![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > Network computers
This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Industrial IoT Technologies and Applications, IoT 2016, held in GuangZhou, China, in March 2016. The volume contains 26 papers carefully reviewed and selected from 55 submissions focusing on topics such as big data, cloud computing, Internet of Things (IoT).
This book constitutes the refereed proceedings of the First International EAI Conference on Emerging Technologies for Developing Countries, AFRICATEK 2017, held in Marrakech, Morocco, in March 2017. The 15 full papers, 5 short papers, 2 invited papers and one poster paper were selected from 41 submissions. The papers are organized thematically in tracks, starting with wireless sensor networks (WSNs), vehicular area networks (VANs) and mobile networks; IoT and cloud computing; big data, data analytics, and knowledge management; processing big data over diverse clouds; Web services and software engineering; security.
This, the 29th issue of the Transactions on Computational Science journal, is comprised of seven full papers focusing on the area of secure communication. Topics covered include weak radio signals, efficient circuits, multiple antenna sensing techniques, modes of inter-computer communication and fault types, geometric meshes, and big data processing in distributed environments.
This book presents an application-centric approach to the development of smart grid communication architecture. The coverage includes in-depth reviews of such cutting-edge applications as advanced metering infrastructure, distribution automation, demand response and synchrophasors. Features: examines a range of exciting utility applications made possible through smart grid evolution; describes the core-edge network architecture for smart grids, introducing the concept of WANs and FANs; explains how the network design paradigm for smart grids differs from that for more established data networks, and discusses network security in smart grids; provides an overview of communication network technologies for WANs and FANs, covering OPGW, PLC, and LTE and MPLS technology; investigates secure data-centric data management and data analytics for smart grids; discusses the transformation of a network from conventional modes of utility operation to an integrated network based on the smart grid architecture framework.
A major, comprehensive professional text/reference for designing and maintaining security and reliability. From basic concepts to designing principles to deployment, all critical concepts and phases are clearly explained and presented. Includes coverage of wireless security testing techniques and prevention techniques for intrusion (attacks). An essential resource for wireless network administrators and developers.
This brief explores the utilization of large antenna arrays in massive multiple-input-multiple-output (MIMO) for both interference suppression, where it can improve cell-edge user rates, and for wireless backhaul in small cell networks, where macro base stations can forward data to small access points in an energy efficient way. Massive MIMO is deemed as a critical technology for next generation wireless technology. By deploying an antenna array that has active elements in excess of the number of users, massive MIMO not only provides tremendous diversity gain but also powers new aspects for network design to improve performance. This brief investigates a better utilization of the excessive spatial dimensions to improve network performance. It combines random matrix theory and stochastic geometry to develop an analytical framework that accounts for all the key features of a network, including number of antenna array, base station density, inter-cell interference, random base station deployment, and network traffic load. The authors explore the impact from different network parameters through numerical analysis.Researchers in wireless network design will find this to be an exceptional resource, as will advanced-level students or professionals working in networking and information systems design.
This volume constitutes the thoroughly refereed post-conference proceedings of the First EAI International Summit, Smart City 360 Degrees, held in Bratislava, Slovakia and Toronto, ON, Canada, in October 2015. The 77 carefully reviewed papers include eight conferences: The Bratislava program covered the Conference on Sustainable Solutions beyond Mobility of Goods (SustainableMoG 2015), the MOBIDANUBE conference which strengthens research in the field of mobility opportunities and within Danube strategy, and the conference on Social Innovation and Community Aspects of Smart Cities (SmartCityCom 2015). In parallel the SmartCity360 Toronto included five conferences addressing urban mobility (SUMS), sustainable cities (S2CT), smart grids SGSC), wearable devices for health and wellbeing SWIT Health), and big data (BigDASC).
