0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (1)
  • R250 - R500 (18)
  • R500+ (4,489)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

Fast and Scalable Cloud Data Management (Hardcover, 1st ed. 2020): Felix Gessert, Wolfram Wingerath, Norbert Ritter Fast and Scalable Cloud Data Management (Hardcover, 1st ed. 2020)
Felix Gessert, Wolfram Wingerath, Norbert Ritter
R3,663 Discovery Miles 36 630 Ships in 10 - 15 working days

The unprecedented scale at which data is both produced and consumed today has generated a large demand for scalable data management solutions facilitating fast access from all over the world. As one consequence, a plethora of non-relational, distributed NoSQL database systems have risen in recent years and today's data management system landscape has thus become somewhat hard to overlook. As another consequence, complex polyglot designs and elaborate schemes for data distribution and delivery have become the norm for building applications that connect users and organizations across the globe - but choosing the right combination of systems for a given use case has become increasingly difficult as well. To help practitioners stay on top of that challenge, this book presents a comprehensive overview and classification of the current system landscape in cloud data management as well as a survey of the state-of-the-art approaches for efficient data distribution and delivery to end-user devices. The topics covered thus range from NoSQL storage systems and polyglot architectures (backend) over distributed transactions and Web caching (network) to data access and rendering performance in the client (end-user). By distinguishing popular data management systems by data model, consistency guarantees, and other dimensions of interest, this book provides an abstract framework for reasoning about the overall design space and the individual positions claimed by each of the systems therein. Building on this classification, this book further presents an application-driven decision guidance tool that breaks the process of choosing a set of viable system candidates for a given application scenario down into a straightforward decision tree.

Guide to Industrial Analytics - Solving Data Science Problems for Manufacturing and the Internet of Things (Hardcover, 1st ed.... Guide to Industrial Analytics - Solving Data Science Problems for Manufacturing and the Internet of Things (Hardcover, 1st ed. 2021)
Richard Hill, Stuart Berry
R2,116 Discovery Miles 21 160 Ships in 18 - 22 working days

This textbook describes the hands-on application of data science techniques to solve problems in manufacturing and the Industrial Internet of Things (IIoT). Monitoring and managing operational performance is a crucial activity for industrial and business organisations. The emergence of low-cost, accessible computing and storage, through Industrial Digital Technologies (IDT) and Industry 4.0, has generated considerable interest in innovative approaches to doing more with data. Data science, predictive analytics, machine learning, artificial intelligence and general approaches to modelling, simulating and visualising industrial systems have often been considered topics only for research labs and academic departments. This textbook debunks the mystique around applied data science and shows readers, using tutorial-style explanations and real-life case studies, how practitioners can develop their own understanding of performance to achieve tangible business improvements. All exercises can be completed with commonly available tools, many of which are free to install and use. Readers will learn how to use tools to investigate, diagnose, propose and implement analytics solutions that will provide explainable results to deliver digital transformation.

Dynamic Provisioning for Community Services (Hardcover, 2013 ed.): Li Qi, Hai Jin Dynamic Provisioning for Community Services (Hardcover, 2013 ed.)
Li Qi, Hai Jin
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

"Dynamic Provisioning for Community Services" outlines a dynamic provisioning and maintenance mechanism in a running distributed system, e.g. the grid, which can be used to maximize the utilization of computing resources and user demands. The book includes a complete and reliable maintenance system solution for the large-scale distributed system and an interoperation mechanism for the grid middleware deployed in the United States, Europe, and China. The experiments and evaluations have all been practically implemented for ChinaGrid, and the best practices established can help readers to construct reliable distributed systems.
This book is intended for researchers, developers, and graduate students in the fields of grid computing, service-oriented architecture and dynamic maintenance for large distributed systems.
Li Qi is an Associate Professor and the Deputy Director of the R&D Center for the Internet of Things at the Third Research Institute of Ministry of Public Security (TRIMPS), China. Hai Jin is a Professor and the Director of Department of Computer Science, Huazhong University of Science and Technology, China.
"

Communication Protocols - Principles, Methods and Specifications (Hardcover, 1st ed. 2020): Drago Hercog Communication Protocols - Principles, Methods and Specifications (Hardcover, 1st ed. 2020)
Drago Hercog
R4,006 Discovery Miles 40 060 Ships in 10 - 15 working days

