Ehab Al-Shaer
R3,352 Discovery Miles 33 520 Ships in 12 - 17 working days

This book provides a comprehensive and in-depth study of automated firewall policy analysis for designing, configuring and managing distributed firewalls in large-scale enterpriser networks. It presents methodologies, techniques and tools for researchers as well as professionals to understand the challenges and improve the state-of-the-art of managing firewalls systematically in both research and application domains. Chapters explore set-theory, managing firewall configuration globally and consistently, access control list with encryption, and authentication such as IPSec policies. The author also reveals a high-level service-oriented firewall configuration language (called FLIP) and a methodology and framework for designing optimal distributed firewall architecture. The chapters illustrate the concepts, algorithms, implementations and case studies for each technique. Automated Firewall Analytics: Design, Configuration and Optimization is appropriate for researchers and professionals working with firewalls. Advanced-level students in computer science will find this material suitable as a secondary textbook or reference.

Cooperative Communications and Networking - Technologies and System Design (Hardcover, 2010 Ed.): Y -W Peter Hong, Wan-Jen... Cooperative Communications and Networking - Technologies and System Design (Hardcover, 2010 Ed.)
Y -W Peter Hong, Wan-Jen Huang, C.-C.Jay Kuo
R4,561 Discovery Miles 45 610 Ships in 12 - 17 working days

Cooperative and relay communications have recently become the most widely explored topics in communications, whereby users cooperate in transmitting their messages to the destination, instead of conventional networks which operate independently and compete among each other for channel resources. As the field has progressed, cooperative communications have become a design concept rather than a specific transmission technology. This concept has revolutionized the design of wireless networks, allowing increased coverage, throughput, and transmission reliability even as conventional transmission techniques gradually reach their limits. Cooperative and relay technologies have also made their way toward next generation wireless standards, such as IEEE802.16 (WiMAX) or LTE, and have been incorporated into many modern wireless applications, such as cognitive radio and secret communications.

"Cooperative Communications and Networking: Technologies and System Design" provides a systematic introduction to the fundamental concepts of cooperative communications and relays technology to enable engineers, researchers or graduate students to conduct advanced research and development in this area.

"Cooperative Communications and Networking: Technologies and System Design" provides researchers, graduate students, and practical engineers with sufficient knowledge of both the background of cooperative communications and networking, and potential research directions.

Remote Instrumentation and Virtual Laboratories - Service Architecture and Networking (Hardcover, Edition.): Franco Davoli,... Remote Instrumentation and Virtual Laboratories - Service Architecture and Networking (Hardcover, Edition.)
Franco Davoli, Norbert Meyer, Roberto Pugliese, Sandro Zappatore
R10,019 R8,624 Discovery Miles 86 240 Save R1,395 (14%) Ships in 12 - 17 working days

Accessing remote instrumentation worldwide is one of the goals of e-Science. The task of enabling the execution of complex experiments that involve the use of distributed scientific instruments must be supported by a number of different architectural domains, which inter-work in a coordinated fashion to provide the necessary functionality. These domains embrace the physical instruments, the communication network interconnecting the distributed systems, the service oriented abstractions and their middleware. The Grid paradigm (or, more generally, the Service Oriented Architecture -- SOA), viewed as a tool for the integration of distributed resources, plays a significant role, not only to manage computational aspects, but increasingly as an aggregator of measurement instrumentation and pervasive large-scale data acquisition platforms. In this context, the functionality of a SOA allows managing, maintaining and exploiting heterogeneous instrumentation and acquisition devices in a unified way, by providing standardized interfaces and common working environments to their users, but the peculiar aspects of dealing with real instruments of widely different categories may add new functional requirements to this scenario. On the other hand, the growing transport capacity of core and access networks allows data transfer at unprecedented speed, but new challenges arise from wireless access, wireless sensor networks, and the traversal of heterogeneous network domains.

The book focuses on all aspects related to the effective exploitation of remote instrumentation and to the building complex virtual laboratories on top of real devices and infrastructures. These include SOA and related middleware, high-speed networking in support of Grid applications, wireless Grids for acquisition devices and sensor networks, Quality of Service (QoS) provisioning for real-time control, measurement instrumentation and methodology, as well as metrology issues in distributed systems.

