0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (16)
  • R500+ (4,468)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

Innovations in Design & Decision Support Systems in Architecture and Urban Planning (Hardcover, 2006 ed.): Jos P. Leeuwen, van,... Innovations in Design & Decision Support Systems in Architecture and Urban Planning (Hardcover, 2006 ed.)
Jos P. Leeuwen, van, Harry J.P. Timmermans
R7,916 Discovery Miles 79 160 Ships in 18 - 22 working days

The International Conference on Design and Decision Support Systems in Architecture and Urban Planning is organised bi-annually by the Eindhoven University of Technology. This volume contains a selection of papers presented at the eighth conference that was held at the Kapellerput Conference Centre in the village of Heeze, near Eindhoven, The Netherlands, from 4 to 7 July, 2006.

Traditionally, the DDSS conferences aim to be a platform for both starting and experienced researchers who focus on the development and application of computer support in the areas of urban planning and architectural design. This results in an interesting mix of well-established research projects and first explorations. It also leads to a very valuable cross-over of theories, methods, and technologies for support systems in the two different areas, architecture and urban planning. This volume contains 31 peer reviewed papers from this yeara (TM)s conference that are organised into seven sections:

a [ Land Use Simulation and Visualisation

a [ Multi-Agent Models for Movement Simulation

a [ Multi-Agent Models for Urban Development

a [ Managing and Deploying Design Knowledge

a [ Urban Decision-Making

a [ Design Interactivity and Design Automation

a [ Virtual Environments and Augmented Reality.

This book will bring researchers together and is a valuable resource for their continuous joint effort to improve the design and planning of our environment.

QoS Routing Algorithms for Wireless Sensor Networks (Hardcover, 1st ed. 2020): K.R. Venugopal, Shiv Prakash T., M. Kumaraswamy QoS Routing Algorithms for Wireless Sensor Networks (Hardcover, 1st ed. 2020)
K.R. Venugopal, Shiv Prakash T., M. Kumaraswamy
R2,654 Discovery Miles 26 540 Ships in 18 - 22 working days

This book provides a systematic introduction to the fundamental concepts, major challenges, and effective solutions for Quality of Service in Wireless Sensor Networks (WSNs). Unlike other books on the topic, it focuses on the networking aspects of WSNs, discussing the most important networking issues, including network architecture design, medium access control, routing and data dissemination, node clustering, node localization, query processing, data aggregation, transport and quality of service, time synchronization, and network security. Featuring contributions from researchers, this book strikes a balance between fundamental concepts and new technologies, providing readers with unprecedented insights into WSNs from a networking perspective. It is essential reading for a broad audience, including academics, research engineers, and practitioners, particularly postgraduate/postdoctoral researchers and engineers in industry. It is also suitable as a textbook or supplementary reading for graduate computer engineering and computer science courses.

Concepts, Applications, Experimentation and Analysis of Wireless Sensor Networks (Hardcover, 3rd ed. 2023): Hossam Mahmoud... Concepts, Applications, Experimentation and Analysis of Wireless Sensor Networks (Hardcover, 3rd ed. 2023)
Hossam Mahmoud Ahmad Fahmy
R3,424 Discovery Miles 34 240 Ships in 18 - 22 working days

The third edition of this hands-on textbook pursues the focus on the principles of wireless sensor networks (WSNs), their applications, their protocols and standards, and their analysis and test tools; a meticulous care has been accorded to the definitions and terminology. To make WSNs felt and seen, the adopted technologies as well as their manufacturers are presented in detail. In introductory computer networking books, chapters sequencing follows the bottom up or top down architecture of the seven layers protocol. This book is some more steps after, both horizontally and vertically, the view and understanding are getting clearer, chapters ordering is based on topics significance to the elaboration of wireless sensor networks (WSNs) concepts and issues. This book is intended for a wide audience, it is meant to be help and motivate, for both the senior undergraduates, postgraduates, researchers, and practitioners; concepts and WSNs related applications are laid out, research and practical issues are backed by appropriate literature, and new trends are put under focus. For senior undergraduate students, it familiarizes with conceptual foundations, applications and practical projects implementations. For graduate students and researchers, energy-efficient routing protocols, transport layer protocols and cross-layering protocols approach are presented. Testbeds and simulators provide a must follow emphasis on the analysis methods and tools for WSNs. For practitioners, besides applications and deployment, the manufacturers and components of WSNs at several platforms and testbeds are fully explored.

