0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (4)
  • R250 - R500 (19)
  • R500+ (4,514)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

Trust and Fairness in Open, Distributed Systems (Hardcover, 2010 ed.): Adam Wierzbicki Trust and Fairness in Open, Distributed Systems (Hardcover, 2010 ed.)
Adam Wierzbicki
R4,524 Discovery Miles 45 240 Ships in 12 - 17 working days

This book is an attempt to bring closer the greater vision of the development of Social Informatics. Social Informatics can be de?ned as a discipline of informatics that studies how information systems can realize social goals, use social concepts, or become sources of information about social phenomena. All of these research directions are present in this book: fairness is a social goal; trust is a social concept; and much of this book bases on the study of traces of Internet auctions (used also to drive social simulations) that are a rich source of information about social phenomena. The book has been written for an audience of graduate students working in the area of informatics and the social sciences, in an attempt to bridge the gap between the two disciplines. Because of this, the book avoids the use of excessive mathematical formalism, especially in Chapter 2 that attempts to summarize the theoretical basis of the two disciplines of trust and fa- ness management. Readers are usually directed to quoted literature for the purpose of studying mathematical proofs of the cited theorems.

International Conference on Wireless, Intelligent, and Distributed Environment for Communication - WIDECOM 2018 (Hardcover, 1st... International Conference on Wireless, Intelligent, and Distributed Environment for Communication - WIDECOM 2018 (Hardcover, 1st ed. 2018)
Isaac Woungang, Sanjay Kumar Dhurandher
R5,124 R4,484 Discovery Miles 44 840 Save R640 (12%) Ships in 12 - 17 working days

This book presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018), organized by SRM University, NCR Campus, New Delhi, India, February 16-18, 2018. The conference focuses on challenges with respect to the dependability of integrated applications and intelligence-driven security threats against the platforms supporting these applications. The WIDECOM 2018 proceedings features papers addressing issues related to the new dependability paradigms, design, control, and management of next generation networks, performance of dependable network computing and mobile systems, protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and Internet of Things (IoT) systems. The proceeding is a valuable reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners, in industry, in the aforementioned areas. The book's structure and content is organized in such a manner that makes it useful at a variety of learning levels. Presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018), organized by SRM University, NCR Campus, New Delhi, India, February 16-18, 2018; Includes an array of topics related to new dependability paradigms, design, control, and management of next generation networks, performance of dependable network computing and mobile systems, protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and Internet of Things (IoT) systems; Addresses issues related to the design and performance of dependable network computing and systems and to the security of these systems.

Handbook of Mobile Ad Hoc Networks for Mobility Models (Hardcover, Edition.): Radhika Ranjan Roy Handbook of Mobile Ad Hoc Networks for Mobility Models (Hardcover, Edition.)
Radhika Ranjan Roy
R8,768 Discovery Miles 87 680 Ships in 12 - 17 working days

The Mobile Ad Hoc Network (MANET) has emerged as the next frontier for wireless communications networking in both the military and commercial arena. "Handbook of Mobile Ad Hoc Networks for Mobility Models" introduces 40 different major mobility models along with numerous associate mobility models to be used in a variety of MANET networking environments in the ground, air, space, and/or under water mobile vehicles and/or handheld devices. These vehicles include cars, armors, ships, under-sea vehicles, manned and unmanned airborne vehicles, spacecrafts and more. This handbook also describes how each mobility pattern affects the MANET performance from physical to application layer; such as throughput capacity, delay, jitter, packet loss and packet delivery ratio, longevity of route, route overhead, reliability, and survivability. Case studies, examples, and exercises are provided throughout the book.

"Handbook of Mobile Ad Hoc Networks for Mobility Models" is for advanced-level students and researchers concentrating on electrical engineering and computer science within wireless technology. Industry professionals working in the areas of mobile ad hoc networks, communications engineering, military establishments engaged in communications engineering, equipment manufacturers who are designing radios, mobile wireless routers, wireless local area networks, and mobile ad hoc network equipment will find this book useful as well.

