0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (1)
  • R250 - R500 (18)
  • R500+ (4,474)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

Recent Trends in Computer Networks and Distributed Systems Security - Second International Conference, SNDS 2014, Trivandrum,... Recent Trends in Computer Networks and Distributed Systems Security - Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014. Proceedings (Paperback, 2014 ed.)
Gregorio Martinez Perez, Sabu M. Thampi, Ryan Ko, Lei Shu
R2,904 Discovery Miles 29 040 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014, held in Trivandrum, India, in March 2014. The 32 revised full papers presented together with 9 short papers and 8 workshop papers were carefully reviewed and selected from 129 submissions. The papers are organized in topical sections on security and privacy in networked systems; multimedia security; cryptosystems, algorithms, primitives; system and network security; short papers. The workshop papers were presented at the following workshops: Second International Workshop on Security in Self-Organising Networks (Self Net 2014); Workshop on Multidisciplinary Perspectives in Cryptology and Information Security (CIS 2014); Second International Workshop on Trust and Privacy in Cyberspace (Cyber Trust 2014).

Communications: Wireless in Developing Countries and Networks of the Future - 3rd IFIP TC 6 International Conference, WCITD... Communications: Wireless in Developing Countries and Networks of the Future - 3rd IFIP TC 6 International Conference, WCITD 2010 and IFIP TC 6 International Conference, NF 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010, Proceedings (Paperback, 2010 ed.)
Ana Pont, Guy Pujolle, S.V. Raghavan
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Communications: Wireless in Developing Countries and Networks of the Future The present book contains the proceedings of two conferences held at the World Computer Congress 2010 in Brisbane, Australia (September 20-23) organized by the International Federation for Information Processing (IFIP): the Third IFIP TC 6 Int- national Conference on Wireless Communications and Information Technology for Developing Countries (WCITD 2010) and the IFIP TC 6 International Network of the Future Conference (NF 2010). The main objective of these two IFIP conferences on communications is to provide a platform for the exchange of recent and original c- tributions in wireless networks in developing countries and networks of the future. There are many exiting trends and developments in the communications industry, several of which are related to advances in wireless networks, and next-generation Internet. It is commonly believed in the communications industry that a new gene- tion should appear in the next ten years. Yet there are a number of issues that are being worked on in various industry research and development labs and universities towards enabling wireless high-speed networks, virtualization techniques, smart n- works, high-level security schemes, etc. We would like to thank the members of the Program Committees and the external reviewers and we hope these proceedings will be very useful to all researchers int- ested in the fields of wireless networks and future network technologies.

Cooperative Device-to-Device Communication in Cognitive Radio Cellular Networks (Paperback, 2014 ed.): Peng Li, Song Guo Cooperative Device-to-Device Communication in Cognitive Radio Cellular Networks (Paperback, 2014 ed.)
Peng Li, Song Guo
R1,603 Discovery Miles 16 030 Ships in 18 - 22 working days

This brief examines current research on cooperative device-to-device (D2D) communication as an enhanced offloading technology to improve the performance of cognitive radio cellular networks. By providing an extensive review of recent advances in D2D communication, the authors demonstrate that the quality of D2D links significantly affects offloading performance in cellular networks, which motivates the design of cooperative D2D communication. After presenting the architecture of cooperative D2D communication, the challenges of capacity maximization and energy efficiency are addressed by optimizing relay assignment, power control and resource allocation. Furthermore, cooperative D2D communication is enhanced by network coding technology, and then is extended for broadcast sessions. Along with detailed problem formulation and hardness analysis, fast algorithms are developed by exploiting problem-specific characteristics such that they can be applied in practice.

Modeling and Simulation Tools for Emerging Telecommunication Networks - Needs, Trends, Challenges and Solutions (Paperback,... Modeling and Simulation Tools for Emerging Telecommunication Networks - Needs, Trends, Challenges and Solutions (Paperback, 2006 ed.)
Nejat Ince, Ercan Topuz
R5,207 Discovery Miles 52 070 Ships in 18 - 22 working days

This book comprises a selection of papers presented at a symposium organized under the aegis of COST Telecommunications Action 285. The main objective of the book is to enhance existing tools and develop new modeling and simulation tools for research in emerging multi-service telecommunication networks in the areas of model performance improvements, multilayer traffic modeling, and the important issue of evaluation and validation of the new modeling tools.

Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014,... Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers (Paperback, 2014 ed.)
Frances Cleary, Massimo Felici
R1,846 Discovery Miles 18 460 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed, selected papers on the Second Cyber Security and Privacy EU Forum, CSP 2014, held in Athens, Greece, in May 2014. The 14 revised full papers presented were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on security; accountability, data protection and privacy; research and innovation.