This book provides comprehensive coverage of the protocols of communication systems. The book is divided into four parts. Part I covers the basic concepts of system and protocol design and specification, overviews the models and languages for informal and formal specification of protocols, and describes the specification language SDL. In the second part, the basic notions and properties of communication protocols and protocol stacks are explained, including the treatment of the logical correctness and the performance of protocols. In the third part, many methods for message transfer, on which specific communication protocols are based, are explained and formally specified in the SDL language. The fourth part provides for short descriptions of some specific protocols, mainly used in IP networks, in order to acquaint a reader with the practical use of communication methods presented in the third part of the book. The book is relevant to researchers, academics, professionals and students in communications engineering. Provides comprehensive yet granular coverage of the protocols of communication systems Allows readers the ability to understand the formal specification of communication protocols Specifies communication methods and protocols in the specification language SDL, giving readers practical tools to venture on their own

Internet of Things. A Confluence of Many Disciplines - Second IFIP International Cross-Domain Conference, IFIPIoT 2019, Tampa,... Internet of Things. A Confluence of Many Disciplines - Second IFIP International Cross-Domain Conference, IFIPIoT 2019, Tampa, FL, USA, October 31 - November 1, 2019, Revised Selected Papers (Hardcover, 1st ed. 2020)
Augusto Casaca, Srinivas Katkoori, Sandip Ray, Leon Strous
R1,449 Discovery Miles 14 490 Ships in 18 - 22 working days

This book constitutes the refereed post-conference proceedings of the Second IFIP International Cross-Domain Conference on Internet of Things, IFIPIoT 2019, held in Tampa, USA, in October/ November 2019. The 11 full papers presented were carefully reviewed and selected from 22 submissions. Also included in this volume are 8 invited papers. The papers are organized in the following topical sections: IoT applications; context reasoning and situational awareness; IoT security; smart and low power IoT; smart network architectures; and smart system design and IoT education.

Stochastic Geometry Analysis of Multi-Antenna Wireless Networks (Hardcover, 1st ed. 2019): Xianghao Yu, Chang Li, Jun Zhang,... Stochastic Geometry Analysis of Multi-Antenna Wireless Networks (Hardcover, 1st ed. 2019)
Xianghao Yu, Chang Li, Jun Zhang, Khaled B. Letaief
R2,654 Discovery Miles 26 540 Ships in 18 - 22 working days

This book presents a unified framework for the tractable analysis of large-scale, multi-antenna wireless networks using stochastic geometry. This mathematical analysis is essential for assessing and understanding the performance of complicated multi-antenna networks, which are one of the foundations of 5G and beyond networks to meet the ever-increasing demands for network capacity. Describing the salient properties of the framework, which makes the analysis of multi-antenna networks comparable to that of their single-antenna counterparts, the book discusses effective design approaches that do not require complex system-level simulations. It also includes various application examples with different multi-antenna network models to illustrate the framework's effectiveness.

Evolving Technologies for Computing, Communication and Smart World - Proceedings of ETCCS 2020 (Hardcover, 1st ed. 2021):... Evolving Technologies for Computing, Communication and Smart World - Proceedings of ETCCS 2020 (Hardcover, 1st ed. 2021)
Pradeep Kumar Singh, Arti Noor, Maheshkumar H. Kolekar, Sudeep Tanwar, Raj K. Bhatnagar, …
R5,240 Discovery Miles 52 400 Ships in 18 - 22 working days

This book presents best selected papers presented at the International Conference on Evolving Technologies for Computing, Communication and Smart World (ETCCS 2020) held on 31 January-1 February 2020 at C-DAC, Noida, India. It is co-organized by Southern Federal University, Russia; University of Jan Wyzykowski (UJW), Polkowice, Poland; and CSI, India. C-DAC, Noida received funding from MietY during the event. The technical services are supported through EasyChair, Turnitin, MailChimp and IAC Education. The book includes current research works in the areas of network and computing technologies, wireless networks and Internet of things (IoT), futuristic computing technologies, communication technologies, security and privacy.

Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2... Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19-23, 2019, Revised Selected Papers (Hardcover, 1st ed. 2020)
Michael Friedewald, Melek OEnen, Eva Lievens, Stephan Krenn, Samuel Fricker
R2,507 Discovery Miles 25 070 Ships in 18 - 22 working days

This book contains selected papers presented at the 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Windisch, Switzerland, in August 2019. The 22 full papers included in this volume were carefully reviewed and selected from 31 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives, which are reflected in the topical sections: language and privacy; law, ethics and AI; biometrics and privacy; tools supporting data protection compliance; privacy classification and security assessment; privacy enhancing technologies in specific contexts. The chapters "What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking" and "Privacy Implications of Voice and Speech Analysis - Information Disclosure by Inference" are open access under a CC BY 4.0 license at link.springer.com.

Evolving Towards the Internetworked Enterprise - Technological and Organizational Perspectives (Hardcover, 2010 Ed.):... Evolving Towards the Internetworked Enterprise - Technological and Organizational Perspectives (Hardcover, 2010 Ed.)
Giuseppina Passiante
R2,772 Discovery Miles 27 720 Ships in 18 - 22 working days

A new model of business has emerged within the Digital-Economy called Internetworked Enterprise (IE); it's a model that posits networks, communities of individuals and refusal of a centralized mindset as the core elements of the new frame of reference. Internetworked Enterprises are called by some scholars 'Extended' Enterprises, which use digital network to co-operate and compete with other e-business community partners by exchanging knowledge and information across trans-national borders.

"Evolving Towards the Internetworked Enterprise: Technological and Organizational Perspectives" is an edited volume based on a three year research project financed by the Italian Ministry of Research and Education. Researchers for this project are located at Polytechnic of Milan, University of Milan, University of Chieti, Engineering S.P.A and ISUFI-University of Salento. This book presents an overview of IE business methodologies, models, and an interpretative framework analyzing the sector and organizational contingencies that influence the digitalization of organizational processes in networks of SMEs (Small and Medium Enterprise). A set of case studies that provide empirical evidence on the IE phenomenon is included as well.

This book is designed for advanced-level students in computer science and business management concentrating on e-business, digital computing, information technology, economics of technology and innovation management as a reference or secondary text book. Practitioners working in these fields as corporate strategic planners and consultants will also find this book a valuable asset.

Operationalizing Multi-Cloud Environments - Technologies, Tools and Use Cases (Hardcover, 1st ed. 2022): Rajganesh Nagarajan,... Operationalizing Multi-Cloud Environments - Technologies, Tools and Use Cases (Hardcover, 1st ed. 2022)
Rajganesh Nagarajan, Pethuru Raj, Ramkumar Thirunavukarasu
R4,296 Discovery Miles 42 960 Ships in 18 - 22 working days

This book discusses various aspects of the multi-cloud paradigm. The initial portion of the book focuses on the motivations for the industry to embrace a multi-cloud option and the distinct business, technology, and user cases of multi-cloud implementations. The middle part of the book explains the challenges of setting up and sustaining multi-cloud environments. The latter portion focuses on the next-generation technologies and tools along with multi-cloud platforms, processes, patterns, and practices. The final segment of the book is dedicated for cloud brokerage systems. The various traits and tenets of cloud brokerage services especially for accomplishing cloud intermediation, integration, orchestration, governance, security, management, configuration, etc. are explained in detail. The book also clearly articulates how to have intelligent brokers.

Human Aspects of Information Security and Assurance - 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos,... Human Aspects of Information Security and Assurance - 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8-10, 2020, Proceedings (Hardcover, 1st ed. 2020)
Nathan Clarke, Steven Furnell
R1,459 Discovery Miles 14 590 Ships in 18 - 22 working days

This book constitutes the proceedings of the 14th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2020, held in Mytilene, Lesbos, Greece, in July 2020.* The 27 full papers presented in this volume were carefully reviewed and selected from 43 submissions. They are organized in the following topical sections: privacy and COVID-19; awareness and training; social engineering; security behavior; education; end-user security; usable security; security policy; and attitudes and perceptions. *The symposium was held virtually due to the COVID-19 pandemic.

