0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (4)
  • R250 - R500 (20)
  • R500+ (4,515)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

Cyberpatterns - Unifying Design Patterns with Security and Attack Patterns (Hardcover, 2014 ed.): Clive Blackwell, Hong Zhu Cyberpatterns - Unifying Design Patterns with Security and Attack Patterns (Hardcover, 2014 ed.)
Clive Blackwell, Hong Zhu
R3,497 R1,964 Discovery Miles 19 640 Save R1,533 (44%) Ships in 12 - 17 working days

Cyberspace in increasingly important to people in their everyday lives for purchasing goods on the Internet, to energy supply increasingly managed remotely using Internet protocols. Unfortunately, this dependence makes us susceptible to attacks from nation states, terrorists, criminals and hactivists. Therefore, we need a better understanding of cyberspace, for which patterns, which are predictable regularities, may help to detect, understand and respond to incidents better. The inspiration for the workshop came from the existing work on formalising design patterns applied to cybersecurity, but we also need to understand the many other types of patterns that arise in cyberspace.

Software Failure Investigation - A Near-Miss Analysis Approach (Hardcover, 1st ed. 2018): Jan H.P. Eloff, Madeleine Bihina Bella Software Failure Investigation - A Near-Miss Analysis Approach (Hardcover, 1st ed. 2018)
Jan H.P. Eloff, Madeleine Bihina Bella
R3,555 R3,288 Discovery Miles 32 880 Save R267 (8%) Ships in 12 - 17 working days

This book reviews existing operational software failure analysis techniques and proposes near-miss analysis as a novel, and new technique for investigating and preventing software failures. The authors provide details on how near-miss analysis techniques focus on the time-window before the software failure actually unfolds, so as to detect the high-risk conditions that can lead to a major failure. They detail how by alerting system users of an upcoming software failure, the detection of near misses provides an opportunity to collect at runtime failure-related data that is complete and relevant. They present a near-miss management systems (NMS) for detecting upcoming software failures, which can contribute significantly to the improvement of the accuracy of the software failure analysis. A prototype of the NMS is implemented and is discussed in the book. The authors give a practical hands-on approach towards doing software failure investigations by means of near-miss analysis that is of use to industry and academia

Distributed Computing in Big Data Analytics - Concepts, Technologies and Applications (Hardcover, 1st ed. 2017): Sourav... Distributed Computing in Big Data Analytics - Concepts, Technologies and Applications (Hardcover, 1st ed. 2017)
Sourav Mazumder, Robin Singh Bhadoria, Ganesh Chandra Deka
R4,320 Discovery Miles 43 200 Ships in 12 - 17 working days

Big data technologies are used to achieve any type of analytics in a fast and predictable way, thus enabling better human and machine level decision making. Principles of distributed computing are the keys to big data technologies and analytics. The mechanisms related to data storage, data access, data transfer, visualization and predictive modeling using distributed processing in multiple low cost machines are the key considerations that make big data analytics possible within stipulated cost and time practical for consumption by human and machines. However, the current literature available in big data analytics needs a holistic perspective to highlight the relation between big data analytics and distributed processing for ease of understanding and practitioner use. This book fills the literature gap by addressing key aspects of distributed processing in big data analytics. The chapters tackle the essential concepts and patterns of distributed computing widely used in big data analytics. This book discusses also covers the main technologies which support distributed processing. Finally, this book provides insight into applications of big data analytics, highlighting how principles of distributed computing are used in those situations. Practitioners and researchers alike will find this book a valuable tool for their work, helping them to select the appropriate technologies, while understanding the inherent strengths and drawbacks of those technologies.

