![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet > Network computers
This book presents state-of-the-art research on robust resource allocation in current and future wireless networks. The authors describe the nominal resource allocation problems in wireless networks and explain why introducing robustness in such networks is desirable. Then, depending on the objectives of the problem, namely maximizing the social utility or the per-user utility, cooperative or competitive approaches are explained and their corresponding robust problems are considered in detail. For each approach, the costs and benefits of robust schemes are discussed and the algorithms for reducing their costs and improving their benefits are presented. Considering the fact that such problems are inherently non-convex and intractable, a taxonomy of different relaxation techniques is presented, and applications of such techniques are shown via several examples throughout the book. Finally, the authors argue that resource allocation continues to be an important issue in future wireless networks, and propose specific problems for future research.
The Internet of Things is causing major industry disruption, so companies need to plan and manage their "IoT journey" to maximize all business opportunities. In this book companies can learn how to successfully create, launch and manage Internet of Things services. It takes the reader through the process of specifying, implementing, and deploying IoT services; detailing how to scale and manage an IoT business. It introduces the fundamentals of IoT services, explaining IoT service building blocks and the key factors to be considered in the design of IoT services. Moving into the IoT field requires speed. This book provides a fast track approach to IoT; summarizing the global experiences of the author, detailing the discussions, mistakes, successes, learnings and conclusions. Building an Internet of Things Service enables readers to accelerate their own on-boarding in their IoT journey. What You'll Learn Create new IoT Services Review the basic IoT concepts and business implications you need to know as you embark on your IoT journey Solve the major challenges presented by the IoT disruption. Accelerate your own on-boarding in their IoT journey. Who This Book Is For The primary audience is made up of business executives and IoT startups. The secondary audience is students studying IoT in universities and those interested in understanding the fundamentals of an IoT business. No technical background is required.
Cloud service benchmarking can provide important, sometimes surprising insights into the quality of services and leads to a more quality-driven design and engineering of complex software architectures that use such services. Starting with a broad introduction to the field, this book guides readers step-by-step through the process of designing, implementing and executing a cloud service benchmark, as well as understanding and dealing with its results. It covers all aspects of cloud service benchmarking, i.e., both benchmarking the cloud and benchmarking in the cloud, at a basic level. The book is divided into five parts: Part I discusses what cloud benchmarking is, provides an overview of cloud services and their key properties, and describes the notion of a cloud system and cloud-service quality. It also addresses the benchmarking lifecycle and the motivations behind running benchmarks in particular phases of an application lifecycle. Part II then focuses on benchmark design by discussing key objectives (e.g., repeatability, fairness, or understandability) and defining metrics and measurement methods, and by giving advice on developing own measurement methods and metrics. Next, Part III explores benchmark execution and implementation challenges and objectives as well as aspects like runtime monitoring and result collection. Subsequently, Part IV addresses benchmark results, covering topics such as an abstract process for turning data into insights, data preprocessing, and basic data analysis methods. Lastly, Part V concludes the book with a summary, suggestions for further reading and pointers to benchmarking tools available on the Web. The book is intended for researchers and graduate students of computer science and related subjects looking for an introduction to benchmarking cloud services, but also for industry practitioners who are interested in evaluating the quality of cloud services or who want to assess key qualities of their own implementations through cloud-based experiments.
This book constitutes the refereed proceedings of the 18th International Conference on Innovations for Community Services, I4CS 2018, held in Zilina, Slovakia, in June 2018. The 14 revised full papers and the three revised short papers presented in this volume were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on architectures and management; data analytics and models; community and public collaboration; innovations and digital transformation.
This two-volume set LNCS 10915 and 10916 constitutes the refereed proceedings of the 12h International Conference on Augmented Cognition, AC 2018, held as part of the 20th International Conference on Human-Computer Interaction, HCII 2018, in Las Vegas, NV, USA in July 2018. The 1171 papers presented at HCII 2018 conferences were carefully reviewed and selected from 4346 submissions. The papers cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of applications areas. The papers in this volume are organized in the following topical sections: context aware adaption strategies in augmented cognition, brain sensors and measures for operational environments, artificial intelligence and machine learning in augmented cognition, augmented cognition in virtual and mixed reality.