Grids, P2P and Services Computing (Hardcover, 2010 ed.): Frederic Desprez, Vladimir Getov, Thierry Priol, Ramin Yahyapour Grids, P2P and Services Computing (Hardcover, 2010 ed.)
Frederic Desprez, Vladimir Getov, Thierry Priol, Ramin Yahyapour
R4,512 Discovery Miles 45 120 Ships in 12 - 17 working days

Grids, P2P and Services Computing, the 12th volume of the CoreGRID series, is based on the CoreGrid ERCIM Working Group Workshop on Grids, P2P and Service Computing in Conjunction with EuroPar 2009. The workshop will take place August 24th, 2009 in Delft, The Netherlands. Grids, P2P and Services Computing, an edited volume contributed by well-established researchers worldwide, will focus on solving research challenges for Grid and P2P technologies. Topics of interest include: Service Level Agreement, Data & Knowledge Management, Scheduling, Trust and Security, Network Monitoring and more. Grids are a crucial enabling technology for scientific and industrial development. This book also includes new challenges related to service-oriented infrastructures. Grids, P2P and Services Computing is designed for a professional audience composed of researchers and practitioners within the Grid community industry. This volume is also suitable for advanced-level students in computer science.

Data Science and Big Data Computing - Frameworks and Methodologies (Hardcover, 1st ed. 2016): Zaigham Mahmood Data Science and Big Data Computing - Frameworks and Methodologies (Hardcover, 1st ed. 2016)
Zaigham Mahmood
R4,245 Discovery Miles 42 450 Ships in 12 - 17 working days

This illuminating text/reference surveys the state of the art in data science, and provides practical guidance on big data analytics. Expert perspectives are provided by authoritative researchers and practitioners from around the world, discussing research developments and emerging trends, presenting case studies on helpful frameworks and innovative methodologies, and suggesting best practices for efficient and effective data analytics. Features: reviews a framework for fast data applications, a technique for complex event processing, and agglomerative approaches for the partitioning of networks; introduces a unified approach to data modeling and management, and a distributed computing perspective on interfacing physical and cyber worlds; presents techniques for machine learning for big data, and identifying duplicate records in data repositories; examines enabling technologies and tools for data mining; proposes frameworks for data extraction, and adaptive decision making and social media analysis.

Wireless Sensor and Mobile Ad-Hoc Networks - Vehicular and Space Applications (Hardcover, 2015 ed.): Driss Benhaddou, Ala... Wireless Sensor and Mobile Ad-Hoc Networks - Vehicular and Space Applications (Hardcover, 2015 ed.)
Driss Benhaddou, Ala Al-Fuqaha
R4,372 R3,514 Discovery Miles 35 140 Save R858 (20%) Ships in 12 - 17 working days

Wireless sensor Networks: Vehicle and Space Applications describes the practical perspectives in using wireless sensor networks (WSN) to develop real world applications that can be used for space exploration. These applications include sensor interfaces, remote wireless vehicles, space crew health monitoring and instrumentation. The material discusses how applications of WSN originally developed for space travel and exploration are being applied and used in multiple real world applications, allowing for the development of smart systems that have characteristics such as self healing, self diagnosis, and emergency healthcare notification.

Sensor Networks with IEEE 802.15.4 Systems - Distributed Processing, MAC, and Connectivity (Hardcover, 2011 ed.): Chiara... Sensor Networks with IEEE 802.15.4 Systems - Distributed Processing, MAC, and Connectivity (Hardcover, 2011 ed.)
Chiara Buratti, Marco Martalo, Roberto Verdone, Gianluigi Ferrari
R4,464 Discovery Miles 44 640 Ships in 10 - 15 working days

This book presents a simple, yet complete, approach to the design and performance analysis of distributed processing algorithms and techniques suitable for IEEE 802.15.4 networks. In particular, the book focuses on the bottom two layers of the ISO/OSI stack (Physical and Medium Access Control), discussing also a few issue related to routing. The book is a the synergistic combination of signal processing aspects on the one hand and MAC and connectivity issues on the other hand. The goal of the book is to clearly link physical layer aspects with medium access and topology aspects, in order to provide the reader with a clear understanding of how to approach the design of proper distributed signal processing and medium access algorithms in this context.