Collaborative Systems for Smart Networked Environments - 15th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE... Collaborative Systems for Smart Networked Environments - 15th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2014, Amsterdam, The Netherlands, October 6-8, 2014, Proceedings (Hardcover, 2014 ed.)
Luis M. Camarinha-Matos, Hamideh Afsarmanesh
R3,043 Discovery Miles 30 430 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 15th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2014, held in Amsterdam, The Netherlands, in October 2014. The 73 revised papers were carefully selected from 190 submissions. They provide a comprehensive overview of identified challenges and recent advances in various collaborative network (CN) domains and their applications, with a particular focus on the following areas in support of smart networked environments: behavior and coordination; product-service systems; service orientation in collaborative networks; engineering and implementation of collaborative networks; cyber-physical systems; business strategies alignment; innovation networks; sustainability and trust; reference and conceptual models; collaboration platforms; virtual reality and simulation; interoperability and integration; performance management frameworks; performance management systems; risk analysis; optimization in collaborative networks; knowledge management in networks; health and care networks; and mobility and logistics.

Advanced Multimedia and Ubiquitous Engineering - MUE/FutureTech 2018 (Hardcover, 1st ed. 2019): James J. Park, Vincenzo Loia,... Advanced Multimedia and Ubiquitous Engineering - MUE/FutureTech 2018 (Hardcover, 1st ed. 2019)
James J. Park, Vincenzo Loia, Kim-Kwang Raymond Choo, Gangman Yi
R5,788 Discovery Miles 57 880 Ships in 10 - 15 working days

This book presents the combined proceedings of the 12th International Conference on Multimedia and Ubiquitous Engineering (MUE 2018) and the 13th International Conference on Future Information Technology (Future Tech 2018), both held in Salerno, Italy, April 23 - 25, 2018. The aim of these two meetings was to promote discussion and interaction among academics, researchers and professionals in the field of ubiquitous computing technologies. These proceedings reflect the state of the art in the development of computational methods, involving theory, algorithms, numerical simulation, error and uncertainty analysis and novel applications of new processing techniques in engineering, science, and other disciplines related to ubiquitous computing.

Wireless Personal Communications - Simulation and Complexity (Hardcover, 1st ed. 2018): Mohsen A. M. El-Bendary Wireless Personal Communications - Simulation and Complexity (Hardcover, 1st ed. 2018)
Mohsen A. M. El-Bendary
R2,880 Discovery Miles 28 800 Ships in 10 - 15 working days

This book introduces wireless personal communications from the point of view of wireless communication system researchers. Existing sources on wireless communications put more emphasis on simulation and fundamental principles of how to build a study model. In this volume, the aim is to pass on to readers as much knowledge as is essential for completing model building of wireless communications, focusing on wireless personal area networks (WPANs). This book is the first of its kind that gives step-by-step details on how to build the WPANs simulation model. It is most helpful for readers to get a clear picture of the whole wireless simulation model by being presented with many study models. The book is also the first treatise on wireless communication that gives a comprehensive introduction to data-length complexity and the computational complexity of the processed data and the error control schemes. This volume is useful for all academic and technical staff in the fields of telecommunications and wireless communications, as it presents many scenarios for enhancing techniques for weak error control performance and other scenarios for complexity reduction of the wireless data and image transmission. Many examples are given to help readers to understand the material covered in the book. Additional resources such as the MATLAB codes for some of the examples also are presented.

Advances in Production Management Systems: New Challenges, New Approaches - International IFIP WG 5.7 Conference, APMS 2009,... Advances in Production Management Systems: New Challenges, New Approaches - International IFIP WG 5.7 Conference, APMS 2009, Bordeaux, France, September 21-23, 2009, Revised Selected Papers (Hardcover, 2010 ed.)
Bruno Vallespir, Thecle Alix
R3,019 Discovery Miles 30 190 Ships in 10 - 15 working days

The present economic and social environment has given rise to new situations within which companies must operate. As a first example, the globalization of the economy and the need for performance has led companies to outsource and then to operate inside networks of enterprises such as supply chains or virtual enterprises. A second instance is related to environmental issues. The statement about the impact of ind- trial activities on the environment has led companies to revise processes, to save - ergy, to optimize transportation.... A last example relates to knowledge. Knowledge is considered today to be one of the main assets of a company. How to capitalize, to manage, to reuse it for the benefit of the company is an important current issue. The three examples above have no direct links. However, each of them constitutes a challenge that companies have to face today. This book brings together the opinions of several leading researchers from all around the world. Together they try to develop new approaches and find answers to those challenges. Through the individual ch- ters of this book, the authors present their understanding of the different challenges, the concepts on which they are working, the approaches they are developing and the tools they propose. The book is composed of six parts; each one focuses on a specific theme and is subdivided into subtopics.