Network Slicing for 5G and Beyond Networks (Hardcover, 1st ed. 2019): S. M. Ahsan Kazmi, Latif U. Khan, Nguyen H. Tran, Choong... Network Slicing for 5G and Beyond Networks (Hardcover, 1st ed. 2019)
S. M. Ahsan Kazmi, Latif U. Khan, Nguyen H. Tran, Choong Seon Hong
R2,532 Discovery Miles 25 320 Ships in 10 - 15 working days

This book provides a comprehensive guide to the emerging field of network slicing and its importance to bringing novel 5G applications into fruition. The authors discuss the current trends, novel enabling technologies, and current challenges imposed on the cellular networks. Resource management aspects of network slicing are also discussed by summarizing and comparing traditional game theoretic and optimization based solutions. Finally, the book presents some use cases of network slicing and applications for vertical industries. Topics include 5G deliverables, Radio Access Network (RAN) resources, and Core Network (CN) resources. Discusses the 5G network requirements and the challenges therein and how network slicing offers a solution Features the enabling technologies of future networks and how network slicing will play a role Presents the role of machine learning and data analytics for future cellular networks along with summarizing the machine learning approaches for 5G and beyond networks

Analyzing Digital Discourses - Between Convergence and Controversy (Hardcover, 1st ed. 2021): Marjut Johansson, Sanna-Kaisa... Analyzing Digital Discourses - Between Convergence and Controversy (Hardcover, 1st ed. 2021)
Marjut Johansson, Sanna-Kaisa Tanskanen, Jan Chovanec
R4,271 Discovery Miles 42 710 Ships in 18 - 22 working days

This book contributes to the scholarly debate on the forms and patterns of interaction and discourse in modern digital communication by probing some of the social functions that online communication has for its users. An array of experts and scholars in the field address a range of forms of social interaction and discourses expressed by users on social networks and in public media. Social functions are reflected through linguistic and discursive practices that are either those of 'convergence' or 'controversy' in terms of how the discourse participants handle interpersonal relations or how they construct meanings in discourses. In this sense, the book elaborates on some very central concerns in the area of digital discourse analysis that have been reported within the last decade from various methodological perspectives ranging from sociolinguistics and pragmatics to corpus linguistics. This edited collection will be of particular interest to scholars and students in the fields of digital discourse analysis, pragmatics, sociolinguistics, social media and communication, and media and cultural studies.

Linking Enterprise Data (Hardcover, 2010 ed.): David Wood Linking Enterprise Data (Hardcover, 2010 ed.)
David Wood
R4,179 Discovery Miles 41 790 Ships in 18 - 22 working days

Enterprise data is growing at a much faster rate than traditional technologies allow. New enterprise architectures combining existing technologies are desperately needed. This book suggests a way forward by applying new techniques of the World Wide Web to enterprise information systems.

"Linking Enterprise Data" is an edited volume contributed by worldwide leaders in Semantic Web and Linked Data research, standards development and adoption. Linking enterprise data is the application of World Wide Web architecture principles to real-world information management issues faced by commercial, not-for-profit and government enterprises. This book is divided into four sections: Benefits of applying Linked Data principles in enterprise settings, enterprise approval and support of Linked Data projects, specific Linked Data techniques and a number of real-world success stories from early enterprise adopters.

"Linking Enterprise Data" targets professionals working as CTOs, CIOs, enterprise architects, project managers and application developers in commercial, not-for-profit and government organizations concerned with scalability, flexibility and robustness of information management systems. Computer science graduate students and researchers focusing on enterprise information integration will also benefit.

5G Mobile Communications (Hardcover, 1st ed. 2017): Wei Xiang, Kan Zheng, Xuemin (Sherman) Shen 5G Mobile Communications (Hardcover, 1st ed. 2017)
Wei Xiang, Kan Zheng, Xuemin (Sherman) Shen
R5,282 Discovery Miles 52 820 Ships in 18 - 22 working days

This book provides a comprehensive overview of the emerging technologies for next-generation 5G mobile communications, with insights into the long-term future of 5G. Written by international leading experts on the subject, this contributed volume covers a wide range of technologies, research results, and networking methods. Key enabling technologies for 5G systems include, but are not limited to, millimeter-wave communications, massive MIMO technology and non-orthogonal multiple access. 5G will herald an even greater rise in the prominence of mobile access based upon both human-centric and machine-centric networks. Compared with existing 4G communications systems, unprecedented numbers of smart and heterogeneous wireless devices will be accessing future 5G mobile systems. As a result, a new paradigm shift is required to deal with challenges on explosively growing requirements in mobile data traffic volume (1000x), number of connected devices (10-100x), typical end-user data rate (10-100x), and device/network lifetime (10x). Achieving these ambitious goals calls for revolutionary candidate technologies in future 5G mobile systems. Designed for researchers and professionals involved with networks and communication systems, 5G Mobile Communications is a straightforward, easy-to-read analysis of the possibilities of 5G systems.

