![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > Network computers
The twentieth century ended with the vision of smart dust: a network of wirelessly connected devices whose size would match that of a dust particle, each one a se- containedpackageequippedwithsensing,computation,communication,andpower. Smart dust held the promise to bridge the physical and digital worlds in the most unobtrusive manner, blending together realms that were previously considered well separated. Applications involved scattering hundreds, or even thousands, of smart dust devices to monitor various environmental quantities in scenarios ranging from habitat monitoring to disaster management. The devices were envisioned to se- organize to accomplish their task in the most ef?cient way. As such, smart dust would become a powerful tool, assisting the daily activities of scientists and en- neers in a wide range of disparate disciplines. Wireless sensor networks (WSNs), as we know them today, are the most no- worthy attempt at implementing the smart dust vision. In the last decade, this ?eld has seen a fast-growing investment from both academia and industry. Signi?cant ?nancial resources and manpower have gone into making the smart dust vision a reality through WSNs. Yet, we still cannot claim complete success. At present, only specialist computerscientists or computerengineershave the necessary background to walk the road from conception to a ?nal, deployed, and running WSN system.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International ICST Conference on Sensor Systems and Software, S-Cube 2013, held in Lucca, Italy, 2013. The 8 revised full papers and 2 invited papers presented cover contributions on different technologies for wireless sensor networks, including security protocols, middleware, analysis tools and frameworks.
Grids, P2P and Services Computing, the 12th volume of the CoreGRID series, is based on the CoreGrid ERCIM Working Group Workshop on Grids, P2P and Service Computing in Conjunction with EuroPar 2009. The workshop will take place August 24th, 2009 in Delft, The Netherlands. Grids, P2P and Services Computing, an edited volume contributed by well-established researchers worldwide, will focus on solving research challenges for Grid and P2P technologies. Topics of interest include: Service Level Agreement, Data & Knowledge Management, Scheduling, Trust and Security, Network Monitoring and more. Grids are a crucial enabling technology for scientific and industrial development. This book also includes new challenges related to service-oriented infrastructures. Grids, P2P and Services Computing is designed for a professional audience composed of researchers and practitioners within the Grid community industry. This volume is also suitable for advanced-level students in computer science.
This book constitutes the refereed proceedings of the First International Conference on Applied Algorithms, ICAA 2014, held in Kolkata, India, in January 2014. ICAA is a new conference series with a mission to provide a quality forum for researchers working in applied algorithms. Papers presenting original contributions related to the design, analysis, implementation and experimental evaluation of efficient algorithms and data structures for problems with relevant real-world applications were sought, ideally bridging the gap between academia and industry. The 21 revised full papers presented together with 7 short papers were carefully reviewed and selected from 122 submissions.
This book constitutes the refereed proceedings of the 7th International Symposium on Engineering Secure Software and Systems, ESSoS 2015, held in Milan, Italy, in March 2015. The 11 full papers presented together with 5 short papers were carefully reviewed and selected from 41 submissions. The symposium features the following topics: formal methods; cloud passwords; machine learning; measurements ontologies; and access control.
This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Nature of Computation and Communication, ICTCC 2014, held in November 2014 in Ho Chi Minh City, Vietnam. The 34 revised full papers presented were carefully reviewed and selected from over 100 submissions. The papers cover formal methods for self-adaptive systems and discuss natural approaches and techniques for computation and communication.
This book constitutes the refereed proceedings of the 12 European Conference on Wireless Sensor Networks, EWSN 2015, held in Porto, Portugal, in February 2015. The 14 full papers and 9 short papers presented were carefully reviewed and selected from 85 submissions. They cover a wide range of topics grouped into five sessions: services and applications, mobility and delay-tolerance, routing and data dissemination, and human-centric sensing.
This two volume set LNCS 8630 and 8631 constitutes the proceedings of the 14th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2014, held in Dalian, China, in August 2014. The 70 revised papers presented in the two volumes were selected from 285 submissions. The first volume comprises selected papers of the main conference and papers of the 1st International Workshop on Emerging Topics in Wireless and Mobile Computing, ETWMC 2014, the 5th International Workshop on Intelligent Communication Networks, IntelNet 2014, and the 5th International Workshop on Wireless Networks and Multimedia, WNM 2014. The second volume comprises selected papers of the main conference and papers of the Workshop on Computing, Communication and Control Technologies in Intelligent Transportation System, 3C in ITS 2014, and the Workshop on Security and Privacy in Computer and Network Systems, SPCNS 2014.
