![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > Network computers
This SpringerBrief provides state-of-the-art technical reviews on self-organizing and optimization in 5G systems. It covers the latest research results from physical-layer channel modeling to software defined network (SDN) architecture. This book focuses on the cutting-edge wireless technologies such as heterogeneous networks (HetNets), self-organizing network (SON), smart low power node (LPN), 3D-MIMO, and more. It will help researchers from both the academic and industrial worlds to better understand the technical momentum of 5G key technologies.
This book provides a comprehensive overview of the key concerns as well as research challenges in designing secure and resilient Industrial Control Systems (ICS). It will discuss today's state of the art security architectures and couple it with near and long term research needs that compare to the baseline. It will also establish all discussions to generic reference architecture for ICS that reflects and protects high consequence scenarios. Significant strides have been made in making industrial control systems secure. However, increasing connectivity of ICS systems with commodity IT devices and significant human interaction of ICS systems during its operation regularly introduces newer threats to these systems resulting in ICS security defenses always playing catch-up. There is an emerging consensus that it is very important for ICS missions to survive cyber-attacks as well as failures and continue to maintain a certain level and quality of service. Such resilient ICS design requires one to be proactive in understanding and reasoning about evolving threats to ICS components, their potential effects on the ICS mission's survivability goals, and identify ways to design secure resilient ICS systems. This book targets primarily educators and researchers working in the area of ICS and Supervisory Control And Data Acquisition (SCADA) systems security and resiliency. Practitioners responsible for security deployment, management and governance in ICS and SCADA systems would also find this book useful. Graduate students will find this book to be a good starting point for research in this area and a reference source.
This book constitutes the thoroughly refereed post conference proceedings of the 5th International Conference on Cloud Computing, CloudComp 2014, held in Guilin, China, in October 2014. The 25 revised full papers were carefully reviewed and selected from 72 submissions and cover topics such as mobile cloud computing, services, applications, IoT on cloud, architectures and big data, cloud-assisted pervasive computing and services, management and virtualization for cloud, cloud security.
This book constitutes the thoroughly refereed proceedings of the 23rd International Conference on Computer Networks, CN 2016, held in Brunow, Poland, in June 2016. The 32 full papers and the 4 short papers presented were carefully reviewed and selected from 72 submissions. They are organized in topical sections on computer networks architectures and protocols, teleinformatics and telecommunications, new technologies, queueing theory, and innovative applications.
This book constitutes the thoroughly refereed conference proceedings of the 11th International Conference on Cognitive Radio Oriented Wireless Networks, CROWNCOM 2016, held in Grenoble, France, May 30 - April 1, 2016. The 62 revised full papers presented were carefully reviewed and selected from numerous submissions and cover the evolution of cognitive radio technology pertaining to 5G networks. The papers are clustered to topics on dynamic spectrum access/management, networking protocols for CR, modeling and theory, HW architecture and implementations, next generation of cognitive networks, standards and business models, emerging applications for cognitive networks.
This book constitutes the refereed proceedings of the 7th International Symposium on Intelligence Computation and Applications, ISICA 2015, held in Guangzhou, China, in November 2015. The 77 revised full papers presented were carefully reviewed and selected from 189 submissions. The papers feature the most up-to-date research in analysis and theory of evolutionary computation, neural network architectures and learning; neuro-dynamics and neuro-engineering; fuzzy logic and control; collective intelligence and hybrid systems; deep learning; knowledge discovery; learning and reasoning.
This book offers a thorough yet easy-to-read reference guide to various aspects of cloud computing security. It begins with an introduction to the general concepts of cloud computing, followed by a discussion of security aspects that examines how cloud security differs from conventional information security and reviews cloud-specific classes of threats and attacks. A range of varying threats in cloud computing are covered, from threats of data loss and data breaches, to threats to availability and threats posed by malicious insiders. Further, the book discusses attacks launched on different levels, including attacks on the hypervisor, and on the confidentiality of data. Newer types, such as side-channel attacks and resource-freeing attacks, are also described. The work closes by providing a set of general security recommendations for the cloud.