This book investigates the problem of reducing operating cost for a video streaming content delivery network (CDN), including both the CDN's energy and traffic costs. It first introduces the key issues and design choices of representative real-world CDNs, and discusses the energy saving techniques for data centers and CDNs. Then, based on a measurement study on a large video streaming CDN, it reveals an inherent conflict between improving a video streaming CDN's energy efficiency for energy saving, and maintaining the CDN's ISP-friendly server selection policy. Further, it discusses a cost-aware capacity provisioning algorithm that not only allows the service capacity of a CDN's server clusters in numerous ISPs to be dynamically planned, but also means that the overall operating cost, including both the energy consumptions and the cross-ISP traffics, can be further optimized. In addition it uses the workload derived from real-world measurement and also implements real values of the actual power and bandwidth prices to evaluate the capacity provisioning algorithm, showing that it can significantly reduce the overall operating cost of a video streaming CDN, and effectively avoid frequent server switches. Lastly, the book outlines a number of potential research directions regarding cost-aware content delivery. The measurement, analysis, and optimization methodologies and results presented in this book are of particular interest to researchers in the Internet and networking area.
In response to the need to improve road traffic operation, researchers implement advanced technologies and integration of systems and data, and develop state-of-the-art applications to assist traffic engineers. This SpringerBrief introduces three novel Web applications which can be an exceptional resource and a good visualization tool for traffic operators, managers, and analysts to monitor the congestion, and analyze incidents and signal performance measures. The applications offer more detailed analysis providing users with insights from different levels and perspectives. The benefit of providing these automated and interactive visualization tools is more efficient estimation of the local transport networks' performance, thus facilitating the decision making process in case of emergency events.
This SpringerBrief provides state-of-the-art technical reviews on self-organizing and optimization in 5G systems. It covers the latest research results from physical-layer channel modeling to software defined network (SDN) architecture. This book focuses on the cutting-edge wireless technologies such as heterogeneous networks (HetNets), self-organizing network (SON), smart low power node (LPN), 3D-MIMO, and more. It will help researchers from both the academic and industrial worlds to better understand the technical momentum of 5G key technologies.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Industrial IoT Technologies and Applications, IoT 2017, held in Wuhu, China, in March 2017. The volume contains 25 papers carefully reviewed and selected from 41 submissions focusing on topics such as big data, cloud computing, Internet of things, areas of control, mobile computing, and security.
This book constitutes the post-conference proceedings of the Second EAI International Conference on Smart Grid Inspired Future Technologies, SmartGIFT 2017, held in London, UK, in March 2017. The revised full papers are presented in four tracks: Track 1 - Communications, Networks and Architectures; Track 2 - Smart Control and Operation; Track 3 - Grid and Components; and Track 4 - Data Management and Grid Analytics. Aside from the technical paper presentations, the book also contains five invited talks and two technical workshops. The two workshops organized were: the Improving the Robustness of Urban Electricity Network (IRENE) and Wireless Communications and Networking Technologies for Connected Smart Grids (WCSG). The IRENE workshop aimed to address the new dimension of threats in the critical infrastructures through demonstration of IRENE methodologies and approaches. The WCSG workshop aimed to gain insights into key challenges, understanding and design criteria of employing wireless technologies to develop and implement future smart grids related services and applications.
This book offers a thorough yet easy-to-read reference guide to various aspects of cloud computing security. It begins with an introduction to the general concepts of cloud computing, followed by a discussion of security aspects that examines how cloud security differs from conventional information security and reviews cloud-specific classes of threats and attacks. A range of varying threats in cloud computing are covered, from threats of data loss and data breaches, to threats to availability and threats posed by malicious insiders. Further, the book discusses attacks launched on different levels, including attacks on the hypervisor, and on the confidentiality of data. Newer types, such as side-channel attacks and resource-freeing attacks, are also described. The work closes by providing a set of general security recommendations for the cloud.
This book constitutes the thoroughly refereed proceedings of the 23rd International Conference on Computer Networks, CN 2016, held in Brunow, Poland, in June 2016. The 32 full papers and the 4 short papers presented were carefully reviewed and selected from 72 submissions. They are organized in topical sections on computer networks architectures and protocols, teleinformatics and telecommunications, new technologies, queueing theory, and innovative applications.