This book constitutes the proceedings of the 13th IFIP TC 8 International Conference on Computer Information Systems and Industrial Management, CISIM 2014, held in Ho Chi Minh City, Vietnam, in November 2014. The 60 paper presented in this volume were carefully reviewed and selected from 98 submissions. They are organized in topical sections named: algorithms; biometrics and biometrics applications; data analysis and information retrieval; industrial management and other applications; modelling and optimization; networking; pattern recognition and image processing; and various aspects of computer security.
Semantic Web Services for Web Databases introduces an end-to-end framework for querying Web databases using novel Web service querying techniques. This includes a detailed framework for the query infrastructure for Web databases and services. Case studies are covered in the last section of this book. Semantic Web Services For Web Databases is designed for practitioners and researchers focused on service-oriented computing and Web databases.
Soft computing, as opposed to conventional "hard" computing, tolerates imprecision and uncertainty, in a way very much similar to the human mind. Soft computing techniques include neural networks, evolutionary computation, fuzzy logic, and chaos. The recent years have witnessed tremendous success of these powerful methods in virtually all areas of science and technology, as evidenced by the large numbers of research results published in a variety of journals, conferences, as weil as many excellent books in this book series on Studies in Fuzziness and Soft Computing. This volume is dedicated to recent novel applications of soft computing in communications. The book is organized in four Parts, i.e., (1) neural networks, (2) evolutionary computation, (3) fuzzy logic and neurofuzzy systems, and (4) kernel methods. Artificial neural networks consist of simple processing elements called neurons, which are connected by weights that may be adjusted during learning. Part 1 of the book has seven chapters, demonstrating some of the capabilities of two major types of neural networks, i.e., multiplayer perceptron (MLP) neural networks and Hopfield-type neural networks.
This brief presents research results on social cognitive radio networks, a transformational and innovative networking paradigm that promotes the nexus between social interactions and cognitive radio networks. Along with a review of the research literature, the text examines the key motivation and challenges of social cognitive radio network design. Three socially inspired distributed spectrum sharing mechanisms are introduced: adaptive channel recommendation mechanism, imitation-based social spectrum sharing mechanism, and evolutionarily stable spectrum access mechanism. The brief concludes with a discussion of future research directions which ascertains that exploiting social interactions for distributed spectrum sharing will advance the state-of-the-art of cognitive radio network design, spur a new line of thinking for future wireless networks, and enable novel wireless service and applications.
In the last few years, a stimulating idea is fast emergingin the wireless scenario: the pervasive presence around us of a variety of "things" or "objects", such as RFID, sensors, actuators, mobile phones, which, through unique addressing schemes, are able to interact with each other and cooperate with their neighboring "smart" c- ponents to reach common goals. This novel paradigm, named "The Internet of Things" (IoT) continues on the path set by the concept of smart environments and paves the way to the depl- ment of numerous applications with a signi cant impact on many elds of future every-day life. In this context, logistics, Intelligent Transportation Systems (ITS), business/process management,assisted living, and e-health are only a few examples of possible application elds in which this novel paradigm will play a leading role in the next future. Actually,manychallengingissues still needto be addressedand both technolo- calandsocialnodesuntiedbeforethe IoTideabeingwidelyaccepted.Centralissues are making a full interoperabilityof such devices possible, enablingtheir adaptation and autonomousbehavior, as well as guaranteeingtrust, privacy,and security. Also, the IoT idea poses several new problemsconcerningthe networkingaspects. In fact, the "things" composing the IoT will be characterized by low resources in terms of both computation and energy capacity. Accordingly, the proposed solutions need to payspecial attentionto resourceef ciencybesides the obviousscalability problems. The papers included in this volume present a picture of the current state of the art on the above issues; more speci cally, concepts and ideas are discussed on n- working, middleware, security and privacy, RFID and sensor networks, as well as electromagnetic aspects.
This book constitutes the refereed proceedings of the 8th International Conference on Scalable Uncertainty Management, SUM 2014, held in Oxford, UK, in September 2014. The 20 revised full papers and 6 revised short papers were carefully reviewed and selected from 47 submissions. The papers cover topics in all areas of managing and reasoning with substantial and complex kinds of uncertain, incomplete or inconsistent information including applications in decision support systems, machine learning, negotiation technologies, semantic web applications, search engines, ontology systems, information retrieval, natural language processing, information extraction, image recognition, vision systems, data and text mining, and the consideration of issues such as provenance, trust, heterogeneity, and complexity of data and knowledge.
