0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (1)
  • R250 - R500 (15)
  • R500+ (4,483)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

An Introduction to Queueing Systems (Paperback, Softcover reprint of the original 1st ed. 2002): Sanjay K. Bose An Introduction to Queueing Systems (Paperback, Softcover reprint of the original 1st ed. 2002)
Sanjay K. Bose
R4,037 Discovery Miles 40 370 Ships in 18 - 22 working days

Queueing is an aspect of modern life that we encounter at every step in our daily activities. Whether it happens at the checkout counter in the supermarket or in accessing the Internet, the basic phenomenon of queueing arises whenever a shared facility needs to be accessed for service by a ]arge number of jobs or customers. The study of queueing is important as it gravides both a theoretical background to the kind of service that we may expect from such a facility and the way in which the facility itself may be designed to provide some specified grade of service to its customers. Our study of queueing was basically motivated by its use in the study of communication systems and computer networks. The various computers, routers and switches in such a network may be modelled as individual queues. The whole system may itself be modelled as a queueing network providing the required service to the messages, packets or cells that need to be carried. Application of queueing theory provides the theoretical framework for the design and study of such networks. The purpose of this book is to support a course on queueing systems at the senior undergraduate or graduate Ievels. Such a course would then provide the theoretical background on which a subsequent course on the performance modeHing and analysis of computer networks may be based.

Euro-Par 2014: Parallel Processing Workshops - Euro-Par 2014 International Workshops, Porto, Portugal, August 25-26, 2014,... Euro-Par 2014: Parallel Processing Workshops - Euro-Par 2014 International Workshops, Porto, Portugal, August 25-26, 2014, Revised Selected Papers, Part II (Paperback, 2014 ed.)
Luis Lopes, Julius Zilinskas, Alexandru Costan, Roberto G Cascella, Gabor Kecskemeti, …
R1,509 Discovery Miles 15 090 Ships in 18 - 22 working days

The two volumes LNCS 8805 and 8806 constitute the thoroughly refereed post-conference proceedings of 18 workshops held at the 20th International Conference on Parallel Computing, Euro-Par 2014, in Porto, Portugal, in August 2014. The 100 revised full papers presented were carefully reviewed and selected from 173 submissions. The volumes include papers from the following workshops: APCI&E (First Workshop on Applications of Parallel Computation in Industry and Engineering - BigDataCloud (Third Workshop on Big Data Management in Clouds) - DIHC (Second Workshop on Dependability and Interoperability in Heterogeneous Clouds) - FedICI (Second Workshop on Federative and Interoperable Cloud Infrastructures) - Hetero Par (12th International Workshop on Algorithms, Models and Tools for Parallel Computing on Heterogeneous Platforms) - HiBB (5th Workshop on High Performance Bioinformatics and Biomedicine) - LSDVE (Second Workshop on Large Scale Distributed Virtual Environments on Clouds and P2P) - MuCoCoS (7th International Workshop on Multi-/Many-core Computing Systems) - OMHI (Third Workshop on On-chip Memory Hierarchies and Interconnects) - PADAPS (Second Workshop on Parallel and Distributed Agent-Based Simulations) - PROPER (7th Workshop on Productivity and Performance) - Resilience (7th Workshop on Resiliency in High Performance Computing with Clusters, Clouds, and Grids) - REPPAR (First International Workshop on Reproducibility in Parallel Computing) - ROME (Second Workshop on Runtime and Operating Systems for the Many Core Era) - SPPEXA (Workshop on Software for Exascale Computing) - TASUS (First Workshop on Techniques and Applications for Sustainable Ultrascale Computing Systems) - UCHPC (7th Workshop on Un Conventional High Performance Computing) and VHPC (9th Workshop on Virtualization in High-Performance Cloud Computing.