Smart Cities - The Internet of Things, People and Systems (Hardcover, 1st ed. 2017): Schahram Dustdar, Stefan Nastic, Ognjen... Smart Cities - The Internet of Things, People and Systems (Hardcover, 1st ed. 2017)
Schahram Dustdar, Stefan Nastic, Ognjen Scekic
R4,997 Discovery Miles 49 970 Ships in 10 - 15 working days

This book presents a coherent, novel vision of Smart Cities, built around a value-driven architecture. It describes the limitations of the contemporary notion of the Smart City and argues that the next developmental step must actively include not only the physical infrastructure, but information technology and human infrastructure as well, requiring the intensive integration of technical solutions from the Internet of Things (IoT) and social computing. The book is divided into five major parts, the first of which provides both a general introduction and a coherent vision that ties together all the components that are required to realize the vision for Smart Cities. Part II then discusses the provisioning and governance of Smart City systems and infrastructures. In turn, Part III addresses the core technologies and technological enablers for managing the social component of the Smart City platform. Both parts combine state-of-the-art research with cutting-edge industrial efforts in the respective fields. Lastly, Part IV details a road map to achieving Cyber-Human Smart Cities. Rounding out the coverage, it discusses the concrete technological advances needed to move beyond contemporary Smart Cities and toward the Smart Cities of the future. Overall, the book provides an essential overview of the latest developments in the areas of IoT and social computing research, and outlines a research roadmap for a closer integration of the two areas in the context of the Smart City. As such, it offers a valuable resource for researchers and graduate students alike.

Connected Dominating Set: Theory and Applications (Hardcover, 2013 ed.): Dingzhu Du, Peng-Jun Wan Connected Dominating Set: Theory and Applications (Hardcover, 2013 ed.)
Dingzhu Du, Peng-Jun Wan
R1,860 Discovery Miles 18 600 Ships in 10 - 15 working days

The connected dominating set has been a classic subject studied in graph theory since 1975. Since the 1990s, it has been found to have important applications in communication networks, especially in wireless networks, as a virtual backbone. Motivated from those applications, many papers have been published in the literature during last 15 years. Now, the connected dominating set has become a hot research topic in computer science. In this book, we are going to collect recent developments on the connected dominating set, which presents the state of the art in the study of connected dominating sets. The book consists of 16 chapters. Except the 1st one, each chapter is devoted to one problem, and consists of three parts, motivation and overview, problem complexity analysis, and approximation algorithm designs, which will lead the reader to see clearly about the background, formulation, existing important research results, and open problems. Therefore, this would be a very valuable reference book for researchers in computer science and operations research, especially in areas of theoretical computer science, computer communication networks, combinatorial optimization, and discrete mathematics.

Transforming Enterprise Cloud Services (Hardcover, 2010 Ed.): William Y Chang, Hosame Abu-Amara, Jessica Feng Sanford Transforming Enterprise Cloud Services (Hardcover, 2010 Ed.)
William Y Chang, Hosame Abu-Amara, Jessica Feng Sanford
R4,253 Discovery Miles 42 530 Ships in 18 - 22 working days

The broad scope of Cloud Computing is creating a technology, business, sociolo- cal, and economic renaissance. It delivers the promise of making services available quickly with rather little effort. Cloud Computing allows almost anyone, anywhere, at anytime to interact with these service offerings. Cloud Computing creates a unique opportunity for its users that allows anyone with an idea to have a chance to deliver it to a mass market base. As Cloud Computing continues to evolve and penetrate different industries, it is inevitable that the scope and definition of Cloud Computing becomes very subjective, based on providers' and customers' persp- tive of applications. For instance, Information Technology (IT) professionals p- ceive a Cloud as an unlimited, on-demand, flexible computing fabric that is always available to support their needs. Cloud users experience Cloud services as virtual, off-premise applications provided by Cloud service providers. To an end user, a p- vider offering a set of services or applications in the Cloud can manage these off- ings remotely. Despite these discrepancies, there is a general consensus that Cloud Computing includes technology that uses the Internet and collaborated servers to integrate data, applications, and computing resources. With proper Cloud access, such technology allows consumers and businesses to access their personal files on any computer without having to install special tools. Cloud Computing facilitates efficient operations and management of comp- ing technologies by federating storage, memory, processing, and bandwidth.

