0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (3)
  • R250 - R500 (18)
  • R500+ (4,517)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

Architectural Design - Conception and Specification of Interactive Systems (Paperback, Softcover reprint of the original 1st... Architectural Design - Conception and Specification of Interactive Systems (Paperback, Softcover reprint of the original 1st ed. 2016)
Chris A. Vissers, Luis Ferreira Pires, Dick A.C. Quartel, Marten Van Sinderen
R1,633 Discovery Miles 16 330 Ships in 10 - 15 working days

This book presents a design methodology that is practically applicable to the architectural design of a broad range of systems. It is based on fundamental design concepts to conceive and specify the required functional properties of a system, while abstracting from the specific implementation functions and technologies that can be chosen to build the system. Abstraction and precision are indispensable when it comes to understanding complex systems and precisely creating and representing them at a high functional level. Once understood, these concepts appear natural, self-evident and extremely powerful, since they can directly, precisely and concisely reflect what is considered essential for the functional behavior of a system. The first two chapters present the global views on how to design systems and how to interpret terms and meta-concepts. This informal introduction provides the general context for the remainder of the book. On a more formal level, Chapters 3 through 6 present the main basic design concepts, illustrating them with examples. Language notations are introduced along with the basic design concepts. Lastly, Chapters 7 to 12 discuss the more intricate basic design concepts of interactive systems by focusing on their common functional goal. These chapters are recommended to readers who have a particular interest in the design of protocols and interfaces for various systems. The didactic approach makes it suitable for graduate students who want to develop insights into and skills in developing complex systems, as well as practitioners in industry and large organizations who are responsible for the design and development of large and complex systems. It includes numerous tangible examples from various fields, and several appealing exercises with their solutions.

Wireless Algorithms, Systems, and Applications - 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018,... Wireless Algorithms, Systems, and Applications - 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings (Paperback, 1st ed. 2018)
Sriram Chellappan, Wei Cheng, Wei Li
R3,991 Discovery Miles 39 910 Ships in 10 - 15 working days

This book constitutes the proceedings of the 13th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2018, held in Tianjin, China, in June 2018. The 59 full papers and 18 short papers presented in this book were carefully reviewed and selected from 197 submissions. The papers cover various topics such as cognitive radio networks; wireless sensor networks; cyber-physical systems; distributed and localized algorithm design and analysis; information and coding theory for wireless networks; localization; mobile cloud computing; topology control and coverage; security and privacy; underwater and underground networks; vehicular networks; internet of things; information processing and data management; programmable service interfaces; energy-efficient algorithms; system and protocol design; operating system and middle-ware support; and experimental test-beds, models and case studies.

Practical Contiki-NG - Programming for Wireless Sensor Networks (Paperback, 1st ed.): Agus Kurniawan Practical Contiki-NG - Programming for Wireless Sensor Networks (Paperback, 1st ed.)
Agus Kurniawan
R1,250 R1,042 Discovery Miles 10 420 Save R208 (17%) Ships in 10 - 15 working days

Explore how to develop and implement wireless server networks (WSN) using Contiki-NG, branded as the operating system for the IoT. The book explains Contiki-NG's advantages in sensing, communication, and energy optimization and enables you to begin solving problems in automation with WSN. Practical Contiki-NG is a guide to getting started with Contiki-NG programming featuring projects that demonstrate a variety of applications. This book takes a practical and content-driven approach to the latest technologies, including Raspberry Pi, IoT and cloud servers. Readers will go through step-by-step guides and sample scenarios such as sensing, actuating, connectivity, building middleware, and utilizing IoT and cloud-based technologies. If you're looking to go from zero to hero in using Contiki-NG to build Wireless Sensor Network (WSN) applications then this is the book for you. What You'll Learn Prepare and set up Contiki-NG development Review the basics of the Contiki-NG platform to build Wireless Sensor Networks (WSN) Develop your own Contiki-NG program Perform sensing and actuating on the Contiki-NG platform Implement a middleware for Contiki-NG motes Build a simple IoT program using the Contiki-NG environment Who This Book Is For Developers, students, researchers and anyone who has an interest in Wireless Sensor Network (WSN).