Technological Innovation for Value Creation - Third IFIP WG 5.5/SOCOLNET Doctoral Conference on Computing, Electrical and... Technological Innovation for Value Creation - Third IFIP WG 5.5/SOCOLNET Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2012, Costa de Caparica, Portugal, February 27-29, 2012, Proceedings (Hardcover, 2012)
Luis M. Camarinha-Matos, Ehsan Shahamatnia, Goncalo Nunes
R2,764 Discovery Miles 27 640 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third IFIP WG 5.5/SOCOLNET Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2012, held in Costa de Caparica, Portugal, in February 2012. The 65 revised full papers were carefully reviewed and selected from numerous submissions. They cover a wide spectrum of topics ranging from collaborative enterprise networks to microelectronics. The papers are organized in topical sections on collaborative systems, service orientation, knowledge and content management, human interaction, Petri nets, smart systems, robotic systems, perceptional systems, signal processing, energy, renewable energy, energy smart grid, power electronics, electronics, optimization in electronics, telecommunications and electronics, and electronic materials. The book also includes papers from the Workshop on Data Anaylsis and Modeling Retina in Health and Disease.

Network Security Metrics (Hardcover, 1st ed. 2017): Lingyu Wang, Sushil Jajodia, Anoop Singhal Network Security Metrics (Hardcover, 1st ed. 2017)
Lingyu Wang, Sushil Jajodia, Anoop Singhal
R3,965 Discovery Miles 39 650 Ships in 10 - 15 working days

This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the lack of effective security metrics which this book discusses in detail. Since "you cannot improve what you cannot measure", a network security metric is essential to evaluating the relative effectiveness of potential network security solutions. The authors start by examining the limitations of existing solutions and standards on security metrics, such as CVSS and attack surface, which typically focus on known vulnerabilities in individual software products or systems. The first few chapters of this book describe different approaches to fusing individual metric values obtained from CVSS scores into an overall measure of network security using attack graphs. Since CVSS scores are only available for previously known vulnerabilities, such approaches do not consider the threat of unknown attacks exploiting the so-called zero day vulnerabilities. Therefore, several chapters of this book are dedicated to develop network security metrics especially designed for dealing with zero day attacks where the challenge is that little or no prior knowledge is available about the exploited vulnerabilities, and thus most existing methodologies for designing security metrics are no longer effective. Finally, the authors examine several issues on the application of network security metrics at the enterprise level. Specifically, a chapter presents a suite of security metrics organized along several dimensions for measuring and visualizing different aspects of the enterprise cyber security risk, and the last chapter presents a novel metric for measuring the operational effectiveness of the cyber security operations center (CSOC). Security researchers who work on network security or security analytics related areas seeking new research topics, as well as security practitioners including network administrators and security architects who are looking for state of the art approaches to hardening their networks, will find this book helpful as a reference. Advanced-level students studying computer science and engineering will find this book useful as a secondary text.

Human Behavior Understanding in Networked Sensing - Theory and Applications of Networks of Sensors (Hardcover, 2014 ed.): Paolo... Human Behavior Understanding in Networked Sensing - Theory and Applications of Networks of Sensors (Hardcover, 2014 ed.)
Paolo Spagnolo, Pier Luigi Mazzeo, Cosimo Distante
R3,960 R2,207 Discovery Miles 22 070 Save R1,753 (44%) Ships in 10 - 15 working days

This book provides a broad overview of both the technical challenges in sensor network development, and the real-world applications of distributed sensing. Important aspects of distributed computing in large-scale networked sensor systems are analyzed in the context of human behavior understanding, including topics on systems design tools and techniques. Additionally, the book examines a varied range of applications. Features: contains valuable contributions from an international selection of leading experts in the field; presents a high-level introduction to the aims and motivations underpinning distributed sensing; describes decision-making algorithms in the presence of complex sensor networks; provides a detailed analysis of the design, implementation, and development of a distributed network of homogeneous or heterogeneous sensors; reviews the application of distributed sensing to human behavior understanding and autonomous intelligent vehicles; includes a helpful glossary and a list of acronyms.

