0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (16)
  • R500+ (4,482)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

Enabling Secure and Privacy Preserving Communications in Smart Grids (Paperback, 2014): Hongwei Li Enabling Secure and Privacy Preserving Communications in Smart Grids (Paperback, 2014)
Hongwei Li
R1,561 Discovery Miles 15 610 Ships in 18 - 22 working days

This brief focuses on the current research on security and privacy preservation in smart grids. Along with a review of the existing works, this brief includes fundamental system models, possible frameworks, useful performance, and future research directions. It explores privacy preservation demand response with adaptive key evolution, secure and efficient Merkle tree based authentication, and fine-grained keywords comparison in the smart grid auction market. By examining the current and potential security and privacy threats, the author equips readers to understand the developing issues in smart grids. The brief is designed for researchers and professionals working with computer communication networks and smart grids. Graduate students interested in networks and communication engineering will also find the brief an essential resource.

Guide to Voice and Video over IP - For Fixed and Mobile Networks (Paperback, 2013 ed.): Lingfen Sun, Is-Haka Mkwawa, Emmanuel... Guide to Voice and Video over IP - For Fixed and Mobile Networks (Paperback, 2013 ed.)
Lingfen Sun, Is-Haka Mkwawa, Emmanuel Jammeh, Emmanuel Ifeachor
R2,450 Discovery Miles 24 500 Ships in 18 - 22 working days

This book presents a review of the latest advances in speech and video compression, computer networking protocols, the assessment and monitoring of VoIP quality, and next generation network architectures for multimedia services. The book also concludes with three case studies, each presenting easy-to-follow step-by-step instructions together with challenging hands-on exercises. Features: provides illustrative worked examples and end-of-chapter problems; examines speech and video compression techniques, together with speech and video compression standards; describes the media transport protocols RTP and RTCP, as well as the VoIP signalling protocols SIP and SDP; discusses the concepts of VoIP quality of service and quality of experience; reviews next-generation networks based on the IP multimedia subsystem and mobile VoIP; presents case studies on building a VoIP system based on Asterisk, setting up a mobile VoIP system based on Open IMS and Android mobile, and analysing VoIP protocols and quality.

Information Security Practice and Experience - 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014,... Information Security Practice and Experience - 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014, Proceedings (Paperback, 2014 ed.)
Xinyi Huang, Jianying Zhou
R2,925 Discovery Miles 29 250 Ships in 18 - 22 working days

This book constitutes the proceedings of the 10th International Conference on Information Security Practice and Experience, ISPEC 2014, held in Fuzhou, China, in May 2014. The 36 papers presented in this volume were carefully reviewed and selected from 158 submissions. In addition the book contains 5 invited papers. The regular papers are organized in topical sections named: network security; system security; security practice; security protocols; cloud security; digital signature; encryption and key agreement and theory.

3D Surface Reconstruction - Multi-Scale Hierarchical Approaches (Paperback, 2013 ed.): Francesco Bellocchio, N. Alberto... 3D Surface Reconstruction - Multi-Scale Hierarchical Approaches (Paperback, 2013 ed.)
Francesco Bellocchio, N. Alberto Borghese, Stefano Ferrari, Vincenzo Piuri
R3,049 Discovery Miles 30 490 Ships in 18 - 22 working days

3D Surface Reconstruction: Multi-Scale Hierarchical Approaches presents methods to model 3D objects in an incremental way so as to capture more finer details at each step. The configuration of the model parameters, the rationale and solutions are described and discussed in detail so the reader has a strong understanding of the methodology. Modeling starts from data captured by 3D digitizers and makes the process even more clear and engaging. Innovative approaches, based on two popular machine learning paradigms, namely Radial Basis Functions and the Support Vector Machines, are also introduced. These paradigms are innovatively extended to a multi-scale incremental structure, based on a hierarchical scheme. The resulting approaches allow readers to achieve high accuracy with limited computational complexity, and makes the approaches appropriate for online, real-time operation. Applications can be found in any domain in which regression is required. 3D Surface Reconstruction: Multi-Scale Hierarchical Approaches is designed as a secondary text book or reference for advanced-level students and researchers in computer science. This book also targets practitioners working in computer vision or machine learning related fields.