The 3 volume-set LNCS 10901, 10902 + 10903 constitutes the refereed proceedings of the 20th International Conference on Human-Computer Interaction, HCI 2018, which took place in Las Vegas, Nevada, in July 2018. The total of 1171 papers and 160 posters included in the 30 HCII 2018 proceedings volumes was carefully reviewed and selected from 4346 submissions. HCI 2018 includes a total of 145 papers; they were organized in topical sections named: Part I: HCI theories, methods and tools; perception and psychological issues in HCI; emotion and attention recognition; security, privacy and ethics in HCI. Part II: HCI in medicine; HCI for health and wellbeing; HCI in cultural heritage; HCI in complex environments; mobile and wearable HCI. Part III: input techniques and devices; speech-based interfaces and chatbots; gesture, motion and eye-tracking based interaction; games and gamification.
This book presents current research in the area of advanced monitoring in P2P botnets, and uses a dual-perspective approach to discuss aspects of botnet monitoring in-depth. First, from the perspective of a defender, e.g. researchers, it introduces advanced approaches to successfully monitor botnets, taking the presence of current botnet anti-monitoring mechanisms into consideration. Then, adopting a botmaster perspective to anticipate the advances in future botnets, it introduces advanced measures to detect and prevent monitoring activities. All the proposed methods were evaluated either using real-world data or in a simulation scenario. In addition to providing readers with an in-depth understanding of P2P botnets, the book also analyzes the implications of the various design choices of recent botnets for effectively monitoring them. It serves as an excellent introduction to new researchers and provides a useful review for specialists in the field.
This book constitutes the proceedings of the 14th International Conference on Latent Variable Analysis and Signal Separation, LVA/ICA 2018, held in Guildford, UK, in July 2018.The 52 full papers were carefully reviewed and selected from 62 initial submissions. As research topics the papers encompass a wide range of general mixtures of latent variables models but also theories and tools drawn from a great variety of disciplines such as structured tensor decompositions and applications; matrix and tensor factorizations; ICA methods; nonlinear mixtures; audio data and methods; signal separation evaluation campaign; deep learning and data-driven methods; advances in phase retrieval and applications; sparsity-related methods; and biomedical data and methods.
The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation.
This book reports on a set of new techniques for resolving current issues in networked control systems. The main focus is on strategies for event-based control, for both centralized and decentralized architectures. The first part of the book addresses the problem of single-loop networked control systems and proposes an anticipative remote controller for dealing with delays and packet losses. The second part of the book proposes a distributed event-based control strategy for networked dynamical systems, which has been implemented in a test-bed of mobile robots, and provides readers with a thorough description of an interactive simulator used to validate the results. This thesis, examined at the Universidad Nacional de Educacion a Distancia in 2013, received the award for best thesis in control engineering from the Control Engineering group of the Spanish Committee of Automatic Control in 2015.
This book presents a review of traditional context-aware computing research, identifies its limitations in developing social context-aware pervasive systems, and introduces a new technology framework to address these limitations. Thus, this book provides a good reference for developments in context-aware computing and pervasive social computing. It examines the emerging area of pervasive social computing, which is a novel collective paradigm derived from pervasive computing, social media, social networking, social signal processing and multimodal human-computer interaction. This book offers a novel approach to model, represent, reason about and manage different types of social context. It shows how users' social context information can be acquired from different online social networks such as Facebook, LinkedIn, Twitter and Google Calendar. It further presents the use of social context information in developing innovative smart mobile applications to assist users in their daily life. The mix of both theoretical and applied research results makes this book attractive to a variety of readers from both academia and industry. This book provides a new platform for implementing different types of socially-aware mobile applications. The platform hides the complexity of managing social context, and thus provides essential support to application developers for the development of socially-aware applications. The book contains detailed descriptions of how the underlying platform has been implemented using available technologies such as ontology and rule engines, and how this platform can be used to develop socially-aware mobile applications using two exemplar applications. The book also presents evaluations of the proposed platform and applications using real-world data from Facebook, LinkedIn and Twitter. Therefore, this book is a syndication of scientific research with practical industrial applications, making it useful to researchers as well as to software engineers.