Decentralized Systems with Design Constraints (Hardcover, Edition.): Magdi S. Mahmoud Decentralized Systems with Design Constraints (Hardcover, Edition.)
Magdi S. Mahmoud
R5,713 R4,509 Discovery Miles 45 090 Save R1,204 (21%) Ships in 12 - 17 working days

Decentralized Control and Filtering provides a rigorous framework for examining the analysis, stability and control of large-scale systems, addressing the difficulties that arise because dimensionality, information structure constraints, parametric uncertainty and time-delays.This monograph serves three purposes: it reviews past methods and results from a contemporary perspective; it examines presents trends and approaches and to provide future possibilities; and it investigates robust, reliable and/or resilient decentralized design methods based on a framework of linear matrix inequalities. As well as providing an overview of large-scale systems theories from the past several decades, the author presents key modern concepts and efficient computational methods. Representative numerical examples, end-of-chapter problems, and typical system applications are included, and theoretical developments and practical applications of large-scale dynamical systems are discussed in depth.

Economics of Information Security and Privacy III (Hardcover, 2012): Bruce Schneier Economics of Information Security and Privacy III (Hardcover, 2012)
Bruce Schneier
R4,864 Discovery Miles 48 640 Ships in 12 - 17 working days

The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining expertise from the fields of economics, social science, business, law, policy and computer science. Prior workshops have explored the role of incentives between attackers and defenders, identified market failures dogging Internet security, and assessed investments in cyber-defense. Current contributions build on past efforts using empirical and analytic tools to not only understand threats, but also strengthen security through novel evaluations of available solutions. "Economics of Information Security and Privacy III" addresses the following questions: how should information risk be modeled given the constraints of rare incidence and high interdependence; how do individuals' and organizations' perceptions of privacy and security color their decision making; how can we move towards a more secure information infrastructure and code base while accounting for the incentives of stakeholders?

Distributed Programming - Theory and Practice (Hardcover, 2013 ed.): A. Udaya Shankar Distributed Programming - Theory and Practice (Hardcover, 2013 ed.)
A. Udaya Shankar
R1,603 Discovery Miles 16 030 Ships in 10 - 15 working days

"Distributed Programming: Theory and Practice" presents a practical and rigorous method to develop distributed programs that correctly implement their specifications. The method also covers how to write specifications and how to use them. Numerous examples such as bounded buffers, distributed locks, message-passing services, and distributed termination detection illustrate the method. Larger examples include data transfer protocols, distributed shared memory, and TCP network sockets.

"Distributed Programming: Theory and Practice" bridges the gap between books that focus on specific concurrent programming languages and books that focus on distributed algorithms. Programs are written in a "real-life" programming notation, along the lines of Java and Python with explicit instantiation of threads and programs.Students and programmers will see these as programs and not "merely" algorithms in pseudo-code. The programs implement interesting algorithms and solve problems that are large enough to serve as projects in programming classes and software engineering classes. Exercises and examples are included at the end of each chapter with on-line access to the solutions.

"Distributed Programming: Theory and Practice "is designed as an advanced-level text book for students in computer science and electrical engineering. Programmers, software engineers and researchers working in this field will also find this book useful."

Optical Switching in Next Generation Data Centers (Hardcover, 1st ed. 2018): Francesco Testa, Lorenzo Pavesi Optical Switching in Next Generation Data Centers (Hardcover, 1st ed. 2018)
Francesco Testa, Lorenzo Pavesi
R5,263 Discovery Miles 52 630 Ships in 12 - 17 working days

This book introduces the reader to the optical switching technology for its application to data centers. In addition, it takes a picture of the status of the technology and system architecture evolution and of the research in the area of optical switching in data center. The book is organized in four parts: the first part is focused on the system aspects of optical switching in intra-data center networking, the second part is dedicated to describing the recently demonstrated optical switching networks, the third part deals with the latest technologies developed to enable optical switching and, finally, the fourth part of the book outlines the future prospects and trends.