Attachment Transmission in Wireless Networks (Paperback, 2014): Lu Wang, Kaishun Wu, Mounir Hamdi Attachment Transmission in Wireless Networks (Paperback, 2014)
Lu Wang, Kaishun Wu, Mounir Hamdi
R1,561 Discovery Miles 15 610 Ships in 18 - 22 working days

This brief presents the novel PHY layer technique, attachment transmission, which provides an extra control panel with minimum overhead. In addition to describing the basic mechanisms of this technique, this brief also illustrates the challenges, the theoretical model, implementation and numerous applications of attachment transmission. Extensive experiments demonstrate that attachment transmission is capable of exploiting and utilizing channel redundancy to deliver control information and thus it can provide significant support to numerous higher layer applications. The authors also address the critical problem of providing cost-effective coordination mechanisms for wireless design. The combination of new techniques and implementation advice makes this brief a valuable resource for researchers and professionals interested in wireless penetration and communication networks.

Cognitive Wireless Networks (Paperback, 2015 ed.): Zhiyong Feng, Qixun Zhang, Ping Zhang Cognitive Wireless Networks (Paperback, 2015 ed.)
Zhiyong Feng, Qixun Zhang, Ping Zhang
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This brief examines the current research in cognitive wireless networks (CWNs). Along with a review of challenges in CWNs, this brief presents novel theoretical studies and architecture models for CWNs, advances in the cognitive information awareness and delivery, and intelligent resource management technologies. The brief presents the motivations and concepts of CWNs, including theoretical studies of temporal and geographic distribution entropy as well as cognitive information metrics. A new architecture model of CWNs is proposed with theoretical, functional and deployment architectures supporting cognitive information flow and resource flow. Key technologies are identified to achieve the efficient cognitive information awareness and delivery. The brief concludes by validating the effectiveness of proposed theories and technologies using the CWNs testbed and discussing the importance of standardization practices. The context and analysis provided by this text are ideal for researchers and practitioners interested in wireless networks and cognitive information. Cognitive Wireless Networks is also valuable for advanced-level students studying resource management and networking.

Mathematical and Engineering Methods in Computer Science - 9th International Doctoral Workshop, MEMICS 2014, Telc, Czech... Mathematical and Engineering Methods in Computer Science - 9th International Doctoral Workshop, MEMICS 2014, Telc, Czech Republic, October 17--19, 2014, Revised Selected Papers (Paperback, 2014 ed.)
Petr Hlineny, Zdenek Dvorak, Jiri Jaros, Jan Kofron, Jan Korenek, …
R1,588 Discovery Miles 15 880 Ships in 18 - 22 working days

This volume contains the post-proceedings of the 9th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science, MEMICS 2014, held in Telc, Czech Republic, in October 2014. The 13 thoroughly revised papers were carefully selected out of 28 submissions and are presented together with 4 invited papers. The topics covered by the papers include: algorithms, logic, and games; high performance computing; computer aided analysis, verification, and testing; hardware design and diagnostics; computer graphics and image processing; and artificial intelligence and natural language processing.

Wired/Wireless Internet Communications - 12th International Conference, WWIC 2014, Paris, France, May 26-28, 2014, Revised... Wired/Wireless Internet Communications - 12th International Conference, WWIC 2014, Paris, France, May 26-28, 2014, Revised Selected Papers (Paperback, 2014 ed.)
Abdelhamid Mellouk, Scott Fowler, Boubaker Daachi, Said Hoceini
R2,227 Discovery Miles 22 270 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Wired/Wireless Internet Communication, WWIC 2014, held in Paris, France, during May 27-28, 2014. The 22 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on wireless and wired networks; resource management and next generation services; next generation services, network architecture and applications.