This book introduces wireless traffic steering as a paradigm to realize green communication in multi-tier heterogeneous cellular networks. By matching network resources and dynamic mobile traffic demand, traffic steering helps to reduce on-grid power consumption with on-demand services provided. This book reviews existing solutions from the perspectives of energy consumption reduction and renewable energy harvesting. Specifically, it explains how traffic steering can improve energy efficiency through intelligent traffic-resource matching. Several promising traffic steering approaches for dynamic network planning and renewable energy demand-supply balancing are discussed. This book presents an energy-aware traffic steering method for networks with energy harvesting, which optimizes the traffic allocated to each cell based on the renewable energy status. Renewable energy demand-supply balancing is a key factor in energy dynamics, aimed at enhancing renewable energy sustainability to reduce on-grid energy consumption. Dynamic network planning adjusts cell density with traffic variations to provide on-demand service, which reduces network power consumption with quality of service provisioning during off-peak hours. With intra- or inter-tier traffic steering, cell density is dynamically optimized with regards to the instant traffic load for conventional homogeneous and multi-tier heterogeneous cellular networks, respectively. This book is beneficial for researchers and graduate students interested in traffic management and future wireless networking.
This book presents advances in the field of optical networks - specifically on research and applications in elastic optical networks (EON). The material reflects the authors' extensive research and industrial activities and includes contributions from preeminent researchers and practitioners in optical networking. The authors discuss the new research and applications that address the issue of increased bandwidth demand due to disruptive, high bandwidth applications, e.g., video and cloud applications. The book also discusses issues with traffic not only increasing but becoming much more dynamic, both in time and direction, and posits immediate, medium, and long-term solutions throughout the text. The book is intended to provide a reference for network architecture and planning, communication systems, and control and management approaches that are expected to steer the evolution of EONs.
This open access book was prepared as a Final Publication of the COST Action IC1304 "Autonomous Control for a Reliable Internet of Services (ACROSS)". The book contains 14 chapters and constitutes a show-case of the main outcome of the Action in line with its scientific goals. It will serve as a valuable reference for undergraduate and post-graduate students, educators, faculty members, researchers, engineers, and research strategists working in this field. The explosive growth of the Internet has fundamentally changed the global society. The emergence of concepts like SOA, SaaS, PaaS, IaaS, NaaS, and Cloud Computing in general has catalyzed the migration from the information-oriented Internet into an Internet of Services (IoS). This has opened up virtually unbounded possibilities for the creation of new and innovative services that facilitate business processes and improve the quality of life. However, this also calls for new approaches to ensuring the quality and reliability of these services. The objective of this book is, by applying a systematic approach, to assess the state-of-the-art and consolidate the main research results achieved in this area.
This book constitutes the thoroughly refereed proceedings of the 25th International Conference on Computer Networks, CN 2018, held in Gliwice, Poland, in June 2018. The 34 full papers presented were carefully reviewed and selected from 86 submissions. They are organized in topical sections on computer networks; teleinformatics and telecommunications; queueing theory; cybersecurity and quality service.