Mobile Intention Recognition (Hardcover, 2012): Peter Kiefer Mobile Intention Recognition (Hardcover, 2012)
Peter Kiefer
R1,520 Discovery Miles 15 200 Ships in 10 - 15 working days

Mobile Intention Recognition addresses problems of practical relevance for mobile system engineers: how can we make mobile assistance systems more intelligent? How can we model and recognize patterns of human behavior which span more than a limited spatial context? This text provides an overview on plan and intention recognition, ranging from the late 1970s to very recent approaches. This overview is unique as it discusses approaches with respect to the specificities of mobile intention recognition. This book covers problems from research on mobile assistance systems using methods from artificial intelligence and natural language processing. It thus addresses an extraordinary interdisciplinary audience.

Coverage Control in Sensor Networks (Hardcover, 2010 Ed.): Bang Wang Coverage Control in Sensor Networks (Hardcover, 2010 Ed.)
Bang Wang
R2,893 Discovery Miles 28 930 Ships in 10 - 15 working days

The advances in sensor design have decreased the size, weight, and cost of sensors by orders of magnitude, yet with the increase of higher spatial and temporal re- lution and accuracy. With the fast progress of sensors design and communications technique, sensor networks have also been quickly evolving in both research and practical domains in the last decade. More and more sensor networks have been - ployed in real-world to gather information for our daily life. Applications of sensor networks can be found in battle?eld surveillance, environmental monitoring, b- logical detection, smart spaces, industrial diagnostics, etc. Although the technique of sensor networks has a very promising future, many challenges are still deserving lots of research efforts for its successful applications. Thisbookisdevotedtocoveragecontrol,oneofthemostfundamentalandimportant research issues in sensor networks. The aim of the book is to provide tutorial-like and up-to-date reference resources on various coverage control problems in sensor networks, a hot topic that has been intensively researched in recent years. Due to some unique characteristics of sensor networks such as energy constraint and - hoc topology, the coverage problems in sensor networks have many new scenarios and features that entitle them an important research issue in recent years. I have done my best to include in the book the most recent advances, techniques, protocols, results, and ?ndings in this ?eld.

Industrial Sensors and Controls in Communication Networks - From Wired Technologies to Cloud Computing and the Internet of... Industrial Sensors and Controls in Communication Networks - From Wired Technologies to Cloud Computing and the Internet of Things (Hardcover, 1st ed. 2019)
Dong Seong Kim, Hoa Tran-Dang
R3,644 Discovery Miles 36 440 Ships in 10 - 15 working days

This informative text/reference presents a detailed review of the state of the art in industrial sensor and control networks. The book examines a broad range of applications, along with their design objectives and technical challenges. The coverage includes fieldbus technologies, wireless communication technologies, network architectures, and resource management and optimization for industrial networks. Discussions are also provided on industrial communication standards for both wired and wireless technologies, as well as for the Industrial Internet of Things (IIoT). Topics and features: describes the FlexRay, CAN, and Modbus fieldbus protocols for industrial control networks, as well as the MIL-STD-1553 standard; proposes a dual fieldbus approach, incorporating both CAN and ModBus fieldbus technologies, for a ship engine distributed control system; reviews a range of industrial wireless sensor network (IWSN) applications, from environmental sensing and condition monitoring, to process automation; examines the wireless networking performance, design requirements, and technical limitations of IWSN applications; presents a survey of IWSN commercial solutions and service providers, and summarizes the emerging trends in this area; discusses the latest technologies and open challenges in realizing the vision of the IIoT, highlighting various applications of the IIoT in industrial domains; introduces a logistics paradigm for adopting IIoT technology on the Physical Internet. This unique work will be of great value to all researchers involved in industrial sensor and control networks, wireless networking, and the Internet of Things.

Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC 11 International Information Security Conference, SEC 2010,... Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC 11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010, Proceedings (Hardcover, 2010 Ed.)
Kai Rannenberg, Vijay Varadharajan, Christian Weber
R1,563 Discovery Miles 15 630 Ships in 10 - 15 working days

These proceedings contain the papers of IFIP/SEC 2010. It was a special honour and privilege to chair the Program Committee and prepare the proceedings for this conf- ence, which is the 25th in a series of well-established international conferences on security and privacy organized annually by Technical Committee 11 (TC-11) of IFIP. Moreover, in 2010 it is part of the IFIP World Computer Congress 2010 celebrating both the Golden Jubilee of IFIP (founded in 1960) and the Silver Jubilee of the SEC conference in the exciting city of Brisbane, Australia, during September 20-23. The call for papers went out with the challenging motto of "Security & Privacy Silver Linings in the Cloud" building a bridge between the long standing issues of security and privacy and the most recent developments in information and commu- cation technology. It attracted 102 submissions. All of them were evaluated on the basis of their significance, novelty, and technical quality by at least five member of the Program Committee. The Program Committee meeting was held electronically over a period of a week. Of the papers submitted, 25 were selected for presentation at the conference; the acceptance rate was therefore as low as 24. 5% making SEC 2010 a highly competitive forum. One of those 25 submissions could unfortunately not be included in the proceedings, as none of its authors registered in time to present the paper at the conference.

Intelligent Information Processing IX - 10th IFIP TC 12 International Conference, IIP 2018, Nanning, China, October 19-22,... Intelligent Information Processing IX - 10th IFIP TC 12 International Conference, IIP 2018, Nanning, China, October 19-22, 2018, Proceedings (Hardcover, 1st ed. 2018)
Zhongzhi Shi, Eunika Mercier-Laurent, Jiuyong Li
R1,602 Discovery Miles 16 020 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th IFIP TC 12 International Conference on Intelligent Information Processing, IIP 2018, held in Nanning, China, in October 2018. The 37 full papers and 8 short papers presented were carefully reviewed and selected from 80 submissions. They are organized in topical sections on machine learning, deep learning, multi-agent systems, neural computing and swarm intelligence, natural language processing, recommendation systems, social computing, business intelligence and security, pattern recognition, and image understanding.

QoS Routing Algorithms for Wireless Sensor Networks (Hardcover, 1st ed. 2020): K.R. Venugopal, Shiv Prakash T., M. Kumaraswamy QoS Routing Algorithms for Wireless Sensor Networks (Hardcover, 1st ed. 2020)
K.R. Venugopal, Shiv Prakash T., M. Kumaraswamy
R2,874 Discovery Miles 28 740 Ships in 10 - 15 working days

This book provides a systematic introduction to the fundamental concepts, major challenges, and effective solutions for Quality of Service in Wireless Sensor Networks (WSNs). Unlike other books on the topic, it focuses on the networking aspects of WSNs, discussing the most important networking issues, including network architecture design, medium access control, routing and data dissemination, node clustering, node localization, query processing, data aggregation, transport and quality of service, time synchronization, and network security. Featuring contributions from researchers, this book strikes a balance between fundamental concepts and new technologies, providing readers with unprecedented insights into WSNs from a networking perspective. It is essential reading for a broad audience, including academics, research engineers, and practitioners, particularly postgraduate/postdoctoral researchers and engineers in industry. It is also suitable as a textbook or supplementary reading for graduate computer engineering and computer science courses.