Applications of Evolutionary Computation - 17th European Conference, EvoApplications 2014, Granada, Spain, April 23-25, 2014,... Applications of Evolutionary Computation - 17th European Conference, EvoApplications 2014, Granada, Spain, April 23-25, 2014, Revised Selected Papers (Paperback, 2014 ed.)
Anna I. Esparcia-Alcazar, Antonio M. Mora
R2,843 Discovery Miles 28 430 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on the Applications of Evolutionary Computation, EvoApplications 2014, held in Granada, Spain, in April 2014, colocated with the Evo* 2014 events EuroGP, EvoCOP, and EvoMUSART. The 79 revised full papers presented were carefully reviewed and selected from 128 submissions. EvoApplications 2014 consisted of the following 13 tracks: EvoCOMNET (nature-inspired techniques for telecommunication networks and other parallel and distributed systems), EvoCOMPLEX (evolutionary algorithms and complex systems), EvoENERGY (evolutionary computation in energy applications), EvoFIN (evolutionary and natural computation in finance and economics), EvoGAMES (bio-inspired algorithms in games), EvoIASP (evolutionary computation in image analysis, signal processing, and pattern recognition), EvoINDUSTRY (nature-inspired techniques in industrial settings), EvoNUM (bio-inspired algorithms for continuous parameter optimization), EvoPAR (parallel implementation of evolutionary algorithms), EvoRISK (computational intelligence for risk management, security and defence applications), EvoROBOT (evolutionary computation in robotics), EvoSTOC (evolutionary algorithms in stochastic and dynamic environments), and EvoBio (EC and related techniques in bioinformatics and computational biology).

Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014,... Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers (Paperback, 2014 ed.)
Frances Cleary, Massimo Felici
R1,846 Discovery Miles 18 460 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed, selected papers on the Second Cyber Security and Privacy EU Forum, CSP 2014, held in Athens, Greece, in May 2014. The 14 revised full papers presented were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on security; accountability, data protection and privacy; research and innovation.

Social Media Retrieval (Paperback, 2013 ed.): Naeem Ramzan, Roelof Van Zwol, Jong-Seok Lee, Kai Cluver, Xian-Sheng Hua Social Media Retrieval (Paperback, 2013 ed.)
Naeem Ramzan, Roelof Van Zwol, Jong-Seok Lee, Kai Cluver, Xian-Sheng Hua
R5,275 Discovery Miles 52 750 Ships in 18 - 22 working days

This comprehensive text/reference examines in depth the synergy between multimedia content analysis, personalization, and next-generation networking. The book demonstrates how this integration can result in robust, personalized services that provide users with an improved multimedia-centric quality of experience. Each chapter offers a practical step-by-step walkthrough for a variety of concepts, components and technologies relating to the development of applications and services. Topics and features: introduces the fundamentals of social media retrieval, presenting the most important areas of research in this domain; examines the important topic of multimedia tagging in social environments, including geo-tagging; discusses issues of personalization and privacy in social media; reviews advances in encoding, compression and network architectures for the exchange of social media information; describes a range of applications related to social media.

Theory and Practice of Natural Computing - Third International Conference, TPNC 2014, Granada, Spain, December 9-11, 2014.... Theory and Practice of Natural Computing - Third International Conference, TPNC 2014, Granada, Spain, December 9-11, 2014. Proceedings (Paperback, 2014 ed.)
Adrian Horia Dediu, Manuel Lozano, Carlos Martin-Vide
R2,100 Discovery Miles 21 000 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Conference, TPNC 2014, held in Granada, Spain, in December 2014. The 22 revised full papers presented in this book were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on nature-inspired models of computation; synthesizing nature by means of computation; nature-inspired materials; and information processing in nature.

Measurement Methodology and Tools - First European Workshop, FP7 FIRE/EULER Project, May 9, 2012, Aalborg, Denmark, Invited... Measurement Methodology and Tools - First European Workshop, FP7 FIRE/EULER Project, May 9, 2012, Aalborg, Denmark, Invited Papers (Paperback, 2013 ed.)
Lluis Fabrega, Pere Vila, Davide Careglio, Dimitri Papadimitriou
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the outcome of the Workshop on Measurement and Measurement Tools which was held as part of the Future Internet Research Experimentation (FIRE) initiative during the Future Internet Assembly conference (FIA) in May 2012. The 10 contributions included in this volume are invited extended versions of the presentations at the workshop. The book closes with a summary and conclusions of the findings in these papers.

Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings... Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings (Paperback, 2014 ed.)
Atul Prakash, Rudrapatna Shyamasundar
R2,693 Discovery Miles 26 930 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Conference on Information Systems Security, ICISS 2014, held in Hyderabad, India, in December 2014. The 20 revised full papers and 5 short papers presented together with 3 invited papers were carefully reviewed and selected from 129 submissions. The papers address the following topics: security inferences; security policies; security user interfaces; security attacks; malware detection; forensics; and location based security services.