Compression and Coding Algorithms (Hardcover, 2002 ed.): Alistair Moffat, Andrew Turpin Compression and Coding Algorithms (Hardcover, 2002 ed.)
Alistair Moffat, Andrew Turpin
R2,353 R1,672 Discovery Miles 16 720 Save R681 (29%) Ships in 12 - 17 working days

Compression and Coding Algorithms describes in detail the coding mechanisms that are available for use in data compression systems. The well known Huffman coding technique is one mechanism, but there have been many others developed over the past few decades, and this book describes, explains and assesses them. People undertaking research of software development in the areas of compression and coding algorithms will find this book an indispensable reference. In particular, the careful and detailed description of algorithms and their implementation, plus accompanying pseudo-code that can be readily implemented on computer, make this book a definitive reference in an area currently without one.

Connected Dominating Set: Theory and Applications (Hardcover, 2013 ed.): Dingzhu Du, Peng-Jun Wan Connected Dominating Set: Theory and Applications (Hardcover, 2013 ed.)
Dingzhu Du, Peng-Jun Wan
R2,033 R1,915 Discovery Miles 19 150 Save R118 (6%) Ships in 12 - 17 working days

The connected dominating set has been a classic subject studied in graph theory since 1975. Since the 1990s, it has been found to have important applications in communication networks, especially in wireless networks, as a virtual backbone. Motivated from those applications, many papers have been published in the literature during last 15 years. Now, the connected dominating set has become a hot research topic in computer science. In this book, we are going to collect recent developments on the connected dominating set, which presents the state of the art in the study of connected dominating sets. The book consists of 16 chapters. Except the 1st one, each chapter is devoted to one problem, and consists of three parts, motivation and overview, problem complexity analysis, and approximation algorithm designs, which will lead the reader to see clearly about the background, formulation, existing important research results, and open problems. Therefore, this would be a very valuable reference book for researchers in computer science and operations research, especially in areas of theoretical computer science, computer communication networks, combinatorial optimization, and discrete mathematics.

Concepts, Applications, Experimentation and Analysis of Wireless Sensor Networks (Hardcover, 2nd ed. 2021): Hossam Mahmoud... Concepts, Applications, Experimentation and Analysis of Wireless Sensor Networks (Hardcover, 2nd ed. 2021)
Hossam Mahmoud Ahmad Fahmy
R3,520 Discovery Miles 35 200 Ships in 12 - 17 working days

The new edition of this popular book has been transformed into a hands-on textbook, focusing on the principles of wireless sensor networks (WSNs), their applications, their protocols and standards, and their analysis and test tools; a meticulous care has been accorded to the definitions and terminology. To make WSNs felt and seen, the adopted technologies as well as their manufacturers are presented in detail. In introductory computer networking books, chapters sequencing follows the bottom up or top down architecture of the seven layers protocol. This book starts some steps later, with chapters ordered based on a topic's significance to the elaboration of wireless sensor networks (WSNs) concepts and issues. With such a depth, this book is intended for a wide audience, it is meant to be a helper and motivator, for both the senior undergraduates, postgraduates, researchers, and practitioners; concepts and WSNs related applications are laid out, research and practical issues are backed by appropriate literature, and new trends are put under focus. For senior undergraduate students, it familiarizes readers with conceptual foundations, applications, and practical project implementations. For graduate students and researchers, transport layer protocols and cross-layering protocols are presented and testbeds and simulators provide a must follow emphasis on the analysis methods and tools for WSNs. For practitioners, besides applications and deployment, the manufacturers and components of WSNs at several platforms and testbeds are fully explored.

Cyber Physical Computing for IoT-driven Services (Hardcover, 1st ed. 2018): Vladimir Hahanov Cyber Physical Computing for IoT-driven Services (Hardcover, 1st ed. 2018)
Vladimir Hahanov
R2,688 Discovery Miles 26 880 Ships in 12 - 17 working days

This book presents the cyber culture of micro, macro, cosmological, and virtual computing. The book shows how these work to formulate, explain, and predict the current processes and phenomena monitoring and controlling technology in the physical and virtual space.The authors posit a basic proposal to transform description of the function truth table and structure adjacency matrix to a qubit vector that focuses on memory-driven computing based on logic parallel operations performance. The authors offer a metric for the measurement of processes and phenomena in a cyberspace, and also the architecture of logic associative computing for decision-making and big data analysis.The book outlines an innovative theory and practice of design, test, simulation, and diagnosis of digital systems based on the use of a qubit coverage-vector to describe the functional components and structures. Authors provide a description of the technology for SoC HDL-model diagnosis, based on Test Assertion Blocks Activated Graph. Examples of cyber-physical systems for digital monitoring and cloud management of social objects and transport are proposed. A presented automaton model of cosmological computing explains the cyclical and harmonious evolution of matter-energy essence, and also a space-time form of the Universe.