This book constitutes the post-proceedings of the 6th International ICST Conference on Mobile Networks and Management, MONAMI 2014, held in Wurzburg, Germany, in September 2014. The 22 revised full papers presented were carefully reviewed and selected from 30 submissions. In addition, MONAMI 2014 hosted a workshop on enhanced living environments which also featured 10 papers. The volume is organized thematically in six parts, covering: LTE networks, virtualization and software defined networking, self-organizing networks, energy awareness in wireless networks, wireless networks algorithms and techniques and applications and context-awareness. The workshop on enhanced living environments is organized in thematic sessions on ambient assisted living architectures, human interaction technologies, devises and mobile cloud.
This SpringerBrief focuses on crucial issues for device-to-device (D2D) communications within the rapidly expanding 4G LTE toward 5G system. Several critical technical challenges in D2D communications are discussed, and D2D standardization activities in 3GPP are provided. Topics range from proximity discovery and mode selection, to resource management. The authors investigate proximity detection solutions for enabling direct user equipment communication by listening to uplink transmission. The problem of mixed mode selection is demonstrated to meet multiple quality of service (QoS) requirements in D2D enabled cellular networks. Finally, the brief explores the problem of designing interference-constrained resource allocation to pair cellular user resources with potential D2D links in cellular D2D underlay, with the goal of improving spectrum efficiency. Device-to-Device Communications in Cellular Networks targets researchers and professionals working in wireless communications and networks. Advanced-level students in electrical engineering and computer science studying wireless communications and networks can also use this material as a study guide.
This book constitutes the proceedings of the 6th International Conference on Cloud Computing, CloudComp 2015, held in Daejeon, South Korea, in October 2015. The 36 revised full papers were carefully reviewed and selected from 89 submissions and cover topics such as virtualization and management on cloud; resource management, models and performance; mobile cloud and media services; pervasive cloud applications, services and testbeds; cloud-enabling techniques and devices.
This book discusses the characteristics of virtualized cloud networking, identifies the requirements of cloud network management, and illustrates the challenges in deploying virtual clusters in multi-tenant cloud data centers. The book also introduces network partitioning techniques to provide contention-free allocation, topology-invariant reallocation, and highly efficient resource utilization, based on the Fat-tree network structure. Managing cloud data center resources without considering resource contentions among different cloud services and dynamic resource demands adversely affects the performance of cloud services and reduces the resource utilization of cloud data centers. These challenges are mainly due to strict cluster topology requirements, resource contentions between uncooperative cloud services, and spatial/temporal data center resource fragmentation. Cloud data center network resource allocation/reallocation which cope well with such challenges will allow cloud services to be provisioned with predictable network performance, mitigate service performance degradation and even guarantee service level agreements. Virtualized Cloud Data Center Networks: Issues in Resource Management tackles the challenges of managing cloud data center networks and introduces techniques to efficiently deploy large-scale distributed computing applications that require predictable performance in multi-tenant cloud data centers.
This brief focuses on the use of full-duplex radio in cognitive radio networks, presenting a novel spectrum sharing protocol that allows the secondary users to simultaneously sense and access the vacant spectrum. This protocol, called "Listen-and-talk" (LAT), is evaluated by both mathematical analysis and computer simulations in comparison with other existing protocols, including the listen-before-talk protocol. In addition to LAT-based signal processing and resource allocation, the brief discusses techniques such as spectrum sensing and dynamic spectrum access. The brief proposes LAT as a suitable access scheme for cognitive radio networks, which can support the quality-of-service requirements of these high priority applications. Fundamental theories and key techniques of cognitive radio networks are also covered. Listen and Talk: Full-duplex Cognitive Radio Networks is designed for researchers, developers, and professionals involved in cognitive radio networks. Advanced-level students studying signal processing or simulations will also find the content helpful since it moves beyond traditional cognitive radio networks into future applications for the technology.
Quality-of-Service (QoS) is normally used to describe the non-functional characteristics of Web services and as a criterion for evaluating different Web services. QoS Management of Web Services presents a new distributed QoS evaluation framework for these services. Moreover, three QoS prediction methods and two methods for creating fault-tolerant Web services are also proposed in this book. It not only provides the latest research results, but also presents an excellent overview of QoS management of Web sciences, making it a valuable resource for researchers and graduate students in service computing. Zibin Zheng is an associate research fellow at the Shenzhen Research Institute, The Chinese University of Hong Kong, China. Professor Michael R. Lyu also works at the same institute.