Fuzzy Probabilities and Fuzzy Sets for Web Planning (Hardcover, 2004 ed.): James J Buckley Fuzzy Probabilities and Fuzzy Sets for Web Planning (Hardcover, 2004 ed.)
James J Buckley
R2,987 Discovery Miles 29 870 Ships in 10 - 15 working days

This book presents important applications of soft computing and fuzziness to the growing field of web planning. A new method of using fuzzy numbers to model uncertain probabilities and how these can be used to model a fuzzy queuing system is demonstrated, as well as a method of modeling fuzzy queuing systems employing fuzzy arrival rates and fuzzy service rates. All the computations needed to get to the fuzzy numbers for system performance are described starting for the one server case to more than three servers. A variety of optimization models are discussed with applications to the average response times, server utilization, server and queue costs, as well as to phenomena identified with web sites such as "burstiness" and "long tailed distributions".

Advances in Real-Time Systems (Hardcover, 2012): Samarjit Chakraborty, Joerg Eberspacher Advances in Real-Time Systems (Hardcover, 2012)
Samarjit Chakraborty, Joerg Eberspacher
R2,925 Discovery Miles 29 250 Ships in 10 - 15 working days

This volume contains the lectures given in honor to Georg Farber as tribute to his contributions in the area of real-time and embedded systems. The chapters of many leading scientists cover a wide range of aspects, like robot or automotive vision systems or medical aspects. "

Sensor Networks and Configuration - Fundamentals, Standards, Platforms, and Applications (Hardcover, 2007 ed.): Nitaigour P.... Sensor Networks and Configuration - Fundamentals, Standards, Platforms, and Applications (Hardcover, 2007 ed.)
Nitaigour P. Mahalik
R5,885 Discovery Miles 58 850 Ships in 10 - 15 working days

This book incorporates a selection of research and development papers. Its scope is on history and background, underlying design methodology, application domains and recent developments. The readers will be able to understand the underlying technology, philosophy, concepts, ideas, and principles, with regard to broader areas of sensor network. Aspects of sensor network and experimental results have been presented in proper order.

Congestion Control in Data Transmission Networks - Sliding Mode and Other Designs (Hardcover, 2013 ed.): Przemyslaw Ignaciuk,... Congestion Control in Data Transmission Networks - Sliding Mode and Other Designs (Hardcover, 2013 ed.)
Przemyslaw Ignaciuk, Andrzej Bartoszewicz
R2,944 Discovery Miles 29 440 Ships in 10 - 15 working days

Congestion Control in Data Transmission Networks details the modeling and control of data traffic in communication networks. It shows how various networking phenomena can be represented in a consistent mathematical framework suitable for rigorous formal analysis. The monograph differentiates between fluid-flow continuous-time traffic models, discrete-time processes with constant sampling rates, and sampled-data systems with variable discretization periods.
The authors address a number of difficult real-life problems, such as:
optimal control of flows with disparate, time-varying delay;
the existence of source and channel nonlinearities;
the balancing of quality of service and fairness requirements; and
the incorporation of variable rate allocation policies.
Appropriate control mechanisms which can handle congestion and guarantee high throughput in various traffic scenarios (with different networking phenomena being considered) are proposed. Systematic design procedures using sound control-theoretic foundations are adopted. Since robustness issues are of major concern in providing efficient data-flow regulation in today s networks, sliding-mode control is selected as the principal technique to be applied in creating the control solutions. The controller derivation is given extensive analytical treatment and is supported with numerous realistic simulations. A comparison with existing solutions is also provided. The concepts applied are discussed in a number of illustrative examples, and supported by many figures, tables, and graphs walking the reader through the ideas and introducing their relevance in real networks.
Academic researchers and graduate students working in computer networks and telecommunications and in control (especially time-delay systems and discrete-time optimal and sliding-mode control) will find this text a valuable assistance in ensuring smooth data-flow within communications networks."