Transforming Enterprise Cloud Services (Hardcover, 2010 Ed.): William Y Chang, Hosame Abu-Amara, Jessica Feng Sanford Transforming Enterprise Cloud Services (Hardcover, 2010 Ed.)
William Y Chang, Hosame Abu-Amara, Jessica Feng Sanford
R4,568 Discovery Miles 45 680 Ships in 12 - 17 working days

The broad scope of Cloud Computing is creating a technology, business, sociolo- cal, and economic renaissance. It delivers the promise of making services available quickly with rather little effort. Cloud Computing allows almost anyone, anywhere, at anytime to interact with these service offerings. Cloud Computing creates a unique opportunity for its users that allows anyone with an idea to have a chance to deliver it to a mass market base. As Cloud Computing continues to evolve and penetrate different industries, it is inevitable that the scope and definition of Cloud Computing becomes very subjective, based on providers' and customers' persp- tive of applications. For instance, Information Technology (IT) professionals p- ceive a Cloud as an unlimited, on-demand, flexible computing fabric that is always available to support their needs. Cloud users experience Cloud services as virtual, off-premise applications provided by Cloud service providers. To an end user, a p- vider offering a set of services or applications in the Cloud can manage these off- ings remotely. Despite these discrepancies, there is a general consensus that Cloud Computing includes technology that uses the Internet and collaborated servers to integrate data, applications, and computing resources. With proper Cloud access, such technology allows consumers and businesses to access their personal files on any computer without having to install special tools. Cloud Computing facilitates efficient operations and management of comp- ing technologies by federating storage, memory, processing, and bandwidth.

WirelessHART (TM) - Real-Time Mesh Network for Industrial Automation (Hardcover, 2010 ed.): Deji Chen, Mark Nixon, Aloysius Mok WirelessHART (TM) - Real-Time Mesh Network for Industrial Automation (Hardcover, 2010 ed.)
Deji Chen, Mark Nixon, Aloysius Mok
R3,102 Discovery Miles 31 020 Ships in 10 - 15 working days

The process control industry has seen generations of technology advancement, from pneumatic communication to electrical communication to electronic c- munication, from centralized control to distributed control. At the center of today's distributed control systems are operator workstations. These operator wo- stations provide the connection between those overseeing and running plant operations to the process itself. With each new generation of products the operator workstation has become increasingly more intelligent. Newer applications provide advanced alarming, control, and diagnostics. Behind all of these applications are smarter devices. These smart devices provide greater process insight, reduce en- neering costs, and contribute to improving the overall operational performance of the plant. Smart devices include advanced diagnostics that can report the health of the device and in many cases, the health of the process that the device is connected to. It is not uncommon for smart devices to include diagnostics that can detect plugged lines, burner flame instability, agitator loss, wet gas, orifice wear, leaks, and cavitations. These devices tell the user how well they are operating and when they need maintenance. Improvements in sensor technology and diagnostics have lead to a large variety of smart devices. So how do users connect the capabilities of these smart devices to their existing control system infrastructures? The answer is wireless. Wireless technology has matured to the point that it now can be safely applied in industrial control, monitor, and asset management applications.

Trust Management IV - 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010, Proceedings... Trust Management IV - 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010, Proceedings (Hardcover, Edition.)
Masakatsu Nishigaki, Audun Josang, Yuko Murayama, Stephen Marsh
R1,570 Discovery Miles 15 700 Ships in 10 - 15 working days