Cognitive Wireless Networks - Concepts, Methodologies and Visions Inspiring the Age of Enlightenment of Wireless Communications... Cognitive Wireless Networks - Concepts, Methodologies and Visions Inspiring the Age of Enlightenment of Wireless Communications (Paperback, 2007 ed.)
Frank H. P. Fitzek, Marcos D. Katz
R2,776 Discovery Miles 27 760 Ships in 18 - 22 working days

This book advocates the idea of breaking up the cellular communication architecture by introducing cooperative strategies among wireless devices through cognitive wireless networking. It details the cooperative and cognitive aspects for future wireless communication networks. Coverage includes social and biological inspired behavior applied to wireless networks, peer-to-peer networking, cooperative networks, and spectrum sensing and management.

Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Revised Selected Papers... Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Revised Selected Papers (Paperback, 2013 ed.)
Tanveer Zia, Albert Zomaya, Vijay Varadharajan, Morley Mao
R2,502 Discovery Miles 25 020 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Security and Privacy in Communication Networks, held in Sydney, Australia, in September 2013. The 26 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are grouped in topical sections on: security and privacy in mobile, sensor and ad hoc networks; malware, botnets and distributed denial of service; security for emerging technologies: VoIP, peer-to-peer and cloud computing; encryption and key management; security in software and machine learning; network and system security model; security and privacy in pervasive and ubiquitous computing.

Sensor Systems and Software - 4th International ICST Conference, S-Cube 2013, Lucca, Italy, June 11-12, 2013, Revised Selected... Sensor Systems and Software - 4th International ICST Conference, S-Cube 2013, Lucca, Italy, June 11-12, 2013, Revised Selected Papers (Paperback, 2013)
Marco Zuniga, Gianluca Dini
R1,701 Discovery Miles 17 010 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International ICST Conference on Sensor Systems and Software, S-Cube 2013, held in Lucca, Italy, 2013. The 8 revised full papers and 2 invited papers presented cover contributions on different technologies for wireless sensor networks, including security protocols, middleware, analysis tools and frameworks.

On the Move to Meaningful Internet Systems: OTM 2014 Workshops - Confederated International Workshops: OTM Academy, OTM... On the Move to Meaningful Internet Systems: OTM 2014 Workshops - Confederated International Workshops: OTM Academy, OTM Industry Case Studies Program, C&TC, EI2N, INBAST, ISDE, META4eS, MSC and OnToContent 2014, Amantea, Italy, October 27-31, 2014. Proceedings (Paperback, 2014 ed.)
Robert Meersman, Herve Panetto, Alok Mishra, Rafael Valencia-Garcia, Lucas Filipe Martins Da Silva, …
R1,518 Discovery Miles 15 180 Ships in 18 - 22 working days

This volume constitutes the refereed proceedings of the following 9 international workshops: OTM Academy, OTM Industry Case Studies Program, Cloud and Trusted Computing, C&TC, Enterprise Integration, Interoperability, and Networking, EI2N, Industrial and Business Applications of Semantic Web Technologies, INBAST, Information Systems, om Distributed Environment, ISDE, Methods, Evaluation, Tools and Applications for the Creation and Consumption of Structured Data for the e-Society, META4eS, Mobile and Social Computing for collaborative interactions, MSC, and Ontology Content, OnToContent 2014. These workshops were held as associated events at OTM 2014, the federated conferences "On The Move Towards Meaningful Internet Systems and Ubiquitous Computing", in Amantea, Italy, in October 2014. The 56 full papers presented together with 8 short papers, 6 posters and 5 keynotes were carefully reviewed and selected from a total of 96 submissions. The focus of the workshops were on the following subjects models for interoperable infrastructures, applications, privacy and access control, reliability and performance, cloud and configuration management, interoperability in (System-of-)Systems, distributed information systems applications, architecture and process in distributed information system, distributed information system development and operational environment, ontology is use for eSociety, knowledge management and applications for eSociety, social networks and social services, social and mobile intelligence, and multimodal interaction and collaboration.