Towards User-Centric Intelligent Network Selection in 5G Heterogeneous Wireless Networks - A Reinforcement Learning Perspective... Towards User-Centric Intelligent Network Selection in 5G Heterogeneous Wireless Networks - A Reinforcement Learning Perspective (Hardcover, 1st ed. 2020)
Zhiyong Du, Bin Jiang, Qihui Wu, Yuhua Xu, Kun Xu
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book presents reinforcement learning (RL) based solutions for user-centric online network selection optimization. The main content can be divided into three parts. The first part (chapter 2 and 3) focuses on how to learning the best network when QoE is revealed beyond QoS under the framework of multi-armed bandit (MAB). The second part (chapter 4 and 5) focuses on how to meet dynamic user demand in complex and uncertain heterogeneous wireless networks under the framework of markov decision process (MDP). The third part (chapter 6 and 7) focuses on how to meet heterogeneous user demand for multiple users inlarge-scale networks under the framework of game theory. Efficient RL algorithms with practical constraints and considerations are proposed to optimize QoE for realizing intelligent online network selection for future mobile networks. This book is intended as a reference resource for researchers and designers in resource management of 5G networks and beyond.

Optical Modulation - Advanced Techniques and Applications in Transmission Systems and Networks (Hardcover): Le Nguyen Binh Optical Modulation - Advanced Techniques and Applications in Transmission Systems and Networks (Hardcover)
Le Nguyen Binh
R5,824 Discovery Miles 58 240 Ships in 10 - 15 working days

This books aims to present fundamental aspects of optical communication techniques and advanced modulation techniques and extensive applications of optical communications systems and networks employing single-mode optical fibers as the transmission system. New digital techqniues such as chromatic dispersion, polarization mode dispersion, nonlinear phase distortion effects, etc. will be discussed. Practical models for practice and understanding the behavior and dynamics of the devices and systems will be included.

Real-time Communication Protocols for Multi-hop Ad-hoc Networks - Wireless Networking in Production and Control Systems... Real-time Communication Protocols for Multi-hop Ad-hoc Networks - Wireless Networking in Production and Control Systems (Hardcover, 1st ed. 2020)
Reinhard Gotzhein
R1,664 Discovery Miles 16 640 Ships in 18 - 22 working days

This book focuses on core functionalities for wireless real-time multi-hop networking with TDMA (time-division multiple access) and their integration into a flexible, versatile, fully operational, self-contained communication system. The use of wireless real-time communication technologies for the flexible networking of sensors, actuators, and controllers is a crucial building block for future production and control systems. WirelessHART and ISA 100.11a, two technologies that have been developed predominantly for industrial use, are currently available. However, a closer analysis of these approaches reveals certain deficits. Current research on wireless real-time communication systems shows potential to remove these limitations, resulting in flexible, versatile, and robust solutions that can be implemented on today's low-cost and resource-constrained hardware platforms. Unlike other books on wireless communication, this book presents protocols located on MAC layer and above, and build on the physical (PHY) layer of standard wireless communication technologies.

Future Wireless and Optical Networks - Networking Modes and Cross-Layer Design (Hardcover, 2012 ed.): Shengming Jiang Future Wireless and Optical Networks - Networking Modes and Cross-Layer Design (Hardcover, 2012 ed.)
Shengming Jiang
R2,674 Discovery Miles 26 740 Ships in 18 - 22 working days

This book reviews the challenges of all-optical and wireless networks for the future Internet, with a focus on cross-layer design and optimization. Features: presents a thorough introduction to major networking modes and their effect on Internet development; proposes a new structure favorable for all-optical packet switching; discusses a new quality of service (QoS) provisioning approach, which overcomes the scalability problem of IntServ and the coarse QoS granularity of DiffServ; describes the end-to-end arguments in Internet design, before investigating a solution to congestion control problems in multi-hop wireless and all-optical networks; examines how to exploit multiple-input-multiple-output technology to improve network performance in centralized wireless networks; surveys green networking strategies from a quantitative perspective; suggests a strategic vision for possible developments of network technology for the future Internet.