Cyber Security Meets Machine Learning (Hardcover, 1st ed. 2021): Xiaofeng Chen, Willy Susilo, Elisa Bertino Cyber Security Meets Machine Learning (Hardcover, 1st ed. 2021)
Xiaofeng Chen, Willy Susilo, Elisa Bertino
R3,792 Discovery Miles 37 920 Ships in 12 - 17 working days

Machine learning boosts the capabilities of security solutions in the modern cyber environment. However, there are also security concerns associated with machine learning models and approaches: the vulnerability of machine learning models to adversarial attacks is a fatal flaw in the artificial intelligence technologies, and the privacy of the data used in the training and testing periods is also causing increasing concern among users. This book reviews the latest research in the area, including effective applications of machine learning methods in cybersecurity solutions and the urgent security risks related to the machine learning models. The book is divided into three parts: Cyber Security Based on Machine Learning; Security in Machine Learning Methods and Systems; and Security and Privacy in Outsourced Machine Learning. Addressing hot topics in cybersecurity and written by leading researchers in the field, the book features self-contained chapters to allow readers to select topics that are relevant to their needs. It is a valuable resource for all those interested in cybersecurity and robust machine learning, including graduate students and academic and industrial researchers, wanting to gain insights into cutting-edge research topics, as well as related tools and inspiring innovations.

EAI International Conference on Technology, Innovation, Entrepreneurship and Education - TIE'2017 (Hardcover, 1st ed.... EAI International Conference on Technology, Innovation, Entrepreneurship and Education - TIE'2017 (Hardcover, 1st ed. 2019)
Angelica Reyes-Munoz, Ping Zheng, David Crawford, Victor Callaghan
R5,693 R4,490 Discovery Miles 44 900 Save R1,203 (21%) Ships in 12 - 17 working days

This book presents the proceedings of the 1st EAI International Conference on Technology, Innovation, Entrepreneurship and Education (TIE 2017), which took place at Canterbury Christ Church University on September 11-12, 2017. The central theme of the conference is creativity and innovation, especially in relation to technology, business, education, social and political needs that make modern society flourish. The proceedings feature papers from a cross-disciplinary audience that explore the process of creativity and innovation. The goal is that the various disciplines can learn from each other and see how they might benefit from the cross-fertilization of practices.

3rd EAI International Conference on Robotic Sensor Networks - ROSENET 2019 (Hardcover, 1st ed. 2021): Yujie Li, Huimin Lu 3rd EAI International Conference on Robotic Sensor Networks - ROSENET 2019 (Hardcover, 1st ed. 2021)
Yujie Li, Huimin Lu
R4,441 Discovery Miles 44 410 Ships in 10 - 15 working days

This proceedings presents the papers of the 3rd EAI International Conference on Robotic Sensor Networks (ROSENET 2019). The conference explores the integration of networks and robotic technologies, which has become a topic of increasing interest for both researchers and developers from academic fields and industries worldwide. The authors posit that big networks will be the main approach to the next generation of robotic research, The book discusses how the explosive number of network models and increasing computational power of computers significantly extends the number of potential applications for robotic technologies while also bringing new challenges to each network's community. The conference provided a platform for researchers to share up-to-date scientific achievements in this field. The conference took place August 17, 2019, Kitakyushu, Japan. Presents the proceedings of the 3rd EAI International Conference on Robotic Sensor Networks (ROSENET 2019), August 17, 2019, Kitakyushu, Japan Features papers on robotic technologies for healthcare, medicine, military and more Includes perspectives from a multi-disciplinary selection of global researchers, academics, and professionals

Multidimensional Queueing Models in Telecommunication Networks (Hardcover, 2014 ed.): Agassi Melikov, Leonid Ponomarenko Multidimensional Queueing Models in Telecommunication Networks (Hardcover, 2014 ed.)
Agassi Melikov, Leonid Ponomarenko
R3,225 R1,902 Discovery Miles 19 020 Save R1,323 (41%) Ships in 12 - 17 working days

The increasing complexity of telecommunication networks requires us to develop adequate mathematical models. We must find their characteristics, optimize them subject to chosen criteria, and develop the corresponding control algorithms. Multidimensional queueing models are used to design and optimize modern and next-generation networks (NGN). The central problem of the related mathematical theory is to apply multidimensional and large-size queueing models to improve efficiency. In this book new methods are successively developed and applied to solve related problems. The book is recommended for researchers engaged with the mathematical theory of telecommunications traffic.