Formal Methods and Software Engineering - 15th International Conference on Formal EngineeringMethods, ICFEM 2013, Queenstown,... Formal Methods and Software Engineering - 15th International Conference on Formal EngineeringMethods, ICFEM 2013, Queenstown, New Zealand, October 29 - November 1, 2013, Proceedings (Paperback, 2013 ed.)
Lindsay Groves, Jing Sun
R1,459 Discovery Miles 14 590 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 15th International Conference on Formal Engineering Methods, ICFEM 2013, held in Queenstown, New Zealand, in October/November 2013. The 28 revised full papers together with 2 keynote speeches presented were carefully reviewed and selected from 88 submissions. The topics covered are abstraction and refinement, formal specification and modeling, program analysis, software verification, formal methods for software safety, security, reliability and dependability, tool development, integration and experiments involving verified systems, formal methods used in certifying products under international standards, and formal model-based development and code generation.

Next Generation Optical Network Design and Modelling - IFIP TC6 / WG6.10 Sixth Working Conference on Optical Network Design and... Next Generation Optical Network Design and Modelling - IFIP TC6 / WG6.10 Sixth Working Conference on Optical Network Design and Modelling (ONDM 2002) February 4-6, 2002, Torino, Italy (Paperback, Softcover reprint of the original 1st ed. 2003)
Andrea Bianco, Fabio Neri
R2,711 Discovery Miles 27 110 Ships in 18 - 22 working days

Optical networks are leaving the labs and becoming a reality. Despite the current crisis of the telecom industry, our everyday life increasingly depends on communication networks for information exchange, medicine, education, data transfer, commerce, and many other endeavours. High capacity links are required by the large futemet traffic demand, and optical networks remain one of the most promising technologies for meeting these needs. WDM systems are today widely deployed, thanks to low-cost at extreme data rates and high reliability of optical components, such as optical amplifiers and fixed/tunable filters and transceivers. Access and metropolitan area networks are increasingly based on optical technologies to overcome the electronic bottleneck at the network edge. Traditional multi-layer architectures, such as the widely deployed IP/ATM/SDH protocol stack, are increasingly based on WDM transport; further efforts are sought to move at the optical layer more of the functionalities available today in higher protocol layers. New components and subsystems for very high speed optical networks offer new design opportunities to network operators and designers. The trends towards dynamically configurable all-optical network infrastructures open up a wide range of new network engineering and design choices, which must face issues such as interoperability and unified control and management.

Location Privacy Protection in Mobile Networks (Paperback, 2013 ed.): Xinxin Liu, Xiaolin Li Location Privacy Protection in Mobile Networks (Paperback, 2013 ed.)
Xinxin Liu, Xiaolin Li
R1,592 Discovery Miles 15 920 Ships in 18 - 22 working days

This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users' privacy. The second approach considers a totally distributed environment where users perform privacy protection by themselves. Finally, more general system architecture is discussed including how a semi-trusted server may exist, but users need to collaborate to achieve maximized privacy protection. This brief is designed for researchers and professionals working with privacy preservation, mobile networks, and threat models. The variety of approaches presented makes it useful for students as well.

Distributed Computing and Internet Technology - 11th International Conference, ICDCIT 2015, Bhubaneswar, India, February 5-8,... Distributed Computing and Internet Technology - 11th International Conference, ICDCIT 2015, Bhubaneswar, India, February 5-8, 2015. Proceedings (Paperback, 2015 ed.)
Raja Natarajan, Gautam Barua, Manas Ranjan Patra
R2,629 Discovery Miles 26 290 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 11th International Conference on Distributed Computing and Internet Technology, ICDCIT 2015, held in Bhubaneswar, India, in February 2015. The 12 revised full papers presented together with 30 short papers and 9 invited talks in this volume were carefully reviewed and selected from 221 submissions. The papers cover topics such as distributed computing and algorithms; internet technologies and Web services; secure computing and communication; cloud computing; information retrieval and recommender systems and societal applications.

Signal Processing and Information Technology - Second International Joint Conference, SPIT 2012, Dubai, UAE, September 20-21,... Signal Processing and Information Technology - Second International Joint Conference, SPIT 2012, Dubai, UAE, September 20-21, 2012, Revised Selected Papers (Paperback, 2014 ed.)
Vinu V. Das, Passent M. El-Kafrawy
R1,994 Discovery Miles 19 940 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the Second International Joint Conference in Signal Processing and Information Technology, SPIT 2012, held in Dubai, UAE, in September 2012. The 32 papers included in this volume were carefully reviewed and selected from 330 submissions. The papers cover research and development activities in computer science, information technology, computational engineering, image and signal processing, and communication.