This book constitutes the thoroughly refereed conference proceedings of the 11th International Conference on Cognitive Radio Oriented Wireless Networks, CROWNCOM 2016, held in Grenoble, France, May 30 - April 1, 2016. The 62 revised full papers presented were carefully reviewed and selected from numerous submissions and cover the evolution of cognitive radio technology pertaining to 5G networks. The papers are clustered to topics on dynamic spectrum access/management, networking protocols for CR, modeling and theory, HW architecture and implementations, next generation of cognitive networks, standards and business models, emerging applications for cognitive networks.
This book constitutes the refereed proceedings of the Third International Conference on Future Network Systems and Security, FNSS 2017, held in Gainesville, FL, USA, during August/September 2017. The 15 full papers presented were carefully reviewed and selected from 42 submissions. The papers are organized in topical sections on protocol design and secure implementation, security protocols and attack countermeasures, big data and future applications.
This is the first book to introduce UUDN for 5G, including the concept, challenges, architecture and key technologies. The new network architecture based on "de-cellular" and "user-centric" is proposed with three kinds of decoupling: user plane and control plane decoupling from radio access, control and transmission decoupling from network, local service and network service decoupling. Key characteristics of UUDN are provided, including four aspects: Intelligent network knows user, Moving network follows user, Dynamic network serves user, and Secured network protects user. Four promising technology directions are discussed in detail, including dynamic APs grouping (DAPGing) method, intelligent networking, advanced interference management and user-centric security. The authors also include a UUDN solution, illustrated with numerology and evaluation results as a practical example. Finally, further research directions of UUDN are analyzed. This book gives an overall introduction of UUDN for people who are interested and just begin their study, as well as some suggestions on further research for experts involved in academic, industrial and standardization activities on relative fields.
This SpringerBrief presents the design and performance evaluation of communication protocols based on dissimilarity metrics for wireless multihop networks. Dissimilarity metrics are used to infer the network topology based solely on local information to efficiently disseminate packets throughout the network, reducing both redundancy and congestion which is covered in this brief. The performance evaluation of the proposed communication protocols has been conducted by both meticulous simulation and real experimentation in a wireless multi-hop testbed. The obtained results in this brief corroborate the hypothesis regarding the validity of dissimilarity metrics, which can be used to design efficient communication protocols. This SpringerBrief is a good starting point for advanced-level students studying computer science and electrical engineering, as well as researchers and professionals working in this field.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th EAI International Conference on Sensor Systems and Software, S-Cube 2016, held in Sophia Antipolis, Nice, France, in December 2016. The 15 revised full papers and 5 invited papers cover technologies for wireless sensor networks, smart city and industry 4.0 applications, and smart sensing.
This book constitutes the proceedings of the 6th International Conference on Cloud Computing, CloudComp 2015, held in Daejeon, South Korea, in October 2015. The 36 revised full papers were carefully reviewed and selected from 89 submissions and cover topics such as virtualization and management on cloud; resource management, models and performance; mobile cloud and media services; pervasive cloud applications, services and testbeds; cloud-enabling techniques and devices.
The objective of this SpringerBrief is to present security architectures and incentive mechanisms to realize system availability for D2D communications. D2D communications enable devices to communicate directly, improving resource utilization, enhancing user's throughput, extending battery lifetime, etc. However, due to the open nature of D2D communications, there are two substantial technical challenges when applied to large-scale applications, that is, security and availability which is demonstrated in this book. This SpringerBrief proposes a secure data sharing protocol, which merges the advantages of public key cryptography and symmetric encryption, to achieve data security in D2D communications. Furthermore, a joint framework involving both the physical and application layer security technologies is proposed for multimedia service over D2D communications thus the scalable security service can be achieved without changing the current communication framework. Additionally, as the system availability largely depends on the cooperation degree of the users, a graph-theory based cooperative content dissemination scheme is proposed to achieve maximal Quality of Experience (QoE) with fairness and efficiency. This SpringerBrief will be a valuable resource for advanced-level students and researchers who want to learn more about cellular networks.