This book gives a wide-ranging description of the many facets of complex dynamic networks and systems within an infrastructure provided by integrated control and supervision: envisioning, design, experimental exploration, and implementation. The theoretical contributions and the case studies presented can reach control goals beyond those of stabilization and output regulation or even of adaptive control. Reporting on work of the Control of Complex Systems (COSY) research program, Complex Systems follows from and expands upon an earlier collection: Control of Complex Systems by introducing novel theoretical techniques for hard-to-control networks and systems. The major common feature of all the superficially diverse contributions encompassed by this book is that of spotting and exploiting possible areas of mutual reinforcement between control, computing and communications. These help readers to achieve not only robust stable plant system operation but also properties such as collective adaptivity, integrity and survivability at the same time retaining desired performance quality. Applications in the individual chapters are drawn from: * the general implementation of model-based diagnosis and systems engineering in medical technology, in communication, and in power and airport networks; * the creation of biologically inspired control brains and safety-critical human-machine systems, * process-industrial uses; * biped robots; * large space structures and unmanned aerial vehicles; and * precision servomechanisms and other advanced technologies. Complex Systems provides researchers from engineering, applied mathematics and computer science backgrounds with innovative theoretical and practical insights into the state-of-the-art of complex networks and systems research. It employs physical implementations and extensive computer simulations. Graduate students specializing in complex-systems
This is the first book devoted to mobility management, covering the important principles, technologies and applications of mobility management based on years of academic research and industry experiences. The content is organized according to the reference models proposed by the authors, and emphasizes on technical principles rather than protocol details; a systematic and comprehensive introduction is presented yet without losing focuses; the existing technologies in cellular system, mobile Internet and IMS/SIP are also extensively compared. This book can be an indispensable reference for mobile communication engineers, computer network engineers, researchers and anyone else involved in academic, industrial and standardization activities on mobility management.
This book summarizes the state-of-the-art in unsupervised learning. The contributors discuss how with the proliferation of massive amounts of unlabeled data, unsupervised learning algorithms, which can automatically discover interesting and useful patterns in such data, have gained popularity among researchers and practitioners. The authors outline how these algorithms have found numerous applications including pattern recognition, market basket analysis, web mining, social network analysis, information retrieval, recommender systems, market research, intrusion detection, and fraud detection. They present how the difficulty of developing theoretically sound approaches that are amenable to objective evaluation have resulted in the proposal of numerous unsupervised learning algorithms over the past half-century. The intended audience includes researchers and practitioners who are increasingly using unsupervised learning algorithms to analyze their data. Topics of interest include anomaly detection, clustering, feature extraction, and applications of unsupervised learning. Each chapter is contributed by a leading expert in the field.
This book offers a thorough examination of potential game theory and its applications in radio resource management for wireless communications systems and networking. The book addresses two major research goals: how to identify a given game as a potential game, and how to design the utility functions and the potential functions with certain special properties in order to formulate a potential game. After proposing a unifying mathematical framework for the identification of potential games, the text surveys existing applications of this technique within wireless communications and networking problems found in OFDMA 3G/4G/WiFi networks, as well as next-generation systems such as cognitive radios and dynamic spectrum access networks. Professionals interested in understanding the theoretical aspect of this specialized field will find Potential Game Theory a valuable resource, as will advanced-level engineering students. It paves the way for extensive and rigorous research exploration on a topic whose capacity for practical applications is vast but not yet fully exploited.
This book investigates new enabling technologies for Fi-Wi convergence. The editors discuss Fi-Wi technologies at the three major network levels involved in the path towards convergence: system level, network architecture level, and network management level. The main topics will be: a. At system level: Radio over Fiber (digitalized vs. analogic, standardization, E-band and beyond) and 5G wireless technologies; b. Network architecture level: NGPON, WDM-PON, BBU Hotelling, Cloud Radio Access Networks (C-RANs), HetNets. c. Network management level: SDN for convergence, Next-generation Point-of-Presence, Wi-Fi LTE Handover, Cooperative MultiPoint.
This book provides a concise and comprehensive overview of vehicular communication technologies. It classifies all relevant standards, protocols and applications, so as to enable the reader to gain a holistic approach towards the subject of vehicular communications. The primary methods are algorithmic processes and simulation results.First, an overview and classification of vehicular technologies is presented. Then, the book focuses on specific applications of V2V and V2I communications. Special attention is given to recent research and development results regarding R&D projects in the field, in cooperation with car manufacturing companies and universities at a global level.Designed to facilitate understanding of vehicle to vehicle and vehicle to infrastructure technologies, this textbook is appropriate for undergraduate and graduate students of vehicular communications or mobile networks.