This book constitutes the refereed proceedings of the 11th International Conference on Service-Oriented Computing, ICSOC 2012, held in Berlin, Germany, in December 2013. The 29 full papers and 27 short papers presented were carefully reviewed and selected from 205 submissions. The papers are organized in topical sections on service engineering, service operations and management; services in the cloud; and service applications and implementations.
This book constitutes the thoroughly refereed post conference proceedings of the Third International Conference on Cloud Computing, Cloud Comp 2012, held in Vienna, Austria, in September 2012. The 14 revised full papers were carefully reviewed and selected from numerous submissions and cover various topics in the application of cloud computing technologies.
This book constitutes the refereed proceedings of the 9th International Haifa Verification Conference, HVC 2013, held in Haifa, Israel in November 2013. The 24 revised full papers presented were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on SAT and SMT-based verification, software testing, supporting dynamic verification, specification and coverage, abstraction and model presentation.
The two-volume set LNCS 8297 and LNCS 8298 constitutes the proceedings of the 4th International Conference on Swarm, Evolutionary and Memetic Computing, SEMCCO 2013, held in Chennai, India, in December 2013. The total of 123 papers presented in this volume was carefully reviewed and selected for inclusion in the proceedings. They cover cutting-edge research on swarm, evolutionary and memetic computing, neural and fuzzy computing and its application.
This book constitutes the thoroughly refereed proceedings of the 15th International Conference on Advanced Concepts for Intelligent Vision Systems, ACIVS 2013, held in Pozna, Poland, in October 2013. The 63 revised full papers were carefully selected from 111 submissions. The topics covered are aquisition, pre-processing and coding, biometry, classification and recognition, depth, 3D and tracking, efficient implementation and frameworks, low level image analysis, segmentation and video analysis."
This book constitutes the refereed proceedings of the 25th IFIP WG 6.1 International Conference on Testing Software and Systems, ICTSS 2013, held in Istanbul, Turkey, in November 2013. The 17 revised full papers presented together with 3 short papers were carefully selected from 68 submissions. The papers are organized in topical sections on model-based testing, testing timed and concurrent systems, test suite selection and effort estimation, tools and languages, and debugging.
This book constitutes the refereed proceedings of the First Australasian Conference on Artificial Life and Computational Intelligence, ACALCI 2015, held in Newcastle, NSW, Australia, in February 2015. The 34 revised full papers presented were carefully reviewed and selected from 63 submissions. The papers are organized in the following topical sections: philosophy and theory; game environments and methods; learning, memory and optimization; and applications and implementations.
This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Critical Information Infrastructures Security, CRITIS 2012, held in Lillehammer, Norway, in September 2012. The 23 revised full papers were thoroughly reviewed and selected from 67 submissions. The papers are structured in the following topical sections: intrusion management; smart metering and grid, analysis and modeling; SCADA; cyber issues; CI analysis; CIP sectors; CI assessment; and threat modeling.
One of the first books in the timely and important area of heavy traffic analysis of controlled and uncontrolled stochastics networks, by one of the leading authors in the field. The general theory is developed, with possibly state dependent parameters, and specialized to many different cases of practical interest.
This book constitutes the refereed proceedings of the 4th International Conference on Decision and Game Theory for Security, GameSec 2013, held in Fort Worth, TX, USA, in November 2013. The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. The conference focuses on analytical models based on game, information, communication, optimization, decision, and control theories that are applied to diverse security topics. At the same time, the connection between theoretical models and real world security problems are emphasized to establish the important feedback loop between theory and practice. Observing the scarcity of venues for researchers who try to develop a deeper theoretical understanding of the underlying incentive and resource allocation issues in security, we believe that GameSec will fill an important void and serve as a distinguished forum of highest standards for years to come.
This book addresses the need to improve TCP's performance inside data centers by providing solutions that are both practical and backward compatible with standard TCP versions. The authors approach this challenge first by deriving an analytical model for TCP's performance under typical data center workload traffic. They then discuss some solutions that are designed to improve TCP performance by either proactively detecting network congestion through probabilistic retransmission or by avoiding timeout penalty through dynamic resizing of TCP segments. Experimental results show that each of techniques discussed outperforms standard TCP inside a data center. |
You may like...
Software for Parallel Computation
Janusz S. Kowalik, Lucio Grandinetti
Hardcover
R2,853
Discovery Miles 28 530
Caraval: 4-Book Collection - Caraval…
Stephanie Garber
Hardcover
Mind the Gap - Navigating Your…
Doug Forsdick, Keri Martinson, …
Hardcover
|