Security-Aware Design for Cyber-Physical Systems - A Platform-Based Approach (Paperback, Softcover reprint of the original 1st... Security-Aware Design for Cyber-Physical Systems - A Platform-Based Approach (Paperback, Softcover reprint of the original 1st ed. 2017)
Chungwei Lin, Alberto Sangiovanni-Vincentelli
R3,538 Discovery Miles 35 380 Ships in 10 - 15 working days

Addressing the rising security issues during the design stages of cyber-physical systems, this book develops a systematic approach to address security at early design stages together with all other design constraints. Cyber-attacks become more threatening as systems are becoming more connected with the surrounding environment, infrastructures, and other systems. Security mechanisms can be designed to protect against attacks and meet security requirements, but there are many challenges of applying security mechanisms to cyber-physical systems including open environments, limited resources, strict timing requirements, and large number of devices. Designed for researchers and professionals, this book is valuable for individuals working in network systems, security mechanisms, and system design. It is also suitable for advanced-level students of computer science.

Introduction to Cyberdeception (Paperback, Softcover reprint of the original 1st ed. 2016): Neil C. Rowe, Julian Rrushi Introduction to Cyberdeception (Paperback, Softcover reprint of the original 1st ed. 2016)
Neil C. Rowe, Julian Rrushi
R2,261 Discovery Miles 22 610 Ships in 10 - 15 working days

This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and practical, and that go well beyond traditional honeypots. It contains features friendly for classroom use: (1) minimal use of programming details and mathematics, (2) modular chapters that can be covered in many orders, (3) exercises with each chapter, and (4) an extensive reference list.Cyberattacks have grown serious enough that understanding and using deception is essential to safe operation in cyberspace. The deception techniques covered are impersonation, delays, fakes, camouflage, false excuses, and social engineering. Special attention is devoted to cyberdeception in industrial control systems and within operating systems. This material is supported by a detailed discussion of how to plan deceptions and calculate their detectability and effectiveness. Some of the chapters provide further technical details of specific deception techniques and their application. Cyberdeception can be conducted ethically and efficiently when necessary by following a few basic principles. This book is intended for advanced undergraduate students and graduate students, as well as computer professionals learning on their own. It will be especially useful for anyone who helps run important and essential computer systems such as critical-infrastructure and military systems.

Transactions on Computational Collective Intelligence XXVIII (Paperback, 1st ed. 2018): Ngoc Thanh Nguyen, Ryszard Kowalczyk,... Transactions on Computational Collective Intelligence XXVIII (Paperback, 1st ed. 2018)
Ngoc Thanh Nguyen, Ryszard Kowalczyk, Jaap van den Herik, Ana Paula Rocha, Joaquim Filipe
R1,597 Discovery Miles 15 970 Ships in 10 - 15 working days

These transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as the semantic Web, social networks, and multi-agent systems. TCCI strives to cover new methodological, theoretical and practical aspects of CCI understood as the form of intelligence that emerges from the collaboration and competition of many individuals (artificial and/or natural). The application of multiple computational intelligence technologies, such as fuzzy systems, evolutionary computation, neural systems, consensus theory, etc., aims to support human and other collective intelligence and to create new forms of CCI in natural and/or artificial systems. This twenty-eight issue is a special issue with 11 selected papers from the International Conference on Agents and Artificial Intelligence, ICAART 2016 and 2017 editions.