This book discusses the characteristics of virtualized cloud networking, identifies the requirements of cloud network management, and illustrates the challenges in deploying virtual clusters in multi-tenant cloud data centers. The book also introduces network partitioning techniques to provide contention-free allocation, topology-invariant reallocation, and highly efficient resource utilization, based on the Fat-tree network structure. Managing cloud data center resources without considering resource contentions among different cloud services and dynamic resource demands adversely affects the performance of cloud services and reduces the resource utilization of cloud data centers. These challenges are mainly due to strict cluster topology requirements, resource contentions between uncooperative cloud services, and spatial/temporal data center resource fragmentation. Cloud data center network resource allocation/reallocation which cope well with such challenges will allow cloud services to be provisioned with predictable network performance, mitigate service performance degradation and even guarantee service level agreements. Virtualized Cloud Data Center Networks: Issues in Resource Management tackles the challenges of managing cloud data center networks and introduces techniques to efficiently deploy large-scale distributed computing applications that require predictable performance in multi-tenant cloud data centers.
This volume contains the technical papers presented in the seven high-quality workshops associated with the European Conference on Service-Oriented and Cloud Computing, ESOCC 2015, held in Taormina, Italy, in September 2015: Third International Workshop on Cloud for IoT (CLloT 2015), 5th International Workshop on Adaptive Services for the Future Internet (WAS4FI 2015), Second Workshop on Seamless Adaptive Multi-cloud Management of Service-Based Applications (SeaClouds 2015), First International Workshop on Cloud Adoption and Migration (CloudWay 2015), First International Workshop on Digital Enterprise Architecture and Engineering (IDEA 2015), First Workshop on Federated Cloud Networking (FedCloudNet 2015). Abstracts of the presentations held at the European Projects Forum (EU Projects 2015) are included in the back matter of this volume. The 25 full papers and 6 short papers were carefully reviewed and selected from 48 submissions. They focus on specific topics in service-oriented and cloud computing domains such as limits and /or advantages of existing cloud solutions, Future Internet technologies, efficient and adaptive deployment and management of service-based applications across multiple clouds, novel cloud service migration practices and solutions, digitization of enterprises in the cloud computing era, federated cloud networking services.
This book constitutes the refereed proceedings of the 6th International Workshop on Representations, Analysis and Recognition of Shape and Motion from Imaging Data, RFMI 2016, held in Sidi Bou Said Village, Tunisia, in October 2016. The 9 revised full papers and 7 revised short papers presented were carefully reviewed and selected from 23 submissions. The papers are organized in topical sections on 3D shape registration and comparison; face analysis and recognition; video and motion analysis; 2D shape analysis.
This book constitutes the refereed proceedings of the 6th International Conference on Supercomputing, ISUM 2015, held in Mexico, Mexico, in March 2015. The 38 revised full papers presented were carefully reviewed and selected from 102 submissions. The papers are organized in topical sections on perspectives in supercomputer infrastructure and applications; parallel algorithms and optimization; HPC applications and simulations; |
You may like...
Engineering Scalable, Elastic, and…
Steffen Becker, Gunnar Brataas, …
Hardcover
R2,017
Discovery Miles 20 170
Network Science - Complexity in Nature…
Ernesto Estrada, Maria Fox, …
Hardcover
R2,788
Discovery Miles 27 880
5G-Enabled Vehicular Communications and…
Xiang Cheng, Rongqing Zhang, …
Hardcover
R3,106
Discovery Miles 31 060
Handbook of Multimedia Information…
Amit Kumar Singh, Anand Mohan
Hardcover
R6,633
Discovery Miles 66 330
Private Cloud Computing - Consolidation…
Stephen R. Smoot, Nam K. Tan
Paperback
R1,225
Discovery Miles 12 250
Handbook of Computer Networks and Cyber…
Brij B. Gupta, Gregorio Martinez Perez, …
Hardcover
R7,167
Discovery Miles 71 670
|