Radio Frequency Source Coding Made Easy (Paperback, 2015 ed.): Saleh Faruque Radio Frequency Source Coding Made Easy (Paperback, 2015 ed.)
Saleh Faruque
R1,824 Discovery Miles 18 240 Ships in 18 - 22 working days

This book introduces Radio Frequency Source Coding to a broad audience. The author blends theory and practice to bring readers up-to-date in key concepts, underlying principles and practical applications of wireless communications. The presentation is designed to be easily accessible, minimizing mathematics and maximizing visuals.

Advances in Wireless Sensor Networks - 7th China Conference, CWSN 2013, Qingdao, China, October 17-19, 2013. Revised Selected... Advances in Wireless Sensor Networks - 7th China Conference, CWSN 2013, Qingdao, China, October 17-19, 2013. Revised Selected Papers (Paperback, 2014 ed.)
Limin Sun, Huadong Ma, Feng Hong
R2,354 Discovery Miles 23 540 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th China Conference of Wireless Sensor Networks, held in Qingdao, China, in October 2013. The 35 revised full papers were carefully reviewed and selected from 191 submissions. The papers cover a wide range of topics in the wireless sensor network fields like node systems, infrastructures, communication protocols, data management.

Cloud Computing for Enterprise Architectures (Paperback, 2011): Zaigham Mahmood, Richard Hill Cloud Computing for Enterprise Architectures (Paperback, 2011)
Zaigham Mahmood, Richard Hill
R3,120 Discovery Miles 31 200 Ships in 18 - 22 working days

This important text provides a single point of reference for state-of-the-art cloud computing design and implementation techniques. The book examines cloud computing from the perspective of enterprise architecture, asking the question; how do we realize new business potential with our existing enterprises? Topics and features: with a Foreword by Thomas Erl; contains contributions from an international selection of preeminent experts; presents the state-of-the-art in enterprise architecture approaches with respect to cloud computing models, frameworks, technologies, and applications; discusses potential research directions, and technologies to facilitate the realization of emerging business models through enterprise architecture approaches; provides relevant theoretical frameworks, and the latest empirical research findings.

Future Network Systems and Security - First International Conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings... Future Network Systems and Security - First International Conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings (Paperback, 2015 ed.)
Robin Doss, Selwyn Piramuthu, Wei Zhou
R1,910 Discovery Miles 19 100 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the International Conference on Future Network Systems and Security, FNSS 2015, held in Paris, France, in June 2015. The 13 full papers presented were carefully reviewed and selected from 34 submissions. The papers focus on the technology, communications, systems and security aspects of relevance to the network of the future.

Economics of Grids, Clouds, Systems, and Services - 11th International Conference, GECON 2014, Cardiff, UK, September 16-18,... Economics of Grids, Clouds, Systems, and Services - 11th International Conference, GECON 2014, Cardiff, UK, September 16-18, 2014. Revised Selected Papers. (Paperback, 2014 ed.)
Joern Altmann, Kurt Vanmechelen, Omer F. Rana
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 11th International Conference on Economics of Grids, Clouds, Systems, and Services, GECON 2014, held in Cardiff, UK, in September 2014. The 8 revised full papers and 7 paper-in-progress presented were carefully reviewed and selected from 24 submissions. The presentation sessions that have been set up are: Cloud Adoption, Work in Progress on Market Dynamics, Cost Optimization, Work in Progress on Pricing, Contracts and Service Selection and Economic Aspects of Quality of Service.

Computer and Computing Technologies in Agriculture - 5th IFIP TC 5, SIG 5.1 International Conference, CCTA 2011, Beijing,... Computer and Computing Technologies in Agriculture - 5th IFIP TC 5, SIG 5.1 International Conference, CCTA 2011, Beijing, China, October 29-31, 2011, Proceedings, Part I (Paperback, 2012 ed.)
Daoliang Li, Yingyi Chen
R2,732 Discovery Miles 27 320 Ships in 18 - 22 working days

The three-volume set IFIP AICT 368-370 constitutes the refereed post-conference proceedings of the 5th IFIP TC 5, SIG 5.1 International Conference on Computer and Computing Technologies in Agriculture, CCTA 2011, held in Beijing, China, in October 2011. The 189 revised papers presented were carefully selected from numerous submissions. They cover a wide range of interesting theories and applications of information technology in agriculture, including simulation models and decision-support systems for agricultural production, agricultural product quality testing, traceability and e-commerce technology, the application of information and communication technology in agriculture, and universal information service technology and service systems development in rural areas. The 62 papers included in the first volume focus on decision support systems, intelligent systems, and artificial intelligence applications.