Trust Management VI - 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012, Proceedings... Trust Management VI - 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012, Proceedings (Hardcover, 2012 ed.)
Theo Dimitrakos, Rajat Moona, Dhiren, Patel, D. Harrison McKnight
R1,436 Discovery Miles 14 360 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 6th IFIP WG 11.11 International Conference, IFIPTM 2012, held in Surat, India, in May 2012. The 12 revised full papers presented together with 8 short papers and the abstracts of 4 keynote talks were carefully reviewed and selected from 51 submissions. Building on the traditions inherited from the iTrust and previous IFIPTM conferences, IFIPTM 2012 is a multi-disciplinary conference focusing on areas such as: trust models, social, economic and behavioural aspects of trust, trust in networks, mobile systems and cloud computation, privacy, reputation systems, and identity management.

Governance and Sustainability in Information Systems. Managing the Transfer and Diffusion of IT - IFIP WG 8.6 International... Governance and Sustainability in Information Systems. Managing the Transfer and Diffusion of IT - IFIP WG 8.6 International Working Conference, Hamburg, Germany, September 22-24, 2011, Proceedings (Hardcover)
Markus Nuttgens, Andreas Gadatsch, Karlheinz Kautz, Ingrid Schirmer, Nadine Blinn
R2,705 Discovery Miles 27 050 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the IFIP WG 8.6 International Working Conference on Governance and Sustainability in Information Systems, held in Hamburg, Germany, in September 2011. The 14 revised full papers and 16 research in progress and practice papers presented were carefully reviewed and selected from 47 submissions. The full research papers are organized in the following topical sections:governance, sustainability, design themes, customer and user integration, and future subjects.

Proceedings of the 3rd European Conference on Computer Network Defense (Hardcover, 2009 ed.): Vasilios Siris, Sotiris... Proceedings of the 3rd European Conference on Computer Network Defense (Hardcover, 2009 ed.)
Vasilios Siris, Sotiris Ioannidis, Kostas Anagnostakis, Panagiotis Trimintzios
R4,011 Discovery Miles 40 110 Ships in 18 - 22 working days

The European Conference on Computer and Network Defense draws contributions and participation both from academia and industry, and addresses security from multiple perspectives, including state-of-the-art research in computer network security, intrusion detection, denial-of-service, privacy protection, security policies, and incident response & management. The conference is organized jointly by the Institute of Computer Science of the Foundation for Research and Technology - Hellas (FORTH) and the European Network and Information Security Agency (ENISA).

Business Process Technology - A Unified View on Business Processes, Workflows and Enterprise Applications (Hardcover, 2010... Business Process Technology - A Unified View on Business Processes, Workflows and Enterprise Applications (Hardcover, 2010 ed.)
Colin Atkinson; Dirk Draheim
R1,579 Discovery Miles 15 790 Ships in 18 - 22 working days

Currently, we see a variety of tools and techniques for specifying and implementing business processes. The problem is that there are still gaps and tensions between the different disciplines needed to improve business process execution and improvement in enterprises. Business process modeling, workflow execution and application programming are examples of disciplines that are hosted by different communities and that emerged separately from each other. In particular, concepts have not yet been fully elaborated at the system analysis level. Therefore, practitioners are faced again and again with similar questions in concrete business process projects: Which decomposition mechanism to use? How to find the correct granularity for business process activities? Which implementing technology is the optimal one in a given situation? This work offers an approach to the systematization of the field. The methodology used is explicitly not a comparative analysis of existing tools and techniques - although a review of existing tools is an essential basis for the considerations in the book. Rather, the book tries to provide a landscape of rationales and concepts in business processes with a discussion of alternatives.

MIMO Communication for Cellular Networks (Hardcover, 2012): Howard Huang, Constantinos B. Papadias, Sivarama Venkatesan MIMO Communication for Cellular Networks (Hardcover, 2012)
Howard Huang, Constantinos B. Papadias, Sivarama Venkatesan
R2,691 Discovery Miles 26 910 Ships in 18 - 22 working days

Multiple antenna (MIMO) techniques are an essential component of any contemporary wireless communication system because they can significantly improve the performance over conventional single-antenna links. While MIMO techniques are relatively well understood at the link level, the interaction of multiple MIMO links and their impact on performance at the system level necessitate fundamentally new investigations. We propose a book that investigates the theoretical foundations of MIMO networks consisting of multiple simultaneous MIMO links and applies these principles in the design of next-generation wireless networks.