Protocols for High Speed Networks IV (Paperback, 1995 ed.): G. Neufeld, Mito Protocols for High Speed Networks IV (Paperback, 1995 ed.)
G. Neufeld, Mito
R4,033 Discovery Miles 40 330 Ships in 18 - 22 working days

Welcome to the fourth IFIP workshop on protocols for high speed networks in Vancouver. This workshop follows three very successful workshops held in Ziirich (1989), Palo Alto (1990) and Stockholm (1993) respectively. We received a large number of papers in response to our call for contributions. This year, forty papers were received of which sixteen were presented as full papers and four were presented as poster papers. Although we received many excellent papers the program committee decided to keep the number of full presentations low in order to accommodate more discussion in keeping with the format of a workshop. Many people have contributed to the success of this workshop including the members of the program committee who, with the additional reviewers, helped make the selection of the papers. We are thankful to all the authors of the papers that were submitted. We also thank several organizations which have contributed financially to this workshop, specially NSERC, ASI, CICSR, UBC, MPR Teltech and Newbridge Networks.

Scalable Uncertainty Management - 7th International Conference, SUM 2013, Washington, DC, USA, September 16-18, 2013,... Scalable Uncertainty Management - 7th International Conference, SUM 2013, Washington, DC, USA, September 16-18, 2013, Proceedings (Paperback, 2013 ed.)
Weiru Liu, V.S. Subrahmanian, Jef Wijsen
R1,437 Discovery Miles 14 370 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th International Conference on Scalable Uncertainty Management, SUM 2013, held in Washington, DC, USA, in September 2013. The 26 revised full papers and 3 revised short papers were carefully reviewed and selected from 57 submissions. The papers cover topics in all areas of managing and reasoning with substantial and complex kinds of uncertain, incomplete or inconsistent information including applications in decision support systems, machine learning, negotiation technologies, semantic web applications, search engines, ontology systems, information retrieval, natural language processing, information extraction, image recognition, vision systems, data and text mining, and the consideration of issues such as provenance, trust, heterogeneity, and complexity of data and knowledge.

Security Engineering and Intelligence Informatics - CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September... Security Engineering and Intelligence Informatics - CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013, Proceedings (Paperback, 2013 ed.)
Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Li Da Xu
R1,458 Discovery Miles 14 580 Ships in 18 - 22 working days

This volume constitutes the refereed proceedings of two workshops: the Second International Workshop on Modern Cryptography and Security Engineering (MoCrySEn 2013) and the Third International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2013) held within the framework of the IFIP 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, in Regensburg, Germany, in September 2013. The 16 revised papers presented at MoCrySEn 2013 were carefully reviewed and selected from 30 submissions. They deal with symmetric-key cryptography, public-key cryptography, algorithmic cryptanalysis, software and hardware implementation of cryptographic algorithms, database encryption, and interaction between cryptographic theory and implementation issues. The 15 papers presented at SeCIHD 2013 are organized in topical sections on cyber security and dependability, network security and privacy, and multimedia technology for homeland defense.

Evolution of Telecommunication Services - The Convergence of Telecom and Internet: Technologies and Ecosystems (Paperback, 2013... Evolution of Telecommunication Services - The Convergence of Telecom and Internet: Technologies and Ecosystems (Paperback, 2013 ed.)
Emmanuel Bertin, Noel Crespi, Thomas Magedanz
R2,259 Discovery Miles 22 590 Ships in 18 - 22 working days

In the telecom world, services have usually been conceived with a specific mindset. This mindset has defined the traditional characteristics of these services; services distinguished by their linkage with the access network, tight control over service use (e.g., authentication, billing), lack of deep personalization capabilities (mass services only) and reliance on standardization to achieve end-to-end interoperability between all the actors of the value chain (e.g., operators, platform manufacturers, device manufactures). This book offers insights into this complex but exciting world of telecommunications characterized by constant evolution, and approaches it from technology as well as business perspectives. The book is appropriately structured in three parts: (a) an overview of the state-of-the-art in fixed/mobile NGN and standardization activities; (b) an analysis of the competitive landscape between operators, device manufactures and OTT providers, emphasizing why network operators are challenged on their home turf; and (c) opportunities for business modeling and innovative telecom service offers.