A Survey of Fractal Dimensions of Networks (Paperback, 1st ed. 2018): Eric Rosenberg A Survey of Fractal Dimensions of Networks (Paperback, 1st ed. 2018)
Eric Rosenberg
R1,833 Discovery Miles 18 330 Ships in 10 - 15 working days

Many different fractal dimensions have been proposed for networks. In A Survey of Fractal Dimensions of Networks the theory and computation of the most important of these dimensions are reviewed, including the box counting dimension, the correlation dimension, the mass dimension, the transfinite fractal dimension, the information dimension, the generalized dimensions (which provide a way to describe multifractals), and the sandbox method (for approximating the generalized dimensions). The book describes the use of diameter-based and radius-based boxes, and presents several heuristic methods for box counting, including greedy coloring, random sequential node burning, and a method for computing a lower bound. We also discuss very recent results on resolving ambiguity in the calculation of the information dimension and the generalized dimensions, and on the non-monotonicity of the generalized dimensions. Anyone interested in the theory and application of networks will want to read this Brief. This includes anyone studying, e.g., social networks, telecommunications networks, transportation networks, ecological networks, food chain networks, network models of the brain, or financial networks.

Electronics, Communications and Networks V - Proceedings of the 5th International Conference on Electronics, Communications and... Electronics, Communications and Networks V - Proceedings of the 5th International Conference on Electronics, Communications and Networks (CECNet 2015) (Paperback, Softcover reprint of the original 1st ed. 2016)
Amir Hussain
R7,129 Discovery Miles 71 290 Ships in 10 - 15 working days

This book comprises peer-reviewed contributions presented at the 5th International Conference on Electronics, Communications and Networks (CECNet 2015), held in Shanghai, China, 12-15 December, 2015. It includes new multi-disciplinary topics spanning a unique depth and breadth of cutting-edge research areas in Electronic Engineering, Communications and Networks, and Computer Technology. More generally, it is of interest to academics, students and professionals involved in Consumer Electronics Technology, Communication Engineering and Technology, Wireless Communication Systems and Technology, and Computer Engineering and Technology.

Human-Computer Interaction. Interaction in Context - 20th International Conference, HCI International 2018, Las Vegas, NV, USA,... Human-Computer Interaction. Interaction in Context - 20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part II (Paperback, 1st ed. 2018)
Masaaki Kurosu
R2,845 Discovery Miles 28 450 Ships in 10 - 15 working days

The 3 volume-set LNCS 10901, 10902 + 10903 constitutes the refereed proceedings of the 20th International Conference on Human-Computer Interaction, HCI 2018, which took place in Las Vegas, Nevada, in July 2018. The total of 1171 papers and 160 posters included in the 30 HCII 2018 proceedings volumes was carefully reviewed and selected from 4346 submissions. HCI 2018 includes a total of 145 papers; they were organized in topical sections named: Part I: HCI theories, methods and tools; perception and psychological issues in HCI; emotion and attention recognition; security, privacy and ethics in HCI. Part II: HCI in medicine; HCI for health and wellbeing; HCI in cultural heritage; HCI in complex environments; mobile and wearable HCI. Part III: input techniques and devices; speech-based interfaces and chatbots; gesture, motion and eye-tracking based interaction; games and gamification.

Technological Innovation for Cyber-Physical Systems - 7th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing,... Technological Innovation for Cyber-Physical Systems - 7th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2016, Costa de Caparica, Portugal, April 11-13, 2016, Proceedings (Paperback, Softcover reprint of the original 1st ed. 2016)
Luis M. Camarinha-Matos, Antonio J Falcao, Nazanin Vafaei, Shirin Najdi
R4,731 Discovery Miles 47 310 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2016, held in Costa de Caparica, Portugal, in April 2016. The 53 revised full papers were carefully reviewed and selected from 112 submissions. The papers present selected results produced in engineering doctoral programs and focus on research, development, and application of cyber-physical systems. Research results and ongoing work are presented, illustrated and discussed in the following areas: enterprise collaborative networks; ontologies; Petri nets; manufacturing systems; biomedical applications; intelligent environments; control and fault tolerance; optimization and decision support; wireless technologies; energy: smart grids, renewables, management, and optimization; bio-energy; and electronics.