FTTx Networks - Technology Implementation and Operation (Paperback): James Farmer, Brian Lane, Kevin Bourg, Weyl Wang FTTx Networks - Technology Implementation and Operation (Paperback)
James Farmer, Brian Lane, Kevin Bourg, Weyl Wang
R1,792 Discovery Miles 17 920 Ships in 10 - 15 working days

FTTX Networks: Technology Implementation and Operation provides an in-depth treatment of the technology and implementation of FTTX networks, discusses the environment that gave rise to FTTX, provides a survey of the available FTTX technologies, and gives users the state-of-the-art knowledge needed for successful deployment of FTTX. The book includes hands-on project planning engineering design and operations checklists, as well as recommended best practices for configuring FTTH systems and the data networks preceding them for IPTV, voice, and data, with case studies of actual FTTH systems and a methodology for predicting the performance of real systems. This book is a must-read for all network engineers, technical businesspeople, and technical specialists engaged in building FTTX networks, from technology selection, to fielding the network in production, to implementation.

Advances in Ubiquitous Networking 2 - Proceedings of the UNet'16 (Hardcover, 1st ed. 2017): Rachid El-Azouzi, Daniel Sadoc... Advances in Ubiquitous Networking 2 - Proceedings of the UNet'16 (Hardcover, 1st ed. 2017)
Rachid El-Azouzi, Daniel Sadoc Menasche, Essaid Sabir, Francesco De Pellegrini, Mustapha Benjillali
R5,289 Discovery Miles 52 890 Ships in 18 - 22 working days

This volume offers the proceedings of the 2nd UNet conference, held in Casablanca May 30 - June 1, 2016. It presents new trends and findings in hot topics related to ubiquitous computing/networking, covered in three tracks and three special sessions: Main Track 1: Context-Awareness and Autonomy Paradigms Track Main Track 2: Mobile Edge Networking and Virtualization Track Main Track 3: Enablers, Challenges and Applications Special Session 1: Smart Cities and Urban Informatics for Sustainable Development Special Session 2: Unmanned Aerial Vehicles From Theory to Applications Special Session 3: From Data to Knowledge: Big Data applications and solutions

Concepts, Applications, Experimentation and Analysis of Wireless Sensor Networks (Hardcover, 2nd ed. 2021): Hossam Mahmoud... Concepts, Applications, Experimentation and Analysis of Wireless Sensor Networks (Hardcover, 2nd ed. 2021)
Hossam Mahmoud Ahmad Fahmy
R3,256 Discovery Miles 32 560 Ships in 18 - 22 working days

The new edition of this popular book has been transformed into a hands-on textbook, focusing on the principles of wireless sensor networks (WSNs), their applications, their protocols and standards, and their analysis and test tools; a meticulous care has been accorded to the definitions and terminology. To make WSNs felt and seen, the adopted technologies as well as their manufacturers are presented in detail. In introductory computer networking books, chapters sequencing follows the bottom up or top down architecture of the seven layers protocol. This book starts some steps later, with chapters ordered based on a topic's significance to the elaboration of wireless sensor networks (WSNs) concepts and issues. With such a depth, this book is intended for a wide audience, it is meant to be a helper and motivator, for both the senior undergraduates, postgraduates, researchers, and practitioners; concepts and WSNs related applications are laid out, research and practical issues are backed by appropriate literature, and new trends are put under focus. For senior undergraduate students, it familiarizes readers with conceptual foundations, applications, and practical project implementations. For graduate students and researchers, transport layer protocols and cross-layering protocols are presented and testbeds and simulators provide a must follow emphasis on the analysis methods and tools for WSNs. For practitioners, besides applications and deployment, the manufacturers and components of WSNs at several platforms and testbeds are fully explored.

Wireless Communications under Hostile Jamming: Security and Efficiency (Hardcover, 1st ed. 2018): Tongtong Li, Tianlong Song,... Wireless Communications under Hostile Jamming: Security and Efficiency (Hardcover, 1st ed. 2018)
Tongtong Li, Tianlong Song, Yuan Liang
R2,668 Discovery Miles 26 680 Ships in 18 - 22 working days