This volume contains the proceedings of IFIPTM 2010, the 4th IFIP WG 11.11 International Conference on Trust Management, held in Morioka, Iwate, Japan during June 16-18, 2010. IFIPTM 2010 provided a truly global platform for the reporting of research, development, policy, and practice in the interdependent arrears of privacy, se- rity, and trust. Building on the traditions inherited from the highly succe- ful iTrust conference series, the IFIPTM 2007 conference in Moncton, New Brunswick, Canada, the IFIPTM 2008 conference in Trondheim, Norway, and the IFIPTM 2009 conference at Purdue University in Indiana, USA, IFIPTM 2010 focused on trust, privacy and security from multidisciplinary persp- tives. The conference is an arena for discussion on relevant problems from both research and practice in the areas of academia, business, and government. IFIPTM 2010 was an open IFIP conference. The program of the conference featured both theoretical research papers and reports of real-world case studies. IFIPTM 2010 received 61 submissions from 25 di?erent countries: Japan (10), UK (6), USA (6), Canada (5), Germany (5), China (3), Denmark (2), India (2), Italy (2), Luxembourg (2), The Netherlands (2), Switzerland (2), Taiwan (2), Austria, Estonia, Finland, France, Ireland, Israel, Korea, Malaysia, Norway, Singapore, Spain, Turkey. The Program Committee selected 18 full papers for presentation and inclusion in the proceedings. In addition, the program and the proceedings include two invited papers by academic experts in the ?elds of trust management, privacy and security, namely, Toshio Yamagishi and Pamela Briggs

Turbo Codes - Principles and Applications (Hardcover, 2000 ed.): Branka Vucetic, Jinhong Yuan Turbo Codes - Principles and Applications (Hardcover, 2000 ed.)
Branka Vucetic, Jinhong Yuan
R4,480 Discovery Miles 44 800 Ships in 10 - 15 working days

Turbo coding principles have found widespread applications in information theory and, in part, have entered into mainstream telecommunication theory and practice. These principles are used in error control, detection, interference suppression, equalization, and other communications-related areas. Turbo Codes: Principles and Applications is intended for use by advanced level students and professional engineers involved in coding and telecommunication research. The material is organized into a coherent framework, starting with basic concepts of block and convolutional coding, and gradually increasing in a logical and progressive manner to more advanced material, including applications. All algorithms are fully described and supported by examples, and evaluations of their performance are carried out both analytically and by simulations. The book includes new and original material on a bidirectional SOVA decoding algorithm, design of turbo codes based on the distance spectrum, design of code-matched interleavers, performance on fading channels, and a turbo trellis code modulation scheme. Trellis-based and iterative decoding algorithms, along with a comparison of algorithms based on their performance and complexity, are discussed. Various practical aspects of turbo coding, such as interleaver design, turbo codes on fading channels, and turbo trellis-coded modulation, are presented. Turbo Codes: Principles and Applications will be especially useful to practicing communications engineers, researchers, and advanced level students who are designing turbo coding systems, including encoder/decoder and interleavers, and carrying out performance analysis and sensitivity studies.

Security-Aware Design for Cyber-Physical Systems - A Platform-Based Approach (Hardcover, 1st ed. 2017): Chungwei Lin, Alberto... Security-Aware Design for Cyber-Physical Systems - A Platform-Based Approach (Hardcover, 1st ed. 2017)
Chungwei Lin, Alberto Sangiovanni-Vincentelli
R3,431 Discovery Miles 34 310 Ships in 10 - 15 working days

Addressing the rising security issues during the design stages of cyber-physical systems, this book develops a systematic approach to address security at early design stages together with all other design constraints. Cyber-attacks become more threatening as systems are becoming more connected with the surrounding environment, infrastructures, and other systems. Security mechanisms can be designed to protect against attacks and meet security requirements, but there are many challenges of applying security mechanisms to cyber-physical systems including open environments, limited resources, strict timing requirements, and large number of devices. Designed for researchers and professionals, this book is valuable for individuals working in network systems, security mechanisms, and system design. It is also suitable for advanced-level students of computer science.