This volume contains the proceedings of the 5th International Conference on Frontier Computing (FC 2016), Tokyo, Japan, July 13-15, 2016. This international meeting provided a forum for researchers to share current understanding of recent advances and emergence in information technology, science, and engineering, with themes in the scope of Communication Networks, Business Intelligence and Knowledge Management, Web Intelligence, and any related fields that further the development of information technology. The articles presented cover a wide spectrum of topics: database and data mining, networking and communications, web and internet of things, embedded system, soft computing, social network analysis, security and privacy, optics communication, and ubiquitous/pervasive computing. Many papers report results of great academic potential and value, and in addition, indicate promising directions of research in the focused realm of this conference series. Readers, including students, academic researchers, and professionals, will benefit from the results presented in this book. It also provides an overview of current research and can be used as a guidebook for those new to the field.
This double volume set ( LNAI 10863-10864) constitutes the refereed proceedings of the 25th International Workshop, EG-ICE 2018, held in Lausanne, Switzerland, in June 2018. The 58 papers presented in this volume were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on Advanced Computing in Engineering, Computer Supported Construction Management, Life-Cycle Design Support, Monitoring and Control Algorithms in Engineering, and BIM and Engineering Ontologies.
This book discusses global mobile satellite communications (GMSC) for maritime, land (road and rail), and aeronautical applications. It covers how these enable connections between moving objects such as ships, road and rail vehicles and aircrafts on one hand, and ground telecommunications subscribers through the medium of communications satellites, ground earth stations, Terrestrial Telecommunication Networks (TTN), Internet Service Providers (ISP) and other wireless and landline telecommunications providers. The new edition covers new developments and initiatives that have resulted in land and aeronautical applications and the introduction of new satellite constellations in non-geostationary orbits and projects of new hybrid satellite constellations. The book presents current GMSC trends, mobile system concepts and network architecture using a simple mode of style with understandable technical information, characteristics, graphics, illustrations and mathematics equations. It represents telecommunications technique and technology, which can be useful for all technical staff on vessels at sea and rivers, on all types of land vehicles, on planes, on off shore constructions and for everyone possessing satellite communications handset phones. The first edition of Global Mobile Satellite Communications (Springer, 2005) was split into two books for the second edition - one on applications and one on theory. This book presents global mobile satellite communications applications.
This book focuses on key simulation and evaluation technologies for 5G systems. Based on the most recent research results from academia and industry, it describes the evaluation methodologies in depth for network and physical layer technologies. The evaluation methods are discussed in depth. It also covers the analysis of the 5G candidate technologies and the testing challenges, the evolution of the testing technologies, fading channel measurement and modeling, software simulations, software hardware cosimulation, field testing and other novel evaluation methods. The fifth-generation (5G) mobile communications system targets highly improved network performances in terms of the network capacity and the number of connections. Testing and evaluation technologies is widely recognized and plays important roles in the wireless technology developments, along with the research on basic theory and key technologies. The investigation and developments on the multi-level and comprehensive evaluations for 5G new technologies, provides important performance references for the 5G technology filtering and future standardizations. Students focused on telecommunications, electronic engineering, computer science or other related disciplines will find this book useful as a secondary text. Researchers and professionals working within these related fields will also find this book useful as a reference. |
![]() ![]() You may like...
Federated Learning for Wireless Networks
Choong Seon Hong, Latif U. Khan, …
Hardcover
R4,585
Discovery Miles 45 850
Smart and Sustainable Collaborative…
Luis M. Camarinha-Matos, Xavier Boucher, …
Hardcover
R6,500
Discovery Miles 65 000
Privacy-Preserving in Edge Computing
Longxiang Gao, Tom H. Luan, …
Hardcover
R4,233
Discovery Miles 42 330
Cyber-Physical Systems - Foundations…
Houbing Song, Danda B. Rawat, …
Paperback
Computational Intelligence in Data…
Vallidevi Krishnamurthy, Suresh Jaganathan, …
Hardcover
R2,640
Discovery Miles 26 400
Handbook of Integration of Cloud…
Rajiv Ranjan, Karan Mitra, …
Hardcover
R6,309
Discovery Miles 63 090
Research Trends in Graph Theory and…
Daniela Ferrero, Leslie Hogben, …
Hardcover
R3,543
Discovery Miles 35 430
|