This brief explores two of the main challenges of spatial network data analysis: the many connected components in the spatial network and the many candidates that have to be processed. Within this book, these challenges are conceptualized, well-defined problems are explored, and critical techniques are discussed.The process of summarizing spatial network data entails finding a compact description or representation of observations or activities on large spatial or spatiotemporal networks. However, summarizing spatial network data can be computationally challenging for various reasons, depending on the domain. The content has applications for professionals, organizations, and researchers in transportation safety, public safety, public health, disaster response, and related fields.
This volume contains revised and extended research articles written by prominent researchers participating in the conference. Topics covered include engineering physics, communications systems, control theory, automation, engineering mathematics, scientific computing, industrial engineering, and industrial applications. IAENG Transactions on Engineering Technologies: Special Issue of the International MultiConference of Engineers and Computer Scientists 2012 offers the state of art of tremendous advances in engineering technologies and physical science and applications, and also serves as an excellent reference work for researchers and graduate students working with/on engineering technologies and physical science and applications.
This brief presents a stochastic microscopic mobility model that describes the temporal changes of intervehicle distances. The model is consistent with simulated and empirical vehicle traffic patterns. Using stochastic lumpability methods, the proposed mobility model is mapped into an aggregated mobility model that describes the mobility of a group of vehicles. In addition, the proposed mobility model is used to analyze the spatiotemporal VANET topology. Two metrics are proposed to characterize the impact of vehicle mobility on VANET topology: the time period between successive changes in communication link state (connection and disconnection) and the time period between successive changes in node's one-hop neighborhood. Using the proposed lumped group mobility model, the two VANET topology metrics are probabilistically characterized for different vehicular traffic flow conditions. Furthermore, the limiting behavior of a system of two-hop vehicles and the overlap-state of their coverage ranges is modeled, and the steady-state number of common vehicle neighbors between the two vehicles is approximately derived. The proposed mobility model will facilitate mathematical analysis in VANETs. The spatiotemporal VANET topology analysis provides a useful tool for the development of mobility-aware vehicular network protocols. Mobility Modeling for Vehicular Communication Networks is designed for researchers, developers, and professionals involved with vehicular communications. It is also suitable for advanced-level students interested in communications, transport infrastructure, and infotainment applications.
This SpringerBrief provides essential insights on the SDN application designing and deployment in distributed datacenters. In this book, three key problems are discussed: SDN application designing, SDN deployment and SDN management. This book demonstrates how to design the SDN-based request allocation application in distributed datacenters. It also presents solutions for SDN controller placement to deploy SDN in distributed datacenters. Finally, an SDN management system is proposed to guarantee the performance of datacenter networks which are covered and controlled by many heterogeneous controllers. Researchers and practitioners alike will find this book a valuable resource for further study on Software Defined Networking.
This SpringerBrief presents recent advances in the cognitive MAC designs for opportunistic spectrum access (OSA) networks. It covers the basic MAC functionalities and MAC enhancements of IEEE 802.11. Later chapters discuss the existing MAC protocols for OSA and classify them based on characteristic features. The authors provide new research in adaptive carrier sensing-based MAC designs tailored for OSA, which optimize spectrum utilization and ensure a peaceful coexistence of licensed and unlicensed systems. Analytically devised via optimization and game-theoretic approaches, these adaptive MAC designs are shown to effectively reduce collisions between both primary and secondary network users. Researchers and professionals working in wireless communications and networks will find this content valuable. This brief is also a useful study guide for advanced-level students in computer science and electrical engineering.
This book introduces Radio Frequency Channel Coding to a broad audience. The author blends theory and practice to bring readers up-to-date in key concepts, underlying principles and practical applications of wireless communications. The presentation is designed to be easily accessible, minimizing mathematics and maximizing visuals.
These transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as the semantic Web, social networks, and multi-agent systems. TCCI strives to cover new methodological, theoretical and practical aspects of CCI understood as the form of intelligence that emerges from the collaboration and competition of many individuals (artificial and/or natural). The application of multiple computational intelligence technologies, such as fuzzy systems, evolutionary computation, neural systems, consensus theory, etc., aims to support human and other collective intelligence and to create new forms of CCI in natural and/or artificial systems. This twenty-second issue contains 11 carefully selected and revised contributions.
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Cognitive Radio Oriented Wireless Networks, CROWNCOM 2015, held in Doha, Qatar, in April 2015. The 66 revised full papers presented were carefully reviewed and selected from 110 submissions and cover the evolution of cognitive radio technology pertaining to 5G networks. The papers are clustered to topics on dynamic spectrum access/management, networking protocols for CR, modeling and theory, HW architecture and implementations, next generation of cognitive networks, standards and business models, and emerging applications for cognitive networks.