Database Systems for Advanced Applications - 18th International Conference, DASFAA 2013, International Workshops:  BDMA, SNSM,... Database Systems for Advanced Applications - 18th International Conference, DASFAA 2013, International Workshops: BDMA, SNSM, SeCoP, Wuhan, China, April 22-25, 2013, Proceedings (Paperback, 2013 ed.)
Bonghee Hong, Xiaofeng Meng, Lei Chen, Werner Winiwarter, Wei Song
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the workshop proceedings of the 18th International Conference on Database Systems for Advanced Applications, DASFAA 2013, held in Wuhan, China, in April 2013. The volume contains three workshops, each focusing on specific area that contributes to the main themes of the DASFAA conference: The First International Workshop on Big Data Management and Analytics (BDMA 2013), the Third International Workshop on Social Networks and Social Web (SNSM 2013) and the International Workshop on Semantic Computing and Personalization (SeCoP 2013).

Web-Age Information Management - WAIM 2014 International Workshops: BigEM, HardBD, DaNoS, HRSUNE, BIDASYS, Macau, China, June... Web-Age Information Management - WAIM 2014 International Workshops: BigEM, HardBD, DaNoS, HRSUNE, BIDASYS, Macau, China, June 16-18, 2014, Revised Selected Papers (Paperback, 2014 ed.)
Yueguo Chen, Wolf-Tilo Balke, Jianliang Xu, Wei Xu, Peiquan Jin, …
R2,555 Discovery Miles 25 550 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of 5 workshops of the 15th International Conference on Web-Age Information Management, WAIM 2014, held in Macau, China, June 16-18, 2014. The 38 revised full papers are organized in topical sections on the 5 following workshops: Second International Workshop on Emergency Management in Big Data Age, BigEM 2014; Second International Workshop on Big Data Management on Emerging Hardware, HardBD 2014; International Workshop on Data Management for Next-Generation Location-based Services, DaNoS 2014; International Workshop on Human Aspects of Making Recommendations in Social Ubiquitous Networking Environment, HRSUME 2014; International Workshop on Big Data Systems and Services, BIDASYS 2014.

Trustworthy Execution on Mobile Devices (Paperback, 2014 ed.): Amit Vasudevan, Jonathan M. McCune, James Newsome Trustworthy Execution on Mobile Devices (Paperback, 2014 ed.)
Amit Vasudevan, Jonathan M. McCune, James Newsome
R1,356 Discovery Miles 13 560 Ships in 18 - 22 working days

This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated for leveraging such primitives, and proves that they can indeed strengthen the security properties available to applications and users, without reducing the properties currently enjoyed by OEMs and network carriers. Finally, this brief makes recommendations for future research that may yield practical and deployable results.

Lightweight Cryptography for Security and Privacy - 2nd International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013,... Lightweight Cryptography for Security and Privacy - 2nd International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers (Paperback, 2013 ed.)
Gildas Avoine, Orhun Kara
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the proceedings of the 2th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2013, held in Gebze, Turkey, during May 6-7, 2013. The 10 full papers presented together with 3 invited talks were carefully reviewed and selected from 27 submissions. The papers are grouped in topical sections on efficient Implementations and designs, block cipher cryptanalysis, wireless sensor networks, and cryptographic protocols.

Handbook of Optimization in Complex Networks - Theory and Applications (Paperback, 2012 ed.): My T. Thai, Panos M. Pardalos Handbook of Optimization in Complex Networks - Theory and Applications (Paperback, 2012 ed.)
My T. Thai, Panos M. Pardalos
R4,083 Discovery Miles 40 830 Ships in 18 - 22 working days

Complex Social Networks is a newly emerging (hot) topic with applications in a variety of domains, such as communication networks, engineering networks, social networks, and biological networks. In the last decade, there has been an explosive growth of research on complex real-world networks, a theme that is becoming pervasive in many disciplines, ranging from mathematics and computer science to the social and biological sciences. Optimization of complex communication networks requires a deep understanding of the interplay between the dynamics of the physical network and the information dynamics within the network. Although there are a few books addressing social networks or complex networks, none of them has specially focused on the optimization perspective of studying these networks. This book provides the basic theory of complex networks with several new mathematical approaches and optimization techniques to design and analyze dynamic complex networks. A wide range of applications and optimization problems derived from research areas such as cellular and molecular chemistry, operations research, brain physiology, epidemiology, and ecology.