This monograph is intended for the designers and would-be designers of secure and efficient wireless communication systems under intentional interference. Along with the widespread of wireless devices, especially reconfigurable software defined radios, jamming has become a serious threat to civilian communications. In this book, going beyond traditional communication system design that mainly focuses on accurate information transmission under benign environments, we aim to enhance the physical layer security of communication systems by integrating modern cryptographic techniques into transceiver design, so as to achieve secure high-speed transmission under hostile interference with high reliability and efficiency. We revisit existing jamming patterns, and introduce new jamming patterns. We analyze the weaknesses of existing anti-jamming techniques. We present innovative and feasible anti-jamming techniques, which can strengthen the inherent security of the 3G, 4G and the upcoming 5G systems with minimal and inexpensive changes to the existing CDMA, frequency hopping and OFDM schemes. We also provide benchmarks for system performance evaluation under various jamming scenarios through capacity analysis. This book includes design principles, in-depth theoretical analysis and practical design examples, and will be of interest to academic researchers as well as professionals in industry.

Automated Security Management (Hardcover, 2013 ed.): Ehab Al-Shaer, Xinming Ou, Geoffrey Xie Automated Security Management (Hardcover, 2013 ed.)
Ehab Al-Shaer, Xinming Ou, Geoffrey Xie
R2,874 R1,838 Discovery Miles 18 380 Save R1,036 (36%) Ships in 10 - 15 working days

In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Management presents a number of topics in the area of configuration automation. Early in the book, the chapter authors introduce modeling and validation of configurations based on high-level requirements and discuss how to manage the security risk as a result of configuration settings of network systems. Later chapters delve into the concept of configuration analysis and why it is important in ensuring the security and functionality of a properly configured system. The book concludes with ways to identify problems when things go wrong and more. A wide range of theoretical and practical content make this volume valuable for researchers and professionals who work with network systems.

Microsoft Azure Security Infrastructure (Paperback): Yuri Diogenes, Tom Shinder, Debra Shinder Microsoft Azure Security Infrastructure (Paperback)
Yuri Diogenes, Tom Shinder, Debra Shinder
R611 Discovery Miles 6 110 Ships in 10 - 15 working days

Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure, three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control, security, and compliance. You'll learn how to prepare infrastructure with Microsoft's integrated tools, prebuilt templates, and managed services-and use these to help safely build and manage any enterprise, mobile, web, or Internet of Things (IoT) system. The authors guide you through enforcing, managing, and verifying robust security at physical, network, host, application, and data layers. You'll learn best practices for security-aware deployment, operational management, threat mitigation, and continuous improvement-so you can help protect all your data, make services resilient to attack, and stay in control no matter how your cloud systems evolve. Three Microsoft Azure experts show you how to: * Understand cloud security boundaries and responsibilities * Plan for compliance, risk management, identity/access management, operational security, and endpoint and data protection * Explore Azure's defense-in-depth security architecture * Use Azure network security patterns and best practices * Help safeguard data via encryption, storage redundancy, rights management, database security, and storage security * Help protect virtual machines with Microsoft Antimalware for Azure Cloud Services and Virtual Machines * Use the Microsoft Azure Key Vault service to help secure cryptographic keys and other confidential information * Monitor and help protect Azure and on-premises resources with Azure Security Center and Operations Management Suite * Effectively model threats and plan protection for IoT systems * Use Azure security tools for operations, incident response, and forensic investigation

Research and Innovation Forum 2021 - Managing Continuity, Innovation, and Change in the Post-Covid World: Technology, Politics... Research and Innovation Forum 2021 - Managing Continuity, Innovation, and Change in the Post-Covid World: Technology, Politics and Society (Hardcover, 1st ed. 2021)
Anna Visvizi, Orlando Troisi, Kawther Saeedi
R4,810 Discovery Miles 48 100 Ships in 18 - 22 working days

This book features research presented and discussed during the Research and Innovation Forum (Rii Forum) 2021. The Covid-19 pandemic and its social, political, and economic implications had confirmed that a more thorough debate on these issues and topics was needed. For this reason, the Rii Forum 2021 was devoted to the broadly defined question of the short- and long-term impact of the pandemic on our societies. This volume serves as an essential resource to understand the diverse ways in which Covid-19 impacted our societies, including the capacity to innovate, advances in technology, the evolution of the healthcare systems, business model innovation, the prospects of growth, the stability of political systems, and the future of education.