Wireless Communications under Hostile Jamming: Security and Efficiency (Hardcover, 1st ed. 2018): Tongtong Li, Tianlong Song,... Wireless Communications under Hostile Jamming: Security and Efficiency (Hardcover, 1st ed. 2018)
Tongtong Li, Tianlong Song, Yuan Liang
R2,943 Discovery Miles 29 430 Ships in 10 - 15 working days

This monograph is intended for the designers and would-be designers of secure and efficient wireless communication systems under intentional interference. Along with the widespread of wireless devices, especially reconfigurable software defined radios, jamming has become a serious threat to civilian communications. In this book, going beyond traditional communication system design that mainly focuses on accurate information transmission under benign environments, we aim to enhance the physical layer security of communication systems by integrating modern cryptographic techniques into transceiver design, so as to achieve secure high-speed transmission under hostile interference with high reliability and efficiency. We revisit existing jamming patterns, and introduce new jamming patterns. We analyze the weaknesses of existing anti-jamming techniques. We present innovative and feasible anti-jamming techniques, which can strengthen the inherent security of the 3G, 4G and the upcoming 5G systems with minimal and inexpensive changes to the existing CDMA, frequency hopping and OFDM schemes. We also provide benchmarks for system performance evaluation under various jamming scenarios through capacity analysis. This book includes design principles, in-depth theoretical analysis and practical design examples, and will be of interest to academic researchers as well as professionals in industry.

Research and Innovation Forum 2021 - Managing Continuity, Innovation, and Change in the Post-Covid World: Technology, Politics... Research and Innovation Forum 2021 - Managing Continuity, Innovation, and Change in the Post-Covid World: Technology, Politics and Society (Hardcover, 1st ed. 2021)
Anna Visvizi, Orlando Troisi, Kawther Saeedi
R5,189 Discovery Miles 51 890 Ships in 12 - 17 working days

This book features research presented and discussed during the Research and Innovation Forum (Rii Forum) 2021. The Covid-19 pandemic and its social, political, and economic implications had confirmed that a more thorough debate on these issues and topics was needed. For this reason, the Rii Forum 2021 was devoted to the broadly defined question of the short- and long-term impact of the pandemic on our societies. This volume serves as an essential resource to understand the diverse ways in which Covid-19 impacted our societies, including the capacity to innovate, advances in technology, the evolution of the healthcare systems, business model innovation, the prospects of growth, the stability of political systems, and the future of education.

Advances in Ubiquitous Networking 2 - Proceedings of the UNet'16 (Hardcover, 1st ed. 2017): Rachid El-Azouzi, Daniel Sadoc... Advances in Ubiquitous Networking 2 - Proceedings of the UNet'16 (Hardcover, 1st ed. 2017)
Rachid El-Azouzi, Daniel Sadoc Menasche, Essaid Sabir, Francesco De Pellegrini, Mustapha Benjillali
R5,864 Discovery Miles 58 640 Ships in 10 - 15 working days

This volume offers the proceedings of the 2nd UNet conference, held in Casablanca May 30 - June 1, 2016. It presents new trends and findings in hot topics related to ubiquitous computing/networking, covered in three tracks and three special sessions: Main Track 1: Context-Awareness and Autonomy Paradigms Track Main Track 2: Mobile Edge Networking and Virtualization Track Main Track 3: Enablers, Challenges and Applications Special Session 1: Smart Cities and Urban Informatics for Sustainable Development Special Session 2: Unmanned Aerial Vehicles From Theory to Applications Special Session 3: From Data to Knowledge: Big Data applications and solutions

Security and Privacy in Social Networks (Hardcover, 2013 ed.): Yaniv Altshuler, Yuval Elovici, Armin B. Cremers, Nadav Aharony,... Security and Privacy in Social Networks (Hardcover, 2013 ed.)
Yaniv Altshuler, Yuval Elovici, Armin B. Cremers, Nadav Aharony, Alex Pentland
R2,948 Discovery Miles 29 480 Ships in 10 - 15 working days

"Security and Privacy in Social Networks" brings to the forefront innovative approaches for analyzing and enhancing the security and privacy dimensions in online social networks, and is the first comprehensive attempt dedicated entirely to this field. In order to facilitate the transition of such methods from theory to mechanisms designed and deployed in existing online social networking services, the book aspires to create a common language between the researchers and practitioners of this new area- spanning from the theory of computational social sciences to conventional security and network engineering.

Universal Navigation on Smartphones (Hardcover, 2011): Hassan A. Karimi Universal Navigation on Smartphones (Hardcover, 2011)
Hassan A. Karimi
R1,633 Discovery Miles 16 330 Ships in 10 - 15 working days

Universal navigation is accessible primarily through smart phones providing users with navigation information regardless of the environment (i.e., outdoor or indoor). Universal Navigation for Smart Phones provide the most up-to-date navigation technologies and systems for both outdoor and indoor navigation. It also provides a comparison of the similarities and differences between outdoor and indoor navigation systems from both a technological stand point and user 's perspective.