Enhancing the Internet with the CONVERGENCE System - An Information-centric Network Coupled with a Standard Middleware... Enhancing the Internet with the CONVERGENCE System - An Information-centric Network Coupled with a Standard Middleware (Hardcover, 2014 ed.)
Fernando Almeida, Maria Teresa Andrade, Nicola Blefari-Melazzi, Richard Walker, Heinrich Hussmann, …
R2,958 Discovery Miles 29 580 Ships in 10 - 15 working days

Convergence proposes the enhancement of the Internet with a novel, content-centric, publish-subscribe service model based on the versatile digital item (VDI): a common container for all kinds of digital content, including digital representations of real-world resources. VDIs will serve the needs of the future Internet, providing a homogeneous method for handling structured information, incorporating security and privacy mechanisms. CONVERGENCE subsumes the following areas of research: * definition of the VDI as a new fundamental unit of distribution and transaction; * content-centric networking functionality to complement or replace IP-address-based routing; * security and privacy protection mechanisms; * open-source middleware, including a community dictionary service to enable rich semantic searches; * applications, tested under real-life conditions. This book shows how CONVERGENCE allows publishing, searching and subscribing to any content. Creators can publish their content by wrapping it and its descriptions into a VDI, setting rights for other users to access this content, monitor its use, and communicate with people using it; they may even update or revoke content previously published. Access to content is more efficient, as search engines exploit VDI metadata for indexing, and the network uses the content name to ensure users always access the copy closest to them. Every node in the network is a content cache; handover is easy; multicast is natural; peer-to-peer is built-in; time/space-decoupling is possible. Application developers can exploit CONVERGENCE's middleware and network without having to resort to proprietary/ad hoc solutions for common/supporting functionality. Operators can use the network more efficiently, better controlling information transfer and related revenues flows. Network design, operation and management are simplified by integrating diverse functions and avoiding patches and stopgap solutions. Whether as a text for graduate students working on the future of the Internet, or a resource for practitioners providing e-commerce or multimedia services, or scientists defining new technologies, CONVERGENCE will make a valuable contribution to the future shape of the Internet.

Complex Systems - Relationships between Control, Communications and Computing (Hardcover, 1st ed. 2016): Georgi M. Dimirovski Complex Systems - Relationships between Control, Communications and Computing (Hardcover, 1st ed. 2016)
Georgi M. Dimirovski
R5,192 R4,552 Discovery Miles 45 520 Save R640 (12%) Ships in 12 - 17 working days

This book gives a wide-ranging description of the many facets of complex dynamic networks and systems within an infrastructure provided by integrated control and supervision: envisioning, design, experimental exploration, and implementation. The theoretical contributions and the case studies presented can reach control goals beyond those of stabilization and output regulation or even of adaptive control. Reporting on work of the Control of Complex Systems (COSY) research program, Complex Systems follows from and expands upon an earlier collection: Control of Complex Systems by introducing novel theoretical techniques for hard-to-control networks and systems. The major common feature of all the superficially diverse contributions encompassed by this book is that of spotting and exploiting possible areas of mutual reinforcement between control, computing and communications. These help readers to achieve not only robust stable plant system operation but also properties such as collective adaptivity, integrity and survivability at the same time retaining desired performance quality. Applications in the individual chapters are drawn from: * the general implementation of model-based diagnosis and systems engineering in medical technology, in communication, and in power and airport networks; * the creation of biologically inspired control brains and safety-critical human-machine systems, * process-industrial uses; * biped robots; * large space structures and unmanned aerial vehicles; and * precision servomechanisms and other advanced technologies. Complex Systems provides researchers from engineering, applied mathematics and computer science backgrounds with innovative theoretical and practical insights into the state-of-the-art of complex networks and systems research. It employs physical implementations and extensive computer simulations. Graduate students specializing in complex-systems

Satellite Data Compression (Hardcover, 2011): Bormin Huang Satellite Data Compression (Hardcover, 2011)
Bormin Huang
R1,578 Discovery Miles 15 780 Ships in 10 - 15 working days

"Satellite Data Compression" covers recent progress in compression techniques for multispectral, hyperspectral and ultra spectral data. A survey of recent advances in the fields of satellite communications, remote sensing and geographical information systems is included. "Satellite Data Compression," contributed by leaders in this field, is the first book available on satellite data compression. It covers onboard compression methodology and hardware developments in several space agencies. Case studies are presented on recent advances in satellite data compression techniques via various prediction-based, lookup-table-based, transform-based, clustering-based, and projection-based approaches. This book provides valuable information on state-of-the-art satellite data compression technologies for professionals and students who are interested in this topic. "Satellite Data Compression" is designed for a professional audience comprised of computer scientists working in satellite communications, sensor system design, remote sensing, data receiving, airborne imaging and geographical information systems (GIS). Advanced-level students and academic researchers will also benefit from this book.