Software Engineering Frameworks for the Cloud Computing Paradigm (Hardcover, 2013 ed.): Zaigham Mahmood, Saqib Saeed Software Engineering Frameworks for the Cloud Computing Paradigm (Hardcover, 2013 ed.)
Zaigham Mahmood, Saqib Saeed
R4,550 R3,492 Discovery Miles 34 920 Save R1,058 (23%) Ships in 10 - 15 working days

With the emergence of cloud computing, traditional approaches to software engineering must be adapted in order to take full advantage of the benefits promised by cloud technologies.

This timely and authoritative text/reference presents the latest research on "Software Engineering Frameworks for the Cloud Computing Paradigm," drawn from an international selection of researchers and practitioners. The book offers both a discussion of relevant software engineering approaches and practical guidance on enterprise-wide software deployment in the cloud environment, together with real-world case studies.

Topics and features: presents the state of the art in software engineering approaches for developing cloud-suitable applications; discusses the impact of the cloud computing paradigm on software engineering, including the semantic web; offers guidance and best practices for students and practitioners of cloud-based applications architecture; examines the stages of the software development lifecycle, with a focus on the requirements engineering and testing of cloud-based applications; reviews the efficiency and performance of cloud-based applications; explores feature-driven and cloud-aided software design, presenting strategies for cloud adoption and migration; provides relevant theoretical frameworks, practical approaches and current and future research directions.

This practical and clearly-structured volume is an ideal self-study primer for students of cloud computing and software engineering. Software engineers, application developers and IT infrastructure managers will also find the work to be an invaluable reference.

Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event,... Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7-9, 2021, Proceedings (Hardcover, 1st ed. 2021)
Steven Furnell, Nathan Clarke
R2,666 Discovery Miles 26 660 Ships in 18 - 22 working days

This book constitutes the proceedings of the 15th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2021, held virtually in July 2021.The 18 papers presented in this volume were carefully reviewed and selected from 30 submissions. They are organized in the following topical sections: attitudes and perspectives; cyber security education; and people and technology.

mmWave Massive MIMO Vehicular Communications (Hardcover, 1st ed. 2023): Xiang Cheng, Shijian Gao, Liuqing Yang mmWave Massive MIMO Vehicular Communications (Hardcover, 1st ed. 2023)
Xiang Cheng, Shijian Gao, Liuqing Yang
R852 Discovery Miles 8 520 Ships in 10 - 15 working days

This book proposes promising mmWave solutions to promoting safe and reliable vehicular communications. The authors include topics such as channel estimation, multi-user transceiver design, and advanced index modulation. For channel estimation, unique channel properties and hybrid structures are first introduced, followed by the development of a doubly-sparse doubly-selective channel estimator. For multi-user transceiver design, the concept of hybrid block diagonalization (HBD) is first introduced, followed by a generic HBD-based transceiver design to maximize the system capacity. For advanced index modulation, the generalized beamspace modulation for uplink multi-user scenarios are first introduced, followed by the precoded beamspace modulation for the downlink. Finally, this book discusses open problems and future research directions to inspire further studies in the field of mmWave vehicular communications.

Robustness Optimization for IoT Topology (Hardcover, 1st ed. 2022): Tie Qiu, Ning Chen, Songwei Zhang Robustness Optimization for IoT Topology (Hardcover, 1st ed. 2022)
Tie Qiu, Ning Chen, Songwei Zhang
R3,988 Discovery Miles 39 880 Ships in 10 - 15 working days

The IoT topology defines the way various components communicate with each other within a network. Topologies can vary greatly in terms of security, power consumption, cost, and complexity. Optimizing the IoT topology for different applications and requirements can help to boost the network's performance and save costs. More importantly, optimizing the topology robustness can ensure security and prevent network failure at the foundation level. In this context, this book examines the optimization schemes for topology robustness in the IoT, helping readers to construct a robustness optimization framework, from self-organizing to intelligent networking. The book provides the relevant theoretical framework and the latest empirical research on robustness optimization of IoT topology. Starting with the self-organization of networks, it gradually moves to genetic evolution. It also discusses the application of neural networks and reinforcement learning to endow the node with self-learning ability to allow intelligent networking. This book is intended for students, practitioners, industry professionals, and researchers who are eager to comprehend the vulnerabilities of IoT topology. It helps them to master the research framework for IoT topology robustness optimization and to build more efficient and reliable IoT topologies in their industry.