All aspects of navigation systems including geo-positioning, wireless communication, databases, and functions will be introduced. The main thrust of this book presents new approaches and techniques for future navigation systems including social networking, as an emerging approach for navigation.

Building Scalable Network Services - Theory and Practice (Hardcover, 2004 ed.): Cheng Jin, Sugih Jamin, Danny Raz, Yuval Shavitt Building Scalable Network Services - Theory and Practice (Hardcover, 2004 ed.)
Cheng Jin, Sugih Jamin, Danny Raz, Yuval Shavitt
R3,019 Discovery Miles 30 190 Ships in 10 - 15 working days

Building Scalable Network Services: Theory and Practice is on building scalable network services on the Internet or in a network service provider's network. The focus is on network services that are provided through the use of a set of servers. The authors present a tiered scalable network service model and evaluate various services within this architecture. The service model simplifies design tasks by implementing only the most basic functionalities at lower tiers where the need for scalability dominates functionality.
The book includes a number of theoretical results that are practical and applicable to real networks, such as building network-wide measurement, monitoring services, and strategies for building better P2P networks. Various issues in scalable system design and placement algorithms for service nodes are discussed. Using existing network services as well as potentially new but useful services as examples, the authors formalize the problem of placing service nodes and provide practical solutions for them.

Software Project Management for Distributed Computing - Life-Cycle Methods for Developing Scalable and Reliable Tools... Software Project Management for Distributed Computing - Life-Cycle Methods for Developing Scalable and Reliable Tools (Hardcover, 1st ed. 2017)
Zaigham Mahmood
R2,994 Discovery Miles 29 940 Ships in 10 - 15 working days

This unique volume explores cutting-edge management approaches to developing complex software that is efficient, scalable, sustainable, and suitable for distributed environments. Practical insights are offered by an international selection of pre-eminent authorities, including case studies, best practices, and balanced corporate analyses. Emphasis is placed on the use of the latest software technologies and frameworks for life-cycle methods, including the design, implementation and testing stages of software development. Topics and features: * Reviews approaches for reusability, cost and time estimation, and for functional size measurement of distributed software applications * Discusses the core characteristics of a large-scale defense system, and the design of software project management (SPM) as a service * Introduces the 3PR framework, research on crowdsourcing software development, and an innovative approach to modeling large-scale multi-agent software systems * Examines a system architecture for ambient assisted living, and an approach to cloud migration and management assessment * Describes a software error proneness mechanism, a novel Scrum process for use in the defense domain, and an ontology annotation for SPM in distributed environments* Investigates the benefits of agile project management for higher education institutions, and SPM that combines software and data engineering This important text/reference is essential reading for project managers and software engineers involved in developing software for distributed computing environments. Students and researchers interested in SPM technologies and frameworks will also find the work to be an invaluable resource. Prof. Zaigham Mahmood is a Senior Technology Consultant at Debesis Education UK and an Associate Lecturer (Research) at the University of Derby, UK. He also holds positions as Foreign Professor at NUST and IIU in Islamabad, Pakistan, and Professor Extraordinaire at the North West University Potchefstroom, South Africa.

Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event,... Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7-9, 2021, Proceedings (Hardcover, 1st ed. 2021)
Steven Furnell, Nathan Clarke
R2,941 Discovery Miles 29 410 Ships in 10 - 15 working days

This book constitutes the proceedings of the 15th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2021, held virtually in July 2021.The 18 papers presented in this volume were carefully reviewed and selected from 30 submissions. They are organized in the following topical sections: attitudes and perspectives; cyber security education; and people and technology.