Security and Privacy in Communication Networks - SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON,... Security and Privacy in Communication Networks - SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings (Paperback, 1st ed. 2018)
Xiaodong Lin, Ali Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang
R1,615 Discovery Miles 16 150 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of two workshops held at the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017: the 5th International Workshop on Applications and Techniques in Cyber Security, ATCS 2017, and the First Workshop on Security and Privacy in the Internet Of Things, SePrIoT 2017.The 22 revised regular papers were carefully reviewed and selected from 105 submissions. The topics range from access control; language-based security; malicious software; network security; cloud security; software security; operating system security; privacy protection, database security, security models; and many more.The SePrIoT workshop targets to address novel approaches in security and privacy. The papers focuse, amongst others, on novel models, techniques, protocols, algorithms, or architectures.

Human Re-Identification (Paperback, Softcover reprint of the original 1st ed. 2016): Ziyan Wu Human Re-Identification (Paperback, Softcover reprint of the original 1st ed. 2016)
Ziyan Wu
R3,328 Discovery Miles 33 280 Ships in 10 - 15 working days

This book covers aspects of human re-identification problems related to computer vision and machine learning. Working from a practical perspective, it introduces novel algorithms and designs for human re-identification that bridge the gap between research and reality. The primary focus is on building a robust, reliable, distributed and scalable smart surveillance system that can be deployed in real-world scenarios. This book also includes detailed discussions on pedestrian candidates detection, discriminative feature extraction and selection, dimension reduction, distance/metric learning, and decision/ranking enhancement.This book is intended for professionals and researchers working in computer vision and machine learning. Advanced-level students of computer science will also find the content valuable.

Cross-Cultural Design. Methods, Tools, and Users - 10th International Conference, CCD 2018, Held as Part of HCI International... Cross-Cultural Design. Methods, Tools, and Users - 10th International Conference, CCD 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part I (Paperback, 1st ed. 2018)
Pei-Luen Patrick Rau
R3,700 Discovery Miles 37 000 Ships in 10 - 15 working days

This two-volume set LNCS 10911 and 10912 constitutes the refereed proceedings of the 10th International Conference on Cross-Cultural Design, CCD 2018, held as part of HCI International 2018 in Las Vegas, NV, USA, in July 2018.The total of 1170 papers and 195 posters included in the 30 HCII 2018 proceedings volumes was carefully reviewed and selected from 4373 submissions.The 36 regular papers presented in this volume were organized in topical sections named: cross-cultural design methods and tools; cross-cultural product design; cultural Differences; and culture, emotions and design.

Cyber Deception - Building the Scientific Foundation (Paperback, Softcover reprint of the original 1st ed. 2016): Sushil... Cyber Deception - Building the Scientific Foundation (Paperback, Softcover reprint of the original 1st ed. 2016)
Sushil Jajodia, V.S. Subrahmanian, Vipin Swarup, Cliff Wang
R5,358 Discovery Miles 53 580 Ships in 10 - 15 working days

This edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more. The work presented in this book highlights the complex and multi-facted aspects of cyber deception, identifies the new scientific problems that will emerge in the domain as a result of the complexity, and presents novel approaches to these problems. This book can be used as a text for a graduate-level survey/seminar course on cutting-edge computer science research relating to cyber-security, or as a supplemental text for a regular graduate-level course on cyber-security.

Formal Techniques for Distributed Objects, Components, and Systems - 38th IFIP WG 6.1 International Conference, FORTE 2018,... Formal Techniques for Distributed Objects, Components, and Systems - 38th IFIP WG 6.1 International Conference, FORTE 2018, Held as Part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018, Madrid, Spain, June 18-21, 2018, Proceedings (Paperback, 1st ed. 2018)
Christel Baier, Luis Caires
R2,183 Discovery Miles 21 830 Ships in 10 - 15 working days

This book constitutes the proceedings of the 38th IFIP WG 6.1 International Conference on Formal Techniques for Distributed Objects, Components, and Systems, FORTE 2018, held in Madrid, Spain, in June 2018, as part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018. The 10 full papers presented were carefully reviewed and selected from 28 submissions. The conference is dedicated to fundamental research on theory, models, tools, and applications for distributed systems.