Traffic Monitoring and Analysis - 6th International Workshop, TMA 2014, London, UK, April 14, 2014, Proceedings (Paperback,... Traffic Monitoring and Analysis - 6th International Workshop, TMA 2014, London, UK, April 14, 2014, Proceedings (Paperback, 2014 ed.)
Alberto Dainotti, Anirban Mahanti, Steve Uhlig
R1,535 Discovery Miles 15 350 Ships in 18 - 22 working days

This book constitutes the proceedings of the 6th International Workshop on Traffic Monitoring and Analysis, TMA 2014, held in London, UK, in April 2014.

The thoroughly refereed 11 full papers presented in this volume were carefully reviewed and selected from 30 submissions. The contributions are organized in topical sections on tools and lessons learned from passive measurement, performance at the edge and Web, content and inter domain.

Data Streams - Models and Algorithms (Paperback, 2007 ed.): Charu C. Aggarwal Data Streams - Models and Algorithms (Paperback, 2007 ed.)
Charu C. Aggarwal
R3,106 Discovery Miles 31 060 Ships in 18 - 22 working days

This book primarily discusses issues related to the mining aspects of data streams and it is unique in its primary focus on the subject. This volume covers mining aspects of data streams comprehensively: each contributed chapter contains a survey on the topic, the key ideas in the field for that particular topic, and future research directions. The book is intended for a professional audience composed of researchers and practitioners in industry. This book is also appropriate for advanced-level students in computer science.

Linear Network Error Correction Coding (Paperback, 2014 ed.): Xuan Guang, Zhen Zhang Linear Network Error Correction Coding (Paperback, 2014 ed.)
Xuan Guang, Zhen Zhang
R1,667 Discovery Miles 16 670 Ships in 18 - 22 working days

There are two main approaches in the theory of network error correction coding. In this SpringerBrief, the authors summarize some of the most important contributions following the classic approach, which represents messages by sequences similar to algebraic coding, and also briefly discuss the main results following the other approach, that uses the theory of rank metric codes for network error correction of representing messages by subspaces. This book starts by establishing the basic linear network error correction (LNEC) model and then characterizes two equivalent descriptions. Distances and weights are defined in order to characterize the discrepancy of these two vectors and to measure the seriousness of errors. Similar to classical error-correcting codes, the authors also apply the minimum distance decoding principle to LNEC codes at each sink node, but use distinct distances. For this decoding principle, it is shown that the minimum distance of a LNEC code at each sink node can fully characterize its error-detecting, error-correcting and erasure-error-correcting capabilities with respect to the sink node. In addition, some important and useful coding bounds in classical coding theory are generalized to linear network error correction coding, including the Hamming bound, the Gilbert-Varshamov bound and the Singleton bound. Several constructive algorithms of LNEC codes are presented, particularly for LNEC MDS codes, along with an analysis of their performance. Random linear network error correction coding is feasible for noncoherent networks with errors. Its performance is investigated by estimating upper bounds on some failure probabilities by analyzing the information transmission and error correction. Finally, the basic theory of subspace codes is introduced including the encoding and decoding principle as well as the channel model, the bounds on subspace codes, code construction and decoding algorithms.