Virtualization Techniques for Mobile Systems (Hardcover, 2014 ed.): David Jaramillo, Borko Furht, Ankur Agarwal Virtualization Techniques for Mobile Systems (Hardcover, 2014 ed.)
David Jaramillo, Borko Furht, Ankur Agarwal
R1,493 Discovery Miles 14 930 Ships in 10 - 15 working days

This book presents effective ways to partition mobile devices such that the enterprise system access and its information are completely separated from the personal information. For those using mobile devices for personal and business purposes, the ability to keep the data secure and separate is critical. The applications for security in smart platforms range from personal email accounts to global enterprise systems. Several approaches for mobile virtualization are described, all creating secure and secluded environments for enterprise information. The authors present a reference architecture that allows for integration with existing enterprise mobile device management systems and provides a lightweight solution for containerizing mobile applications. This solution is then benchmarked with several of the existing mobile virtualization solutions across a range of mobile devices. Virtualization Techniques for Mobile Systems is an excellent resource for researchers and professionals working in mobile systems. Advanced-level students studying computer science and electrical engineering will also find the content helpful.

Scaling Networks v6 Labs & Study Guide (Paperback): Cisco Networking Academy, Allan Johnson Scaling Networks v6 Labs & Study Guide (Paperback)
Cisco Networking Academy, Allan Johnson
R1,500 Discovery Miles 15 000 Ships in 12 - 17 working days

Lab Manuals provide students enrolled in a Cisco Networking Academy course of the same name with a convenient, complete collection of all the course lab exercises that provide hands-on practice and challenges. The only authorized Labs & Study Guide for the Cisco Networking Academy Routing and Switching Essentials course in the CCNA Routing and Switching curriculum Each chapter of this book is divided into a Study Guide section followed by a Lab section. The Study Guide section offers exercises that help you learn the concepts, configurations, and troubleshooting skills crucial to your success as a CCENT exam candidate. Each chapter is slightly different and includes some or all the following types of exercises: Vocabulary Matching Exercises Concept Questions Exercises Skill-Building Activities and Scenarios Configuration Scenarios Packet Tracer Exercises Troubleshooting Scenarios The Labs & Activities include all the online course Labs and Packet Tracer activity instructions. If applicable, this section begins with a Command Reference that you will complete to highlight all the commands introduced in the chapter.

Protocol Engineering (Hardcover, 2012 ed.): Hartmut Koenig Protocol Engineering (Hardcover, 2012 ed.)
Hartmut Koenig
R2,458 Discovery Miles 24 580 Ships in 12 - 17 working days

Communication protocols form the operational basis of computer networks and tele communication systems. They are behavior conventions that describe how com munication systems inter act with each other, defining the temporal order of the interactions and the formats of the data units exchanged - essentially they determine the efficiency and reliability of computer networks. Protocol Engineering is an important discipline covering the design, validation, and implementation of communication protocols. Part I of this book is devoted to the fundamentals of communication protocols, describing their working principles and implicitly also those of computer networks. The author introduces the concepts of service, protocol, layer, and layered architecture, and introduces the main elements required in the description of protocols using a model language. He then presents the most important protocol functions. Part II deals with the description of communication proto cols, offering an overview of the various formal methods, the essence of Protocol Engineering. The author introduces the fundamental description methods, such as finite state machines, Petri nets, process calculi, and temporal logics, that are in part used as semantic models for formal description techniques. He then introduces one represen tative technique for each of the main description approaches, among others SDL and LOTOS, and surveys the use of UML for describing protocols. Part III covers the protocol life cycle and the most important development stages, presenting the reader with approaches for systematic protocol design, with various verification methods, with the main implementation techniques, and with strategies for their testing, in particular with conformance and interoperability tests, and the test description language TTCN. The author uses the simple data transfer example protocol XDT (eXample Data Transfer) throughout the book as a reference protocol to exemplify the various description techniques and to demonstrate important validation and implementation approaches. The book is an introduction to communication protocols and their development for undergraduate and graduate students of computer science and communication technology, and it is also a suitable reference for engineers and programmers. Most chapters contain exercises, and the author's accompanying website provides further online material including a complete formal description of the XDT protocol and an animated simulation visualizing its behavior.