Matching Theory for Wireless Networks (Hardcover, 1st ed. 2017): Zhu Han, Yunan Gu, Walid Saad Matching Theory for Wireless Networks (Hardcover, 1st ed. 2017)
Zhu Han, Yunan Gu, Walid Saad
R2,927 Discovery Miles 29 270 Ships in 10 - 15 working days

This book provides the fundamental knowledge of the classical matching theory problems. It builds up the bridge between the matching theory and the 5G wireless communication resource allocation problems. The potentials and challenges of implementing the semi-distributive matching theory framework into the wireless resource allocations are analyzed both theoretically and through implementation examples. Academics, researchers, engineers, and so on, who are interested in efficient distributive wireless resource allocation solutions, will find this book to be an exceptional resource.

Proceedings of the IFIP TC 11 23rd International Information Security Conference - IFIP 20th World Computer Congress, IFIP... Proceedings of the IFIP TC 11 23rd International Information Security Conference - IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy (Hardcover, 2008 ed.)
Sushil Jajodia, Pierangela Samarati, Stelvio Cimato
R5,785 R4,638 Discovery Miles 46 380 Save R1,147 (20%) Ships in 12 - 17 working days

These proceedings contain the papers selected for presentation at the 23rd Inter- tional Information Security Conference (SEC 2008), co-located with IFIP World Computer Congress (WCC 2008), September 8-10, 2008 in Milan, Italy. In - sponse to the call for papers, 143 papers were submitted to the conference. All - pers were evaluated on the basis of their signi?cance, novelty, and technical quality, and reviewed by at least three members of the program committee. Reviewing was blind meaning that the authors were not told which committee members reviewed which papers. The program committee meeting was held electronically, holding - tensive discussion over a period of three weeks. Of the papers submitted, 42 full papers and 11 short papers were selected for presentation at the conference. A conference like this just does not happen; it depends on the volunteer efforts of a host of individuals. There is a long list of people who volunteered their time and energy to put together the conference and who deserve acknowledgment. We thank all members of the program committee and the external reviewers for their hard work in the paper evaluation. Due to the large number of submissions, p- gram committee members were required to complete their reviews in a short time frame. We are especially thankful to them for the commitment they showed with their active participation in the electronic discussion

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Computational Intelligence in Data…
Vallidevi Krishnamurthy, Suresh Jaganathan, … Hardcover R2,621 Discovery Miles 26 210
The Economics of Telecommunication…
Pramode Verma, Fan Zhang Hardcover R2,115 Discovery Miles 21 150
Reconfigurable Intelligent…
Hongliang Zhang, Boya Di, … Hardcover R4,811 Discovery Miles 48 110
Blockchain Cybersecurity, Trust and…
Kim-Kwang Raymond Choo, Ali Dehghantanha, … Hardcover R4,814 Discovery Miles 48 140
Machine Learning, Deep Learning and…
E.S. Gopi Hardcover R6,600 Discovery Miles 66 000
Privacy-Preserving in Edge Computing
Longxiang Gao, Tom H. Luan, … Hardcover R4,130 Discovery Miles 41 300
Research Trends in Graph Theory and…
Daniela Ferrero, Leslie Hogben, … Hardcover R3,422 Discovery Miles 34 220
5G and Beyond - Fundamentals and…
Xingqin Lin, Namyoon Lee Hardcover R4,843 Discovery Miles 48 430
Digital Transformation of Collaboration…
Aleksandra Przegalinska, Francesca Grippa, … Hardcover R3,219 Discovery Miles 32 190
Big Data in Emergency Management…
Rajendra Akerkar Hardcover R4,468 Discovery Miles 44 680

 

Partners