Workflows for e-Science - Scientific Workflows for Grids (Paperback, 2007): Ian J Taylor, Ewa Deelman, Dennis B. Gannon,... Workflows for e-Science - Scientific Workflows for Grids (Paperback, 2007)
Ian J Taylor, Ewa Deelman, Dennis B. Gannon, Matthew Shields
R2,740 Discovery Miles 27 400 Ships in 18 - 22 working days

Scientific Workflow has seen massive growth in recent years as science becomes increasingly reliant on the analysis of massive data sets and the use of distributed resources. The workflow programming paradigm is seen as a means of managing the complexity in defining the analysis, executing the necessary computations on distributed resources, collecting information about the analysis results, and providing means to record and reproduce the scientific analysis.

Workflows for e-Science presents an overview of the current state of the art in the field. It brings together research from many of leading computer scientists in the workflow area and provides real world examples from domain scientists actively involved in e-Science. The computer science topics addressed in the book provide a broad overview of active research focusing on the areas of workflow representations and process models, component and service-based workflows, standardization efforts, workflow frameworks and tools, and problem solving environments and portals.

The topics covered represent a broad range of scientific workflow and will be of interest to a wide range of computer science researchers, domain scientists interested in applying workflow technologies in their work, and engineers wanting to develop workflow systems and tools. As such Workflows for e-Science is an invaluable resource for potential or existing users of workflow technologies and a benchmark for developers and researchers.

Ian Taylor is Lecturer in Computer Science at Cardiff University, and coordinator of Triana activities at Cardiff. He is the author of "From P2P to Web Services and Grids," also published by Springer.

Ewa Deelman is a Research Assistant Professor at the USC Computer Science Department and a Research Team Leader at the Center for Grid Technologies at the USC Information Sciences Institute.

Dennis Gannon is a professor of Computer Science in the School of Informatics at Indiana University. He is also Science Director for the Indiana Pervasive Technology Labs..

Dr Shields is a research associate at Cardiff and one of two lead developers for the Triana project.

Higher-Order Components for Grid Programming - Making Grids More Usable (Paperback, 2009 ed.): Jan Dunnweber, Sergei Gorlatch Higher-Order Components for Grid Programming - Making Grids More Usable (Paperback, 2009 ed.)
Jan Dunnweber, Sergei Gorlatch
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

A major challenge in grid computing remains the application software development for this new kind of infrastructure. Grid application programmers have to take into account several complicated aspects: distribution of data and computations, parallel computations on different sites and processors, heterogeneity of the involved computers, load balancing, etc. Grid programmers thus demand novel programming methodologies that abstract over such technical details while preserving the beneficial features of modern grid middleware. For this purpose, the authors introduce Higher-Order Components (HOCs). HOCs implement generic parallel/distributed processing patterns, together with the required middleware support, and they are offered to users via a high-level service interface. Users only have to provide the application-specific pieces of their programs as parameters, while low-level implementation details, such as the transfer of data across the grid, are handled by the HOCs. HOCs were developed within the CoreGRID European Network of Excellence and have become an optional extension of the popular Globus middleware. The book provides the reader with hands-on experience, describing a broad collection of example applications from various fields of science and engineering, including biology, physics, etc. The Java code for these examples is provided online, complementing the book. The expected application performance is studied and reported for extensive performance experiments on different testbeds, including grids with worldwide distribution. The book is targeted at graduate students, advanced professionals, and researchers in both academia and industry. Readers can raise their level of knowledge about methodologies for programming contemporary parallel and distributed systems, and, furthermore, they can gain practical experience in using distributed software. Practical examples show how the complementary online material can easily be adopted in various new projects.

Self-Organizing Systems - 7th IFIP  TC6 International Workshop, IWSOS 2013, Palma de Mallorca, Spain, May 9-10, 2013, Revised... Self-Organizing Systems - 7th IFIP TC6 International Workshop, IWSOS 2013, Palma de Mallorca, Spain, May 9-10, 2013, Revised Selected Papers (Paperback, 2014)
Wilfried Elmenreich, Falko Dressler, Vittorio Loreto
R1,899 Discovery Miles 18 990 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 7th IFIP TC 6 International Workshop on Self-Organizing Systems, IWSOS 2013, held in Palma de Mallorca, Spain, in May 2013. The 11 revised full papers and 9 short papers presented were carefully selected from 35 paper submissions. The papers are organized in following topics: design and analysis of self-organizing and self-managing systems, inspiring models of self-organization in nature and society, structure, characteristics and dynamics of self-organizing networks, self-organization in techno-social systems, self-organized social computation and self-organized communication systems.