About ten years ago, the information theoretic foundations of MIMO techniques were developed and showed the promise of using multiple antennas at both the transmitter and receiver of a wireless link. An enormous amount of research ensued to develop practical techniques for achieving these promised gains. Within the last few years, the information theory community has again made significant breakthroughs, this time in the understanding of multiuser MIMO systems. Currently in industry, new wideband wireless standards, including EV-DO Rev C, UMTS LTE, and WiMax, are under development to meet the insatiable demands for high-rate, ubiquitous wireless services. For the first time, and for all of these standards, MIMO technology will play an integral role in meeting the aggressive performance requirements for increased data rates, decreased latency, and improved coverage.

Motivated by the confluence of these two eventsa "the emergence of multiuser MIMO theory and the development of commercial MIMO-based systemsa "we propose to connect the two worlds with a bookthat combines theory and practice. This book would provide a systematic survey of MIMO systems, starting with a review of MIMO link-level techniques and conventional single-antenna system-level techniques, summarizing the latest results in multiuser MIMO systems and developments in cross-layer techniques, and applying these techniques to the analysis and design of both current and future packet-based wireless networks. In addition to providing theoretical results, the book would serve as a reference for practicing communication engineers by providing useful descriptions of spatial channel models and system simulation methodologies for MIMO networks

Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats (Hardcover, 2011 ed.): Sushil Jajodia, Anup K. Ghosh,... Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats (Hardcover, 2011 ed.)
Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, X.Sean Wang
R3,433 Discovery Miles 34 330 Ships in 18 - 22 working days

"Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats" was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instruction set and address space layout randomization, just-in-time compilers, among other techniques. However, many challenging research problems remain to be solved, such as the security of virtualization infrastructures, secure and resilient techniques to move systems within a virtualized environment, automatic diversification techniques, automated ways to dynamically change and manage the configurations of systems and networks, quantification of security improvement, potential degradation and more.

"Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats" is designed for advanced -level students and researchers focused on computer science, and as a secondary text book or reference. Professionals working in this field will also find this book valuable.

Hard Real-Time Computing Systems - Predictable Scheduling Algorithms and Applications (Hardcover, 3rd ed. 2011): Giorgio C... Hard Real-Time Computing Systems - Predictable Scheduling Algorithms and Applications (Hardcover, 3rd ed. 2011)
Giorgio C Buttazzo
R3,199 Discovery Miles 31 990 Ships in 18 - 22 working days

This updated edition offers an indispensable exposition on real-time computing, with particular emphasis on predictable scheduling algorithms. It introduces the fundamental concepts of real-time computing, demonstrates the most significant results in the field, and provides the essential methodologies for designing predictable computing systems used to support time-critical control applications. Along with an in-depth guide to the available approaches for the implementation and analysis of real-time applications, this revised edition contains a close examination of recent developments in real-time systems, including limited preemptive scheduling, resource reservation techniques, overload handling algorithms, and adaptive scheduling techniques. This volume serves as a fundamental advanced-level textbook. Each chapter provides basic concepts, which are followed by algorithms, illustrated with concrete examples, figures and tables. Exercises and solutions are provided to enhance self-study, making this an excellent reference for those interested in real-time computing for designing and/or developing predictable control applications.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Distance Learning and University…
Hardcover R2,027 Discovery Miles 20 270
Usability Evaluation of Online Learning…
Hardcover R2,049 Discovery Miles 20 490
Towards the Virtual University…
Nicolae Nistor, Susan English, … Hardcover R2,822 Discovery Miles 28 220
Instructional and Cognitive Impacts of…
Beverly Abbey Paperback R1,723 Discovery Miles 17 230
Pedagogical Considerations and…
Michael Thomas Hardcover R4,457 Discovery Miles 44 570
Exploring the Theory, Pedagogy and…
Lone Dirckinck-Holmfeld, Vivien Hodgson, … Hardcover R2,694 Discovery Miles 26 940
Teaching Information Literacy for…
Mark Hepworth, Geoff Walton Paperback R1,640 Discovery Miles 16 400
Cases on Practical Applications for…
Valerie Harlow Shinas, Chu N. Ly, … Hardcover R5,333 Discovery Miles 53 330
Methods and Applications for Advancing…
Mahbubur Rahman Syed Hardcover R4,974 Discovery Miles 49 740
e-Learning and Social Networking…
Frank Rennie, Tara Morrison Paperback R1,231 Discovery Miles 12 310

 

Partners