Perspectives in Spread Spectrum (Hardcover, 1998 ed.): Amer A. Hassan, John E. Hershey, Gary J. Saulnier Perspectives in Spread Spectrum (Hardcover, 1998 ed.)
Amer A. Hassan, John E. Hershey, Gary J. Saulnier
R3,027 Discovery Miles 30 270 Ships in 10 - 15 working days

Perspectives in Spread Spectrum brings together studies and recent work on six exciting topics from the spread spectrum arts. The book gives a wide, collective view of trends, ideas, and techniques in the spread spectrum discipline, due to the authors' extensive work on spread spectrum techniques and applications from different vantage points. The inexorable march of electronics towards ever faster, ever smaller, and ever more powerful electronic and optical circuitry has wrought, and will continue to enable, profound changes in the spread spectrum arts, by allowing increasingly complex signalling waveforms and statistical tests to be implemented as the theory beyond spread spectrum continues to evolve. Perspectives in Spread Spectrum is divided into six chapters. The first chapter deals with sequence spreading design. There is not a single metric for design of spreading sequences; rather, the design is ideally tailored to the specific scenario of usage. This chapter delves into recent and very promising synthesis work. The second chapter deals with OFDM techniques. As channels become wider and trans-channel fading (or jamming) becomes frequency selective across the band, OFDM techniques may provide a powerful alternative design perspective. The third chapter is a generalization of the venerable Walsh functions. A new modulation scheme, Geometric Harmonic Modulation, GHM for short, is reviewed and characterized as a form of OFDM. From GHM, a further generalization of the Walsh functions is derived for non-binary signalling. The fourth chapter is concerned with some new and exciting results regarding the follower jammer paradigm. A counter-countermeasure technique is reviewed, notable for its counterintuitive characteristic which can be understood from a simple yet elegant game framework. The fifth chapter recounts some results pertaining to random coding for an optical spread spectrum link. The technique is based on laser speckle statistics and uses a coherent array of spatial light modulators at the transmitter but allows the receiver to be realized as a spatially distributed radiometric and therefore incoherent structure. The sixth and final chapter looks at an important and interesting application of spread spectrum to accurately locate a wideband, 'bent pipe', satellite transponder. It is, in a strong sense, an inverted GPS technique. Perspectives in Spread Spectrum serves as an excellent reference and source of ideas for further research, and may be used as a text for advanced courses on the topic.

Agent-Oriented Software Engineering - Reflections on Architectures, Methodologies, Languages, and Frameworks (Hardcover, 2014):... Agent-Oriented Software Engineering - Reflections on Architectures, Methodologies, Languages, and Frameworks (Hardcover, 2014)
Onn Shehory, Arnon Sturm
R4,153 R3,577 Discovery Miles 35 770 Save R576 (14%) Ships in 12 - 17 working days

With this book, Onn Shehory and Arnon Sturm, together with further contributors, introduce the reader to various facets of agent-oriented software engineering (AOSE). They provide a selected collection of state-of-the-art findings, which combines research from information systems, artificial intelligence, distributed systems and software engineering and covers essential development aspects of agent-based systems.

The book chapters are organized into five parts. The first part introduces the AOSE domain in general, including introduction to agents and the peculiarities of software engineering for developing MAS. The second part describes general aspects of AOSE, like architectural models, design patterns and communication. Next, part three discusses AOSE methodologies and associated research directions and elaborates on Prometheus, O-MaSE and INGENIAS. Part four then addresses agent-oriented programming languages. Finally, the fifth part presents studies related to the implementation of agents and multi-agent systems.

The book not only provides a comprehensive review of design approaches for specifying agent-based systems, but also covers implementation aspects such as communication, standards and tools and environments for developing agent-based systems. It is thus of interest to researchers, practitioners and students who are interested in exploring the agent paradigm for developing software systems.

Balanced Automation Systems for Future Manufacturing Networks - 9th IFIP WG 5.5 International Conference, BASYS 2010, Valencia,... Balanced Automation Systems for Future Manufacturing Networks - 9th IFIP WG 5.5 International Conference, BASYS 2010, Valencia, Spain, July 21-23, 2010, Proceedings (Hardcover, 2010 ed.)
Angel Ortiz Bas, Ruben Dario Franco, Pedro Gomez Gasquet
R1,579 Discovery Miles 15 790 Ships in 10 - 15 working days