Guide to Cisco Routers Configuration - Becoming a Router Geek (Hardcover, 2nd ed. 2017): Mohammed M. Alani Guide to Cisco Routers Configuration - Becoming a Router Geek (Hardcover, 2nd ed. 2017)
Mohammed M. Alani
R1,928 Discovery Miles 19 280 Ships in 12 - 17 working days

This easy-to-follow text/reference presents a practical guide to the configuration of Cisco routers, from tasks for beginners to advanced operations. The work starts with the simple step-by-step task of connecting the router and performing basic configuration, before building up to complex and sensitive operations such as router IOS upgrade and Site-to-Site VPNs. This updated and expanded new edition has been enhanced with a more detailed treatment of each topic, supported by a set of training scenarios. Features: discusses basic configuration, domestic duties, standard and advanced routing, WAN technologies, security, router management, remote connectivity, and practical tips; explains in detail the steps required to configure different protocols on Cisco routers; includes coverage of MPLS, multicasting, GRE, HSRP, reflexive and timed-access lists, and configuration steps for IPv6 (NEW); provides an extensive selection of training scenarios, designed to offer hands-on practice in the relevant tasks (NEW).

Towards User-Centric Intelligent Network Selection in 5G Heterogeneous Wireless Networks - A Reinforcement Learning Perspective... Towards User-Centric Intelligent Network Selection in 5G Heterogeneous Wireless Networks - A Reinforcement Learning Perspective (Hardcover, 1st ed. 2020)
Zhiyong Du, Bin Jiang, Qihui Wu, Yuhua Xu, Kun Xu
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

This book presents reinforcement learning (RL) based solutions for user-centric online network selection optimization. The main content can be divided into three parts. The first part (chapter 2 and 3) focuses on how to learning the best network when QoE is revealed beyond QoS under the framework of multi-armed bandit (MAB). The second part (chapter 4 and 5) focuses on how to meet dynamic user demand in complex and uncertain heterogeneous wireless networks under the framework of markov decision process (MDP). The third part (chapter 6 and 7) focuses on how to meet heterogeneous user demand for multiple users inlarge-scale networks under the framework of game theory. Efficient RL algorithms with practical constraints and considerations are proposed to optimize QoE for realizing intelligent online network selection for future mobile networks. This book is intended as a reference resource for researchers and designers in resource management of 5G networks and beyond.

Smart Cities - The Internet of Things, People and Systems (Hardcover, 1st ed. 2017): Schahram Dustdar, Stefan Nastic, Ognjen... Smart Cities - The Internet of Things, People and Systems (Hardcover, 1st ed. 2017)
Schahram Dustdar, Stefan Nastic, Ognjen Scekic
R5,102 Discovery Miles 51 020 Ships in 12 - 17 working days

This book presents a coherent, novel vision of Smart Cities, built around a value-driven architecture. It describes the limitations of the contemporary notion of the Smart City and argues that the next developmental step must actively include not only the physical infrastructure, but information technology and human infrastructure as well, requiring the intensive integration of technical solutions from the Internet of Things (IoT) and social computing. The book is divided into five major parts, the first of which provides both a general introduction and a coherent vision that ties together all the components that are required to realize the vision for Smart Cities. Part II then discusses the provisioning and governance of Smart City systems and infrastructures. In turn, Part III addresses the core technologies and technological enablers for managing the social component of the Smart City platform. Both parts combine state-of-the-art research with cutting-edge industrial efforts in the respective fields. Lastly, Part IV details a road map to achieving Cyber-Human Smart Cities. Rounding out the coverage, it discusses the concrete technological advances needed to move beyond contemporary Smart Cities and toward the Smart Cities of the future. Overall, the book provides an essential overview of the latest developments in the areas of IoT and social computing research, and outlines a research roadmap for a closer integration of the two areas in the context of the Smart City. As such, it offers a valuable resource for researchers and graduate students alike.