Quantum Key Distribution Networks - A Quality of Service Perspective (Hardcover, 1st ed. 2022): Miralem Mehic, Stefan Rass,... Quantum Key Distribution Networks - A Quality of Service Perspective (Hardcover, 1st ed. 2022)
Miralem Mehic, Stefan Rass, Peppino Fazio, Miroslav Voznak
R2,668 Discovery Miles 26 680 Ships in 18 - 22 working days

This book focuses on practical implementation details, telecommunication techniques, security and technology challenges and approaches to implementing quantum technology in modern telecommunication systems. The authors use their extensive practical academic and industrial experience in network technologies and provide details from international projects in quantum cryptography in which they actively participate. Using a variety of examples, analogies, illustrations, tables, and features from practical quantum network realizations, the authors provide a unique view of quantum technology from an engineering telecommunication standpoint, allowing the reader to identify the advantages and challenges of quantum technology. This book also addresses challenges posed by quantum technology such as network organization, passive and active eavesdropping, and future trends in QKD such as Software Defined Networking (SDN) with QKD and application QKD in 5G networks. It is conceived through eight chapters by treating the following thematic units separately: Fundamentals of Quantum Key Distribution, QoS architecture/mode, QoS MAC layer, QoS signaling techniques for key management and session negotiation purpose and QoS routing protocols that minimize the consumption of key material through the equitable utilization of network resources when finding an optimal path. Through numerous information on practical solutions, simulation examples, illustrations, and analysis, readers can easily distinguish the specificity of quantum technology and understand the challenges and methods of practical implementation of quantum cryptography in common telecommunications standards. Researchers working in quantum technology and applied networking security as well as advanced-level students studying computer science and electrical engineering will benefit from this book. Professionals working within these related fields will also benefit from this book.

Cyber-security of SCADA and Other Industrial Control Systems (Hardcover, 1st ed. 2016): Edward J M Colbert, Alexander Kott Cyber-security of SCADA and Other Industrial Control Systems (Hardcover, 1st ed. 2016)
Edward J M Colbert, Alexander Kott
R3,578 R2,725 Discovery Miles 27 250 Save R853 (24%) Ships in 10 - 15 working days

This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general. Careful attention is given to providing the reader with clear and comprehensive background and reference material for each topic pertinent to ICS security. This book offers answers to such questions as: Which specific operating and security issues may lead to a loss of efficiency and operation? What methods can be used to monitor and protect my system? How can I design my system to reduce threats?This book offers chapters on ICS cyber threats, attacks, metrics, risk, situational awareness, intrusion detection, and security testing, providing an advantageous reference set for current system owners who wish to securely configure and operate their ICSs. This book is appropriate for non-specialists as well. Tutorial information is provided in two initial chapters and in the beginnings of other chapters as needed. The book concludes with advanced topics on ICS governance, responses to attacks on ICS, and future security of the Internet of Things.

iNetSec 2009 - Open Research Problems in Network Security - IFIP Wg 11.4 International Workshop, Zurich, Switzerland, April... iNetSec 2009 - Open Research Problems in Network Security - IFIP Wg 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers (Hardcover, 2010 ed.)
Jan Camenisch, Dogan Kesdogan
R1,497 Discovery Miles 14 970 Ships in 18 - 22 working days

The working group WG 11.4 of IFIP ran an iNetSec conference a few times in the past, sometimes together with IFIP security conference, sometimes as a stand-alone workshop with a program selected from peer-reviewed submissions. When we were elected to chair WG 11.4 we asked ourselveswhether the security and also the computer science community at large bene?ts from this workshop. In particular, as there aremany (too many?) securityconferences, it has become di?cult to keep up with the ?eld. After having talked to many colleagues, far too many to list all of them here, we decided to try a di?erent kind of workshop: one where people would attend to discuss open research topics in our ?eld, as typically only happens during the co?ee breaks of ordinary conferences. Toenablethiswecalledforabstractsof2pageswheretheauthorsoutlinethe open problems that they would like to discuss at the workshop, the intent being that the author would be given 15 minutes to present the topic and another 15 minutes for discussion. These abstracts were then read by all members of the Program Committee and ranked by them according to whether they thought thiswouldleadtoaninterestingtalk and discussion. We then simply selected the abstracts that got the best rankings. We were happy to see this result in many really interesting talks and disc- sions in the courseof the workshop.Ofcourse, these lively anddirect discussions are almost impossible to achieve in a printed text. Still, we asked the authors to distill the essence of these discussions into full papers. The results are in your hand