Manufacturing and operations management paradigms are evolving toward more open and resilient spaces where innovation is driven not only by ever-changing customer needs but also by agile and fast-reacting networked structures. Flexibility, adaptability and responsiveness are properties that the next generation of systems must have in order to successfully support such new emerging trends. Customers are being attracted to be involved in Co-innovation Networks, as - proved responsiveness and agility is expected from industry ecosystems. Renewed production systems needs to be modeled, engineered and deployed in order to achieve cost-effective solutions. BASYS conferences have been developed and organized as a forum in which to share visions and research findings for innovative sustainable and knowledge-based products-services and manufacturing models. Thus, the focus of BASYS is to discuss how human actors, emergent technologies and even organizations are integrated in order to redefine the way in which the val- creation process must be conceived and realized. BASYS 2010, which was held in Valencia, Spain, proposed new approaches in automation where synergies between people, systems and organizations need to be fully exploited in order to create high added-value products and services. This book contains the selection of the papers which were accepted for presentation at the BASYS 2010 conference, covering consolidated and emerging topics of the conference scope.

Automated Security Management (Hardcover, 2013 ed.): Ehab Al-Shaer, Xinming Ou, Geoffrey Xie Automated Security Management (Hardcover, 2013 ed.)
Ehab Al-Shaer, Xinming Ou, Geoffrey Xie
R2,997 R1,893 Discovery Miles 18 930 Save R1,104 (37%) Ships in 12 - 17 working days

In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Management presents a number of topics in the area of configuration automation. Early in the book, the chapter authors introduce modeling and validation of configurations based on high-level requirements and discuss how to manage the security risk as a result of configuration settings of network systems. Later chapters delve into the concept of configuration analysis and why it is important in ensuring the security and functionality of a properly configured system. The book concludes with ways to identify problems when things go wrong and more. A wide range of theoretical and practical content make this volume valuable for researchers and professionals who work with network systems.

Sensor Networks - Where Theory Meets Practice (Hardcover, 2009 ed.): Gianluigi Ferrari Sensor Networks - Where Theory Meets Practice (Hardcover, 2009 ed.)
Gianluigi Ferrari
R5,392 R4,557 Discovery Miles 45 570 Save R835 (15%) Ships in 12 - 17 working days

The idea of this book comes from the observation that sensor networks represent a topic of interest from both theoretical and practical perspectives. The title und- lines that sensor networks offer the unique opportunity of clearly linking theory with practice. In fact, owing to their typical low-cost, academic researchers have the opportunity of implementing sensor network testbeds to check the validity of their theories, algorithms, protocols, etc., in reality. Likewise, a practitioner has the opportunity of understanding what are the principles behind the sensor networks under use and, thus, how to properly tune some accessible network parameters to improve the performance. On the basis of the observations above, the book has been structured in three parts: PartIisdenotedas"Theory,"sincethetopicsofits vechaptersareapparently "detached" from real scenarios; Part II is denoted as "Theory and Practice," since the topics of its three chapters, altough theoretical, have a clear connection with speci c practical scenarios; Part III is denoted as "Practice," since the topics of its ve chapters are clearly related to practical applications.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Privacy-Preserving in Edge Computing
Longxiang Gao, Tom H. Luan, … Hardcover R4,130 Discovery Miles 41 300
Machine Learning, Deep Learning and…
E.S. Gopi Hardcover R6,600 Discovery Miles 66 000
Computational Intelligence in Data…
Vallidevi Krishnamurthy, Suresh Jaganathan, … Hardcover R2,621 Discovery Miles 26 210
Industrial IoT - Challenges, Design…
Ismail Butun Hardcover R4,811 Discovery Miles 48 110
Algorithms for Data and Computation…
Alex X. Liu, Rui Li Hardcover R3,820 Discovery Miles 38 200
Reconfigurable Intelligent…
Hongliang Zhang, Boya Di, … Hardcover R4,811 Discovery Miles 48 110
Cyber-Physical Systems - Foundations…
Houbing Song, Danda B. Rawat, … Paperback R2,614 R2,446 Discovery Miles 24 460
Advances in Wireless Communications and…
Roumen Kountchev, Aniket Mahanti, … Hardcover R4,463 Discovery Miles 44 630
5G and Beyond - Fundamentals and…
Xingqin Lin, Namyoon Lee Hardcover R4,843 Discovery Miles 48 430
Big Data in Emergency Management…
Rajendra Akerkar Hardcover R4,468 Discovery Miles 44 680

 

Partners