Trust and Fairness in Open, Distributed Systems (Hardcover, 2010 ed.): Adam Wierzbicki Trust and Fairness in Open, Distributed Systems (Hardcover, 2010 ed.)
Adam Wierzbicki
R4,453 Discovery Miles 44 530 Ships in 12 - 17 working days

This book is an attempt to bring closer the greater vision of the development of Social Informatics. Social Informatics can be de?ned as a discipline of informatics that studies how information systems can realize social goals, use social concepts, or become sources of information about social phenomena. All of these research directions are present in this book: fairness is a social goal; trust is a social concept; and much of this book bases on the study of traces of Internet auctions (used also to drive social simulations) that are a rich source of information about social phenomena. The book has been written for an audience of graduate students working in the area of informatics and the social sciences, in an attempt to bridge the gap between the two disciplines. Because of this, the book avoids the use of excessive mathematical formalism, especially in Chapter 2 that attempts to summarize the theoretical basis of the two disciplines of trust and fa- ness management. Readers are usually directed to quoted literature for the purpose of studying mathematical proofs of the cited theorems.

International Conference on Wireless, Intelligent, and Distributed Environment for Communication - WIDECOM 2018 (Hardcover, 1st... International Conference on Wireless, Intelligent, and Distributed Environment for Communication - WIDECOM 2018 (Hardcover, 1st ed. 2018)
Isaac Woungang, Sanjay Kumar Dhurandher
R4,394 Discovery Miles 43 940 Ships in 10 - 15 working days

This book presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018), organized by SRM University, NCR Campus, New Delhi, India, February 16-18, 2018. The conference focuses on challenges with respect to the dependability of integrated applications and intelligence-driven security threats against the platforms supporting these applications. The WIDECOM 2018 proceedings features papers addressing issues related to the new dependability paradigms, design, control, and management of next generation networks, performance of dependable network computing and mobile systems, protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and Internet of Things (IoT) systems. The proceeding is a valuable reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners, in industry, in the aforementioned areas. The book's structure and content is organized in such a manner that makes it useful at a variety of learning levels. Presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018), organized by SRM University, NCR Campus, New Delhi, India, February 16-18, 2018; Includes an array of topics related to new dependability paradigms, design, control, and management of next generation networks, performance of dependable network computing and mobile systems, protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and Internet of Things (IoT) systems; Addresses issues related to the design and performance of dependable network computing and systems and to the security of these systems.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Advances in Wireless Communications and…
Roumen Kountchev, Aniket Mahanti, … Hardcover R4,365 Discovery Miles 43 650
Privacy-Preserving in Edge Computing
Longxiang Gao, Tom H. Luan, … Hardcover R4,067 Discovery Miles 40 670
Information and Communication Technology…
Tomonobu Senjyu, Parikshit N. Mahalle, … Hardcover R5,754 Discovery Miles 57 540
Computer Networking - An All-in-One…
Quinn Kiser Hardcover R722 R638 Discovery Miles 6 380
Machine Learning, Deep Learning and…
E.S. Gopi Hardcover R6,452 Discovery Miles 64 520
Algorithms for Data and Computation…
Alex X. Liu, Rui Li Hardcover R3,763 Discovery Miles 37 630
5G and Beyond - Fundamentals and…
Xingqin Lin, Namyoon Lee Hardcover R4,765 Discovery Miles 47 650
Intelligent Resource Management for…
Qiang Ye, Weihua Zhuang Hardcover R4,069 Discovery Miles 40 690
6G Mobile Wireless Networks
Yulei Wu, Sukhdeep Singh, … Hardcover R4,758 Discovery Miles 47 580
Federated Learning for Wireless Networks
Choong Seon Hong, Latif U. Khan, … Hardcover R4,405 Discovery Miles 44 050

 

Partners