Constructive Side-Channel Analysis and Secure Design - 5th International Workshop, COSADE 2014, Paris, France, April 13-15,... Constructive Side-Channel Analysis and Secure Design - 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers (Paperback, 2014 ed.)
Emmanuel Prouff
R1,416 Discovery Miles 14 160 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Workshop, COSADE 2014, held in Paris, France, in April 2014. The 20 revised full papers presented together with two invited talks were carefully selected from 51 submissions and collect truly existing results in cryptographic engineering, from concepts to artifacts, from software to hardware, from attack to countermeasure.

Cooperative Device-to-Device Communication in Cognitive Radio Cellular Networks (Paperback, 2014 ed.): Peng Li, Song Guo Cooperative Device-to-Device Communication in Cognitive Radio Cellular Networks (Paperback, 2014 ed.)
Peng Li, Song Guo
R1,603 Discovery Miles 16 030 Ships in 18 - 22 working days

This brief examines current research on cooperative device-to-device (D2D) communication as an enhanced offloading technology to improve the performance of cognitive radio cellular networks. By providing an extensive review of recent advances in D2D communication, the authors demonstrate that the quality of D2D links significantly affects offloading performance in cellular networks, which motivates the design of cooperative D2D communication. After presenting the architecture of cooperative D2D communication, the challenges of capacity maximization and energy efficiency are addressed by optimizing relay assignment, power control and resource allocation. Furthermore, cooperative D2D communication is enhanced by network coding technology, and then is extended for broadcast sessions. Along with detailed problem formulation and hardness analysis, fast algorithms are developed by exploiting problem-specific characteristics such that they can be applied in practice.

Certification and Security in Inter-Organizational E-Services - IFIP 18th World Computer Congress, August 22-27, 2004,... Certification and Security in Inter-Organizational E-Services - IFIP 18th World Computer Congress, August 22-27, 2004, Toulouse, France (Paperback, 2005 ed.)
Enrico Nardelli, Maurizio Talamo
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Certification and Security in Inter-Organizational E-Services presents the proceedings of CSES 2004 - the 2nd International Workshop on Certification and Security in Inter-Organizational E-Services held within IFIP WCC in August 2004 in Toulouse, France. Certification and security share a common technological basis in the reliable and efficient monitoring of executed and running processes; they likewise depend on the same fundamental organizational and economic principles. As the range of services managed and accessed through communication networks grows throughout society, and given the legal value that is often attached to data treated or exchanged, it is critical to be able to certify the network transactions and ensure that the integrity of the involved computer-based systems is maintained. This collection of papers documents several important developments, and offers real-life application experiences, research results and methodological proposals of direct interest to systems experts and users in governmental, industrial and academic communities.

Running Mainframe z on Distributed Platforms - How to Create Robust Cost-Efficient Multiplatform z Environments (Paperback, 1st... Running Mainframe z on Distributed Platforms - How to Create Robust Cost-Efficient Multiplatform z Environments (Paperback, 1st ed.)
Kenneth Barrett, Stephen Norris
R2,306 Discovery Miles 23 060 Ships in 18 - 22 working days