The field of structured P2P systems has seen fast growth upon the introduction of Distributed Hash Tables (DHTs) in the early 2000s. The first proposals, including Chord, Pastry, Tapestry, were gradually improved to cope with scalability, locality and security issues. By utilizing the processing and bandwidth resources of end users, the P2P approach enables high performance of data distribution which is hard to achieve with traditional client-server architectures. The P2P computing community is also being actively utilized for software updates to the Internet, P2PSIP VoIP, video-on-demand, and distributed backups. The recent introduction of the identifier-locator split proposal for future Internet architectures poses another important application for DHTs, namely mapping between host permanent identity and changing IP address. The growing complexity and scale of modern P2P systems requires the introduction of hierarchy and intelligence in routing of requests. Structured Peer-to-Peer Systems covers fundamental issues in organization, optimization, and tradeoffs of present large-scale structured P2P systems, as well as, provides principles, analytical models, and simulation methods applicable in designing future systems. Part I presents the state-of-the-art of structured P2P systems, popular DHT topologies and protocols, and the design challenges for efficient P2P network topology organization, routing, scalability, and security. Part II shows that local strategies with limited knowledge per peer provide the highest scalability level subject to reasonable performance and security constraints. Although the strategies are local, their efficiency is due to elements of hierarchical organization, which appear in many DHT designs that traditionally are considered as flat ones. Part III describes methods to gradually enhance the local view limit when a peer is capable to operate with larger knowledge, still partial, about the entire system. These methods were formed in the evolution of hierarchical organization from flat DHT networks to hierarchical DHT architectures, look-ahead routing, and topology-aware ranking. Part IV highlights some known P2P-based experimental systems and commercial applications in the modern Internet. The discussion clarifies the importance of P2P technology for building present and future Internet systems.
This book constitutes the refereed proceedings of the 13th National Conference on Embedded System Technology, ESTC 2015, held in Beijing, China, in October 2015. The 18 revised full papers presented were carefully reviewed and selected from 63 papers. The topics cover a broad range of fields focusing on research about embedded system technologies, such as smart hardware, system and network, applications and algorithm.
This book constitutes the thoroughly refereed papers of the 8th Chinese Conference on The Semantic Web and Web Science, CSWS 2014, held in Wuhan, China, in August 2014. The 22 research papers presented were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections such as ontology reasoning and learning; semantic data generation and management; and semantic technology and applications.
This brief covers the emerging area of wireless sensor network (WSN)-based structural health monitoring (SHM) systems, and introduces the authors' WSN-based platform called SenetSHM. It helps the reader differentiate specific requirements of SHM applications from other traditional WSN applications, and demonstrates how these requirements are addressed by using a series of systematic approaches. The brief serves as a practical guide, explaining both the state-of-the-art technologies in domain-specific applications of WSNs, as well as the methodologies used to address the specific requirements for a WSN application. In particular, the brief offers instruction for problem formulation and problem solving based on the authors' own experiences implementing SenetSHM. Seven concise chapters cover the development of hardware and software design of SenetSHM, as well as in-field experiments conducted while testing the platform. The brief's exploration of the SenetSHM platform is a valuable feature for civil engineers designing their own similar SHM products, and the various concrete examples of problem formulation and algorithm design will make this an essential read for practitioners, researchers and students alike. |
You may like...
Teaching Statistics - A Bag of Tricks
Andrew Gelman, Deborah Nolan
Hardcover
R3,117
Discovery Miles 31 170
Statistics for Management and Economics
Gerald Keller, Nicoleta Gaciu
Paperback
Antiviral Methods and Protocols
Derek Kinchington, Raymond F. Schinazi
Hardcover
R2,729
Discovery Miles 27 290
Novel Therapeutic Agents for the…
Vibeke Strand, David L. Scot, …
Hardcover
R7,192
Discovery Miles 71 920
Safety and Practice for Organic Food
Debabrata Biswas, Shirley A. Micallef
Paperback
R4,013
Discovery Miles 40 130
International Symposium: Retroviruses…
Robert C. Gallo, Dominique Stehelin, …
Hardcover
R5,470
Discovery Miles 54 700
|