Security and Resiliency Analytics for Smart Grids - Static and Dynamic Approaches (Paperback, Softcover reprint of the original... Security and Resiliency Analytics for Smart Grids - Static and Dynamic Approaches (Paperback, Softcover reprint of the original 1st ed. 2016)
Ehab Al-Shaer, Mohammad Ashiqur Rahman
R3,449 Discovery Miles 34 490 Ships in 10 - 15 working days

This book targets the key concern of protecting critical infrastructures such as smart grids. It explains various static and dynamic security analysis techniques that can automatically verify smart grid security and resiliency and identify potential attacks in a proactive manner. This book includes three main sections. The first presents the idea of formally verifying the compliance of smart grid configurations with the security and resiliency guidelines. It provides a formal framework that verifies the compliance of the advanced metering infrastructure (AMI) configurations with the security and resiliency requirements, and generates remediation plans for potential security violations. The second section covers the formal verification of the security and resiliency of smart grid control systems by using a formal model to analyze attack evasions on state estimation, a core control module of the supervisory control system in smart grids. The model identifies attack vectors that can compromise state estimation. This section also covers risk mitigation techniques that synthesize proactive security plans that make such attacks infeasible. The last part of the book discusses the dynamic security analysis for smart grids. It shows that AMI behavior can be modeled using event logs collected at smart collectors, which in turn can be verified using the specification invariants generated from the configurations of the AMI devices. Although the focus of this book is smart grid security and resiliency, the included formal analytics are generic enough to be extended to other cyber-physical systems, especially those related to industrial control systems (ICS). Therefore, industry professionals and academic researchers will find this book an exceptional resource to learn theoretical and practical aspects of applying formal methods for the protection of critical infrastructures.

Computer Networks - 25th International Conference, CN 2018, Gliwice, Poland, June 19-22, 2018, Proceedings (Paperback, 1st ed.... Computer Networks - 25th International Conference, CN 2018, Gliwice, Poland, June 19-22, 2018, Proceedings (Paperback, 1st ed. 2018)
Piotr Gaj, Michal Sawicki, Grazyna Suchacka, Andrzej Kwiecien
R1,649 Discovery Miles 16 490 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed proceedings of the 25th International Conference on Computer Networks, CN 2018, held in Gliwice, Poland, in June 2018. The 34 full papers presented were carefully reviewed and selected from 86 submissions. They are organized in topical sections on computer networks; teleinformatics and telecommunications; queueing theory; cybersecurity and quality service.

Cyber Threat Intelligence (Paperback, Softcover reprint of the original 1st ed. 2018): Ali Dehghantanha, Mauro Conti, Tooska... Cyber Threat Intelligence (Paperback, Softcover reprint of the original 1st ed. 2018)
Ali Dehghantanha, Mauro Conti, Tooska Dargahi
R4,846 Discovery Miles 48 460 Ships in 10 - 15 working days

This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices. This book also provides the technical information on cyber-threat detection methods required for the researcher and digital forensics experts, in order to build intelligent automated systems to fight against advanced cybercrimes. The ever increasing number of cyber-attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost real-time, and with such a large number of attacks is not possible without deeply perusing the attack features and taking corresponding intelligent defensive actions - this in essence defines cyber threat intelligence notion. However, such intelligence would not be possible without the aid of artificial intelligence, machine learning and advanced data mining techniques to collect, analyze, and interpret cyber-attack campaigns which is covered in this book. This book will focus on cutting-edge research from both academia and industry, with a particular emphasis on providing wider knowledge of the field, novelty of approaches, combination of tools and so forth to perceive reason, learn and act on a wide range of data collected from different cyber security and forensics solutions. This book introduces the notion of cyber threat intelligence and analytics and presents different attempts in utilizing machine learning and data mining techniques to create threat feeds for a range of consumers. Moreover, this book sheds light on existing and emerging trends in the field which could pave the way for future works. The inter-disciplinary nature of this book, makes it suitable for a wide range of audiences with backgrounds in artificial intelligence, cyber security, forensics, big data and data mining, distributed systems and computer networks. This would include industry professionals, advanced-level students and researchers that work within these related fields.