"Running Mainframe z on Distributed Platforms is particularly suitable for a more detailed discussion." Bill Ogden, IBM zPDT Redbook, April 2015 "The authors offer very well-reasoned solutions accompanied by case studies, which will be useful to specialists. The book is made even more useful as the System z mainframe-based solutions offer an advanced systems management environment for significant segments of data within large companies." Eugen Petac, Computing Reviews, Oct. 8, 2014 "Should you choose to implement zPDT, RDz UT, or RD&T in your team's arsenal, you will find Barrett and Norris's insights, genius, and hard work illuminating as to how to rationally and economically manage the environment." -Scott Fagen, Chief Architect-System z Business, CA Technologies "A must-read for anyone interested in successfully deploying cost-efficient zPDT environments with agility in an enterprise that requires simple or complex configurations. The case-study-based exposition of the content allows for its easy consumption and use. Excellent!" -Mahendra Durai, SVP & Information Technology Officer, CA Running Mainframe z on Distributed Platforms reveals alternative techniques not covered by IBM for creatively adapting and enhancing multi-user IBM zPDT environments so that they are more friendly, stable, and reusable than those envisaged by IBM. The enhancement processes and methodologies taught in this book yield multiple layers for system recovery, 24x7 availability, and superior ease of updating and upgrading operating systems and subsystems without having to rebuild environments from scratch. Most of the techniques and processes covered in this book are not new to either the mainframe or distributed platforms. What is new in this book are the authors' innovative methods for taking distributed environments running mainframe virtual machine (VM) and multiple virtual storage (MVS) and making them look and feel like other MVS systems.The authors' combined expertise involves every aspect of the implementation of IBM zPDT technology to create virtualized mainframe environments by which the mainframe operations on a z series server can be transitioned to distributed platforms. All of the enhancement methods consecutively laid out in this book have been architected and developed by the authors for the CA Technologies distributed platform. Barrett and Norris impart these techniques and processes to CIOs and CTOs across the mainframe and distributed fields, to zPDT and RDz UT implementers, and to IBM's independent software vendors and customers.

Trust and Fairness in Open, Distributed Systems (Paperback, 2010 ed.): Adam Wierzbicki Trust and Fairness in Open, Distributed Systems (Paperback, 2010 ed.)
Adam Wierzbicki
R4,011 Discovery Miles 40 110 Ships in 18 - 22 working days

This book is an attempt to bring closer the greater vision of the development of Social Informatics. Social Informatics can be de?ned as a discipline of informatics that studies how information systems can realize social goals, use social concepts, or become sources of information about social phenomena. All of these research directions are present in this book: fairness is a social goal; trust is a social concept; and much of this book bases on the study of traces of Internet auctions (used also to drive social simulations) that are a rich source of information about social phenomena. The book has been written for an audience of graduate students working in the area of informatics and the social sciences, in an attempt to bridge the gap between the two disciplines. Because of this, the book avoids the use of excessive mathematical formalism, especially in Chapter 2 that attempts to summarize the theoretical basis of the two disciplines of trust and fa- ness management. Readers are usually directed to quoted literature for the purpose of studying mathematical proofs of the cited theorems.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cable Networks, Services, and Management
M Toy Hardcover R3,354 Discovery Miles 33 540
A Survey on Coordinated Power Management…
Thant Zin Oo, Nguyen H. Tran, … Hardcover R3,281 Discovery Miles 32 810
EAI International Conference on Big Data…
Anandakumar Haldorai, Arulmurugan Ramu, … Hardcover R4,074 Discovery Miles 40 740
Smart Grids and Their Communication…
Ersan Kabalci, Yasin Kabalci Hardcover R5,953 Discovery Miles 59 530
Potential-Based Analysis of Social…
Seyed Rasoul Etesami Hardcover R3,554 R3,294 Discovery Miles 32 940
The Internet of Things in the Industrial…
Zaigham Mahmood Hardcover R4,001 Discovery Miles 40 010
Cyber-Physical Systems - Foundations…
Houbing Song, Danda B. Rawat, … Paperback R2,507 R2,368 Discovery Miles 23 680
Private Cloud Computing - Consolidation…
Stephen R. Smoot, Nam K. Tan Paperback R1,225 Discovery Miles 12 250
Computer Networking - An All-in-One…
Quinn Kiser Hardcover R665 R594 Discovery Miles 5 940
When Compressive Sensing Meets Mobile…
Linghe Kong, Bowen Wang, … Hardcover R2,653 Discovery Miles 26 530

 

Partners