Euro-Par 2013: Parallel Processing - 19th International Conference, Aachen, Germany, August 26-30, 2013, Proceedings... Euro-Par 2013: Parallel Processing - 19th International Conference, Aachen, Germany, August 26-30, 2013, Proceedings (Paperback, 2013 ed.)
Felix Wolf, Bernd Mohr, Dieter an Mey
R1,576 Discovery Miles 15 760 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 19th International Conference on Parallel and Distributed Computing, Euro-Par 2013, held in Aachen, Germany, in August 2013. The 70 revised full papers presented were carefully reviewed and selected from 261 submissions. The papers are organized in 16 topical sections: support tools and environments; performance prediction and evaluation; scheduling and load balancing; high-performance architectures and compilers; parallel and distributed data management; grid, cluster and cloud computing; peer-to-peer computing; distributed systems and algorithms; parallel and distributed programming; parallel numerical algorithms; multicore and manycore programming; theory and algorithms for parallel computation; high performance networks and communication; high performance and scientific applications; GPU and accelerator computing; and extreme-scale computing.

Computer Information Systems and Industrial Management - 12th IFIP TC 8 International Conference, CISIM 2013, Krakow, Poland,... Computer Information Systems and Industrial Management - 12th IFIP TC 8 International Conference, CISIM 2013, Krakow, Poland, September 25-27, 2013, Proceedings (Paperback, 2013 ed.)
Khalid Saeed, Rituparna Chaki, Agostino Cortesi, Slawomir Wierzchon
R1,475 Discovery Miles 14 750 Ships in 18 - 22 working days

This book constitutes the proceedings of the 12th IFIP TC 8 International Conference, CISIM 2013, held in Cracow, Poland, in September 2013. The 44 papers presented in this volume were carefully reviewed and selected from over 60 submissions. They are organized in topical sections on biometric and biomedical applications; pattern recognition and image processing; various aspects of computer security, networking, algorithms, and industrial applications. The book also contains full papers of a keynote speech and the invited talk.

Internet Resource Pricing Models (Paperback, 2014 ed.): Ke Xu, Yifeng Zhong, Huan He Internet Resource Pricing Models (Paperback, 2014 ed.)
Ke Xu, Yifeng Zhong, Huan He
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This brief guides the reader through three basic Internet resource pricing models using an Internet cost analysis. Addressing the evolution of service types, it presents several corresponding mechanisms which can ensure pricing implementation and resource allocation. The authors discuss utility optimization of network pricing methods in economics and underline two classes of pricing methods including system optimization and entities' strategic optimization. The brief closes with two examples of the newly proposed pricing strategy helping to solve the profit distribution problem brought by P2P free-riding and improve the pricing efficiency with the introduction of the price discrimination. The Internet resource pricing strategy is not only the key factor of Internet resource allocation efficiency, but also the determinant of the profit. The methods and models discussed in Internet Resource Pricing Models increase the efficiency of existing pricing strategies to ensure a sound and sustainable development of the Internet. The brief will help researchers and professionals working with this key factor of Internet resource allocation.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Handbook of Multimedia Information…
Amit Kumar Singh, Anand Mohan Hardcover R6,633 Discovery Miles 66 330
Cable Networks, Services, and Management
M Toy Hardcover R3,354 Discovery Miles 33 540
The Internet of Things in the Industrial…
Zaigham Mahmood Hardcover R4,001 Discovery Miles 40 010
Potential-Based Analysis of Social…
Seyed Rasoul Etesami Hardcover R3,554 R3,294 Discovery Miles 32 940
Distributed Real-Time Systems - Theory…
K. Erciyes Hardcover R2,132 Discovery Miles 21 320
Designing Networks for Innovation and…
Matthaus P. Zylka, Hauke Fuehres, … Hardcover R3,554 R3,294 Discovery Miles 32 940
Fault Tolerant Architectures for…
Sikhar Patranabis, Debdeep Mukhopadhyay Hardcover R3,802 Discovery Miles 38 020
Cyber-Physical Systems - Foundations…
Houbing Song, Danda B. Rawat, … Paperback R2,507 R2,368 Discovery Miles 23 680
Crossbar-Based Interconnection Networks…
Mohsen Jahanshahi, Fathollah Bistouni Hardcover R1,408 Discovery Miles 14 080
Malicious Attack Propagation and Source…
Jiaojiao Jiang, Sheng Wen, … Hardcover R3,336 Discovery Miles 33 360

 

Partners