Advances in Digital Forensics VI - Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January... Advances in Digital Forensics VI - Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, Revised Selected Papers (Hardcover, Edition.)
Kam-Pui Chow, Sujeet Shenoi
R1,639 Discovery Miles 16 390 Ships in 10 - 15 working days

Advances in Digital Forensics VI describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Forensic Techniques, Internet Crime Investigations, Live Forensics, Advanced Forensic Techniques, and Forensic Tools. This book is the sixth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-one edited papers from the Sixth Annual IFIP WG 11.9 International Conference on Digital Forensics, held at the University of Hong Kong, Hong Kong, China, in January 2010.

New Frontiers in Quantitative Methods in Informatics - 7th Workshop, InfQ 2017, Venice, Italy, December 4, 2017, Revised... New Frontiers in Quantitative Methods in Informatics - 7th Workshop, InfQ 2017, Venice, Italy, December 4, 2017, Revised Selected Papers (Paperback, 1st ed. 2018)
Simonetta Balsamo, Andrea Marin, Enrico Vicario
R1,563 Discovery Miles 15 630 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th Workshop on New Frontiers in Quantitative Methods in Informatics, InfQ 2017, held in Venice, Italy, in December 2017. The 11 revised full papers and the one revised short paper presented were carefully reviewed and selected from 22 submissions. The papers are organized in topical sections on networking and mobile applications; applications of quantitative modeling; big data processing and IoT; theory, methods and tools for quantitative analysis.

Network Coding at Different Layers in Wireless Networks (Paperback, Softcover reprint of the original 1st ed. 2016): Yang Qin Network Coding at Different Layers in Wireless Networks (Paperback, Softcover reprint of the original 1st ed. 2016)
Yang Qin
R3,558 Discovery Miles 35 580 Ships in 10 - 15 working days

This book focuses on how to apply network coding at different layers in wireless networks - including MAC, routing, and TCP - with special focus on cognitive radio networks. It discusses how to select parameters in network coding (e.g., coding field, number of packets involved, redundant information ration) in order to be suitable for the varying wireless environments. The author explores how to deploy network coding in MAC to improve network performance and examine joint network coding with opportunistic routing to improve the successful rate of routing. In regards to TCP and network coding, the author considers transport layer protocol working with network coding to overcome the transmission error rate, particularly with how to use the ACK feedback of TCP to enhance the efficiency of network coding. The book pertains to researchers and postgraduate students, especially whose interests are in opportunistic routing and TCP in cognitive radio networks.

Algorithms and Models for the Web Graph - 15th International Workshop, WAW 2018, Moscow, Russia, May 17-18, 2018, Proceedings... Algorithms and Models for the Web Graph - 15th International Workshop, WAW 2018, Moscow, Russia, May 17-18, 2018, Proceedings (Paperback, 1st ed. 2018)
Anthony Bonato, Pawel Pralat, Andrei Raigorodskii
R2,135 Discovery Miles 21 350 Ships in 10 - 15 working days

This book constitutes the proceedings of the 15th International Workshop on Algorithms and Models for the Web Graph, WAW 2018, held in Moscow, Russia in May 2018. The 11 full papers presented in this volume were carefully reviewed and selected from various submissions. The papers focus on topics like the information retrieval and data mining on the Web; Web as a text repository and as a graph, induced in various ways by link among pages, hosts and users; the understanding of graphs that arise from the Web and various user activities on the Web; stimulation of the development of high-performance algorithms and applications that exploit these graphs.

Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada,... Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings (Paperback, 1st ed. 2018)
Xiaodong Lin, Ali Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang
R4,052 Discovery Miles 40 520 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed roceedings of the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017.The 31 revised regular papers and 15 short papers were carefully reviewed and selected from 105 submissions. The topics range from security and privacy in machine learning to differential privacy, which are currently hot research topics in cyber security research.

Computer and Network Security Essentials (Paperback, Softcover reprint of the original 1st ed. 2018): Kevin Daimi Computer and Network Security Essentials (Paperback, Softcover reprint of the original 1st ed. 2018)
Kevin Daimi; Contributions by Guillermo Francia, Levent Ertaul, Luis Hernandez Encinas, Eman El-Sheikh
R5,664 Discovery Miles 56 640 Ships in 10 - 15 working days

This book introduces readers to the tools needed to protect IT resources and communicate with security specialists when there is a security problem. The book covers a wide range of security topics including Cryptographic Technologies, Network Security, Security Management, Information Assurance, Security Applications, Computer Security, Hardware Security, and Biometrics and Forensics. It introduces the concepts, techniques, methods, approaches, and trends needed by security specialists to improve their security skills and capabilities. Further, it provides a glimpse into future directions where security techniques, policies, applications, and theories are headed. The book represents a collection of carefully selected and reviewed chapters written by diverse security experts in the listed fields and edited by prominent security researchers. Complementary slides are available for download on the book's website at Springer.com.

Full-Duplex Wireless Communications Systems - Self-Interference Cancellation (Paperback, Softcover reprint of the original 1st... Full-Duplex Wireless Communications Systems - Self-Interference Cancellation (Paperback, Softcover reprint of the original 1st ed. 2017)
Tho Le-Ngoc, Ahmed Masmoudi
R4,015 Discovery Miles 40 150 Ships in 10 - 15 working days

This book introduces the development of self-interference (SI)-cancellation techniques for full-duplex wireless communication systems. The authors rely on estimation theory and signal processing to develop SI-cancellation algorithms by generating an estimate of the received SI and subtracting it from the received signal. The authors also cover two new SI-cancellation methods using the new concept of active signal injection (ASI) for full-duplex MIMO-OFDM systems. The ASI approach adds an appropriate cancelling signal to each transmitted signal such that the combined signals from transmit antennas attenuate the SI at the receive antennas. The authors illustrate that the SI-pre-cancelling signal does not affect the data-bearing signal. This book is for researchers and professionals working in wireless communications and engineers willing to understand the challenges of deploying full-duplex and practical solutions to implement a full-duplex system. Advanced-level students in electrical engineering and computer science studying wireless communications will also find this book useful as a secondary textbook.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Algorithms for Data and Computation…
Alex X. Liu, Rui Li Hardcover R3,993 Discovery Miles 39 930
5G and Beyond - Fundamentals and…
Xingqin Lin, Namyoon Lee Hardcover R5,058 Discovery Miles 50 580
Learning-Based Reconfigurable Multiple…
Tho Le-Ngoc, Atoosa Dalili Shoaei Hardcover R3,025 Discovery Miles 30 250
Industrial IoT - Challenges, Design…
Ismail Butun Hardcover R5,025 Discovery Miles 50 250
Information Technology in Disaster Risk…
Yuko Murayama, Dimiter Velev, … Hardcover R3,064 Discovery Miles 30 640
Advances in Wireless Communications and…
Roumen Kountchev, Aniket Mahanti, … Hardcover R4,596 Discovery Miles 45 960
Reconfigurable Intelligent…
Hongliang Zhang, Boya Di, … Hardcover R5,025 Discovery Miles 50 250
Computational Intelligence in Data…
Vallidevi Krishnamurthy, Suresh Jaganathan, … Hardcover R2,746 Discovery Miles 27 460
Computer Networking - An All-in-One…
Quinn Kiser Hardcover R760 R667 Discovery Miles 6 670
2nd EAI International Conference on Big…
Anandakumar Haldorai, Arulmurugan Ramu, … Hardcover R5,966 Discovery Miles 59 660

 

Partners