Grids, P2P and Services Computing (Paperback, 2010 ed.): Frederic Desprez, Vladimir Getov, Thierry Priol, Ramin Yahyapour Grids, P2P and Services Computing (Paperback, 2010 ed.)
Frederic Desprez, Vladimir Getov, Thierry Priol, Ramin Yahyapour
R4,011 Discovery Miles 40 110 Ships in 18 - 22 working days

Grids, P2P and Services Computing, the 12th volume of the CoreGRID series, is based on the CoreGrid ERCIM Working Group Workshop on Grids, P2P and Service Computing in Conjunction with EuroPar 2009. The workshop will take place August 24th, 2009 in Delft, The Netherlands. Grids, P2P and Services Computing, an edited volume contributed by well-established researchers worldwide, will focus on solving research challenges for Grid and P2P technologies. Topics of interest include: Service Level Agreement, Data & Knowledge Management, Scheduling, Trust and Security, Network Monitoring and more. Grids are a crucial enabling technology for scientific and industrial development. This book also includes new challenges related to service-oriented infrastructures. Grids, P2P and Services Computing is designed for a professional audience composed of researchers and practitioners within the Grid community industry. This volume is also suitable for advanced-level students in computer science.

Nature of Computation and Communication - International Conference, ICTCC 2014, Ho Chi Minh City, Vietnam, November 24-25,... Nature of Computation and Communication - International Conference, ICTCC 2014, Ho Chi Minh City, Vietnam, November 24-25, 2014, Revised Selected Papers (Paperback, 2015 ed.)
Phan Cong-Vinh, Emil Vassev, Mike Hinchey
R2,386 Discovery Miles 23 860 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Nature of Computation and Communication, ICTCC 2014, held in November 2014 in Ho Chi Minh City, Vietnam. The 34 revised full papers presented were carefully reviewed and selected from over 100 submissions. The papers cover formal methods for self-adaptive systems and discuss natural approaches and techniques for computation and communication.

Engineering Secure Software and Systems - 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015, Proceedings... Engineering Secure Software and Systems - 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015, Proceedings (Paperback, 2015 ed.)
Frank Piessens, Juan Caballero, Nataliia Bielova
R1,994 Discovery Miles 19 940 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th International Symposium on Engineering Secure Software and Systems, ESSoS 2015, held in Milan, Italy, in March 2015. The 11 full papers presented together with 5 short papers were carefully reviewed and selected from 41 submissions. The symposium features the following topics: formal methods; cloud passwords; machine learning; measurements ontologies; and access control.

Soft Computing in Communications (Paperback, Softcover reprint of the original 1st ed. 2004): Lipo Wang Soft Computing in Communications (Paperback, Softcover reprint of the original 1st ed. 2004)
Lipo Wang
R4,045 Discovery Miles 40 450 Ships in 18 - 22 working days

Soft computing, as opposed to conventional "hard" computing, tolerates imprecision and uncertainty, in a way very much similar to the human mind. Soft computing techniques include neural networks, evolutionary computation, fuzzy logic, and chaos. The recent years have witnessed tremendous success of these powerful methods in virtually all areas of science and technology, as evidenced by the large numbers of research results published in a variety of journals, conferences, as weil as many excellent books in this book series on Studies in Fuzziness and Soft Computing. This volume is dedicated to recent novel applications of soft computing in communications. The book is organized in four Parts, i.e., (1) neural networks, (2) evolutionary computation, (3) fuzzy logic and neurofuzzy systems, and (4) kernel methods. Artificial neural networks consist of simple processing elements called neurons, which are connected by weights that may be adjusted during learning. Part 1 of the book has seven chapters, demonstrating some of the capabilities of two major types of neural networks, i.e., multiplayer perceptron (MLP) neural networks and Hopfield-type neural networks.

Semantic Web Services for Web Databases (Paperback, 2011 ed.): Mourad Ouzzani, Athman Bouguettaya Semantic Web Services for Web Databases (Paperback, 2011 ed.)
Mourad Ouzzani, Athman Bouguettaya
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Semantic Web Services for Web Databases introduces an end-to-end framework for querying Web databases using novel Web service querying techniques. This includes a detailed framework for the query infrastructure for Web databases and services. Case studies are covered in the last section of this book. Semantic Web Services For Web Databases is designed for practitioners and researchers focused on service-oriented computing and Web databases.

Heavy Traffic Analysis of Controlled Queueing and Communication Networks (Paperback, Softcover reprint of the original 1st ed.... Heavy Traffic Analysis of Controlled Queueing and Communication Networks (Paperback, Softcover reprint of the original 1st ed. 2001)
Harold Kushner
R1,474 Discovery Miles 14 740 Ships in 18 - 22 working days

One of the first books in the timely and important area of heavy traffic analysis of controlled and uncontrolled stochastics networks, by one of the leading authors in the field. The general theory is developed, with possibly state dependent parameters, and specialized to many different cases of practical interest.