Multi-dimensional Urban Sensing Using Crowdsensing Data (Hardcover, 1st ed. 2023): Chaocan Xiang, Panlong Yang, Fu Xiao,... Multi-dimensional Urban Sensing Using Crowdsensing Data (Hardcover, 1st ed. 2023)
Chaocan Xiang, Panlong Yang, Fu Xiao, Xiaochen Fan
R4,632 Discovery Miles 46 320 Ships in 10 - 15 working days

Chaocan Xiang is an Associate Professor at the College of Computer Science, Chongqing University, China. He received his bachelor’s degree and Ph.D. from Nanjing Institute of Communication Engineering, China, in 2009 and 2014, respectively. He subsequently studied at the University of Michigan-Ann Arbor in 2017 (supervised by Prof. Kang G. Shin, IEEE Life Fellow, ACM Fellow). His research interests mainly include UAVs/vehicle-based crowdsensing, urban computing, Internet of Things, Artificial Intelligence, and big data. He has published more than 50 papers, including over 20 in leading venues such as IEEE Transactions on Mobile Computing, IEEE Transactions on Parallel and Distributed Systems, IEEE INFOCOM, and ACM Ubicomp. He has received a best paper award and a best poster award at two international conferences. Panlong Yang is a full Professor at the University of Science and Technology of China. He has been supported by the NSF Jiangsu through a Distinguished Young Scholarship and was honored as a CCF Distinguished Lecturer in 2015. He has published over 150 papers, including 40 in CCF Class A. Since 2012, he has supervised 14 master’s and Ph.D. candidates, including two excellent dissertation winners in Jiangsu Province and the PLA education system. He has been supported by the National Key Development Project and NSFC projects. He has nominated by ACM MobiCom 2009 for the best demo honored mention awards, and won best paper awards at the IEEE MSN and MASS. He has served as general chair of BigCom and TPC chair of IEEE MSN. In addition, he has served as a TPC member of INFOCOM (CCF Class A) and an associate editor of the Journal of Communication of China. He is a Senior Member of the IEEE (2019). Fu Xiao received his Ph.D. in Computer Science and Technology from the Nanjing University of Science and Technology, Nanjing, China, in 2007. He is currently a Professor and Dean of the School of Computer, Nanjing University of Posts and Telecommunications. He has authored more than 60 papers in respected conference proceedings and journals, including IEEE INFOCOM, ACM Mobihoc, IEEE JASC, IEEE/ACM ToN, IEEE TPDS, IEEE TMC, etc. His main research interest is in the Internet of Things. He is a member of the IEEE Computer Society and the Association for Computing Machinery. Xiaochen Fan received his B.S. degree in Computer Science from Beijing Institute of Technology, Beijing, China, in 2013, and his Ph.D. from the University of Technology Sydney, NSW, Australia, in 2021. His research interests include mobile/pervasive computing, deep learning, and Internet of Things (IoT). He has published over 25 peer-reviewed papers in high-quality journals and IEEE/ACM international conference proceedings.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Developing Business Applications for the…
Christian Hur, Laura Ubelhor Paperback R1,819 R1,577 Discovery Miles 15 770
Propositions for Amending the…
James Hillhouse Paperback R331 Discovery Miles 3 310
A Day in Code- Python - Learn to Code in…
Shari Eskenas Hardcover R635 Discovery Miles 6 350
Tipping Point: Turmoil Or Reform…
Raymond Parsons Paperback R300 R240 Discovery Miles 2 400
International Library of Technology: A…
unknownauthor Paperback R823 Discovery Miles 8 230
Accelerating MATLAB with GPU Computing…
Jung Suh, Youngmin Kim Paperback R1,459 Discovery Miles 14 590
Electrical Age [microform]; v.13
Anonymous Hardcover R890 Discovery Miles 8 900
FORTRAN 90 for Scientists and Engineers
Brian Hahn Paperback R1,359 Discovery Miles 13 590
Memoirs of the Life and Writings of…
Robert Benton Seeley Paperback R781 Discovery Miles 7 810
A Treatise on Electricity, in Theory and…
Auguste De La Rive Paperback R711 Discovery Miles 7 110

 

Partners