Cloud Computing - 5th International Conference, CloudComp 2014, Guilin, China, October 19-21, 2014, Revised Selected Papers... Cloud Computing - 5th International Conference, CloudComp 2014, Guilin, China, October 19-21, 2014, Revised Selected Papers (Paperback, 2015 ed.)
Victor C. M. Leung, Roy Xiaorong Lai, Min Chen, Jiafu Wan
R2,037 Discovery Miles 20 370 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post conference proceedings of the 5th International Conference on Cloud Computing, CloudComp 2014, held in Guilin, China, in October 2014. The 25 revised full papers were carefully reviewed and selected from 72 submissions and cover topics such as mobile cloud computing, services, applications, IoT on cloud, architectures and big data, cloud-assisted pervasive computing and services, management and virtualization for cloud, cloud security.

Human Computer Interaction - 6th Latin American Conference, CLIHC 2013, Carrillo, Costa Rica, December 2-6, 2013, Proceedings... Human Computer Interaction - 6th Latin American Conference, CLIHC 2013, Carrillo, Costa Rica, December 2-6, 2013, Proceedings (Paperback, 2013 ed.)
Cesar Collazos, Andreia Liborio, Cristian Rusu
R1,815 Discovery Miles 18 150 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 6th bi-annual Latin American Conference on Human-Computer Interaction, CLIHC 2013, held in Guanacasta, Costa Rica, in December 2013. The 11 full papers and 14 short papers were carefully reviewed and selected from 32 submissions. The papers address all current topics in HCI such as: cultural issues, assistive technologies, usability, accessibility, multimodal inter-faces, design issues, HCI education, and visualization and evaluation techniques, among others.

Distributed Denial of Service Attack and Defense (Paperback, 2014 ed.): Shui Yu Distributed Denial of Service Attack and Defense (Paperback, 2014 ed.)
Shui Yu
R1,645 Discovery Miles 16 450 Ships in 18 - 22 working days

This brief provides readers a complete and self-contained resource for information about DDoS attacks and how to defend against them. It presents the latest developments in this increasingly crucial field along with background context and survey material. The book also supplies an overview of DDoS attack issues, DDoS attack detection methods, DDoS attack source traceback, and details on how hackers organize DDoS attacks. The author concludes with future directions of the field, including the impact of DDoS attacks on cloud computing and cloud technology. The concise yet comprehensive nature of this brief makes it an ideal reference for researchers and professionals studying DDoS attacks. It is also a useful resource for graduate students interested in cyberterrorism and networking.

Cloud Computing - Third International Conference, CloudComp 2012, Vienna, Austria, September 24-26, 2012, Revised Selected... Cloud Computing - Third International Conference, CloudComp 2012, Vienna, Austria, September 24-26, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Mazin Yousif, Lutz Schubert
R1,659 Discovery Miles 16 590 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post conference proceedings of the Third International Conference on Cloud Computing, Cloud Comp 2012, held in Vienna, Austria, in September 2012. The 14 revised full papers were carefully reviewed and selected from numerous submissions and cover various topics in the application of cloud computing technologies.

Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, HVC 2013, Haifa, Israel,... Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, HVC 2013, Haifa, Israel, November 5-7, 2013, Proceedings (Paperback, 2013 ed.)
Valeria Bertacco, Axel Legay
R1,433 Discovery Miles 14 330 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 9th International Haifa Verification Conference, HVC 2013, held in Haifa, Israel in November 2013. The 24 revised full papers presented were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on SAT and SMT-based verification, software testing, supporting dynamic verification, specification and coverage, abstraction and model presentation.

Distributed Computing and Networking - 15th International Conference, ICDCN 2014, Coimbatore, India, January 4-7, 2014,... Distributed Computing and Networking - 15th International Conference, ICDCN 2014, Coimbatore, India, January 4-7, 2014, Proceedings (Paperback, 2013)
Mainak Chatterjee, Jiannong Cao, Kishore Kothapalli, Sergio Rajsbaum
R1,482 Discovery Miles 14 820 Ships in 18 - 22 working days

This book constitutes the proceedings of the 15th International Conference on Distributed Computing and Networking, ICDCN 2014, held in Coimbatore, India, in January 2014. The 32 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 110 submissions. They are organized in topical sections named: mutual exclusion, agreement and consensus; parallel and multi-core computing; distributed algorithms; transactional memory; P2P and distributed networks; resource sharing and scheduling; cellular and cognitive radio networks and backbone networks.

Advanced Concepts for Intelligent Vision Systems - 15th International Conference, ACIVS 2013, Poznan, Poland, October 28-31,... Advanced Concepts for Intelligent Vision Systems - 15th International Conference, ACIVS 2013, Poznan, Poland, October 28-31, 2013, Proceedings (Paperback, 2013 ed.)
Jaques Blanc-Talon, Andrzej Kasiniski, Wilfried Philips, Dan Popescu, Paul Scheunders
R2,772 Discovery Miles 27 720 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed proceedings of the 15th International Conference on Advanced Concepts for Intelligent Vision Systems, ACIVS 2013, held in Pozna, Poland, in October 2013. The 63 revised full papers were carefully selected from 111 submissions. The topics covered are aquisition, pre-processing and coding, biometry, classification and recognition, depth, 3D and tracking, efficient implementation and frameworks, low level image analysis, segmentation and video analysis."

An Introduction to Queueing Systems (Paperback, Softcover reprint of the original 1st ed. 2002): Sanjay K. Bose An Introduction to Queueing Systems (Paperback, Softcover reprint of the original 1st ed. 2002)
Sanjay K. Bose
R4,037 Discovery Miles 40 370 Ships in 18 - 22 working days

Queueing is an aspect of modern life that we encounter at every step in our daily activities. Whether it happens at the checkout counter in the supermarket or in accessing the Internet, the basic phenomenon of queueing arises whenever a shared facility needs to be accessed for service by a ]arge number of jobs or customers. The study of queueing is important as it gravides both a theoretical background to the kind of service that we may expect from such a facility and the way in which the facility itself may be designed to provide some specified grade of service to its customers. Our study of queueing was basically motivated by its use in the study of communication systems and computer networks. The various computers, routers and switches in such a network may be modelled as individual queues. The whole system may itself be modelled as a queueing network providing the required service to the messages, packets or cells that need to be carried. Application of queueing theory provides the theoretical framework for the design and study of such networks. The purpose of this book is to support a course on queueing systems at the senior undergraduate or graduate Ievels. Such a course would then provide the theoretical background on which a subsequent course on the performance modeHing and analysis of computer networks may be based.

Location Privacy Protection in Mobile Networks (Paperback, 2013 ed.): Xinxin Liu, Xiaolin Li Location Privacy Protection in Mobile Networks (Paperback, 2013 ed.)
Xinxin Liu, Xiaolin Li
R1,592 Discovery Miles 15 920 Ships in 18 - 22 working days

This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users' privacy. The second approach considers a totally distributed environment where users perform privacy protection by themselves. Finally, more general system architecture is discussed including how a semi-trusted server may exist, but users need to collaborate to achieve maximized privacy protection. This brief is designed for researchers and professionals working with privacy preservation, mobile networks, and threat models. The variety of approaches presented makes it useful for students as well.

Wireless Internet - 7th International ICST Conference, WICON 2013, Shanghai, China, April 11-12, 2013, Revised Selected Papers... Wireless Internet - 7th International ICST Conference, WICON 2013, Shanghai, China, April 11-12, 2013, Revised Selected Papers (Paperback, 2013)
Hua Qian, Kai Kang
R1,273 Discovery Miles 12 730 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International ICST Conference on Wireless Internet, WICON 2013, held in Shanghai, China, in April 2012. The 20 revised full papers were carefully reviewed and selected from numerous submissions. The papers cover topics such as vehicular communications and heterogeneous networks, cognitive radio and multi-antenna systems, networks and beyond, ad hoc and mesh networks.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Handbook of Multimedia Information…
Amit Kumar Singh, Anand Mohan Hardcover R6,633 Discovery Miles 66 330
Handbook of Computer Networks and Cyber…
Brij B. Gupta, Gregorio Martinez Perez, … Hardcover R7,167 Discovery Miles 71 670
The Internet of Things in the Industrial…
Zaigham Mahmood Hardcover R4,001 Discovery Miles 40 010
Design and Implementation of Practical…
Akshay Kumar, Ahmed Abdelhadi, … Hardcover R2,663 Discovery Miles 26 630
Distributed Real-Time Systems - Theory…
K. Erciyes Hardcover R2,132 Discovery Miles 21 320
Learning from Imbalanced Data Sets
Alberto Fernandez, Salvador Garcia, … Hardcover R4,006 Discovery Miles 40 060
Fault Tolerant Architectures for…
Sikhar Patranabis, Debdeep Mukhopadhyay Hardcover R3,802 Discovery Miles 38 020
Cyber-Physical Systems - Foundations…
Houbing Song, Danda B. Rawat, … Paperback R2,507 R2,368 Discovery Miles 23 680
Vehicular ad hoc Networks - Standards…
Claudia Campolo, Antonella Molinaro, … Hardcover R4,834 Discovery Miles 48 340
Malicious Attack Propagation and Source…
Jiaojiao Jiang, Sheng Wen, … Hardcover R3,336 Discovery Miles 33 360

 

Partners